diff --git a/files.csv b/files.csv index 060a8770a..ea994db89 100755 --- a/files.csv +++ b/files.csv @@ -26932,7 +26932,7 @@ id,file,description,date,author,platform,type,port 30011,platforms/windows/remote/30011.rb,"Microsoft Tagged Image File Format (TIFF) Integer Overflow",2013-12-03,metasploit,windows,remote,0 30012,platforms/php/webapps/30012.txt,"Chamilo Lms 1.9.6 (profile.php, password0 param) - SQL Injection",2013-12-03,"High-Tech Bridge SA",php,webapps,80 30013,platforms/php/webapps/30013.txt,"Dokeos 2.2 RC2 (index.php, language param) - SQL Injection",2013-12-03,"High-Tech Bridge SA",php,webapps,80 -30014,platforms/windows/local/30014.py,"Windows NDPROXY - Local SYSTEM Privilege Escalation",2013-12-03,ryujin,windows,local,0 +30014,platforms/windows/local/30014.py,"Windows NDPROXY - Local SYSTEM Privilege Escalation (MS14-002)",2013-12-03,ryujin,windows,local,0 30015,platforms/php/webapps/30015.txt,"Advanced Guestbook 2.4.2 Lang Cookie Parameter Local File Include Vulnerability",2007-05-08,netVigilance,php,webapps,0 30016,platforms/windows/remote/30016.txt,"Adobe RoboHelp Frameset-7.HTML Cross-Site Scripting Vulnerability",2007-05-08,"Michael Domberg",windows,remote,0 30017,platforms/unix/local/30017.sh,"HP Tru64 5.0.1 DOP Command Local Privilege Escalation Vulnerability",2007-05-08,"Daniele Calore",unix,local,0 @@ -32500,3 +32500,17 @@ id,file,description,date,author,platform,type,port 36057,platforms/cgi/webapps/36057.txt,"IBM Endpoint Manager - Stored XSS Vulnerability",2015-02-11,"RedTeam Pentesting",cgi,webapps,52311 36058,platforms/php/webapps/36058.txt,"Wordpress Video Gallery 2.7.0 - SQL Injection Vulnerability",2015-02-12,"Claudio Viviani",php,webapps,0 36059,platforms/php/webapps/36059.txt,"Exponent CMS 2.3.1 - Multiple XSS Vulnerabilities",2015-02-12,"Mayuresh Dani",php,webapps,80 +36063,platforms/asp/webapps/36063.txt,"Code Widgets Online Job Application 'admin.asp' Multiple SQL Injection Vulnerabilities",2011-08-17,"L0rd CrusAd3r",asp,webapps,0 +36064,platforms/asp/webapps/36064.txt,"Code Widgets DataBound Index Style Menu 'category.asp' SQL Injection Vulnerability",2011-08-17,Inj3ct0r,asp,webapps,0 +36065,platforms/asp/webapps/36065.txt,"Code Widgets DataBound Collapsible Menu 'main.asp' SQL Injection Vulnerability",2011-08-17,Inj3ct0r,asp,webapps,0 +36066,platforms/asp/webapps/36066.txt,"Code Widgets Multiple Question - Multiple Choice Online Questionaire SQL Injection Vulnerability",2011-08-17,"L0rd CrusAd3r",asp,webapps,0 +36067,platforms/cfm/webapps/36067.txt,"Adobe ColdFusion 'probe.cfm' Cross Site Scripting Vulnerability",2011-08-18,G.R0b1n,cfm,webapps,0 +36068,platforms/php/webapps/36068.txt,"MantisBT <= 1.1.8 Cross Site Scripting and SQL Injection Vulnerabilities",2011-08-18,Net.Edit0r,php,webapps,0 +36070,platforms/php/dos/36070.txt,"PHP Prior to 5.3.7 Multiple NULL Pointer Dereference Denial Of Service Vulnerabilities",2011-08-19,"Maksymilian Arciemowicz",php,dos,0 +36071,platforms/windows/dos/36071.py,"Xlight FTP Server 3.7 Remote Buffer Overflow Vulnerability",2011-08-19,KedAns-Dz,windows,dos,0 +36072,platforms/php/webapps/36072.txt,"OneFileCMS 1.1.1 'onefilecms.php' Cross Site Scripting Vulnerability",2011-08-21,mr.pr0n,php,webapps,0 +36073,platforms/php/webapps/36073.txt,"Pandora FMS 3.x 'index.php' Cross Site Scripting Vulnerability",2011-08-22,"mehdi boukazoula",php,webapps,0 +36074,platforms/php/webapps/36074.txt,"TotalShopUK 1.7.2 'index.php' SQL Injection Vulnerability",2011-08-22,"Eyup CELIK",php,webapps,0 +36075,platforms/windows/remote/36075.py,"Freefloat FTP Server 'ALLO' Command Remote Buffer Overflow Vulnerability",2011-08-20,Black.Spook,windows,remote,0 +36076,platforms/php/webapps/36076.txt,"Concrete 5.4.1 1 'rcID' Parameter Cross Site Scripting Vulnerability",2011-08-22,"Aung Khant",php,webapps,0 +36077,platforms/php/webapps/36077.txt,"Open Classifieds 1.7.2 Multiple Cross Site Scripting Vulnerabilities",2011-08-23,"Yassin Aboukir",php,webapps,0 diff --git a/platforms/asp/webapps/36063.txt b/platforms/asp/webapps/36063.txt new file mode 100755 index 000000000..4c0bd9fe9 --- /dev/null +++ b/platforms/asp/webapps/36063.txt @@ -0,0 +1,10 @@ +source: http://www.securityfocus.com/bid/49207/info + +Code Widgets Online Job Application is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +The following example input is available: + +Username : ' or 1=1 or ''='' +Password: ' or 1=1 or ''='' \ No newline at end of file diff --git a/platforms/asp/webapps/36064.txt b/platforms/asp/webapps/36064.txt new file mode 100755 index 000000000..4fe4fc7cb --- /dev/null +++ b/platforms/asp/webapps/36064.