关联漏洞
标题:
OTRS 安全漏洞
(CVE-2017-16921)
描述:OTRS(Open-source Ticket Request System)是德国OTRS集团的一套开源缺陷跟踪管理系统软件。该软件将电话,邮件等各种渠道提交进来的服务请求归类为不同的队列、服务级别,服务人员通过OTRS系统来跟踪和回复客户。 OTRS 6.0.x版本至6.0.1版本、5.0.x版本至5.0.24版本和4.0.x版本至4.0.26版本中存在安全漏洞。攻击者可利用该漏洞执行任意的shell命令。
描述
CVE-2017-16921: In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.
介绍
# OTRS-4.0.1-6.0.1 Remote Command Execution
This exploit is developed based on https://www.exploit-db.com/exploits/43853
It will perform the authentication against OTRS panel and provide a reverse shell.
Usage: python3 CVE-2017-16921.py <RHOST> <email> <password> <LHOST> <LPORT>
CVE-2017-16921:
In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.
Credits to Hex_26 for the ChallengeToken retrieval function and Bæln0rn for the initial exploit.
文件快照
[4.0K] /data/pocs/dd3d384efb5586c3a3e4b1a35a1f94b5e1f572bf
├── [5.8K] CVE-2017-16921.py
└── [ 706] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。