header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Advisory ID: HTB23301

High-Tech Bridge Security Research Lab discovered a high-risk SQL injection vulnerability in a popular Information Resource Manager (IRM) system GLPI. IRM systems are usually used for management and audit of software packages, providing ITIL-compliant service desk. The vulnerability allows remote non-authenticated attacker to execute arbitrary SQL queries, read and write data to the application's database and completely compromise the vulnerable system. The vulnerability exists due to insufficient filtration of user-supplied data passed via the "page_limit" HTTP GET parameter to "/ajax/getDropdownConnect.php" PHP script. A remote unauthenticated attacker can alter present SQL query, inject and execute arbitrary SQL command in application's database. Below is a simple SQL Injection exploit, which uses time-based exploitation technique. The page will load time will be significantly higher if MySQL version is 5.X or superior: http://[host]/ajax/getDropdownConnect.php?fromtype=Computer&itemtype=Computer&page=1&page_limit=1%20PROCEDURE%20analyse%28%28select%20extractvalue%28rand%28%29,concat%280x3a,%28IF%28MID%28version%28%29,1,1%29%20LIKE%205,%20BENCHMARK%285000000,SHA1%281%29%29,1%29%29%29%29,1%29

Static Out-of-Bounds Memory Read in Wireshark

A static out-of-bounds memory read vulnerability was discovered in Wireshark, which is a free and open-source packet analyzer. The vulnerability can be triggered by feeding a malformed file to tshark. The vulnerability can be observed in an ASAN build of Wireshark, and can lead to a crash.

Observium Commercial – Authenticated RCE

Using either CSRF or by editing the whois binary field in the Observium webui under Settings-> System Path, an attacker may also change the Path to either [whois, mtr, nmap] to any bash command, and by hitting the url: http://<ObserviumIP>/netcmd.php?cmd=whois&query=8.8.8.8 using any user on Observium (even low privileged) we can trigger a code execution. For example, setting up a listener and a CSRF.

Observium Commercial – CSRF

Observium is a low-maintenance auto-discovering network monitoring platform supporting a wide range of device types, platforms and operating systems including Cisco, Windows, Linux, HP, Juniper, Dell, FreeBSD, Brocade, Netscaler, NetApp and many more. Due to lack of CSRF protection, it is possible to create an additional administrator user, or change the current administrator password since it does not ask for the previous password before changing it.

Integer Wrap in PHP 7.x before version 7.0.6

An integer wrap may occur in PHP 7.x before version 7.0.6 when reading zip files with the getFromIndex() and getFromName() methods of ZipArchive, resulting in a heap overflow. With sb.size from (1) being zip_uint64_t uncomp_size; /* (cl) size of uncompressed data */ and zip_uint64_t size; /* size of file (uncompressed) */ from zip_stat_t *st. Whereas len is signed and has a platform-dependent size. When len is larger than sb.size, len is truncated to sb.size in (2) and the heap overflow occurs in (3).

Mach Race OS X Local Privilege Escalation Exploit

Mach Race OS X Local Privilege Escalation Exploit is a SUID, SIP, and binary entitlements universal OS X exploit (CVE-2016-1757). It is used to exploit a race condition in the Mach bootstrap subsystem. The exploit works by creating a Mach service with a predictable name and then racing against the kernel to register a receive right for that service. The exploit is used against a SUID binary or an entitled binary to bypass SIP. It is tested against Mavericks 10.10.5, Yosemite 10.10.5, El Capitan 10.11.2 and 10.11.3 and is fixed in El Capitan 10.11.4. It should work with all OS X versions.

Recent Exploits: