Rapid7 Vulnerability & Exploit Database

Metasploit Web UI Static secret_key_base Value

Back to Search

Metasploit Web UI Static secret_key_base Value

Disclosed
09/15/2016
Created
05/30/2018

Description

This module exploits the Web UI for Metasploit Community, Express and Pro where one of a certain set of Weekly Releases have been applied. These Weekly Releases introduced a static secret_key_base value. Knowledge of the static secret_key_base value allows for deserialization of a crafted Ruby Object, achieving code execution. This module is based on exploits/multi/http/rails_secret_deserialization

Author(s)

  • Justin Steven
  • joernchen of Phenoelit <joernchen@phenoelit.de>

Platform

Ruby

Architectures

ruby

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/metasploit_static_secret_key_base
msf exploit(metasploit_static_secret_key_base) > show targets
    ...targets...
msf exploit(metasploit_static_secret_key_base) > set TARGET < target-id >
msf exploit(metasploit_static_secret_key_base) > show options
    ...show and set options...
msf exploit(metasploit_static_secret_key_base) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;