You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/linux/http/nagios_xi_chained_rce.md
+114Lines changed: 114 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,8 +28,22 @@ steps on the screen to configure the app.
28
28
Configuration is actually not required to exploit the app, but you should do it
29
29
anyway.
30
30
31
+
## Options
32
+
33
+
**USER_ID**
34
+
35
+
If you wish to exploit a particular ```USER_ID```, that can be specified here. Default is 1, which is most likely the admin account.
36
+
37
+
**API_TOKEN**
38
+
39
+
The SQLi included only works for MySQL, which should work in most cases. However, if you experience a different backend, you can enumerate the user
40
+
table via sqlmap: ```sqlmap -u "http://[ip]/nagiosxi/includes/components/nagiosim/nagiosim.php?mode=resolve&host=a&service=" -p service -T xi_users --dump```.
41
+
Then you can set the ```USER_ID``` and ```API_TOKEN``` to skip those phases and move on to exploitation. Default is empty. See example below for more usage.
42
+
31
43
## Usage
32
44
45
+
### Typical Usage
46
+
33
47
Just set ```RHOST``` and fire off the module! It's pretty much painless.
34
48
```set VERBOSE true``` if you want to see details.
0 commit comments