exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files

ELF_RPATH.txt
Posted Jan 29, 2004
Authored by Matthias Andree

Some dynamically linked binary builds of the CVSup package contain untrusted paths in the ELF RPATH fields of the executables which may allow for local privilege escalation.

tags | advisory, local
SHA-256 | b8782bca72a905590f6df6d37502a533b73ad0fe9fb35cea32cce7475f90ab88

Related Files

elFinder Archive Command Injection
Posted Sep 15, 2021
Authored by Shelby Pace, Thomas Chauchefoin | Site metasploit.com

elFinder versions below 2.1.59 are vulnerable to a command injection vulnerability via its archive functionality. When creating a new zip archive, the name parameter is sanitized with the escapeshellarg() php function and then passed to the zip utility. Despite the sanitization, supplying the -TmTT argument as part of the name parameter is still permitted and enables the execution of arbitrary commands as the www-data user.

tags | exploit, arbitrary, php
advisories | CVE-2021-32682
SHA-256 | eefba941559b0ed45889286a43dda93328d3b84159ce379897131f28b557f0ba
elFinder PHP Connector exiftran Command Injection
Posted Mar 12, 2019
Authored by Brendan Coles, Thomas Chauchefoin, q3rv0 | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in elFinder versions prior to 2.1.48. The PHP connector component allows unauthenticated users to upload files and perform file modification operations, such as resizing and rotation of an image. The file name of uploaded files is not validated, allowing shell metacharacters. When performing image operations on JPEG files, the filename is passed to the exiftran utility without appropriate sanitization, causing shell commands in the file name to be executed, resulting in remote command injection as the web server user. The PHP connector is not enabled by default. The system must have exiftran installed and in the PATH. This module has been tested successfully on elFinder versions 2.1.47, 2.1.20, and 2.1.16 on Ubuntu.

tags | exploit, remote, web, shell, php
systems | linux, ubuntu
SHA-256 | 5222268c0c1677f7e0637fd6b8a807ef9ea4bfb24107aadeb85ce45155354bc3
elFinder 2.1.47 Command Injection
Posted Mar 5, 2019
Authored by q3rv0

elFinder versions 2.1.47 and below suffer from a command injection vulnerability in the PHP connector.

tags | exploit, php
advisories | CVE-2019-9194
SHA-256 | c18a99273f5751aac3069a948d7904a72a24ff8573296cdae06be2c2d58ce090
elFinder 2 Remote Command Execution
Posted May 7, 2015
Authored by TUNISIAN CYBER

elFinder 2 suffers from a remote command execution vulnerability via file creation.

tags | exploit, remote
SHA-256 | 57884d86d295df818f1cab870ceaf073323f6d2bc260384a3aeccee8ff36816f
ElfChat 5.2.0 Pro Cross Site Scripting
Posted Oct 3, 2014
Authored by indoushka

ElfChat version 5.2.0 Pro suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 14c2be5038a765871520e53de63ae1d22508257a57f5adb84596065a25eb45eb
Elfchat 5.1.2 Pro Cross Site Scripting
Posted Jul 6, 2012
Authored by Avatar Fearless

ElfChat version 5.1.2 Pro suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5dbc0c25c91ac9c248972741c037874ae862593c456258d1c27f34c121b8cf11
Cheats With ELF - Code Injecting Into ELF Headers
Posted Jun 29, 2010
Authored by murderkey | Site tcc.hellcode.net

Whitepaper called Cheats with ELF - Code Injecting into ELF Headers.

tags | paper
SHA-256 | 2737a2b61dd3e9303deffc4c5ed16acb439de026f629f5909b558e4d76f6372b
elfdump-exploit.c
Posted Feb 14, 2008
Authored by David Reguera Garcia

Exploit that demonstrates an elfdump crash flaw when analyzing a specially crafted ELF file.

tags | exploit
SHA-256 | c3cea28a2e7394096322ead670ca856079d5192d98b98ba04aed8cbae0f111d3
elf-infection.txt
Posted Oct 9, 2006
Authored by jolmos

Infecting ELF binaries to gain local root.

tags | exploit, local, root
SHA-256 | ddbff7dec2b42a5c6f2a6392277bd7b695ef9ef374ad2f4856babe17083ef0d0
elfcd1.txt
Posted May 27, 2005
Site isec.pl

Linux kernel binfmt_elf core dump buffer overflow exploit.

tags | exploit, overflow, kernel
systems | linux
SHA-256 | 58a6abd1f277ec637f9a44b64e7406574fa600212c6681ae666cddafa25fbac1
elf-1.tbz
Posted Sep 9, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Project Freedocs Volume 3 - A collection of tutorials regarding elf programming.

tags | paper
SHA-256 | b82d788fa1cc03185f252c3dd0cd47a9996e0422cc57dc5a354273bd6e0db8ca
elf-0.5.4p1.tar.gz
Posted Sep 9, 2004
Authored by Samy | Site kerneled.org

elf is a command-line tool that allows a user, be it a script or a human, to analyze the contents of an ELF object file header. This header contains various integral values such as the virtual entry point of the object file, the machine architecture it was compiled for and more.

systems | linux
SHA-256 | ba504141b5e785fc1d7f12e8239b05346b36be25671c0ad626f1baa248ad8791
elfrape2.c
Posted Jun 22, 2004

Proof of concept exploit that will patch an ELF binary to utilize the stack overflow in file 3.39 and below. If someone runs file against said binary, a suid shell is created as /tmp/.sh of that uid. New version works on both Linux and the BSDs .

tags | exploit, overflow, shell, proof of concept
systems | linux
SHA-256 | 21103ace980bf29abaf0743ed5d8816533999653245d3642f709e758b76ba991
elfrape.c
Posted Jun 22, 2004

