module

Mako Server v2.5, 2.6 OS Command Injection RCE

Disclosed
2017-09-03
Created
2018-06-14

Description

This module exploits a vulnerability found in Mako Server v2.5, 2.6.
It's possible to inject arbitrary OS commands in the Mako Server
tutorial page through a PUT request to save.lsp.

Attacker input will be saved on the victims machine and can
be executed by sending a GET request to manage.lsp.

Authors

John Page (hyp3rlinx) - Beyond Security SecuriTeam Secure Disclosure
Steven Patterson (Shogun Lab) steven@shogunlab.com

Platform

Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/makoserver_cmd_exec
msf exploit(makoserver_cmd_exec) > show targets
...targets...
msf exploit(makoserver_cmd_exec) > set TARGET < target-id >
msf exploit(makoserver_cmd_exec) > show options
...show and set options...
msf exploit(makoserver_cmd_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.