metasploit-framework/documentation/modules/exploit/linux
Jack Heysel 2b90d33aef
Land #18618, Add OpenNMS privesc and auth RCE
This module exploits built-in functionality in OpenNMS Horizon in order
to execute arbitrary commands as the opennms user. For versions 32.0.2
and higher, this module requires valid credentials for a user with
ROLE_FILESYSTEM_EDITOR privileges and either ROLE_ADMIN or ROLE_REST.
For versions 32.0.1 and lower, credentials are required for a user with
ROLE_FILESYSTEM_EDITOR, ROLE_REST, and/or ROLE_ADMIN privileges.
2024-03-20 12:54:16 -07:00
..
fileformat Clean up and better documentation 2022-08-22 11:46:50 -07:00
http Land #18618, Add OpenNMS privesc and auth RCE 2024-03-20 12:54:16 -07:00
local Land #18786, Fix option collision in `service_persistence` 2024-02-14 17:25:15 +01:00
misc add the RCE exploit 2023-11-06 17:12:40 +00:00
redis spelling fixes on docs 2023-10-10 14:46:18 -04:00
samba undo some spelling fixes when upstream has those issues 2023-10-11 06:30:11 -04:00
smtp ghost doc fixes 2020-05-28 07:20:38 -04:00
snmp module doc standardizations 2020-01-20 21:26:59 -05:00
ssh review 2023-10-23 06:35:23 -04:00
telnet Don't be lazy and spell out "introduction" in docs 2019-09-30 16:58:00 -05:00
upnp added target DIR-845L 2023-11-13 14:48:59 +00:00