You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/linux/http/nagios_xi_chained_rce.md
+21-50Lines changed: 21 additions & 50 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,15 +30,15 @@ anyway.
30
30
31
31
## Options
32
32
33
-
**USERID**
33
+
**USER_ID**
34
34
35
-
If you wish to exploit a particular UserID, that can be specified here. Default is 1, which is most likely the admin account.
35
+
If you wish to exploit a particular ```USER_ID```, that can be specified here. Default is 1, which is most likely the admin account.
36
36
37
-
**APITOKEN**
37
+
**API_TOKEN**
38
38
39
39
The SQLi included only works for MySQL, which should work in most cases. However, if you experience a different backend, you can enumerate the user
40
-
table via sqlmap: ```sqlmap -u "http://<ip>/nagiosxi/includes/components/nagiosim/nagiosim.php?mode=resolve&host=a&service=" -p service -T xi_users --dump```.
41
-
Then you can set the UserID and APITOKEN to skip those phases and move on to exploitation. Default is empty. See example below for more usage.
40
+
table via sqlmap: ```sqlmap -u "http://[ip]/nagiosxi/includes/components/nagiosim/nagiosim.php?mode=resolve&host=a&service=" -p service -T xi_users --dump```.
41
+
Then you can set the ```USER_ID``` and ```API_TOKEN``` to skip those phases and move on to exploitation. Default is empty. See example below for more usage.
42
42
43
43
## Usage
44
44
@@ -95,15 +95,15 @@ msf exploit(nagios_xi_chained_rce) > show options
0 commit comments