exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 150 RSS Feed

Files from h00die

Email addressmike at stcyrsecurity.com
First Active2009-03-09
Last Active2024-09-01
Juniper SSH Backdoor Scanner
Posted Sep 1, 2024
Authored by H D Moore, h00die | Site metasploit.com

This Metasploit module scans for the Juniper SSH backdoor (also valid on Telnet). Any username is required, and the password is <<< %s(un=%s) = %u.

tags | exploit
systems | juniper
advisories | CVE-2015-7755
SHA-256 | 9063c59689446fe07bb9610922c2bca3f2bd26ac97f441441018bc99fbe63a81
VICIdial Multiple Authenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die | Site metasploit.com

This Metasploit module exploits several authenticated SQL Inject vulnerabilities in VICIdial 2.14b0.5 prior to svn/trunk revision 3555 (VICIBox 10.0.0, prior to January 20 is vulnerable). Injection point 1 is on vicidial/admin.php when adding a user, in the modify_email_accounts parameter. Injection point 2 is on vicidial/admin.php when adding a user, in the access_recordings parameter. Injection point 3 is on vicidial/admin.php when adding a user, in the agentcall_email parameter. Injection point 4 is on vicidial/AST_agent_time_sheet.php when adding a user, in the agent parameter. Injection point 5 is on vicidial/user_stats.php when adding a user, in the file_download parameter. VICIdial does not encrypt passwords by default.

tags | exploit, php, vulnerability
advisories | CVE-2022-34876, CVE-2022-34877, CVE-2022-34878
SHA-256 | ee13ad5d4ae7546320169435916f3c9bac21c75f6a3c00a761a80c9d13b3d3b5
Icingaweb Directory Traversal In Static Library File Requests
Posted Sep 1, 2024
Authored by h00die, Thomas Chauchefoin, Jacob Ebben | Site metasploit.com

Icingaweb versions from 2.9.0 to 2.9.5 inclusive, and 2.8.0 to 2.8.5 inclusive suffer from an unauthenticated directory traversal vulnerability. The vulnerability is triggered through the icinga-php-thirdparty library, which allows unauthenticated users to retrieve arbitrary files from the targets filesystem via a GET request to /lib/icinga/icinga-php-thirdparty/<absolute path to target file on disk> as the user running the Icingaweb server, which will typically be the www-data user. This can then be used to retrieve sensitive configuration information from the target such as the configuration of various services, which may reveal sensitive login or configuration information, the /etc/passwd file to get a list of valid usernames for password guessing attacks, or other sensitive files which may exist as part of additional functionality available on the target server. This Metasploit module was tested against Icingaweb 2.9.5 running on Docker.

tags | exploit, arbitrary, php
advisories | CVE-2022-24716
SHA-256 | cdc69a4bccff0e05ac6725d9eb18225432bfef742c18d90b549db0f05b86206e
WordPress Email Subscribers And Newsletter Hash SQL Injection Scanner
Posted Sep 1, 2024
Authored by h00die, Wordfence, red0xff | Site metasploit.com

Email Subscribers and Newsletters plugin contains an unauthenticated timebased SQL injection in versions before 4.3.1. The hash parameter is vulnerable to injection.

tags | exploit, sql injection
advisories | CVE-2019-20361
SHA-256 | 883d0eaca9891a011a583d7cbea23b1c7f956800de4a058033366b43cb374379
Synology Forget Password User Enumeration Scanner
Posted Sep 1, 2024
Authored by h00die, Steve Kaun | Site metasploit.com

This Metasploit module attempts to enumerate users on the Synology NAS by sending GET requests for the forgot password URL. The Synology NAS will respond differently if a user is present or not. These count as login attempts, and the default is 10 logins in 5min to get a permanent block. Set delay accordingly to avoid this, as default is permanent. Vulnerable DSMs are: DSM 6.1 < 6.1.3-15152 DSM 6.0 < 6.0.3-8754-4 DSM 5.2 < 5.2-5967-04.

tags | exploit
advisories | CVE-2017-9554
SHA-256 | c622438aa3e4a490bc624fb626fb236ea403a3b449e8c9b443cda4f4befb21eb
WordPress WPS Hide Login Login Page Revealer
Posted Sep 1, 2024
Authored by h00die, thalakus | Site metasploit.com

