header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

M/Monit 3.7.4 – Privilege Escalation

This exploit is a privilege escalation vulnerability in M/Monit 3.7.4. It allows an attacker to gain administrator privileges by sending a POST request to the '/api/1/admin/users/update' endpoint with the username, fullname, password, and admin flag set to 1. This will allow the attacker to gain full access to the M/Monit application.

TestBox CFML Test Framework 4.1.0 – Directory Traversal

The TestBox 'test-browser' page does not adequately sanitise the 'path' QueryString parameter, allowing an attacker to perform a directory traversal on the page by specifying the value 'path=/../' (appending '../' all the way up to the system root).

Gitlab 12.9.0 – Arbitrary File Read (Authenticated)

This exploit allows an authenticated user to read arbitrary files on the system. The exploit uses the Gitlab API to create two projects, one with an issue containing a malicious description and the other to move the issue to. The malicious description contains a link to the file that is to be read. The exploit uses the private token of the user to authenticate the API requests.

Genexis Platinum 4410 Router 2.1 – UPnP Credential Exposure

This exploit uses the upnpy library to discover UPnP devices on the network and access a specific service on the device by its ID. The 'X_GetAccess' action is then executed which returns a dictionary containing the cleartext password of 'admin' user.

PESCMS TEAM 2.3.2 – Multiple Reflected XSS

PESCMS Team 2.3.2 has multiple reflected XSS via the id parameter:?g=Team&m=Task&a=my&status=3&id=,?g=Team&m=Task&a=my&status=0&id=,?g=Team&m=Task&a=my&status=1&id=,?g=Team&m=Task&a=my&status=10&id=. When payload '><ScRiPt>alert(1)</ScRiPt>' is inputted, the page will pop up an alert window.

ZeroLogon – Netlogon Elevation of Privilege

ZeroLogon is a critical vulnerability in Microsoft Windows Netlogon that allows an attacker to completely compromise the Windows domain. The vulnerability exists in the way Netlogon handles certain requests. An attacker who successfully exploits this vulnerability can run a specially crafted application on a device on the network to take complete control of an affected domain controller, including changing the domain administrator’s password and gaining access to all data on the domain controller.

BigBlueButton 2.2.25 – Arbitrary File Disclosure and Server-Side Request Forgery

BigBlueButton is a web conferencing system that allows participants with the appropriate privileges to upload files in various formats to be used as presentation slides. Among other formats, BigBlueButton accepts LibreOffice documents. LibreOffice documents use the XML-based Open Document Format for Office Applications (ODF). For technical purposes, uploaded files are converted to PDF format with LibreOffice and afterwards to SVG for displaying. The ODF file format supports using the XML Linking Language (XLink) to create links between documents. When local files are referenced using XLinks, the contents of the respective files are included in the generated PDF file when BigBlueButton converts ODF documents with LibreOffice. This leads to an arbitrary file disclosure vulnerability. Furthermore, the XLink standard allows for the use of external resources. When external resources are referenced using XLinks, BigBlueButton will perform a request to the respective resource when converting ODF documents with LibreOffice. This leads to a server-side request forgery vulnerability.

Apache Struts 2.5.20 – Double OGNL evaluation

Apache Struts 2.5.20 is vulnerable to a double OGNL evaluation vulnerability which allows an attacker to execute arbitrary commands on the server. This vulnerability affects Struts versions 2.0.0 to 2.5.20 (S2-059). The exploit is based on a Github example from PrinceFPF and was reported by Matthias Kaiser and Apple InformationSecurity. The vulnerability can be mitigated by upgrading to Struts 2.5.22.

Recent Exploits: