Product: Zenoss <= 3.2.1
Zenoss 3.2.1 is distributed as a Virtual Machine image based on
The telnet binary is not available so the default payload
`cmd/unix/reverse' will not work.
These payloads will work in the default Zenoss environment:
Add Zenoss <= 3.2.1 exploit and Python payload
I'll test this week against my old zenoss setup. Now we have three potential python shells to commit.
Are you having problems with send_request_cgi()? The content-length header is automatically calculated in that function.
Clean up Zenoss exploit + minor improvements
Changed send_request_raw() to send_request_cgi()
- Removed redundant request headers 'Content-Length'
Added rescue error message for connection failures
Changed username to the default 'admin' account
Just an oversight on my part.
Fixed in commit bdf8f1a
I'm not seeing the software as a downloadable image... requested an eval and I receive nothing. So I'm just gonna ask first:
Tested (Not Vulnerable)
minor improvements to Zenoss showdaemonxmlconfig exploit