This Metasploit module exploits a bypass issue with WPS Hide Login versions less than or equal to 1.9. WPS Hide Login is used to make a new secret path to the login page, however a GET request to /wp-admin/options.php with a referer will reveal the hidden path.

tags | exploit, php
advisories | CVE-2021-24917
SHA-256 | cf0e23084f88d35da4dd2286627bbd0801ca437e1cdded439cd94d23e28d6ab9
Joomla API Improper Access Checks
Posted Sep 1, 2024
Authored by h00die, Tianji Lab | Site metasploit.com

Joomla versions between 4.0.0 and 4.2.7, inclusive, contain an improper API access vulnerability. This vulnerability allows unauthenticated users access to webservice endpoints which contain sensitive information. Specifically for this module we exploit the users and config/application endpoints. This Metasploit module was tested against Joomla 4.2.7 running on Docker.

tags | exploit
advisories | CVE-2023-23752
SHA-256 | fa67ae7e6f213f19e195eecd75ea212d3daefe54df94381a906f0a5269cb2249
Wordpress Paid Membership Pro Code Unauthenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die, Joshua Martinelle | Site metasploit.com

Paid Membership Pro, a WordPress plugin, prior to 2.9.8 is affected by an unauthenticated SQL injection via the code parameter. Remote attackers can exploit this vulnerability to dump usernames and password hashes from the wp_users table of the affected WordPress installation. These password hashes can then be cracked offline using tools such as Hashcat to obtain valid login credentials for the affected WordPress installation.

tags | exploit, remote, sql injection
advisories | CVE-2023-23488
SHA-256 | d01aa9df62ceaa2afa8e7303c8aaf9059424791f857f1b227c5c890811cf5457
Wordpress RegistrationMagic Task_ids Authenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die, Hacker5preme | Site metasploit.com

RegistrationMagic, a WordPress plugin, prior to 5.0.1.5 is affected by an authenticated SQL injection via the task_ids parameter.

tags | exploit, sql injection
advisories | CVE-2021-24862
SHA-256 | 1a580e447f3469ec25a634735f3ea21fb9756b92a3c75631271cbb832da6c3fd
Riverbed SteelHead VCX File Read
Posted Sep 1, 2024
Authored by h00die, Gregory Draperi | Site metasploit.com

This Metasploit module exploits an authenticated arbitrary file read in the log modules filter engine. SteelHead VCX (VCX255U) version 9.6.0a was confirmed as vulnerable.

tags | exploit, arbitrary
SHA-256 | 82200956bfcf313b96ff93db76c110d1947a97a9884d89e92f426e7c7e7da5ea
ES File Explorer Open Port
Posted Sep 1, 2024
Authored by h00die, moonbocal, 小荷才露尖尖角, fs0c131y | Site metasploit.com

This Metasploit module connects to ES File Explorers HTTP server to run certain commands. The HTTP server is started on app launch, and is available as long as the app is open. Version 4.1.9.7.4 and below are reported vulnerable This Metasploit module has been tested against 4.1.9.5.1.

tags | exploit, web
advisories | CVE-2019-6447
SHA-256 | a73c6b524b907dbe590605fec39555ee25f87f4dfb5e202dfc167e9995d06c69
WordPress ChopSlider3 Id SQL Injection Scanner
Posted Sep 1, 2024
Authored by h00die, SunCSR, Callum Murphy | Site metasploit.com

The iDangero.us Chop Slider 3 WordPress plugin version 3.4 and prior contains a blind SQL injection in the id parameter of the get_script/index.php page. The injection is passed through GET parameters, and thus must be encoded, and magic_quotes is applied at the server.

tags | exploit, php, sql injection
advisories | CVE-2020-11530
SHA-256 | c40d3f2150f043263d7f5b593f87cd6eb6ed9507f109b3c2713e5d016de691c2
Wordpress Secure Copy Content Protection And Content Locking Sccp_id Unauthenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die, Hacker5preme, Krzysztof Zając | Site metasploit.com

