Path: blob/master/documentation/modules/exploit/linux/http/denyall_waf_exec.md
31513 views
Vulnerable Application
This module exploits the command injection vulnerability of DenyAll Web Application Firewall. Unauthenticated users can execute a terminal command under the context of the web server user.
It's possible to have trial demo for 15 days at Amazon Marketplace. https://aws.amazon.com/marketplace/pp/B01N4Q0INA?qid=1505806897911
You just need to follow instruction above URL.
Verification Steps
A successful check of the exploit will look like this:
Start
msfconsoleuse use exploit/linux/http/denyall_execSet
RHOSTSet
LHOSTRun
checkVerify that you are seeing
The target appears to be vulnerable.Run
exploitVerify that you are seeing
iTokenvalue extraction.Verify that you are getting
meterpretersession.