module

Vagrant Synced Folder Vagrantfile Breakout

Disclosed
Jan 19, 2011
Created
Oct 27, 2022

Description

This module exploits a default Vagrant synced folder (shared folder)
to append a Ruby payload to the Vagrant project Vagrantfile config file.

By default, unless a Vagrant project explicitly disables shared folders,
Vagrant mounts the project directory on the host as a writable 'vagrant'
directory on the guest virtual machine. This directory includes the
project Vagrantfile configuration file.

Ruby code within the Vagrantfile is loaded and executed when a user
runs any vagrant command from the project directory on the host,
leading to execution of Ruby code on the host.

Authors

HashiCorp
bcoles [email protected]

Platform

Ruby,Unix

Architectures

ruby, cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/local/vagrant_synced_folder_vagrantfile_breakout
msf exploit(vagrant_synced_folder_vagrantfile_breakout) > show targets
...targets...
msf exploit(vagrant_synced_folder_vagrantfile_breakout) > set TARGET < target-id >
msf exploit(vagrant_synced_folder_vagrantfile_breakout) > show options
...show and set options...
msf exploit(vagrant_synced_folder_vagrantfile_breakout) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.