Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/p1ckzi/nanocmshell
authenticated remote code execution via shell upload.
https://github.com/p1ckzi/nanocmshell
exploit file-upload nanocms nanocmshell php php-reverse-shell rce
Last synced: about 6 hours ago
JSON representation
authenticated remote code execution via shell upload.
- Host: GitHub
- URL: https://github.com/p1ckzi/nanocmshell
- Owner: p1ckzi
- Created: 2022-07-22T09:17:00.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-08-03T07:37:56.000Z (over 2 years ago)
- Last Synced: 2024-12-03T16:18:05.542Z (2 months ago)
- Topics: exploit, file-upload, nanocms, nanocmshell, php, php-reverse-shell, rce
- Language: Python
- Homepage:
- Size: 43 KB
- Stars: 2
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# nanocmshell ⭐
a simple script that exploits an authenticated file upload/remote code execution vulnerability in NanoCMS v0.4.## the exploit ❗
https://github.com/kalyan02/NanoCMS has not been maintained in a long time and suffers from a a number of vulnerabilities including authenticated file upload/remote code execution which this script exploits.
More information here: https://github.com/ishell/Exploits-Archives/blob/master/2009-exploits/0904-exploits/nanocms-multi.txt
NanoCMS saves pages both new and edited, as .php files by default, allowing an authenticated attacker to upload executable code.
this script uploads a webshell.## prerequisites ✔
* python3
* python3 requests module
* python3 beautifulsoup4 module
```
sudo apt install python3
sudo apt install python3-pip
pip3 install beautifulsoup4
pip3 install requests
```## usage ℹ
use `./nanocmshell` or `python3 nanocmshell` with `-h` or `--help` for help menu:
```
usage: nanocmshell [-h] [-u USER] [-p PASSWD] [-e] [-a] [-n] address file../nanocmshell exploits authenticated file upload
and remote code execution in NanoCMS.positional arguments:
address schema/ip/hostname, port, sub-directories to the vulnerable NanoCMS
server
file php file to uploadoptions:
-h, --help show this help message and exit
-u USER, --user USER username
-p PASSWD, --passwd PASSWD
password
-e, --execute attempts to make a request to the uploadedfile (more useful if
uploading a reverse shell)
-a, --accessible turns off features which may negatively affect screen readers
-n, --no-colour removes colour outputexamples:
python3 nanocmshell http://10.10.10.10/ rev.php
python3 nanocmshell http://hostname:8080 rev-shell.php -a
./nanocmshell https://10.10.10.10 rev-shell -n -e -u 'user'
```
note: admin/demo are default credentials used but new ones can be supplied with `-u` and `-p` flags.## notes 📝
the script was mainly an exercise in creating a comprehensive program for a single exploit with both readability and accessibility in mind.
aims to handle a number of potential errors to make troubleshooting easier.
probably unlikely to see this in the wild (as of 2022), but maybe useful for CTFs.## credits 👍
https://skerritt.blog/a11y/ - accessibility implementation.