Vulnerability & Exploit Database

Back to search

Metasploit Web UI Diagnostic Console Command Execution

This module exploits the "diagnostic console" feature in the Metasploit Web UI to obtain a reverse shell. The diagnostic console is able to be enabled or disabled by an administrator on Metasploit Pro and by an authenticated user on Metasploit Express and Metasploit Community. When enabled, the diagnostic console provides access to msfconsole via the web interface. An authenticated user can then use the console to execute shell commands. NOTE: Valid credentials are required for this module. Tested against: Metasploit Community 4.1.0, Metasploit Community 4.8.2, Metasploit Community 4.12.0

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/multi/http/metasploit_webui_console_command_execution

Authors

  • Justin Steven

Targets

  • Unix
  • Windows

Platforms

  • unix
  • windows

Architectures

  • cmd

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/metasploit_webui_console_command_execution msf exploit(metasploit_webui_console_command_execution) > show targets ...targets... msf exploit(metasploit_webui_console_command_execution) > set TARGET <target-id> msf exploit(metasploit_webui_console_command_execution) > show options ...show and set options... msf exploit(metasploit_webui_console_command_execution) > exploit