Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-16921 PoC — OTRS 安全漏洞

Source
Associated Vulnerability
Title:OTRS 安全漏洞 (CVE-2017-16921)
Description:OTRS(Open-source Ticket Request System)是德国OTRS集团的一套开源缺陷跟踪管理系统软件。该软件将电话,邮件等各种渠道提交进来的服务请求归类为不同的队列、服务级别,服务人员通过OTRS系统来跟踪和回复客户。 OTRS 6.0.x版本至6.0.1版本、5.0.x版本至5.0.24版本和4.0.x版本至4.0.26版本中存在安全漏洞。攻击者可利用该漏洞执行任意的shell命令。
Description
CVE-2017-16921: In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.
Readme
# OTRS-4.0.1-6.0.1 Remote Command Execution
This exploit is developed based on https://www.exploit-db.com/exploits/43853
It will perform the authentication against OTRS panel and provide a reverse shell.

Usage: python3 CVE-2017-16921.py <RHOST> <email> <password> <LHOST> <LPORT>

CVE-2017-16921:
In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.

Credits to Hex_26 for the ChallengeToken retrieval function and Bæln0rn for the initial exploit.
File Snapshot

[4.0K] /data/pocs/dd3d384efb5586c3a3e4b1a35a1f94b5e1f572bf ├── [5.8K] CVE-2017-16921.py └── [ 706] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.