# ExploitTitle:Sysaid20.1.11 b26 -RemoteCommandExecution
# GoogleDork: intext:"Help Desk Software by SysAid <http://www.sysaid.com/>"
# Date:2020-03-09
# ExploitAuthor:AhmedSherif
# VendorHomepage: https://www.sysaid.com/free-help-desk-software
# SoftwareLink:[https://www.sysaid.com/free-help-desk-software
# Version:Sysaid v20.1.11 b26
# Tested on:WindowsServer2016
# CVE:NoneGhostCatAttackThedefault
installation of Sysaid is enabling the exposure of AJP13 protocol which is used
by tomcat instance,this vulnerability has been released recently on
different blogposts
<https://www.zdnet.com/article/ghostcat-bug-impacts-all-apache-tomcat-versions-released-in-the-last-13-years/>.*Proof-of-Concept*[image: image.png]The
attacker would be able toexploit the vulnerability and read the Web.XML of
Sysaid.
UnauthenticatedFileUploadIt was
found on the Sysaid application that an attacker would be able toupload files
without authenticated by directly access the below link:
http://REDACTED:8080/UploadIcon.jsp?uploadChatFile=true&parent=In the above screenshot, it shows that an attacker can execute commands
in the system without any prior authentication tothe system.