execution Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:03:23 GMT This Metasploit module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed. Full Article
execution Vesta Control Panel Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:50:37 GMT This Metasploit module exploits an authenticated command injection vulnerability in the v-list-user-backups bash script file in Vesta Control Panel to gain remote code execution as the root user. Full Article
execution TP-Link Archer A7/C7 Unauthenticated LAN Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:58:49 GMT This Metasploit module exploits a command injection vulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the router TP-Link Archer A7/C7 (AC1750), hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability can only be exploited by an attacker on the LAN side of the router, but the attacker does not need any authentication to abuse it. After exploitation, an attacker will be able to execute any command as root, including downloading and executing a binary from another host. This vulnerability was discovered and exploited at Pwn2Own Tokyo 2019 by the Flashback team. Full Article
execution Unraid 6.8.0 Authentication Bypass / Arbitrary Code Execution By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:37:57 GMT This Metasploit module exploits two vulnerabilities affecting Unraid 6.8.0. An authentication bypass is used to gain access to the administrative interface, and an insecure use of the extract PHP function can be abused for arbitrary code execution as root. Full Article
execution TrixBox CE 2.8.0.4 Command Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 21:07:49 GMT This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap. Full Article
execution Liferay Portal Java Unmarshalling Remote Code Execution By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:57:25 GMT This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1. Full Article
execution Nexus Repository Manager 3.21.1-01 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:37:25 GMT This Metasploit module exploits a Java Expression Language (EL) injection in Nexus Repository Manager versions up to and including 3.21.1 to execute code as the Nexus user. Tested against 3.21.1-01. Full Article
execution netkit-telnet 0.17 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 20:57:43 GMT netkit-telnet version 0.17 telnetd on Fedora 31 BraveStarr remote code execution exploit. Full Article
execution FreeSWITCH Event Socket Command Execution By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 16:05:59 GMT This Metasploit module uses the FreeSWITCH event socket interface to execute system commands using the system API command. The event socket service is enabled by default and listens on TCP port 8021 on the local network interface. This module has been tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN) (x64). Full Article
execution Sagemcom Fast 3890 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:51:01 GMT This exploit uses the Cable Haunt vulnerability to open a shell for the Sagemcom F@ST 3890 (50_10_19-T1) cable modem. The exploit serves a website that sends a malicious websocket request to the cable modem. The request will overflow a return address in the spectrum analyzer of the cable modem and using a rop chain start listening for a tcp connection on port 1337. The server will then send a payload over this tcp connection and the modem will start executing the payload. The payload will listen for commands to be run in the eCos shell on the cable modem and redirect STDOUT to the tcp connection. Full Article
execution NagiosXI 5.6 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:30:28 GMT This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6. Full Article
execution Symantec Web Gateway 5.0.2.8 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:33:55 GMT This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8. Full Article
execution NagiosXI 5.6.11 Remote Command Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:36:48 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11. Full Article
execution ManageEngine 14 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:39:26 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14. Full Article
execution Symantec Web Gateway 5.0.2.8 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:44:54 GMT This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8. Full Article
execution Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution By packetstormsecurity.com Published On :: Mon, 12 Aug 2013 04:11:58 GMT Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program. Full Article
execution Oracle WebLogic 12.1.2.0 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 09 Jul 2018 13:11:11 GMT Oracle WebLogic version 12.1.2.0 RMI registry UnicastRef object java deserialization remote code execution exploit. Full Article
execution IQrouter 3.3.1 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:52:30 GMT IQrouter firmware version 3.3.1 suffers from a remote code execution vulnerability. Full Article
execution NSClient++ 0.5.2.35 Authenticated Remote Code Execution By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:03:42 GMT NSClient++ version 0.5.2.35 suffers from an authenticated remote code execution vulnerability. Full Article
execution Edimax EW-7438RPn 1.13 Remote Code Execution By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:36:26 GMT Edimax EW-7438RPn version 1.13 suffers from a remote code execution vulnerability. Full Article
execution Furukawa Electric ConsciusMAP 2.8.1 Java Deserialization Remote Code Execution By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:40:45 GMT Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit. Full Article
execution Source Engine CS:GO Build 4937372 Arbitrary Code Execution By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 22:22:22 GMT Source Engine CS:GO BuildID: 4937372 arbitrary code execution exploit. Full Article
execution School ERP Pro 1.0 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:32:10 GMT School ERP Pro version 1.0 suffers from a remote code execution vulnerability. Full Article
execution Open-AudIT Professional 3.3.1 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:43:06 GMT Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability. Full Article
execution Saltstack 3000.1 Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:59:22 GMT Saltstack version 3000.1 suffers from a remote code execution vulnerability. Full Article
