diff --git a/documentation/modules/exploit/multi/script/web_delivery.md b/documentation/modules/exploit/multi/script/web_delivery.md index 0f3aad99dd..4f71362d5e 100644 --- a/documentation/modules/exploit/multi/script/web_delivery.md +++ b/documentation/modules/exploit/multi/script/web_delivery.md @@ -89,6 +89,7 @@ In this example we make a `post` form that pings a user provided IP, which is a 2. `mkdir /var/www/cgi-bin` 3. Enable folder for cgi execution: add `ScriptAlias "/cgi-bin/" "/var/www/cgi-bin/"` to `/etc/apache2/sites-enabled/000-default.conf ` inside of the `VirtualHost` tags 4. Create the vulnerable page by writing the following text to `/var/www/cgi-bin/example.pl`: + ``` #!/usr/bin/perl use CGI qw(:standard); @@ -106,6 +107,7 @@ In this example we make a `post` form that pings a user provided IP, which is a $query->end_form(), $query->end_html(); ``` + 5. Make it executable: `chmod +x /var/www/cgi-bin/example.pl` We can verify this page is exploitable by chaining commands so instead of submitting `127.0.0.1` we'll submit `127.0.0.1;whoami`. @@ -195,6 +197,7 @@ In this example we make a `post` form that pings a user provided IP, which is a 1. Enable cgi: `a2enmod php7.0` 2. Create the vulnerable page by writing the following text to `/var/www/html/example.php`: + ```