Skip to content

Use WritableDir in execute_cmdstager for exploit/linux/http/f5_bigip_tmui_rce#14003

Merged
wvu merged 1 commit intorapid7:masterfrom
wvu:bug/f5
Aug 15, 2020
Merged

Use WritableDir in execute_cmdstager for exploit/linux/http/f5_bigip_tmui_rce#14003
wvu merged 1 commit intorapid7:masterfrom
wvu:bug/f5

Conversation

@wvu
Copy link
Contributor

@wvu wvu commented Aug 15, 2020

Since we're using WritableDir in script_path for upload_script, we can also use it in :temp for execute_cmdstager.

msf6 exploit(linux/http/f5_bigip_tmui_rce) > grep WritableDir advanced
   WritableDir             /tmp                                                yes       Writable directory
msf6 exploit(linux/http/f5_bigip_tmui_rce) >

https://github.com/rapid7/rex-exploitation/blob/9c19df14e66d381e318996478e5d55018a6061c6/lib/rex/exploitation/cmdstager/base.rb#L26-L31

Fixes #13807. Bughancement.

@wvu wvu self-assigned this Aug 15, 2020
@wvu wvu merged commit dd7cc72 into rapid7:master Aug 15, 2020
@wvu wvu deleted the bug/f5 branch August 15, 2020 02:49
@wvu
Copy link
Contributor Author

wvu commented Mar 27, 2021

You forgot about #11467, didn't you?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant