CVE-2024-34716
┌──(kali㉿kali)-[~/…/htb/labs/trickster/CVE-2024-34716]
└─$ ll
total 7.2M
4.0K drwxrwxr-x 3 kali kali 4.0K Sep 21 23:59 .
8.0K -rw-rw-r-- 1 kali kali 5.4K Sep 21 23:59 reverse_shell.php
8.0K -rw-rw-r-- 1 kali kali 4.3K Sep 21 23:57 exploit.html
4.0K -rw-rw-r-- 1 kali kali 2.0K Sep 21 23:51 exploit.py
4.0K drwxrwxr-x 8 kali kali 4.0K Sep 21 23:49 .git
7.2M -rw-rw-r-- 1 kali kali 7.1M Sep 21 23:49 ps_next_8_theme_malicious.zip
4.0K -rw-rw-r-- 1 kali kali 170 Sep 21 23:49 README.md
4.0K drwxrwxr-x 5 kali kali 4.0K Sep 21 23:49 ..The exploit PoC requires modifications to make it suitable for the target PrestaShop instance
exploit.html
Fixed the line 11 at the url variable in the exploit.html file
Fixed the line 39 at the csrfUrl variable in the exploit.html file
Fixed the line 79 at the formData variable in the exploit.html file
Fixed the line 82 at the postUrl variable in the exploit.html file
reverse_shell.php
Modifying the supplied reverse shell; reverse_shell.php
exploit.py
Fixed
Fixed
The line 48 is a bit weird.
It’s supposed to fetched the a.php file from ps_next_8_theme_malicious.zip , which is LOADED from the exploit.html file
Changed it to a.php
ps_next_8_theme_malicious.zip
Something seems off with the exploit.py file above.
┌──(kali㉿kali)-[~/…/htb/labs/trickster/CVE-2024-34716]
└─$ 7z l ps_next_8_theme_malicious.zip
7-Zip 24.08 (x64) : Copyright (c) 1999-2024 Igor Pavlov : 2024-08-11
64-bit locale=C.UTF-8 Threads:128 OPEN_MAX:1024
Scanning the drive for archives:
1 file, 7444459 bytes (7270 KiB)
Listing archive: ps_next_8_theme_malicious.zip
--
Path = ps_next_8_theme_malicious.zip
Type = zip
Physical Size = 7444459
Date Time Attr Size Compressed Name
------------------- ----- ------------ ------------ ------------------------
2023-03-09 12:12:12 D.... 0 0 assets
2023-03-09 12:12:12 D.... 0 0 config
2023-03-09 12:12:12 D.... 0 0 dependencies
2023-03-09 12:12:15 D.... 0 0 modules
2023-03-09 12:12:15 D.... 0 0 templates
2023-03-09 07:57:33 ....A 905111 902013 preview.png
2023-03-09 12:12:12 D.... 0 0 _dev
2024-04-08 13:08:01 ..... 64 58 .htaccess
2024-04-08 13:13:07 ..... 5491 2255 a.php
------------------- ----- ------------ ------------ ------------------------
2024-04-08 13:13:07 17269551 7230157 772 files, 288 foldersInspecting the zip file
There is the a.php file
┌──(kali㉿kali)-[~/…/htb/labs/trickster/CVE-2024-34716]
└─$ unzip ps_next_8_theme_malicious.zip a.php
Archive: ps_next_8_theme_malicious.zip
inflating: a.phpExtracting only the a.php file
a.php
It was another PHP reverse shell
Changed
┌──(kali㉿kali)-[~/…/htb/labs/trickster/CVE-2024-34716]
└─$ zip ps_next_8_theme_malicious.zip a.php
updating: a.php (deflated 59%)Updated the ps_next_8_theme_malicious.zip file