Rapid7 Vulnerability & Exploit Database

SolarView Compact unauthenticated remote command execution vulnerability.

Back to Search

SolarView Compact unauthenticated remote command execution vulnerability.

Disclosed
05/15/2023
Created
09/06/2023

Description

CONTEC's SolarView™ Series enables you to monitor and visualize solar power and is only available in Japan. This module exploits a command injection vulnerability on the SolarView Compact `v6.00` web application via vulnerable endpoint `downloader.php`. After exploitation, an attacker will have full access with the same user privileges under which the webserver is running (typically as user `contec`).

Author(s)

  • h00die-gr3y <h00die.gr3y@gmail.com>

Platform

Linux,PHP,Unix

Architectures

php, cmd, armle, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/solarview_unauth_rce_cve_2023_23333
msf exploit(solarview_unauth_rce_cve_2023_23333) > show targets
    ...targets...
msf exploit(solarview_unauth_rce_cve_2023_23333) > set TARGET < target-id >
msf exploit(solarview_unauth_rce_cve_2023_23333) > show options
    ...show and set options...
msf exploit(solarview_unauth_rce_cve_2023_23333) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;