Directory traversal vulnerability in ServiceDesk Plus MSP v5 to v9.0 v9030; AssetExplorer v4 to v6.1; SupportCenter v5 to v7.9; IT360 v8 to v10.4.
This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk, AssetExplorer, SupportCenter and IT360 when uploading attachment files. The JSP that accepts the upload does not handle correctly '../' sequences, which can be abused to write to the file system. Authentication is needed to exploit this vulnerability, but this module will attempt to login using the default credentials for the administrator and guest accounts. Alternatively, you can provide a pre-authenticated cookie or a username / password. For IT360 targets, enter the RPORT of the ServiceDesk instance (usually 8400). All versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer, SupportCenter and IT360 (including MSP) are vulnerable. At the time of release of this module, only ServiceDesk v9 has been fixed in build 9031 and above. This module has been tested successfully in Windows and Linux on several versions.
msf > use exploit/multi/http/manageengine_auth_upload msf exploit(manageengine_auth_upload) > show targets ...targets... msf exploit(manageengine_auth_upload) > set TARGET <target-id> msf exploit(manageengine_auth_upload) > show options ...show and set options... msf exploit(manageengine_auth_upload) > exploit
OSCP This is a repository which contains custom/ported POC exploits They have been made for study and learning purposes Currently under development 35845py CVE: 2014-5301 OSVDB: 116733 URL: seclistsorg/fulldisclosure/2015/Jan/5 Original metasploit module: wwwexploit-dbcom/exploits/35845 Usage 35845py filewar host port First create reverse shell payload