-
Notifications
You must be signed in to change notification settings - Fork 13.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add an RCE exploit for the AIS logistics software #11641
Conversation
Thanks for the fast feedback. I added all the suggested changes. |
At some stage during the review process, the reviewer will request documentation for this module. |
Do you need anything else? |
Please add module documentation. |
You cannot download the software. It is not publicity available and I cannot provide you an instance to test the exploit. I can send you a wireshark dump if you want. |
I suggested a few more changes to the module. You can send a PCAP to msfdev [at] metasploit.com so we can verify the module works. |
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
Release NotesThe windows/misc/ais_esel_server_rce exploit module has been added to the framework. This module exploits an unauthenticated SQL injection in AIS ESEL-Server to execute commands on the server. |
Add an RCE exploit for the AIS logistics software (www.ais.de). It exploits a SQL injection on the backend of their mobile app.
Verification
List the steps needed to make sure this thing works
msfconsole
use exploit/windows/misc/ais_esel_server_rce
set RHOSTS <IP>
check
run
Scenarios