This Metasploit module exploits a Remote PHP Code Execution vulnerability in Drupal RESTWS Module. Unauthenticated users can execute arbitrary code under the context of the web server user. RESTWS alters the default page callbacks for entities to provide additional functionality. A vulnerability in this approach allows an unauthenticated attacker to send specially crafted requests resulting in arbitrary PHP execution. RESTWS 2.x prior to 2.6 and 1.x prior to 1.7 versions are affected by issue. This Metasploit module was tested against RESTWS 2.5 with Drupal 7.5 installation on Ubuntu server.
Monthly Archives: July 2016
UPC Hungary Administrative Password / Insecure Transit
UPC Hungary devices have the same administrative password for all devices, send it insecurely over the wire, and also use telnetd by default.
Technicolor TC7200 Modem / Router Session Management / Fixed Password
The Technicolor TC7200 suffers from session management issues and also uses a fixed password for backup file encryption. Proof of concept code included.
WordPress WooCommerce 2.6.2 Cross Site Scripting
WordPress WooCommerce plugin version 2.6.2 suffers from a cross site scripting vulnerability.
WordPress Paid Memberships Pro 1.8.9.3 Cross Site Scripting
WordPress Paid Memberships Pro plugin version 1.8.9.3 suffers from a cross site scripting vulnerability.
PHP 7.0.8 / 5.6.23 / 5.5.37 bzread() OOB Write
PHP versions 7.0.8, 5.6.23, and 5.5.37 suffers from an out-of-bounds write vulnerability in bzread().
Hitron CGNV4 Modem / Router CSRF / Session Management / Command Injection
The Hitron CGNV4 modem / router suffers session management, cross site request forgery, and command injection vulnerabilities.
Compal CH7465LG-LC Modem / Router Session Management / Command Injection
The Compal CH7465LG-LC suffers session management, denial of service, unauthenticated configuration changes, and command injection vulnerabilities. Proof of concept included.
Cisco EPC3925 UPC Modem / Router Default Passphrase
The default SSID and passphrase on the Cisco EPC3925 are derived from the MAC address and the DOCSIS serial number. Since the MAC address of the device is broadcasted via WiFi and the typical serial number is within the range 200.000.000 and 260.000.000, the default password can be brute-forced within minutes. Proof of concept included.
Red Hat Security Advisory 2016-1475-01
Red Hat Security Advisory 2016-1475-01 – Oracle Java SE version 8 includes the Oracle Java Runtime Environment and the Oracle Java Software Development Kit. This update upgrades Oracle Java SE 8 to version 8 Update 101. Security Fix: This update fixes multiple vulnerabilities in the Oracle Java Runtime Environment and the Oracle Java Software Development Kit.