Skip to content

Commit 2254a1f

Browse files
committed
Responded to comments
1 parent 18be9fc commit 2254a1f

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

documentation/modules/exploit/linux/http/craftcms_ftp_template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ to inject and execute arbitrary PHP code on the server via crafted HTTP requests
1919

2020
To test this exploit, follow these steps to set up a vulnerable Craft CMS environment.
2121

22-
#### Non-Docker Setup
22+
#### Docker Setup
2323

2424
Install a specific vulnerable version of Craft CMS:
2525

@@ -67,7 +67,7 @@ ddev launch
6767

6868
1. Start the vulnerable Craft CMS instance using the steps above.
6969
2. Launch `msfconsole`.
70-
3. Use the module: `use exploit/multi/http/craftcms_twig_rce`.
70+
3. Use the module: `use exploit/linux/http/craftcms_ftp_template`.
7171
4. Set `RHOSTS` to the target Craft CMS instance.
7272
5. Configure additional options (`TARGETURI`, `SSL`, etc.) as needed.
7373
6. Execute the exploit with the `run` command.

modules/exploits/linux/http/craftcms_ftp_template.rb

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ def initialize(info = {})
2929
['URL', 'https://github.com/Chocapikk/CVE-2024-56145'],
3030
['URL', 'https://www.assetnote.io/resources/research/how-an-obscure-php-footgun-led-to-rce-in-craft-cms']
3131
],
32+
'Payload' => {
33+
'BadChars' => "\x22\x27" # " and '
34+
},
3235
'License' => MSF_LICENSE,
3336
'Privileged' => false,
3437
'Platform' => %w[unix linux],

0 commit comments

Comments
 (0)