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/49208/info + +Code Widgets DataBound Index Style Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +http://www.example.com/CS0106/category.asp?cat=[sqli] \ No newline at end of file diff --git a/platforms/asp/webapps/36065.txt b/platforms/asp/webapps/36065.txt new file mode 100755 index 000000000..9b1762778 --- /dev/null +++ b/platforms/asp/webapps/36065.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/49209/info + +Code Widgets DataBound Collapsible Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +http://www.example.com/CS0077/main.asp?key=[sqli] \ No newline at end of file diff --git a/platforms/asp/webapps/36066.txt b/platforms/asp/webapps/36066.txt new file mode 100755 index 000000000..29a641371 --- /dev/null +++ b/platforms/asp/webapps/36066.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/49210/info + +Code Widgets Multiple Question - Multiple Choice Online Questionaire is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +http://www.example.com/CS0099/index.asp?Q=2&A=[sqli] \ No newline at end of file diff --git a/platforms/cfm/webapps/36067.txt b/platforms/cfm/webapps/36067.txt new file mode 100755 index 000000000..00b6b21dc --- /dev/null +++ b/platforms/cfm/webapps/36067.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/49220/info + +Adobe ColdFusion is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker could exploit this vulnerability to execute arbitrary script code in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +http://www.example.com/CFIDE/probe.cfm?name= \ No newline at end of file diff --git a/platforms/cgi/webapps/35900.txt b/platforms/cgi/webapps/35900.txt new file mode 100755 index 000000000..c956599ad --- /dev/null +++ b/platforms/cgi/webapps/35900.txt @@ -0,0 +1,143 @@ +Document Title: +=============== +Barracuda Networks Cloud Series - Filter Bypass Vulnerability + + +References (Source): +==================== +http://www.vulnerability-lab.com/get_content.php?id=754 + +Barracuda Networks Security ID (BNSEC): 731 + + +Release Date: +============= +2015-01-19 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +754 + + +Common Vulnerability Scoring System: +==================================== +4.5 + + +Abstract Advisory Information: +============================== +The Vulnerability Laboratory Research Team discovered a filter bypass vulnerability in the official Barracuda Cloud Series Products. + + +Vulnerability Disclosure Timeline: +================================== +2015-01-19: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Affected Product(s): +==================== +Barracuda Networks +Product: Cloud Control Center 2014 Q2 + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Technical Details & Description: +================================ +A filter bypass vulnerability has been discovered in the official Barracuda Networks Cloud Series Appliance Applications 2014-Q1. +The filter bypass issue allows an attacker to bypass the secure filter validation of the service to execute malicious script codes. + +The barracuda filter blocks for example standard iframes, scripts and other invalid code context: The cloud service has a own exception-handling +to parse or encode malicious injected web context. The mechanism filters the first request and sanitizes the output in every input field. + +During a pentest we injected a standard iframe to check and provoke the validation. The frame got blocked! In the next step the attacker splits (%20%20%20) +the request and injects at the end an onload frame to an external malicious source. The second iframe with the onload alert executes the script codes after +the validation encoded only the first script code tag. The second script code tag can bypass the applicance filter mechanism and executes in the web context +of affected modules. The secure validation does not recognize a splitted request which results in client-side and application-side script code execution in +the cloud series products. + +The security risk of the filter bypass vulnerability is estimated as medium and the cvss (common vulnerability scoring system) count is 4.5 (medium). +Exploitation of the filter bypass vulnerability requires a low privileged application user account with restricted access and low user interaction. +Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects and persistent manipulation +of affected or connected module context. + +Vulnerable Request Method(s): + [+] POST & GET + + +Proof of Concept (PoC): +======================= +The filter bypass web vulnerability can be exploited by local privileged user accounts and remote attackers with low or medium user interaction. +For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. + +PoC: +