module

Pi-Hole Top Domains API Authenticated Exec

Disclosed
2021-08-04
Created
2022-01-17

Description

This exploits a command execution in Pi-Hole Web Interface
The Settings > API/Web inetrace page contains the field
Top Domains/Top Advertisers which is validated by a regex which does not properly
filter system commands, which can then be executed by calling the gravity
functionality. However, the regex only allows a-z, 0-9, _.

Authors

h00die
SchneiderSec

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/admin/http/pihole_domains_api_exec
msf auxiliary(pihole_domains_api_exec) > show actions
...actions...
msf auxiliary(pihole_domains_api_exec) > set ACTION < action-name >
msf auxiliary(pihole_domains_api_exec) > show options
...show and set options...
msf auxiliary(pihole_domains_api_exec) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.