Proof of concept exploit that will patch an ELF binary to utilize the stack overflow in file 3.39 and below. If someone runs file against said binary, a suid shell is created as /tmp/.sh of that uid.

tags | exploit, overflow, shell, proof of concept
SHA-256 | 15a084aac71ca804bb1ff97e1ca230d473228271616ff4493d50b4b2a3d11cd4
elfpgp-0.1.5.tar.gz
Posted Jan 16, 2004
Authored by Bart Trojanowski | Site jukie.net

elfpgp signs an ELF binary by using standard PGP/GnuPG keys. It also allows for verification of said signatures. The signature is stored in the binary in an ELF record.

tags | encryption
SHA-256 | c72305a22e7ace63cfd05154d33e383e750ba58c7cec03ad65c3754c61d2550d
elfcmp-1.0.0.tar.gz
Posted Oct 21, 2003
Authored by Matt Miller | Site hick.org

Elfcmp compares running processes to the their respective binary image to ensure that the process image in memory has not been tampered with after execution. This is useful for security auditing, as other methods that rely strictly on checking disk image checksums are not reliable if only the process image is being tampered with.

systems | linux
SHA-256 | cc834fee066f13e42f1cba14a95de3239289c91042562ea57d720564a2a26f41
elfsh-0.51b3-portable.tgz
Posted Sep 13, 2003
Authored by Mayhem | Site elfsh.devhell.org

Elf Shell v0.51b3-portable is an automated reverse engineering tool with read/write capability for the ELF format. Sophisticated output with cross references using .got, .ctors, .dtors, .symtab, .dynsym, .dynamic, .rel.* and many other with an integrated hexdump. Designed for Linux. All calls encapsulated in libelfsh.a, so the elfsh API is really reusable.

Changes: It works on Linux, NetBSD, FreeBSD, and Solaris for the INTEL and SPARC architectures. It provides ET_REL injection into ET_EXEC for both arch, and INTEL control flow graphs, as well as a lot of new improvements, as featured lastly in The Cerberus ELF interface article in phrack #61.
tags | shell
systems | linux
SHA-256 | ecffe100d0da12235cfe464726313491409739493030f3fbdb3a28696b23447f
elfdoctor.c
Posted Sep 6, 2003
Authored by Pluf

Scanner to look up infection techniques that can be used in ELF modules. Includes function hijacking, relocation files, etc. Runs on linux 2.4.X.

systems | linux
SHA-256 | dcd0e0b68ca65f72ca23959a54204f1f589d2cac48c5840fd77dc0b45db13d17
elf-reloc.c
Posted Jul 29, 2003
Authored by sac, Soeren Bleikertz | Site sac.cc

A demonstration of ELF relocation.

tags | exploit
SHA-256 | 15f16677b70d453d8baa3551f84c1a7dff88f2b60f14e3269391e42b8eeba9fb
elfbinder_1.5.tar.gz
Posted May 7, 2003
Authored by GML

Elf binder v1.5 will bind a tar file to the end of an executable. It will then untar the file in /tmp, run the installation script, and can be useful for automation.

systems | linux
SHA-256 | 7c68d9e3a950633449b73b3e7cc149f45eb56ccbd2ba6ed0f2f1cd101337429c
elfrip.c
Posted Jul 17, 2002
Authored by netric, PoWeR PoRK | Site netric.org

Elfrip is a tiny cat-like utility for ripping the code section out of a nasm generated elf image.

systems | unix
SHA-256 | d04491b975521b75ef0b591b237c4372cec5f1be775b96ff57fb534aa0a5189f
elfsh-0.43b-portable.tgz
Posted Jul 6, 2002
Authored by Mayhem | Site devhell.org

Elf Shell v0.43b-portable is an automated reverse engineering tool with read/write capability for the ELF format. Sophisticated output with cross references using .got, .ctors, .dtors, .symtab, .dynsym, .dynamic, .rel.* and many other with an integrated hexdump. Designed for Linux. All calls encapsulated in libelfsh.a, so the elfsh API is really reusable. Sample output here.

Changes: Bigger testsuite, documentation improved, minor bugs and typo fixed, Improved portability - still working on Redhat, Debian, Slackware Linux, NetBSD and FreeBSD current.
tags | shell
systems | linux
SHA-256 | 9068395673dc10ca19ad2f71181d0ce313ff9da89bde2727c0db51c616b87c20
elf-runtime-fixup.txt
Posted Jan 17, 2002
Authored by Mayhem | Site devhell.org

Reversing the ELF - Stepping with GDB during PLT uses and .GOT fixup. This is a GDB tutorial about runtime process fixup using the Procedure Linkage Table section (.plt) and the Global Offset Table section (.got) by the dynamic linker ld-linux.so. ASM knowledge will be helpful. More info on ELF here.

tags | paper
systems | linux, unix
SHA-256 | d827aaba5feb045e90dea774ade60c84ce956eb244b90457391bfb60f6d84432
elf-pv.txt
Posted Aug 17, 1999
Authored by Silvio Cesare

An article on UNIX ELF PARASITES AND VIRUSES including a fully working parasite infector and binary virus for Linux (UNIX portable however). The parasites and virus described and given do not destroy the executeables functionality but instead as with many DOS viruses simply append new code to the image. Rudimentary techniques for disabling the parasites and virus is also described. (includes LONG rant at beginning by author).

tags | exploit, virus
systems | linux, unix
SHA-256 | 41101f0b3c5ca938f20c81b9751270536b75203824557fe9301873ac62f7da1e
Page 1 of 1
Back1Next

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    3 Files
  • 27
    Sep 27th
    13 Files
  • 28
    Sep 28th
    5 Files
  • 29
    Sep 29th
    12 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close