From 38a6cf0b567c655ec5ca6cf6ad72d02110112eb4 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Mon, 2 Oct 2017 05:01:34 +0000 Subject: [PATCH] DB: 2017-10-02 8 new exploits Dup Scout Enterprise 10.0.18 - 'Import Command' Buffer Overflow Sync Breeze Enterprise 10.0.28 - Buffer Overflow SmarterStats 11.3.6347 - Cross-Site Scripting WordPress Plugin WPHRM - SQL Injection PHP Multi Vendor Script 1.02 - 'sid' Parameter SQL Injection Real Estate MLM plan script 1.0 - 'srch' Parameter SQL Injection ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download HBGK DVR 3.0.0 build20161206 - Authentication Bypass --- files.csv | 8 ++++ platforms/aspx/webapps/42923.txt | 68 +++++++++++++++++++++++++++ platforms/hardware/webapps/42931.txt | 26 +++++++++++ platforms/php/webapps/42924.txt | 29 ++++++++++++ platforms/php/webapps/42925.txt | 41 +++++++++++++++++ platforms/php/webapps/42926.txt | 37 +++++++++++++++ platforms/php/webapps/42927.txt | 45 ++++++++++++++++++ platforms/windows/local/42921.py | 64 ++++++++++++++++++++++++++ platforms/windows/remote/42928.py | 69 ++++++++++++++++++++++++++++ 9 files changed, 387 insertions(+) create mode 100755 platforms/aspx/webapps/42923.txt create mode 100755 platforms/hardware/webapps/42931.txt create mode 100755 platforms/php/webapps/42924.txt create mode 100755 platforms/php/webapps/42925.txt create mode 100755 platforms/php/webapps/42926.txt create mode 100755 platforms/php/webapps/42927.txt create mode 100755 platforms/windows/local/42921.py create mode 100755 platforms/windows/remote/42928.py diff --git a/files.csv b/files.csv index 9b0177ce8..1c435b4d7 100644 --- a/files.csv +++ b/files.csv @@ -9263,6 +9263,7 @@ id,file,description,date,author,platform,type,port 42777,platforms/windows/local/42777.py,"CyberLink LabelPrint < 2.5 - Buffer Overflow (SEH Unicode)",2017-09-23,f3ci,windows,local,0 42890,platforms/windows/local/42890.txt,"Trend Micro OfficeScan 11.0/XG (12.0) - Image File Execution Bypass",2017-09-28,hyp3rlinx,windows,local,0 42918,platforms/windows/local/42918.py,"DiskBoss Enterprise 8.4.16 - 'Import Command' Buffer Overflow",2017-09-28,"Touhid M.Shaikh",windows,local,0 +42921,platforms/windows/local/42921.py,"Dup Scout Enterprise 10.0.18 - 'Import Command' Buffer Overflow",2017-09-29,"Touhid M.Shaikh",windows,local,0 1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80 2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80 5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139 @@ -15868,6 +15869,7 @@ id,file,description,date,author,platform,type,port 42793,platforms/multiple/remote/42793.rb,"NodeJS Debugger - Command Injection (Metasploit)",2017-09-26,Metasploit,multiple,remote,5858 42806,platforms/java/remote/42806.py,"Oracle WebLogic Server 10.3.6.0 - Java Deserialization",2017-09-27,SlidingWindow,java,remote,0 42888,platforms/hardware/remote/42888.sh,"Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remote Code Execution",2017-09-27,"Adam Brown",hardware,remote,0 +42928,platforms/windows/remote/42928.py,"Sync Breeze Enterprise 10.0.28 - Buffer Overflow",2017-09-30,"Owais Mehtab",windows,remote,0 14113,platforms/arm/shellcode/14113.txt,"Linux/ARM - setuid(0) + execve(_/bin/sh___/bin/sh__0) Shellcode (38 bytes)",2010-06-29,"Jonathan Salwan",arm,shellcode,0 13241,platforms/aix/shellcode/13241.txt,"AIX - execve /bin/sh Shellcode (88 bytes)",2004-09-26,"Georgi Guninski",aix,shellcode,0 13242,platforms/bsd/shellcode/13242.txt,"BSD - Reverse TCP /bin/sh Shell (127.0.0.1:31337/TCP) Shellcode (124 bytes)",2000-11-19,Scrippie,bsd,shellcode,0 @@ -38602,3 +38604,9 @@ id,file,description,date,author,platform,type,port 42916,platforms/hardware/webapps/42916.py,"Roteador Wireless Intelbras WRN150 - Autentication Bypass",2017-09-28,"Elber Tavares",hardware,webapps,0 42919,platforms/php/webapps/42919.txt,"Easy Blog PHP Script 1.3a - 'id' Parameter SQL Injection",2017-09-28,8bitsec,php,webapps,0 42922,platforms/php/webapps/42922.py,"FileRun < 2017.09.18 - SQL Injection",2017-09-29,SPARC,php,webapps,0 +42923,platforms/aspx/webapps/42923.txt,"SmarterStats 11.3.6347 - Cross-Site Scripting",2017-09-27,sqlhacker,aspx,webapps,0 +42924,platforms/php/webapps/42924.txt,"WordPress Plugin WPHRM - SQL Injection",2017-09-29,"Ihsan Sencan",php,webapps,0 +42925,platforms/php/webapps/42925.txt,"PHP Multi Vendor Script 1.02 - 'sid' Parameter SQL Injection",2017-09-28,8bitsec,php,webapps,0 +42926,platforms/php/webapps/42926.txt,"Real Estate MLM plan script 1.0 - 'srch' Parameter SQL Injection",2017-09-28,8bitsec,php,webapps,0 +42927,platforms/php/webapps/42927.txt,"ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download",2017-09-29,"Ihsan Sencan",php,webapps,0 +42931,platforms/hardware/webapps/42931.txt,"HBGK DVR 3.0.0 build20161206 - Authentication Bypass",2017-09-24,"RAT - ThiefKing",hardware,webapps,0 diff --git a/platforms/aspx/webapps/42923.txt b/platforms/aspx/webapps/42923.txt new file mode 100755 index 000000000..5f339f021 --- /dev/null +++ b/platforms/aspx/webapps/42923.txt @@ -0,0 +1,68 @@ +---------------------------- +Title: CVE-2017-14620 +---------------------------- +TL;DR: SmarterStats Version 11.3.6347, and possibly prior versions, +will Render the Referer Field of HTTP Logfiles in URL /Data/Reports/ReferringURLsWithQueries +---------------------------- +Author: David Hoyt +Date: September 29, 2017 +---------------------------- +CVSS:3.0 Metrics +CVSS:3.0 Vector String: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C/CR:M/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:L/MI:N/MA:N +CVSS:3.0 Scores: Base Score 4.3, Temporal Score: 4.1, Environmental Score: 4.1 +---------------------------- +Keywords +---------------------------- +CVE-2017-14620, CWE-533, CWE-532, CWE-117, CWE-93, CAPEC-86, CAPEC-79, Stored Document Object Model Cross Site Scripting (Stored DOM XSS), +Client Side Request Forgery (CSRF), Open Redirection, HTTP Logfiles, Exploit, PoC, HTML Tags, SmarterStats 11.3 +---------------------------- +CVE-2017-14620 Requirements +---------------------------- + SmarterStats Version 11.3 + HTTP Proxy (BurpSuite, Fiddler) + Web Browser (Chrome - Current/Stable) + User Interaction Required - Must Click Referer Link Report + Supported Windows OS + Microsoft .NET 4.5 +---------------------------- +CVE-2017-14620 Reproduction +---------------------------- +Vendor Link https://www.smartertools.com/smarterstats/website-analytics +Download Link https://www.smartertools.com/smarterstats/downloads + +Step 1: Test with an HTTP Logfile containing a URL-encoded String to the Referer Field with HTML Tags to be Rendered in a Browser: + +http://www.bing.com/search?q=Loading\n
+
\n