Skip to content

Instantly share code, notes, and snippets.

View ahpaleus's full-sized avatar

Maciej Domanski ahpaleus

View GitHub Profile
@ahpaleus
ahpaleus / encryption.c
Last active July 22, 2022 17:56
AES 256 bit shellcode encryption
#include <openssl/conf.h>
#include <openssl/evp.h>
#include <openssl/err.h>
#include <string.h>
int main (void)
{
/* A 256 bit key */
unsigned char *key = (unsigned char *)"01234567890123456789012345678901";
global _start
section .text
_start:
jmp short call_shellcode ; jmp-call-pop technique to put shellcode onto stack
decoder:
pop esi ; address of the EncodedShellcode from stack to ESI
lea edi, [esi +1] ; load effective address->2nd position to EDI
CVE-2021-33899
------------------------------------------
Cross-Site Scripting in message_media.php
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it.
------------------------------------------
CVE-2020-25149
------------------------------------------
Authenticated Local File Inclusion in device/metric
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to local file inclusion due to the fact that there is an unrestricted possibility of loading any file with inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution in the further analysis and opens further attack vectors.
------------------------------------------
CVE-2020-25148
------------------------------------------
Cross Site Scripting in iftype
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. ------------------------------------------
[Additional Information]
CVE-2020-25147
------------------------------------------
Unauthenticated SQL Injection
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. Sending improper variable type “Array” allows to bypass core SQL Injection sanitization. Users are able to inject malicious SQL queries. This vulnerability leads to full database leak and even ckeys that can be used in the authentication process without knowing of username and clear text passwords.
------------------------------------------
CVE-2020-25146
------------------------------------------
Cross Site Scripting in syslog_rules -> edit_syslog_rule
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. ------------------------------------------
[Additional Information]
CVE-2020-25145
------------------------------------------
Authenticated Local File Inclusion in device/port
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to local file inclusion due to the fact that there is an unrestricted possibility of loading any file with inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution in the further analysis and opens further attack vectors.
------------------------------------------
CVE-2020-25144
------------------------------------------
Authenticated Local File Inclusion in apps
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to local file inclusion due to the fact that there is an unrestricted possibility of loading any file with inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution in the further analysis and opens further attack vectors.
------------------------------------------
CVE-2020-25143
------------------------------------------
Authenticated Union Based SQL Injection
------------------------------------------
[Description]
Penetration test has shown that the application is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. Sending improper variable type “Array” allows to bypass core SQL Injection sanitization. Authenticated users are able to inject malicious SQL queries. This vulnerability leads to full database leak and even ckeys that can be used in the authentication process without knowing of username and clear text passwords.
------------------------------------------