Path: blob/master/modules/exploits/zenoss_3x_command_execution/module.rb
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5################################################################################6# For more information see: http://itsecuritysolutions.org/2012-07-30-zenoss-3.2.1-multiple-security-vulnerabilities/7################################################################################8class Zenoss_command_execution < BeEF::Core::Command9def self.options10@configuration = BeEF::Core::Configuration.instance11lhost = @configuration.beef_host12lhost = '' if lhost == '0.0.0.0'13[14{ 'name' => 'rhost', 'ui_label' => 'Target Host', 'value' => '127.0.0.1' },15{ 'name' => 'rport', 'ui_label' => 'Target Port', 'value' => '8080' },16{ 'name' => 'lhost', 'ui_label' => 'Local Host', 'value' => lhost },17{ 'name' => 'lport', 'ui_label' => 'Local Port', 'value' => '4444' },18{ 'name' => 'user', 'ui_label' => 'Username', 'value' => 'admin' },19{ 'name' => 'pass', 'ui_label' => 'Password', 'value' => 'zenoss' }20]21end2223def post_execute24save({ 'result' => @datastore['result'] })25end26end272829