Secure Copy Content Protection and Content Locking, a WordPress plugin, prior to 2.8.2 is affected by an unauthenticated SQL injection via the sccp_id[] parameter. Remote attackers can exploit this vulnerability to dump usernames and password hashes from thewp_users table of the affected WordPress installation. These password hashes can then be cracked offline using tools such as Hashcat to obtain valid login credentials for the affected WordPress installation.

tags | exploit, remote, sql injection
advisories | CVE-2021-24931
SHA-256 | a16f33882a4042dbb5483766850b39941b6501b9b0173d5fdf5fb279b10a5e47
DnaLIMS Directory Traversal
Posted Sep 1, 2024
Authored by h00die, Nicholas von Pechmann | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability found in dnaLIMS. Due to the way the viewAppletFsa.cgi script handles the secID parameter, it is possible to read a file outside the www directory.

tags | exploit, cgi
advisories | CVE-2017-6527
SHA-256 | 51e9c7257950972cb9c2f3eadb03402eb6967e9df8461564e00e53de1edcfeba
Abandoned Cart For WooCommerce SQL Injection Scanner
Posted Sep 1, 2024
Authored by h00die, WPDeeply | Site metasploit.com

Abandoned Cart, a plugin for WordPress which extends the WooCommerce plugin, prior to 5.8.2 is affected by an unauthenticated SQL injection via the billing_first_name parameter of the save_data AJAX call. A valid wp_woocommerce_session cookie is required, which has at least one item in the cart.

tags | exploit, sql injection
SHA-256 | 80a396b232c09010cbae409cc90533d399a952a66a286c4d10fe3644a0ecc608
Dicoogle PACS Web Server Directory Traversal
Posted Sep 1, 2024
Authored by h00die, Carlos Avila | Site metasploit.com

This Metasploit module exploits an unauthenticated directory traversal vulnerability in the Dicoogle PACS Web Server v2.5.0 and possibly earlier, allowing an attacker to read arbitrary files with the web server privileges. While the application is java based, the directory traversal was only successful against Windows targets.

tags | exploit, java, web, arbitrary
systems | windows
SHA-256 | 8f2ecf1201b59abdcaedb189bb29a75443dfe162b8acf3116d81747473b35059
Wordpress BulletProof Security Backup Disclosure
Posted Sep 1, 2024
Authored by h00die, Ron Jost | Site metasploit.com

The Wordpress plugin BulletProof Security, versions less than or equal to 5.1, suffers from an information disclosure vulnerability, in that the db_backup_log.txt is publicly accessible. If the backup functionality is being utilized, this file will disclose where the backup files can be downloaded. After downloading the backup file, it will be parsed to grab all user credentials.

tags | exploit, info disclosure
advisories | CVE-2021-39327
SHA-256 | 67c4807293a251cc053fbb1a5fb7a2329f603f6abac1003faf1823ea7751fe74
WordPress Easy WP SMTP Password Reset
Posted Sep 1, 2024
Authored by h00die | Site metasploit.com

Wordpress plugin Easy WP SMTP versions less than or equal to 1.4.2 was found to not include index.html within its plugin folder. This potentially allows for directory listings. If debug mode is also enabled for the plugin, all SMTP commands are stored in a debug file. An email must have been sent from the system as well to create the debug file. If an email hasnt been sent (Test Email function not included), Aggressive can bypass the last check. Combining these items, its possible to request a password reset for an account, then view the debug file to determine the link that was emailed out, and reset the users password.

tags | exploit
advisories | CVE-2020-35234
SHA-256 | 8559f369219946f2ef710f6c5fb744b1424d53fa6245cf079bdb8020ffd203c8
Wordpress LearnPress Current_items Authenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die, nhattruong, Sagi Tzadik, Omri Herscovici | Site metasploit.com

LearnPress, a learning management plugin for WordPress, prior to 3.2.6.8 is affected by an authenticated SQL injection via the current_items parameter of the post-new.php page.

tags | exploit, php, sql injection
advisories | CVE-2020-6010
SHA-256 | 150d41dad29f88db33ed82424ed85cc194746e3e92127751db33050409ecec61
WordPress Modern Events Calendar SQL Injection Scanner
Posted Sep 1, 2024
Authored by h00die, red0xff, Hacker5preme | Site metasploit.com

