File tree Expand file tree Collapse file tree 2 files changed +8
-7
lines changed
documentation/modules/exploit/linux/http
modules/exploits/linux/http Expand file tree Collapse file tree 2 files changed +8
-7
lines changed Original file line number Diff line number Diff line change @@ -3,9 +3,9 @@ Pandora FMS is a monitoring solution that provides full observability for your o
33This module exploits an command injection vulnerability in the ` chromium-path ` or ` phantomjs-bin ` directory
44setting at the application settings page of Pandora FMS.
55You need have admin access at the Pandora FMS Web application in order to execute this RCE.
6- This access can be achieved leveraging a default password vulnerability in Pandora FMS that allows an attacker
7- to access the Pandora FMS MySQL database, create a new admin user and gain administrative access to the Pandora FMS
8- Web application.
6+ This access can be achieved by knowing the admin credentials to access the web application or leveraging a default
7+ password vulnerability in Pandora FMS that allows an attacker to access the Pandora FMS MySQL database,
8+ create a new admin user and gain administrative access to the Pandora FMS Web application.
99This attack can be remotely executed over the WAN as long as the MySQL services are exposed to the outside world.
1010This issue affects Community, Free and Enterprise editions:
1111 - chromium-path: from v7.0NG.768 through <= v7.0NG.780
Original file line number Diff line number Diff line change @@ -27,10 +27,11 @@ def initialize(info = {})
2727 technology. This module exploits an command injection vulnerability in the `chromium-path` or
2828 `phantomjs-bin` directory setting at the application settings page of Pandora FMS.
2929 You need have admin access at the Pandora FMS Web application in order to execute this RCE.
30- This access can be achieved leveraging a default password vulnerability in Pandora FMS that
31- allows an attacker to access the Pandora FMS MySQL database, create a new admin user and gain
32- administrative access to the Pandora FMS Web application. This attack can be remotely executed
33- over the WAN as long as the MySQL services are exposed to the outside world.
30+ This access can be achieved by knowing the admin credentials to access the web application or
31+ leveraging a default password vulnerability in Pandora FMS that allows an attacker to access
32+ the Pandora FMS MySQL database, create a new admin user and gain administrative access to the
33+ Pandora FMS Web application. This attack can be remotely executed over the WAN as long as the
34+ MySQL services are exposed to the outside world.
3435 This issue affects Community, Free and Enterprise editions:
3536 - chromium-path: from v7.0NG.768 through <= v7.0NG.780
3637 - phantomjs-bin: from v7.0NG.724 through <= v7.0NG.767
You can’t perform that action at this time.
0 commit comments