This exploit takes advantage of known issues with debugging functions within the AIX linker library. We are taking advantage of known functionality, and focusing on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes. The CVEs we will be taking advantage of are CVE-2009-1786, CVE-2009-2669, and CVE-2014-3074. In each instance of the aforementioned CVEs, IBM merely patched the binaries which were reported in the original reports as being used for escalation of the vulnerabilities. This allowed for the lquerylv binary to slip by their patches and become an attack vector.
This exploit is used to gain root access on AIX 6.1/7.1/7.2.0.2 systems. It takes advantage of a vulnerability in the lsmcode binary, which allows an attacker to create a SUID root shell. The exploit sets environment variables, sets the umask to 000, executes the vulnerable binary, and then creates a SUID root shell. The exploit then cleans up the environment variables and executes the ibstat binary to gain root access.
A Cross-Site Request Forgery (CSRF) vulnerability exists in redaxo CMS 5.2.0, which allows an attacker to add an admin user by sending a malicious request. The attacker can craft a malicious HTML page containing a form with hidden fields, which when visited by an authenticated user, will submit the form and add an admin user with the credentials specified in the form.
nodcms is vulnerable to Cross Site Request Forgery (CSRF) and Cross Site Scripting (XSS) attacks. An attacker can craft a malicious HTML page that when visited by an authenticated user, can create a new user with administrative privileges or inject malicious JavaScript code into the application.
This exploit allows an attacker to upload a malicious file to the Snews CMS server without authentication. The malicious file can be a shell script, which can be used to gain access to the server. The attacker can then execute arbitrary code on the server.
This exploit allows an attacker to change the username and password of the admin without needing the old username and password. The attacker can craft a malicious HTML page with a form containing the new username and password and submit it to the vulnerable website. This will change the admin credentials to the ones specified by the attacker.
PCMan FTP Server 2.0 is vulnerable to a buffer overflow attack when an overly long string is sent to the ACCT command. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted string to the affected command. This may allow attackers to execute arbitrary code.
The attacker sends a simple query to a vulnerable reflector supporting the Connectionless LDAP service (CLDAP) and using address spoofing makes it appear to originate from the intended victim. The CLDAP service responds to the spoofed address, sending unwanted network traffic to the attacker’s intended target. Amplification techniques allow bad actors to intensify the size of their attacks, because the responses generated by the LDAP servers are much larger than the attacker’s queries. In this case, the LDAP service responses are capable of reaching very high bandwidth and an average amplification factor of 46x and a peak of 55x has been seen.
This exploit allows an attacker to inject malicious JavaScript code into the ETchat CMS by creating a new room. The malicious code is then executed when the victim visits the page, allowing the attacker to steal the victim's cookies.
SweetRice CMS Panel In Adding Ads Section SweetRice Allow To Admin Add PHP Codes In Ads File. A CSRF Vulnerabilty In Adding Ads Section Allow To Attacker To Execute PHP Codes On Server. In This Exploit I Just Added a echo '<h1> Hacked </h1>'; phpinfo(); Code You Can Customize Exploit For Your Self.