Remove unneeded require
parent
08e1f86390
commit
b49b7ca9db
|
@ -3,8 +3,6 @@
|
||||||
# Current source: https://github.com/rapid7/metasploit-framework
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
##
|
##
|
||||||
|
|
||||||
require 'uri'
|
|
||||||
|
|
||||||
class MetasploitModule < Msf::Exploit::Remote
|
class MetasploitModule < Msf::Exploit::Remote
|
||||||
Rank = ExcellentRanking
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
@ -18,14 +16,13 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
This module exploits an arbitrary command execution vulnerability in Webmin
|
This module exploits an arbitrary command execution vulnerability in Webmin
|
||||||
1.900 and lower versions. Any user authorized to the "Java file manager"
|
1.900 and lower versions. Any user authorized to the "Java file manager"
|
||||||
and "Upload and Download" fields, to execute arbitrary commands with root privileges.
|
and "Upload and Download" fields, to execute arbitrary commands with root privileges.
|
||||||
In addition, "Running Processes" field must be authorized to discover the directory to be uploaded.
|
In addition, if the 'Running Processes' (proc) privilege is set the user can
|
||||||
A vulnerable file can be printed on the original files of the Webmin application.
|
accurately determine directory upload to. Webmin application files can be
|
||||||
The vulberable file we are uploading should be integrated with the application.
|
written/overwritten, thus allowing RCE root. The module has been tested
|
||||||
Therefore, a ".cgi" file with the vulnerability belong to webmin application should be used.
|
successfully with Webmin 1900 over Debia'cookie' "redirect=1; testing=1;
|
||||||
The module has been tested successfully with Webmin 1900 over Debia'cookie' => "redirect=1; testing=1; sid=#{session}"n 4.9.18.
|
sid=#{session}"n 4.9.18.
|
||||||
Update: The update to this module allows the user to set 'GUESSUPLOAD' to true, which will attempt
|
Using GUESSUPLOAD attempts to use a default installation path in order to trigger the
|
||||||
to upload the files to known default locations. This removes 'proc' permission requirement, meaning
|
exploit.
|
||||||
attackers only need 'file' and 'updown' permissions.
|
|
||||||
),
|
),
|
||||||
'Author' => [
|
'Author' => [
|
||||||
'AkkuS <Özkan Mustafa Akkuş>', # Vulnerability Discovery, Initial PoC module
|
'AkkuS <Özkan Mustafa Akkuş>', # Vulnerability Discovery, Initial PoC module
|
||||||
|
@ -57,7 +54,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
[
|
[
|
||||||
Opt::RPORT(10000),
|
Opt::RPORT(10000),
|
||||||
OptBool.new('SSL', [true, 'Use SSL', true]),
|
OptBool.new('SSL', [true, 'Use SSL', true]),
|
||||||
OptBool.new('GUESSUPLOAD', [true, "If the 'Running Process' permission is not given to the user guess the path.", false]),
|
OptBool.new('GUESSUPLOAD', [true, "If no 'proc' permissions exists use default path.", false]),
|
||||||
OptString.new('USERNAME', [true, 'Webmin Username']),
|
OptString.new('USERNAME', [true, 'Webmin Username']),
|
||||||
OptString.new('PASSWORD', [true, 'Webmin Password'])
|
OptString.new('PASSWORD', [true, 'Webmin Password'])
|
||||||
], self.class
|
], self.class
|
||||||
|
|
Loading…
Reference in New Issue