Methodology
Ctrlk
  • 😃Welcome
    • Bullet Proof Strategy
    • 👁️Enumeration
    • 👺Exploitation
      • Passwords Attacks
      • Web Applications
        • My little cheatsheet
        • Login Portal Strat
        • SQL injection
        • Local File Inclusion
        • WebDav
        • Wordpress
        • phpmyadmin
        • Bypassing Proxies
        • Node.Js Command Injection
        • Weak Cookies and Parameters
        • PHP Web Shells
        • Code Injection
        • Werkzeug
        • Collection of Vulnerable Apps
          • RaspAP 2.5 Authenticated RCE
          • ZenPhoto 1.4.1.4 RCE
          • Sonatype Nexus 3.21.1
          • Argus Surveillance DVR 4.0
          • SmarterMail + .Net Remote
          • H2 Web Console
          • Exhibitor for Zookeper (Exhibitor Web)
          • Subrion 4.2.1
          • RestStack API 3100
          • Kibana 5.6.15 < 6.6.1
          • Authenticated NodeBB Plugin Emoji 3.2.1
        • Discovering Hidden Parameters
        • 🕴️Jenkins
      • Vulnerable Services
      • Client Side Attacks
      • Evil-WinRM
      • Methodology
      • Reversing
      • Enumerating Firewall
    • 👽Privilege Escalation
    • 💀Elevated Post Exploitation
    • 🟦Active Directory
    • 😎Walkthroughs
    • Cert Pictures :)
    • 🐍Python Lessons
    • 🐚Bash Lessons
    • C# Programming
Powered by GitBook
On this page
  1. 😃Welcome
  2. 👺Exploitation
  3. Web Applications
  4. Collection of Vulnerable Apps

RaspAP 2.5 Authenticated RCE

You would be able to deduce the name of the application based on Nikto scans, moreover the default credentials for this application are admin:secret.

LogoGitHub - gerbsec/CVE-2020-24572-POC: An issue was discovered in includes/webconsole.php in RaspAP 2.5. With authenticated access, an attacker can use a misconfigured (and virtually unrestricted) web console to attack the underlying OS running this software, and execute commands on the system including ones for uploading of files and execution of code.GitHub

This exploit will guide the way.

Or check walla for an example.

PreviousCollection of Vulnerable AppsNextZenPhoto 1.4.1.4 RCE

Last updated 3 years ago