Subscribe via feed.
Archive for May, 2017

BuilderEngine Arbitrary File Upload / Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a vulnerability found in BuilderEngine 3.5.0 via elFinder 2.0. The jquery-file-upload plugin can be abused to upload a malicious file, which would result in arbitrary remote code execution under the context of the web server.

WordPress PHPMailer Host Header Command Injection

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a command injection vulnerability in WordPress version 4.6 with Exim as an MTA via a spoofed Host header to PHPMailer, a mail-sending library that is bundled with WordPress. A valid WordPress username is required to exploit the vulnerability. Additionally, due to the altered Host header, exploitation is limited to the default […]

MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption

Posted by deepcore under exploit (No Respond)

This Metasploit module is a port of the Equation Group ETERNALBLUE exploit, part of the FuzzBunch toolkit released by Shadow Brokers. There is a buffer overflow memmove operation in Srv!SrvOs2FeaToNt. The size is calculated in Srv!SrvOs2FeaListSizeToNt, with mathematical error where a DWORD is subtracted into a WORD. The kernel pool is groomed so that overflow […]

Serviio Media Server checkStreamUrl Command Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits an unauthenticated remote command execution vulnerability in the console component of Serviio Media Server versions 1.4 to 1.8 on Windows operating systems. The console service (on port 23423 by default) exposes a REST API which which does not require authentication. The ‘action’ API endpoint does not sufficiently sanitize user-supplied data in […]

PingID MFA Cross Site Scripting

Posted by deepcore under exploit (No Respond)

PingID MFA suffers from a cross site scripting vulnerability.

Dup Scout Enterprise 9.5.14 Buffer Overflow

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of Dup Scout Enterprise v9.5.14, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

PlaySms 1.4 Remote Code Execution

Posted by deepcore under exploit (No Respond)

PlaySms version 1.4 suffers from a remote code execution vulnerability.

Microsoft Windows Kernel bind() Out-Of-Bounds Read

Posted by deepcore under exploit (No Respond)

Two related bugs have been discovered in the Microsoft Windows kernel code responsible for implementing the bind() socket function, specifically in the afd!AfdBind and tcpip!TcpBindEndpoint routines. They both can lead to reading beyond the allocated pool-based buffer memory area, potentially allowing user-mode applications to disclose kernel-mode secrets. They can also be exploited to trigger a […]

Microsoft Windows Kernel DACL Descriptor Uninitialized Memory

Posted by deepcore under exploit (No Respond)

Microsoft Windows kernel suffers from an uninitialized memory issue in the default DACL descriptor of system processes token.

Microsoft Windows Kernel nt!NtTraceControl Memory Disclosure

Posted by deepcore under exploit (No Respond)

The handler of the nt!NtTraceControl system call (specifically the EtwpSetProviderTraitsUm functionality, opcode 0x1E) discloses portions of uninitialized pool memory to user-mode clients on Microsoft Windows 10 systems.