execution ManageEngine DataSecurity Plus Path Traversal / Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:40:45 GMT ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffers from a path traversal vulnerability that can lead to remote code execution. Full Article
execution ManageEngine Asset Explorer Windows Agent Remote Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:56:17 GMT The ManageEngine Asset Explorer windows agent suffers form a remote code execution vulnerability. All versions prior to 1.0.29 are affected. Full Article
execution Realtek SDK Information Disclosure / Code Execution By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 23:23:23 GMT Realtek SDK based routers suffer from information disclosure, incorrect access control, insecure password storage, code execution, and incorrectly implemented CAPTCHA vulnerabilities. Full Article
execution SmartClient 120 Information Disclosure / XML Injection / LFI / Code Execution By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:12:28 GMT SmartClient version 120 suffers from information disclosure, local file inclusion, remote file upload, and XML external entity injection vulnerabilities. Full Article
execution MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:50:46 GMT MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities. Full Article
execution Cisco UCS Director Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Sep 2019 18:11:07 GMT The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. The second one, CVE-2019-1936, is a command injection in a password change form, that allows the attacker to inject commands that will execute as root. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. It has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0. Note that Cisco also mentions in their advisory that their IMC Supervisor and UCS Director Express are also affected by these vulnerabilities, but this module was not tested with those products. Full Article
execution Cisco Data Center Network Manager 11.2 Remote Code Execution By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:45:40 GMT Cisco Data Center Network Manager version 11.2 remote code execution exploit. Full Article
execution Irix LPD tagprinter Command Execution By packetstormsecurity.com Published On :: Tue, 27 Oct 2009 16:00:56 GMT This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix. Full Article
execution Attackers Exploit 0-Day Code Execution Flaw In The Sophos Firewall By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:39:49 GMT Full Article headline hacker flaw
execution GitLab Awards Researcher $20,000 For Remote Code Execution Bug By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:19 GMT Full Article headline hacker flaw patch
execution PHP imap_open Remote Code Execution By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 01:52:56 GMT The imap_open function within PHP, if called without the /norsh flag, will attempt to preauthenticate an IMAP session. On Debian based systems, including Ubuntu, rsh is mapped to the ssh binary. Ssh's ProxyCommand option can be passed from imap_open to execute arbitrary commands. While many custom applications may use imap_open, this exploit works against the following applications: e107 v2, prestashop, SuiteCRM, as well as Custom, which simply prints the exploit strings for use. Prestashop exploitation requires the admin URI, and administrator credentials. suiteCRM/e107/hostcms require administrator credentials. Full Article
execution Nagios XI Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 13:17:29 GMT This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI. Full Article
execution Launcher Execution Mitigation Patch By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 02:33:33 GMT This patch mitigates allowing launcher the ability to execute arbitrary programs. Full Article
execution SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:17:54 GMT SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities. Full Article
execution Samsung Android Remote Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:12:41 GMT Samsung Android suffers from multiple interaction-less remote code execution vulnerabilities as well as other remote access issues in the Qmage image codec built into Skia. Full Article
execution Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 17 Aug 2012 22:22:33 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
execution Internet Explorer Script Interjection Code Execution By packetstormsecurity.com Published On :: Fri, 07 Sep 2012 03:22:50 GMT The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur. Full Article
execution HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code Execution By packetstormsecurity.com Published On :: Wed, 04 Sep 2013 03:19:31 GMT This Metasploit module exploits a vulnerability on the lrFileIOService ActiveX, as installed with HP LoadRunner 11.50. The vulnerability exists in the WriteFileString method, which allow the user to write arbitrary files. It's abused to drop a payload embedded in a dll, which is later loaded through the Init() method from the lrMdrvService control, by abusing an insecure LoadLibrary call. This Metasploit module has been tested successfully on IE8 on Windows XP. Virtualization based on the Low Integrity Process, on Windows Vista and 7, will stop this module because the DLL will be dropped to a virtualized folder, which isn't used by LoadLibrary. Full Article
execution MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
execution MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
execution MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python By packetstormsecurity.com Published On :: Fri, 14 Nov 2014 00:34:29 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, bypassing the patch MS14-060, for the vulnerability publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as those using Office 2010 SP1 may be less stable, and may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article
execution HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
execution Pisay Online E-Learning System 1.0 SQL Injection / Code Execution By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:40:34 GMT Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities. Full Article
execution Exim Command Execution Flaw Affects Millions Of Servers By packetstormsecurity.com Published On :: Fri, 07 Jun 2019 15:06:13 GMT Full Article headline email flaw
execution qdPM Remote Code Execution By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 22:43:25 GMT qdPM versions prior to 9.1 suffer from a remote shell upload vulnerability that allows for remote code execution. Full Article