header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GNU/Linux mbse-bbs 0.70.0 & below stack overflow exploit

Multiple overflow conditions occur within mbse-bbs versions 0.70.0 & below. The current version of mbse-bbs does not contain these weaknesses. Exploitation of these vulnerabilities can facilitate a privilege escalation attack in which an unprivileged user becomes root. Exploit calculates return address where ASLR is not in use. Vulnerable code is shown below;matthew@localhost ~/foo/mbsebbs-0.70.0/unix $ cat -n mbuseradd.c...177 shell = calloc(PATH_MAX, sizeof(char));...228 sprintf(shell, "%s/bin/mbsebbs", getenv("MBSE_ROOT"));(heap corruption in 0.33.17/stack overflow in others). *** glibc detected *** free(): invalid next size (normal): 0x0804e068 ***Example Usage.matthew@localhost ~ $ iduid=1000(matthew) gid=100(users) groups=10(wheel),100(users)matthew@localhost ~ $ ./prdelka-vs-GNU-mbsebbs /opt/mbse/bin/mbuseradd[ GNU/Linux mbse-bbs 0.70.0 & below stack overflow exploit[ Using return address 0xbfffefd8sh-3.1# iduid=0(root) gid=1(bin) groups=10(wheel),100(users)- prdelka

Jshop Server 1.3 – Remote Code Execution

The Jshop Server 1.3 is vulnerable to remote code execution. An attacker can exploit the vulnerability by injecting malicious code through the 'jssShopFileSystem' parameter in the 'fieldValidation.php' file. This allows the attacker to execute arbitrary code on the target system.

Recent Exploits: