Adding new lines
parent
a68b6f0ab9
commit
8f6f3bdb20
|
@ -3,7 +3,9 @@
|
|||
This module exploits an IP whitelist bypass vulnerability in the developer web console included with Ruby on Rails 4.0.x and 4.1.x. This module will also achieve code execution on Rails 4.2.x if the attack is launched from a whitelisted IP range.
|
||||
|
||||
## Verification Steps
|
||||
**Prerequisites :**
|
||||
|
||||
**Prerequisites:**
|
||||
|
||||
```
|
||||
$ gem install rails -v 4.2.6
|
||||
$ rails new taco
|
||||
|
@ -15,18 +17,23 @@ $ bundle
|
|||
$ rails server
|
||||
```
|
||||
|
||||
**Installing nodejs :**
|
||||
**Installing nodejs:**
|
||||
|
||||
```
|
||||
sudo apt-get install nodejs
|
||||
```
|
||||
|
||||
**Launch msfconsole :**
|
||||
**Launch msfconsole:**
|
||||
|
||||
1. Do: ```use exploit/multi/http/rails_web_console_v2_code_exec```
|
||||
2. Do: ```set RHOSTS [IP]```
|
||||
3. Do: ```set RPORT [Port]```
|
||||
4. Do: ```run```
|
||||
|
||||
## Sample Output
|
||||
|
||||
### Rails version 4.2.6
|
||||
|
||||
```
|
||||
msf > use exploit/multi/http/rails_web_console_v2_code_exec
|
||||
msf exploit(rails_web_console_v2_code_exec) > set RHOST 192.168.0.106
|
||||
|
|
Loading…
Reference in New Issue