Modern Events Calendar plugin contains an unauthenticated timebased SQL injection in versions before 6.1.5. The time parameter is vulnerable to injection.

tags | exploit, sql injection
advisories | CVE-2021-24946
SHA-256 | 982d4d258c486cd930bfa6a8ab9aa9156ad56e14deb8a20ab4d8c1bd29c21177
WordPress Loginizer Log SQL Injection Scanner
Posted Sep 1, 2024
Authored by h00die, mslavco, red0xff | Site metasploit.com

Loginizer wordpress plugin contains an unauthenticated timebased SQL injection in versions before 1.6.4. The vulnerable parameter is in the log parameter. Wordpress has forced updates of the plugin to all servers.

tags | exploit, sql injection
advisories | CVE-2020-27615
SHA-256 | 19a3dea18cc17107d42a30ec2c31df71bf5f3d9812f33d059c921e228a7efb3e
LimeSurvey Zip Path Traversals
Posted Sep 1, 2024
Authored by h00die, Alejandro Parodi, Matthew Aberegg, Michael Burkey, Federico Fernandez | Site metasploit.com

This Metasploit module exploits an authenticated path traversal vulnerability found in LimeSurvey versions between 4.0 and 4.1.11 with CVE-2020-11455 or less than or equal to 3.15.9 with CVE-2019-9960, inclusive. In CVE-2020-11455 the getZipFile function within the filemanager functionality allows for arbitrary file download. The file retrieved may be deleted after viewing, which was confirmed in testing. In CVE-2019-9960 the szip function within the downloadZip functionality allows for arbitrary file download. Verified against 4.1.11-200316, 3.15.0-181008, 3.9.0-180604, 3.6.0-180328, 3.0.0-171222, and 2.70.0-170921.

tags | exploit, arbitrary
advisories | CVE-2019-9960, CVE-2020-11455
SHA-256 | 9f74526757273c5edcea64339d62718ea0a109843590d25d98a39b5da99e5413
Wordpress Plugin WooCommerce Payments Unauthenticated Admin Creation
Posted Sep 1, 2024
Authored by h00die, Julien Ahrens, Michael Mazzolini | Site metasploit.com

WooCommerce-Payments plugin for Wordpress versions 4.8, 4.8.2, 4.9, 4.9.1, 5.0, 5.0.4, 5.1, 5.1.3, 5.2, 5.2.2, 5.3, 5.3.1, 5.4, 5.4.1, 5.5, 5.5.2, and 5.6, 5.6.2 contain an authentication bypass by specifying a valid user ID number within the X-WCPAY-PLATFORM-CHECKOUT-USER header. With this authentication bypass, a user can then use the API to create a new user with administrative privileges on the target WordPress site IF the user ID selected corresponds to an administrator account.

tags | exploit
advisories | CVE-2023-28121
SHA-256 | 6f6df2d58639769e982d2ed7af034862e1b5fef526f5ddae0309cdf72c8e05ac
Grafana Plugin Path Traversal
Posted Sep 1, 2024
Authored by h00die, jordyv | Site metasploit.com

Grafana versions 8.0.0-beta1 through 8.3.0 prior to 8.0.7, 8.1.8, 8.2.7, or 8.3.1 are vulnerable to directory traversal through the plugin URL. A valid plugin ID is required, but many are installed by default.

tags | exploit
advisories | CVE-2021-43798
SHA-256 | 9a1339320c6be6654d8bea7386ff041fd2641e68f9a4fbeae07e898d1d0b2068
Apache Optionsbleed Scanner
Posted Sep 1, 2024
Authored by h00die, Hanno Bock | Site metasploit.com

This Metasploit module scans for the Apache optionsbleed vulnerability where the Allow response header returned from an OPTIONS request may bleed memory if the server has a .htaccess file with an invalid Limit method defined.

tags | exploit
advisories | CVE-2017-9798
SHA-256 | ac77af0b3c6e749b827f71ab13339140afc6a894fad192ca238076187f0cb5e7
Page 1 of 6
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close