module

Rocket Servergraph Admin Center fileRequestor Remote Code Execution

Disclosed
2013-10-30
Created
2018-05-30

Description

This module abuses several directory traversal flaws in Rocket Servergraph Admin
Center for Tivoli Storage Manager. The issues exist in the fileRequestor servlet,
allowing a remote attacker to write arbitrary files and execute commands with
administrative privileges. This module has been tested successfully on Rocket
ServerGraph 1.2 over Windows 2008 R2 64 bits, Windows 7 SP1 32 bits and Ubuntu
12.04 64 bits.

Authors

rgod rgod@autistici.org
juan vazquez juan.vazquez@metasploit.com

Platform

Linux,Unix,Windows

Architectures

x86, x64, cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/rocket_servergraph_file_requestor_rce
msf exploit(rocket_servergraph_file_requestor_rce) > show targets
...targets...
msf exploit(rocket_servergraph_file_requestor_rce) > set TARGET < target-id >
msf exploit(rocket_servergraph_file_requestor_rce) > show options
...show and set options...
msf exploit(rocket_servergraph_file_requestor_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.