Path: blob/master/documentation/modules/exploit/windows/http/magicinfo_traversal.md
20089 views
Vulnerable Application
Vulnerability Description
This module exploits a path traversal vulnerability in Samsung MagicINFO 9 <= 21.1050.0 (CVE-2024-7399).
Remote code execution can be obtained by exploiting the path traversal vulnerability (CVE-2024-7399) in the SWUpdateFileUploader servlet, which can be queried by an unauthenticated user to upload a JSP shell. By default, the application listens on TCP ports 7001 (HTTP) and 7002 (HTTPS) on all network interfaces and runs in the context of NT AUTHORITY\SYSTEM.
Vulnerable Application Installation
A trial version of the software can be obtained from [the vendor] (https://www.samsung.com/us/business/solutions/digital-signage-solutions/magicinfo/).
Successfully tested on
MagicINFO 9 21.1040.2 on Windows 10 (22H2)
Verification Steps
Install Postgres or MySQL
Install the application
Activate the license
Start
msfconsole
and run the following commands:
You should get a shell in the context of NY AUTHORITY\SYSTEM
.
Options
DEPTH
The traversal depth. The FILE path will be prepended with ../ * DEPTH.
Scenarios
Running the exploit against MagicINFO 9 21.1040.2 on Windows 10 should result in an output similar to the following: