module

WebNMS Framework Server Arbitrary File Upload

Disclosed
2016-07-04
Created
2018-05-30

Description

This module abuses a vulnerability in WebNMS Framework Server 5.2 that allows an
unauthenticated user to upload text files by using a directory traversal attack
on the FileUploadServlet servlet. A JSP file can be uploaded that then drops and
executes a malicious payload, achieving code execution under the user which the
WebNMS server is running.
This module has been tested with WebNMS Framework Server 5.2 and 5.2 SP1 on
Windows and Linux.

Author

Pedro Ribeiro pedrib@gmail.com

Platform

Linux,Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/webnms_file_upload
msf exploit(webnms_file_upload) > show targets
...targets...
msf exploit(webnms_file_upload) > set TARGET < target-id >
msf exploit(webnms_file_upload) > show options
...show and set options...
msf exploit(webnms_file_upload) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.