-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Nonce obtained but not expected exploit response #1
Comments
another strange thing is that the nonce obtained by the requests.get or curl are the same, but they are different from the one I see on the webpage, and only the former nonce is vaild, using the later nonce would return 403: |
Hello, I've updated my code, in fact from what I understand, the payload I used doesn't work on all versions because the feature wasn't implemented, but I don't really know since I don't have access to the version history. I've made a lot of changes at 2f9dfea Come back when you can and tell me if it's fixed :D. In the end, there are still several payloads that are possible to trigger the RCE. Regarding the nonce, it's very strange what you're saying. Are you sure you've chosen the right nonce in "nonce", which itself is in the "bricksData" variable in a script tag? |
Well, regarding the nonce I tried to reproduce what you told me and indeed I see the same behavior, that the nonce is different depending on the browser or curl. I don't know the cause but to overcome this problem you can just retrieve the nonce from your curl request and then run the curl PoC. It will work. As for injecting php code on version 1.8, No idea why it's not working on your instance |
Hey, Just took a deeper dive into the Bricks version 1.8 code and compared it with version 1.9.5 based on the issue you opened. Here's the gist of what I found: It looks like in version 1.8, the Here’s a quick recap on the payloads: Working payload: $ python exploit.py -u http://localhost:8888 --payload-type code
[*] Nonce found: de1e9b5b98
[+] http://localhost:8888 is vulnerable to CVE-2024-25600. Command output: www-data
[!] Shell is ready, please type your commands UwU
# id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
# This demonstrates that the Non-working payloads (everything except "code"):
Hope this clears up why the |
I tried the new payload and it does work on the 1.8 version. Thank you for your effort! |
Wordpress Version 6.4.3
Bricks Version: 1.8
Just installed the Bricks theme, no further configuration.
Same happened when I tried the curl:
The text was updated successfully, but these errors were encountered: