From 8945b320b5b4862fe1232b3a22cc42d07b1392b9 Mon Sep 17 00:00:00 2001 From: Exploit-DB Date: Sat, 6 May 2023 00:16:26 +0000 Subject: [PATCH] DB: 2023-05-06 20 changes to exploits/shellcodes/ghdb Codigo Markdown Editor v1.0.1 (Electron) - Remote Code Execution Cmaps v8.0 - SQL injection EasyPHP Webserver 14.1 - Multiple Vulnerabilities (RCE and Path Traversal) File Thingie 2.5.7 - Remote Code Execution (RCE) Intern Record System v1.0 - SQL Injection (Unauthenticated) Jedox 2020.2.5 - Disclosure of Database Credentials via Improper Access Controls Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path Jedox 2020.2.5 - Remote Code Execution via Executable Groovy-Scripts Jedox 2020.2.5 - Stored Cross-Site Scripting in Log-Module Jedox 2022.4.2 - Code Execution via RPC Interfaces Jedox 2022.4.2 - Disclosure of Database Credentials via Connection Checks Jedox 2022.4.2 - Remote Code Execution via Directory Traversal KodExplorer v4.51.03 - Pwned-Admin File-Inclusion - Remote Code Execution (RCE) Online Pizza Ordering System v1.0 - Unauthenticated File Upload pluck v4.7.18 - Stored Cross-Site Scripting (XSS) Simple Task Managing System v1.0 - SQL Injection (Unauthenticated) Ulicms-2023.1 sniffing-vicuna - Remote Code Execution (RCE) Ulicms-2023.1 sniffing-vicuna - Stored Cross-Site Scripting (XSS) Wolf CMS 0.8.3.1 - Remote Code Execution (RCE) --- exploits/multiple/local/51432.txt | 35 ++++++ exploits/php/webapps/51274.txt | 2 +- exploits/php/webapps/51419.txt | 48 ++++++++ exploits/php/webapps/51420.txt | 77 ++++++++++++ exploits/php/webapps/51421.txt | 18 +++ exploits/php/webapps/51422.txt | 46 ++++++++ exploits/php/webapps/51423.txt | 182 ++++++++++++++++++++++++++++ exploits/php/webapps/51424.txt | 28 +++++ exploits/php/webapps/51425.txt | 34 ++++++ exploits/php/webapps/51426.txt | 25 ++++ exploits/php/webapps/51427.txt | 28 +++++ exploits/php/webapps/51428.txt | 56 +++++++++ exploits/php/webapps/51429.txt | 25 ++++ exploits/php/webapps/51430.txt | 116 ++++++++++++++++++ exploits/php/webapps/51431.py | 74 ++++++++++++ exploits/php/webapps/51434.txt | 151 ++++++++++++++++++++++++ exploits/php/webapps/51435.txt | 75 ++++++++++++ exploits/php/webapps/51436.py | 189 ++++++++++++++++++++++++++++++ files_exploits.csv | 21 +++- ghdb.xml | 105 +++++++++++++++++ 20 files changed, 1332 insertions(+), 3 deletions(-) create mode 100644 exploits/multiple/local/51432.txt create mode 100644 exploits/php/webapps/51419.txt create mode 100644 exploits/php/webapps/51420.txt create mode 100644 exploits/php/webapps/51421.txt create mode 100644 exploits/php/webapps/51422.txt create mode 100644 exploits/php/webapps/51423.txt create mode 100644 exploits/php/webapps/51424.txt create mode 100644 exploits/php/webapps/51425.txt create mode 100644 exploits/php/webapps/51426.txt create mode 100644 exploits/php/webapps/51427.txt create mode 100644 exploits/php/webapps/51428.txt create mode 100644 exploits/php/webapps/51429.txt create mode 100644 exploits/php/webapps/51430.txt create mode 100755 exploits/php/webapps/51431.py create mode 100644 exploits/php/webapps/51434.txt create mode 100644 exploits/php/webapps/51435.txt create mode 100755 exploits/php/webapps/51436.py diff --git a/exploits/multiple/local/51432.txt b/exploits/multiple/local/51432.txt new file mode 100644 index 000000000..39c57a75d --- /dev/null +++ b/exploits/multiple/local/51432.txt @@ -0,0 +1,35 @@ +# Exploit Title: Codigo Markdown Editor v1.0.1 (Electron) - Arbitrary Code Execution +# Date: 2023-05-03 +# Exploit Author: 8bitsec +# Vendor Homepage: https://alfonzm.github.io/codigo/ +# Software Link: https://github.com/alfonzm/codigo-app +# Version: 1.0.1 +# Tested on: [Mac OS 13] + +Release Date: +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +2023-05-03 + +Product & Service Introduction: +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= +=3D=3D=3D=3D=3D=3D +A Markdown editor & notes app made with Vue & Electron + +Technical Details & Description: +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= +=3D=3D=3D=3D=3D=3D=3D + +A vulnerability was discovered on Codigo markdown editor v1.0.1 allowing a = +user to execute arbitrary code by opening a specially crafted file. + +Proof of Concept (PoC): +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Arbitrary code execution: + +Create a markdown file (.md) in any text editor and write the following pay= +load: +