opsxcq/exploit-CVE-2016-10033

Not sure how it works.

thisisALPINE opened this issue · 3 comments

`./exploit.sh xxxxx:80
[+] CVE-2016-10033 exploit by opsxcq
[+] Exploiting xxxxx:80
[+] Target exploited, acessing shell at http://xxxxx:80/backdoor.php
[+] Running whoami
base64: invalid option -- d
Usage: base64 [-dhvD] [-b num] [-i in_file] [-o out_file]
-h, --help display this message
-D, --decode decodes input
-b, --break break encoded string into num character lines
-i, --input input file (default: "-" for stdin)
-o, --output output file (default: "-" for stdout)

RemoteShell>

Whatever thing I input after this (like ls, cd, whoami), I always get this kind of error message

base64: invalid option -- d Usage: base64 [-dhvD] [-b num] [-i in_file] [-o out_file] -h, --help display this message -D, --decode decodes input -b, --break break encoded string into num character lines -i, --input input file (default: "-" for stdin) -o, --output output file (default: "-" for stdout)

What is going on? Are there other commands?

Are you running this exploit on Mac OS X ?

Just change the code in exploit to use base64 -D instead of base64 -d