List the vulnerable application and versions affected + cleaner cleanup script.
parent
18c844623a
commit
53a3caba2b
|
@ -1,5 +1,7 @@
|
|||
## Vulnerable Application
|
||||
|
||||
[HashiCorp Consul][https://www.consul.io/] with `disable_remote_exec` configuration flag set to false (default configuration up to version 0.8, opt-in since version 0.9).
|
||||
|
||||
### Description
|
||||
|
||||
This module exploits a feature of Hashicorp Consul named rexec.
|
||||
|
@ -43,11 +45,11 @@ Node Address Status Type Build Protocol DC Segment
|
|||
d28e7cf476ff 172.17.0.2:8301 alive client 1.4.0 2 dc1 <default>
|
||||
```
|
||||
|
||||
The following bash script can be used to stop and destroy **all your running docker containers** (so be careful if you use docker containers for other things at the same time):
|
||||
The following bash script can be used to stop and destroy **all your consul containers** (so be careful if you use consul containers for other things at the same time):
|
||||
|
||||
```
|
||||
#!/bin/sh
|
||||
for h in `sudo docker ps -a| grep -v CONTAINER | cut -d' ' -f1`; do sudo docker stop $h && sudo docker rm $h; done
|
||||
for h in `sudo docker ps -a | grep consul | cut -d' ' -f1`; do docker stop $h && docker rm $h; done
|
||||
```
|
||||
|
||||
## Verification Steps
|
||||
|
|
Loading…
Reference in New Issue