Add WANem v2.3 command execution #772

Merged
merged 1 commit into from Sep 8, 2012

Projects

None yet

3 participants

@bcoles
Contributor
bcoles commented Sep 8, 2012

Add WANem v2.3 command execution exploit module

  • Remote root
  • Tested on WANem v2.3

WANem v2.3 command execution exploit

@jvazquez-r7
Contributor

Thanks bcoles! Looking into this!

@wchen-r7
Contributor
wchen-r7 commented Sep 8, 2012

Nice. Works for me.

@wchen-r7 wchen-r7 merged commit f026591 into rapid7:master Sep 8, 2012
@jvazquez-r7

Maybe Rex::Text.uri_encode could be used. I haven't tested

@jvazquez-r7

A "echo" injection could be used to test if the application is really vulnerable :)

@jvazquez-r7

Is it right even when privileges are acquires after exploitation? Compatible payload doesn't require privileges, but not sure if this "true" is fully correct. Anyway not a big concern :P

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment