Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-14772 PoC — Pydio 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Pydio 操作系统命令注入漏洞 (CVE-2018-14772)
Description:Pydio(前称AjaXplorer)是一款基于Web的远程文件管理器。该管理器支持上传和下载文件、在线文件编辑、图片预览等。 Pydio 4.2.1版本至8.2.1版本中存在安全漏洞。远程攻击者可利用该漏洞在底层系统上执行任意代码。
Description
RCE exploit for CVE-2018-14772
Readme
# CVE-2018-14772

### info

This is a PoC Remote Code Execution exploit for CVE-2018-14772, a vulnerability 
that I discovered in the [pydio](https://pydio.com/) file sharing platform. It 
requires pydio application administrator credentials to work. You can run the 
exploit like so:

### usage

```
$ python exploit.py -h
usage: exploit.py [-h] -t TARGET -u USERNAME -p PASSWORD -L LISTENER_IP -P
                  LISTENER_PORT [--payload PAYLOAD]

[*] exploit some pydio boxes (academically)

optional arguments:
  -h, --help         show this help message and exit
  --payload PAYLOAD  one of the pre-built reverse-shell payloads (1, 2, 3, 4,
                     or 5), or a custom command. keep in mind you can't use
                     the (") character as it breaks the injection

required arguments:
  -t TARGET          this is the target URI for the pydio instance..i.e.
                     http://127.0.0.1:31337/pydio/
  -u USERNAME        this is the username of the admin user
  -p PASSWORD        this is the password of the admin user
  -L LISTENER_IP     IP address to catch reverse shell on
  -P LISTENER_PORT   port to catch reverse shell on
```

I baked in a few reverse shell payloads you can try. Additionally, you can use ad-hoc custom shell commands. Keep in mind, using the `"` character will break the command injection, so you have to work around that limitation.

### example exploitation

![img](https://i.imgur.com/oBXqt78.png)

### writeup

found on my blog [here](http://coastalsec.io/cve-2018-14772-remote-code-execution)
File Snapshot

[4.0K] /data/pocs/5dc8922d0ba494b991004dd1b61f276b8ed75cda ├── [ 16K] exploit.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.