Skip to content

F-Masood/Booked-Scheduler-2.7.5---RCE-Without-MSF

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Booked Scheduler 2.7.5 - Remote Command Execution Without Metasploit

Dated: 23 Jan 2021 - Author: F-Masood
Description: This is a manual way (without using metasploit) of exploiting the CVE 2019-9581 or EDB-ID:46486 vulnerablity.
Need: Just to avoid using MSF, I made this one ;-)

Please note the original credit of finding this vulnerability goes to AKKUS ---> https://www.exploit-db.com/?author=9483.
The vulnerability requires authenticated user (admin login) as a pre-req. After logging as ADMIN, the user can upload a malicious php script by exploiting arbitrary file upload vulnerability in ico file upload section.

PoC
  1. Login to the Booked Scheduler 2.7.5 web portal. alt text

  2. Navigate to manage_theme.php page. alt text

  3. Under Favicon section, upload your malicious php script e.g. I am uploading a file rce.php Also, I am using Burp to intercept my request, although Burp part is not necessary. alt text

  4. The file is ready to be uploaded. The highlighted section shows the contents of codeexec.php. You can grab this codeexec.php from here -> https://raw.githubusercontent.com/F-Masood/php-backdoors/main/rce.php alt text

  5. Navigate to custom-favicon.php file, give some command as input and you have achieved RCE. Wohoooo!!! alt text

About

Exploiting Booked Scheduler 2.7.5 - RCE without MSF.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published