module
Mako Server v2.5, 2.6 OS Command Injection RCE
Disclosed | Created |
---|---|
2017-09-03 | 2018-06-14 |
Disclosed
2017-09-03
Created
2018-06-14
Description
This module exploits a vulnerability found in Mako Server v2.5, 2.6.
It's possible to inject arbitrary OS commands in the Mako Server
tutorial page through a PUT request to save.lsp.
Attacker input will be saved on the victims machine and can
be executed by sending a GET request to manage.lsp.
It's possible to inject arbitrary OS commands in the Mako Server
tutorial page through a PUT request to save.lsp.
Attacker input will be saved on the victims machine and can
be executed by sending a GET request to manage.lsp.
Authors
John Page (hyp3rlinx) - Beyond Security SecuriTeam Secure Disclosure
Steven Patterson (Shogun Lab) steven@shogunlab.com
Steven Patterson (Shogun Lab) steven@shogunlab.com
Platform
Unix,Windows
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.