You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This module exploits a command injection vulnerability in Netflow component of PandoraFMS. The module requires a set of user credentials to modify Netflow settings. Also, Netflow binaries have to present on the system.
19
+
This module exploits a command injection vulnerability in Netflow component of PandoraFMS. The module requires a set of user credentials to modify Netflow settings. Also, Netflow binaries have to be present on the system.
20
20
},
21
21
'License'=>MSF_LICENSE,
22
22
'Author'=>['msutovsky-r7'],# researcher, module dev
returnMsf::Exploit::CheckCode::Safe('Application is not probably PandoraFMS')unlessversion
80
+
returnMsf::Exploit::CheckCode::Safe('Application is not probably PandoraFMS')ifversion.blank?
81
81
82
82
version=version[1..]&.sub('NG','')
83
83
84
84
vprint_warning('Token was not parsed, will try again')unless@csrf_token
85
85
86
86
vprint_status("Version #{version} detected")
87
87
88
-
returnExploit::CheckCode::Vulnerable("Vulnerable PandoraFMS version #{version} detected")ifRex::Version.new(version).between?(Rex::Version.new('7.0.774'),Rex::Version.new('7.0.777.10'))
88
+
returnExploit::CheckCode::Appears("Vulnerable PandoraFMS version #{version} detected")ifRex::Version.new(version).between?(Rex::Version.new('7.0.774'),Rex::Version.new('7.0.777.10'))
89
89
90
90
Msf::Exploit::CheckCode::Safe("Running version #{version}, which is not vulnerable")
91
91
end
@@ -108,6 +108,13 @@ def get_csrf_token
108
108
fail_withFailure::NotFound,'Could not found CSRF token'unless@csrf_token
109
109
end
110
110
111
+
##
112
+
# Checks whether login response was valid and successful. It check whether response code is 200 an if body contains either of following values - id="welcome-icon-header", id="welcome-panel" or "godmode"
0 commit comments