header-logo
Suggest Exploit
vendor:
I Read It Somewhere (IRIS)
by:
aeon
9,3
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: I Read It Somewhere (IRIS)
Affected Version From: v1.3
Affected Version To: v1.3
Patch Exists: YES
Related CWE: N/A
CPE: a:ireaditsomewhere:i_read_it_somewhere
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2013

I Read It Somewhere (IRIS) <= v1.3 (post auth) Remote Command Execution

This vulnerability allows an attacker to execute arbitrary commands on the vulnerable system with the privileges of the web server. It requires a valid account as at least a user and the target to have outgoing internet connectivity.

Mitigation:

Upgrade to the latest version of I Read It Somewhere (IRIS) or apply the patch from the vendor.
Source

Exploit-DB raw data:

Here is a bug that I finally found time to write about :-)

https://infosecabsurdity.wordpress.com/2013/02/09/iris-citations-management-tool-post-auth-remote-command-execution/

The attached contains my mini framework, exploit and screenshot.

Cheers!

~ aeon

# I Read It Somewhere (IRIS) <= v1.3 (post auth) Remote Command Execution
# download: http://ireaditsomewhere.googlecode.com 
# Notes: 
# - Found this in my archive, duno how long this has been 0Day for... but I had no use for it obviously.
# - Yes! ..the code is disgusting, but does the job
# - Sorry if I ripped your code, it worked for me and I dont reinvent wheels so thank you!
# ~ aeon (https://infosecabsurdity.wordpress.com/)
#
# Exploit requirements:
# ~~~~~~~~~~~~~~~~~~~~~
#
# - A valid account as at least a user
# - The target to have outgoing internet connectivity

Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24480.tar.gz