-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
jasmin ransomware sqli and dir travers (CVE-2024-30851) #19103
Conversation
@chebuya wanted to bring this to your attention since you discovered it |
documentation/modules/auxiliary/gather/jasmin_ransomware_sqli.md
Outdated
Show resolved
Hide resolved
[ | ||
OptString.new('TARGETURI', [true, 'The relative URI of the Jasmin Ransomware webserver', '/']), | ||
OptInt.new('DEPTH', [true, 'Depth of directory traversal to root ', 9]), | ||
OptString.new('FILE', [true, 'File to retrieve', 'etc/passwd']) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could this datastore option enable the module to grab multiple files at once?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
as an OptString
in theory if there was a ,
or other delimiter, however I don't think any dir travers modules within MSF do multiple files unless its a 'static' device (like a network appliance) where things are in a set location and certain files are known to be of strategic value
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @h00die for these modules. I just left a few minor comments before it lands.
@cdelafuente-r7 this should be good now |
Thanks for updating this @h00die ! Everything looks good to me now. I tested against the latest version available and verified both modules work as expected. I'll go ahead and land it.
|
f274c46
Release NotesThis adds an unauthenticated directory traversal and a SQLi exploit against the Jasmin ransomware web panel. |
This PR adds an unauth dir traversal, and a sqli exploit (CVE-2024-30851) against the Jasmin ransomware web panel.
Verification
Install the application
Start msfconsole
Do:
use auxiliary/gather/jasmin_ransomware_dir_traversal
Do:
set rhosts [ip]
Do:
run
You should get the content of a file if it exists.
Install the application
Start msfconsole
Do:
use auxiliary/gather/jasmin_ransomware_sqli
Do:
set rhosts [IP]
Do:
run
You should contents from the SQL Database.