CVE-2022-23046

渗透技巧 2年前 (2022) admin
896 0 0

CVE-2022-23046

PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the “subnet” parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php.

Installation

  1. Build
git clone https://github.com/dnr6419/CVE-2022-23046.git
cd CVE-2022-23046 && docker-compose up -d 
pip3(or pip) install -r requirements.txt
python3(or python) CVE-2022-23046.py -h
  1. Setup 2-1. Go to the http://[YOUR_IP] and Choose [New phpipam installation].
CVE-2022-23046

2-2. Choose [Automatic database installation].
2-3. MySQL username & Password is “root”/”my_secret_mysql_root_pass”.

CVE-2022-23046

2-4. Setting the Password and Login to check the installation is complete.

CVE-2022-23046

Exploit

  python3 CVE-2022-23046.py --url http://localhost --user admin
  # and input your password
CVE-2022-23046

Reference

https://github.com/jcarabantes/CVE-2022-23046.git
https://hub.docker.com/r/phpipam/phpipam-www

 

原文始发于Github :CVE-2022-23046

版权声明:admin 发表于 2022年2月21日 下午5:27。
转载请注明:CVE-2022-23046 | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...