Vulnerability & Exploit Database

Back to search

GitStack Unsanitized Argument RCE

This module exploits a remote code execution vulnerability that exists in GitStack through v2.3.10, caused by an unsanitized argument being passed to an exec function call. This module has been tested on GitStack v2.3.10.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/windows/http/gitstack_rce

Authors

  • Kacper Szurek
  • Jacob Robles

References

Targets

  • Automatic

Platforms

  • windows

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/http/gitstack_rce msf exploit(gitstack_rce) > show targets ...targets... msf exploit(gitstack_rce) > set TARGET <target-id> msf exploit(gitstack_rce) > show options ...show and set options... msf exploit(gitstack_rce) > exploit

Related Modules