Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-12185 PoC — Elabftw 命令代码问题漏洞

Source
Associated Vulnerability
Title:Elabftw 命令代码问题漏洞 (CVE-2019-12185)
Description:Elabftw是一套开源的实验数据托管平台。该平台运行于Linux系统中,并支持存储多种对象。 Elabftw 1.8.5版本中存在命令代码问题漏洞。该漏洞源于外部输入数据构造可执行命令过程中,网络系统或产品未正确过滤其中的特殊元素。攻击者可利用该漏洞执行非法命令。
Description
eLabFTW 1.8.5 'EntityController' Arbitrary File Upload / RCE (CVE-2019-12185)
Readme
- Exploit Title         : eLabFTW 1.8.5 'EntityController' Arbitrary File Upload / RCE
- Date                  : 5/18/19
- Exploit Author        : liquidsky (Joseph McPeters)
- Vulnerable Software   : eLabFTW 1.8.5
- Vendor Homepage       : https://www.elabftw.net/
- Version               : 1.8.5
- Software Link         : https://doc.elabftw.net/
- Tested On             : Linux / PHP Version 7.0.33 / Default installation (Softaculous)
- Author Site		: http://incidentsecurity.com | https://github.com/fuzzlove
- CVE                   : CVE-2019-12185 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12185

- Greetz : wetw0rk, offsec ^^

- Description: eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component.
  This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request.
  This will allow for PHP files to be written to the web root, and for code to execute on the remote server. 
 
- Notes: Once this is done a php shell will drop at https://[target site]/[elabftw directory]/uploads/[random 2 alphanum]/[random long alphanumeric].php5?e=whoami
  You will have to visit the uploads directory on the site to see what the name is. However there is no protection against directory listing.
  So this can be done by an attacker remotely.
File Snapshot

[4.0K] /data/pocs/fdad83873f3bd969143948fd44d9a4131414d27f ├── [6.8K] elabftw-185.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.