Digital Whisper Electronic Magazine #94
Digital Whisper Electronic Magazine #95
Digital Whisper Electronic Magazine #96
Digital Whisper Electronic Magazine #97
Digital Whisper Electronic Magazine #98
Digital Whisper Electronic Magazine #99
Digital Whisper Electronic Magazine 100
Digital Whisper Electronic Magazine #101
Digital Whisper Electronic Magazine #102
Digital Whisper Electronic Magazine #103
Digital Whisper Electronic Magazine #105
Digital Whisper Electronic Magazine #106
Digital Whisper Electronic Magazine #107
Digital Whisper Electronic Magazine #104
Linux/x64 Reverse TCP Stager Shellcode
Sagemcom Fast 3890 Remote Code Execution
This exploit uses the Cable Haunt vulnerability to open a shell for the Sagemcom F@ST 3890 (50_10_19-T1) cable modem. The exploit serves a website that sends a malicious websocket request to the cable modem. The request will overflow a return address in the spectrum analyzer of the cable modem and using a rop chain start listening for a tcp connection on port 1337. The server will then send a payload over this tcp connection and the modem will start executing the payload. The payload will listen for commands to be run in the eCos shell on the cable modem and redirect STDOUT to the tcp connection.
NagiosXI 5.6 Remote Command Execution
This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.
NagiosXI 5.6.11 Remote Command Execution
This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.
ManageEngine 14 Remote Code Execution
This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.
Packet Storm Exploit 2013-0811-1 - Oracle Java storeImageArray() Invalid Array Indexing Code Execution
Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
Packet Storm Advisory 2013-0811-1 - Oracle Java storeImageArray()
Oracle Java versions prior to 7u25 suffer from an invalid array indexing vulnerability that exists within the native storeImageArray() function inside jre/bin/awt.dll. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was obtained through the Packet Storm Bug Bounty program.
Java storeImageArray() Invalid Array Indexing
This Metasploit module abuses an Invalid Array Indexing Vulnerability on the static function storeImageArray() function in order to produce a memory corruption and finally escape the Java Sandbox. The vulnerability affects Java version 7u21 and earlier. The module, which doesn't bypass click2play, has been tested successfully on Java 7u21 on Windows and Linux systems. This was created based upon the Packet Storm Bug Bounty release for this issue.
Microsoft Windows .Reg File / Dialog Box Message Spoofing
The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful.
ManageEngine DataSecurity Plus Path Traversal / Code Execution
ManageEngine DataSecurity Plus versions prior to 6.0.1 and ADAudit Plus versions prior to 6.0.3 suffers from a path traversal vulnerability that can lead to remote code execution.
ManageEngine Asset Explorer Windows Agent Remote Code Execution
The ManageEngine Asset Explorer windows agent suffers form a remote code execution vulnerability. All versions prior to 1.0.29 are affected.
LabVantage 8.3 Information Disclosure
ManageEngine EventLog Analyzer 10.0 Information Disclosure
ManageEngine EventLog Analyzer version 10.0 suffers from an information disclosure vulnerability.
Cisco M1070 Content Security Management Appliance IronPort Header Injection
Cisco M1070 Content Security Management Appliance IronPort remote host header injection exploit.
Cisco Content Security Management Virtual Appliance M600V IronPort Header Injection
Cisco Content Security Management Virtual Appliance M600V IronPort remote host header injection exploit.
Cisco DCNM JBoss 10.4 Credential Leakage
Cisco Data Center Network Manager 11.2 Remote Code Execution
Cisco Data Center Network Manager 11.2.1 SQL Injection
Cisco Data Center Network Manager version 11.2.1 suffers from a remote SQL injection vulnerability.
Cisco Data Center Network Manager 11.2.1 Command Injection
ImageMagick Memory Leak
KVM kvm_inject_page_fault Uninitialized Memory Leak
Irix LPD tagprinter Command Execution
This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.
Nagios XI Authenticated Remote Command Execution
This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI.