Subscribe via feed.
Archive for October, 2021

[webapps] TextPattern CMS 4.8.7 – Remote Command Execution (RCE) (Authenticated)

Posted by deepcore under Security (No Respond)

TextPattern CMS 4.8.7 – Remote Command Execution (RCE) (Authenticated)

Tags: ,

[webapps] TextPattern CMS 4.8.7 – Remote Command Execution (RCE) (Authenticated)

Posted by deepcore under Security (No Respond)

TextPattern CMS 4.8.7 – Remote Command Execution (RCE) (Authenticated)

Tags: ,

[local] SolarWinds Kiwi CatTools 3.11.8 – Unquoted Service Path

Posted by deepcore under Security (No Respond)

SolarWinds Kiwi CatTools 3.11.8 – Unquoted Service Path

Tags: ,

myfactory.FMS 7.1-911 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

myfactory.FMS versions 7.1-911 and below suffer from a cross site scripting vulnerability.

Moodle Authenticated Spelling Binary Remote Code Execution

Posted by deepcore under exploit (No Respond)

Moodle allows an authenticated user to define spellcheck settings via the web interface. The user can update the spellcheck mechanism to point to a system-installed aspell binary. By updating the path for the spellchecker to an arbitrary command, an attacker can run arbitrary commands in the context of the web application upon spellchecking requests. This […]

Moodle Teacher Enrollment Privilege Escalation / Remote Code Execution

Posted by deepcore under exploit (No Respond)

Moodle versions 3.9, 3.8 to 3.8.3, 3.7 to 3.7.6, 3.5 to 3.5.12, and earlier unsupported versions allow for a teacher to exploit chain to remote code execution. A bug in the privileges system allows a teacher to add themselves as a manager to their own class. They can then add any other users, and thus […]

Moodle SpellChecker Path Authenticated Remote Command Execution

Posted by deepcore under exploit (No Respond)

Moodle allows an authenticated administrator to define spellcheck settings via the web interface. An administrator can update the aspell path to include a command injection. This is extremely similar to CVE-2013-3630, just using a different variable. This Metasploit module was tested against Moodle versions 3.11.2, 3.10.0, and 3.8.0.

Moodle Admin Shell Upload

Posted by deepcore under exploit (No Respond)

This Metasploit module will generate a plugin which can receive a malicious payload request and upload it to a server running Moodle provided valid admin credentials are used. Then the payload is sent for execution, and the plugin uninstalled. You must have an admin account to exploit this vulnerability. Successfully tested against versions 3.6.3, 3.8.0, […]

Zero-Day Hunters Seek Laws To Prevent Vendors Suing Them For Helping Out And Doing Their Jobs

Posted by deepcore under exploit (No Respond)

[webapps] Sonicwall SonicOS 7.0 – Host Header Injection

Posted by deepcore under Security (No Respond)

Sonicwall SonicOS 7.0 – Host Header Injection

Tags: ,