module

Metasploit Web UI Static secret_key_base Value

Disclosed
2016-09-15
Created
2018-05-30

Description

This module exploits the Web UI for Metasploit Community, Express and
Pro where one of a certain set of Weekly Releases have been applied.
These Weekly Releases introduced a static secret_key_base value.
Knowledge of the static secret_key_base value allows for
deserialization of a crafted Ruby Object, achieving code execution.

This module is based on
exploits/multi/http/rails_secret_deserialization

Authors

Justin Steven
joernchen of Phenoelit joernchen@phenoelit.de

Platform

Ruby

Architectures

ruby

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/metasploit_static_secret_key_base
msf exploit(metasploit_static_secret_key_base) > show targets
...targets...
msf exploit(metasploit_static_secret_key_base) > set TARGET < target-id >
msf exploit(metasploit_static_secret_key_base) > show options
...show and set options...
msf exploit(metasploit_static_secret_key_base) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.