changed wording and line numbers

GSoC/Meterpreter_Web_Console
Shelby Pace 2018-09-18 13:33:09 -05:00
parent 2cf1fbcb2c
commit b98dfe0e7f
No known key found for this signature in database
GPG Key ID: B2F3A8B476406857
1 changed files with 6 additions and 7 deletions

View File

@ -2,7 +2,7 @@
This module exploits a SQL injection vulnerability in Pimcore's REST web service for versions below 5.3.0. By using a UNION query on the `object inquire` service, this module can steal the usernames and password hashes of all users of Pimcore.
Pimcore begins to create password hashes by concatenating a user's username, the name of the application, and the user's password like so: `USERNAME:pimcore:PASSWORD`.
Pimcore begins to create password hashes by concatenating a user's username, the name of the application, and the user's password in the format `USERNAME:pimcore:PASSWORD`.
The resulting string is then used to generate an MD5 hash, and then that MD5 hash is used to create the final hash, which is generated using PHP's built-in `password_hash` function.
## Vulnerable Application
@ -17,11 +17,11 @@
1. Install the application
2. Start msfconsole
3. Do: `use auxiliary/sqli/oracle/pimcore_list_creds`
3. Do: `set RHOSTS [IP]`
3. Do: `set TARGETURI [URI]`
3. Do: `set APIKEY [KEY]`
4. Do: `run`
5. You should get a list of Pimcore user credentials
4. Do: `set RHOSTS [IP]`
5. Do: `set TARGETURI [URI]`
6. Do: `set APIKEY [KEY]`
7. Do: `run`
8. You should get a list of Pimcore user credentials
## Options
@ -33,7 +33,6 @@
### Tested on Ubuntu 18.04.1 Running Pimcore v5.2.3
```
msf5 > use auxiliary/sqli/oracle/pimcore_list_creds
msf5 auxiliary(sqli/oracle/pimcore_list_creds) > set rhosts 192.168.37.246