Updated docs

This commit is contained in:
Jack Heysel
2024-11-11 12:40:56 -08:00
parent 3068511b66
commit 27459bb10f
@@ -8,17 +8,20 @@ by default.
### Setup
A vulnerable docker-compose configuration can be found at the following link: https://github.com/vulhub/vulhub/pull/559
Clone the repo `vulhub`: `https://github.com/vulhub/vulhub.git` checkout the pull request mentioned above.
Once cloned run `cd vulhub/chamilo/CVE-2023-4220`. Then run `docker compose up`
After the contain is build navigate to `http://127.0.0.1:8080` to complete the installation wizard.
Note when filling out the database IP address and credentials - the DB hostname is the name of the container which is
`mariadb` (not `localhost` or `127.0.0.1`). Once the installation wizard is complete the target should be ready to be
exploited with the module. This container has the non-default `/files/` directory created already.
1. Clone the repo `git clone https://github.com/vulhub/vulhub.git`
1. Checkout the pull request mentioned above: `git checkout CVE-2023-4220`
1. Run `cd vulhub/chamilo/CVE-2023-4220`
1. Start the environment: `docker compose up`
1. Navigate to `http://127.0.0.1:8080` to complete the installation wizard.
1. Note when filling out the database IP address and credentials - the DB hostname is the name of the container which is
`mariadb` (not `localhost` or `127.0.0.1`).
1. Once the installation wizard is complete the target should be ready to be
exploited with the module. This container has the non-default `/files/` directory created already.
## Verification Steps
1. Start msfconsole
1. Do: `use `
1. Do: `use linux/http/chamilo_bigupload_webshell`
1. Set the `RHOST`, `RPORT`, and `LHSOT` options
1. Run the module
1. Receive a Meterpreter session as the `www-data` user.
@@ -83,4 +86,4 @@ Computer : c2064983b0e1
OS : Linux c2064983b0e1 6.10.11-linuxkit #1 SMP PREEMPT_DYNAMIC Thu Oct 3 10:19:48 UTC 2024 x86_64
Meterpreter : php/linux
meterpreter >
```
```