mirror of
https://github.com/SleepingBag945/dddd.git
synced 2025-06-10 10:12:52 +00:00
34 lines
717 B
YAML
34 lines
717 B
YAML
id: consul-rexec-rce
|
|
|
|
info:
|
|
name: Consul Rexec RCE
|
|
author: SleepingBag945
|
|
severity: critical
|
|
description: |
|
|
Under a specific configuration, a malicious attacker can remotely execute commands on the Consul server without authorization by sending a carefully constructed HTTP request.
|
|
metadata:
|
|
fofa-query: protocol="consul(http)"
|
|
tags: rce
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /v1/agent/self HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- '"EnableRemoteScriptChecks":true'
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
|
|
# msf
|
|
# search Hashicorp
|
|
# exploit/multi/misc/consul_service_exec |