exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Meder Kydyraliev

Email addressmeder at o0o.nu
First Active2004-12-31
Last Active2013-03-22
Apache Struts ParametersInterceptor Remote Code Execution
Posted Mar 22, 2013
Authored by Meder Kydyraliev | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in Apache Struts versions < 2.3.1.2. This issue is caused because the ParametersInterceptor allows for the use of parentheses which in turn allows it to interpret parameter values as OGNL expressions during certain exception handling for mismatched data types of properties which allows remote attackers to execute arbitrary Java code via a crafted parameter.

tags | exploit, java, remote, arbitrary
advisories | CVE-2011-3923, OSVDB-78501
SHA-256 | e56bcff70dfc308ffd717452aab966d54c1fdec14e8544d8df4198054ba401b9
Apache Struts < 2.2.0 Remote Command Execution
Posted Aug 19, 2011
Authored by Meder Kydyraliev, bannedit | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in Apache Struts versions < 2.2.0. This issue is caused by a failure to properly handle unicode characters in OGNL extensive expressions passed to the web server. By sending a specially crafted request to the Struts application it is possible to bypass the "#" restriction on ParameterInterceptors by using OGNL context variables. Bypassing this restriction allows for the execution of arbitrary Java code.

tags | exploit, java, remote, web, arbitrary
advisories | CVE-2010-1870, OSVDB-66280
SHA-256 | f3dc9c6ae8fc8270cc4ef71f82c223ad04ea9e8725f94ee4894465c9a0bfbc4b
Struts2/XWork Remote Command Execution
Posted Jul 14, 2010
Authored by Meder Kydyraliev

Struts2/XWork suffers from a remote command execution vulnerability.

tags | exploit, remote
advisories | CVE-2010-1870
SHA-256 | 4bfaf1025cecb689d125b743ac0333bad9a7f8606514866a6849cf570bfdb557
Spring Framework Code Execution
Posted Jun 19, 2010
Authored by Meder Kydyraliev

Spring Framework suffers from an arbitrary code execution vulnerability. Versions affected include 3.0.0 to 3.0.2, 2.5.0 to 2.5.6SEC01 (community releases) and 2.5.0 to 2.5.7 (subscription customers).

tags | advisory, arbitrary, code execution
SHA-256 | 464c70a443ef9692530dbda478e34f5a3956fde33c6de1caa81b62e0cc7ac632
bypassing-servlet.txt
Posted Aug 14, 2007
Authored by Meder Kydyraliev | Site o0o.nu

OWASP Stinger and Struts servlet input validation filters suffer from a bypass vulnerability.

tags | advisory, bypass
SHA-256 | 03451f25df2b90ee11c15c5234a31fe6413bc3463e77a6f3140b03dc0f79b315
DAY_2_-_Fyodor_Yarochkin_and_Meder_Kydyraliev_-_YAWATT.pdf
Posted Oct 9, 2006
Authored by Fyodor Yarochkin, Meder Kydyraliev | Site conference.hitb.org

HITBSecConf2006 Presentation - Yet Another Web Application Testing Toolkit (YAWATT).

tags | web
SHA-256 | a35cbde25a9caa5e6325a5bfbf04887f6e92677113767b8f0aa24425004a6546
OpenCMS_multiple_vulnerabilities.txt
Posted Jul 28, 2006
Authored by Meder Kydyraliev | Site o0o.nu

OpenCMS versions 6.2.1, 6.2, 6.0.3, and 6.0.4 are vulnerable to multiple access control and input validation vulnerabilities. Other versions may be vulnerable as well. Authenticated users can perform attacks allow arbitrary file access, viewing the source of JSP files, the uploading of malicious files, and more.

tags | exploit, arbitrary, vulnerability
SHA-256 | dae1da08286e5fcadd45f3c2651460bce4ec4265bc744b87f052a7a66a30c060
Blogger_HTTP_response_splitting.txt
Posted Jan 25, 2006
Authored by Meder Kydyraliev | Site o0o.nu

Blogger's personal page redirection mechanism contains a classic HTTP response splitting vulnerability in the "Location" HTTP header. The problem occurs due to use of unsanitized user-supplied data in the "Location" HTTP header, which enables attacker to inject CRLF(%0d%0a) characters thus splitting server's response taking full control over the contents of second HTTP response. Exploitation of the vulnerability can lead to cross-site scripting (XSS), cache poisoning and phishing attacks.

tags | advisory, web, xss
SHA-256 | b1bba7cc5beca200d483fb1ac898c490176fc394f70bf51480e8ff51ed266fc0
orinoco-leakage.txt
Posted Oct 13, 2005
Authored by Meder Kydyraliev | Site o0o.nu

The Linux orinoco driver included in kernel versions less than 2.6.13.4 pads Ethernet frames with uninitialized data, thus allowing remote attackers to obtain parts of memory which may contain sensitive information.

tags | advisory, remote, kernel
systems | linux
SHA-256 | 943689f13a94d8b3a143d68cf86a1f8f2fadbb9507737199b7abdf735e62255a
TT-Fyodor-Yarochkin-Meder-Kydyraliev-STIFware-Evolution.ppt
Posted Oct 11, 2005
Authored by Fyodor Yarochkin, Meder Kydyraliev

STIFWare Evolution - Meder and Fyodor have been working on their concept of common framework to unify offensive part of heterogeneous security data and security tools into a single unit - security tools framework. The presentation deals with the evolution of STIF framework into what they call now STIF-ware - a set of STIF relevant modules that would allow the computer security hobbists to build, control and monitor the distributed network of automated hacking agents, guided by set of goals and targets, assigned to the system.

SHA-256 | 44117ca91c39d4c41ac5c5a1d266ffce5d633d4eb8ddac4389eee2d5417e9085
xprobe2-0.3.tar.gz
Posted Aug 5, 2005
Authored by Ofir Arkin, Fyodor Yarochkin, Meder Kydyraliev | Site prdownloads.sourceforge.net

Xprobe2 is a remote active OS fingerprinting tool which uses advanced techniques such as fuzzy logic.

Changes: New application-based OS fingerprinting modules (SMB, SNMP). Several bug fixes (i.e. pcap sniffing).
tags | remote
systems | unix
SHA-256 | 12a9d0a2f38da8bb74c9e1cd96b2019802632cf55f8948384aafd417bb79a164
xprobe2-0.2.2.tar.gz
Posted Feb 18, 2005
Authored by Ofir Arkin, Fyodor Yarochkin, Meder Kydyraliev | Site prdownloads.sourceforge.net

Xprobe2 0.2.2 is a remote active OS fingerprinting tool which uses advanced techniques such as fuzzy logic.

tags | remote
systems | unix
SHA-256 | bfe28acfadb1c41490347ff80010ed5272e944a5815887a49a8c7804009fd2f5
xprobe2-0.2.1.tar.gz
Posted Dec 31, 2004
Authored by Ofir Arkin, Fyodor Yarochkin, Meder Kydyraliev | Site sys-security.com

Xprobe2 is a remote active operating system fingerprinting tool. Xprobe2 uses advanced techniques, such as the usage of fuzzy logic to match fingerprinting results with the tool's signature database and unique fingerprinting methods to provide accurate results.

Changes: A number of bugs have been fixed and more features have been introduced.
tags | tool, remote, scanner
systems | unix
SHA-256 | a7c860e4e8a3594085cb1bdd36e217130c0b305b4b86ba63af7e86675be16fc9
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close