diff --git a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp
index fbaf7a1dd..b103ce21a 100644
--- a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp
+++ b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp
@@ -4,6 +4,8 @@
class linuxki_rce::apache {
Exec { path => ['/bin', '/usr/bin', '/usr/local/bin', '/sbin', '/usr/sbin'] }
+ $port = '80' #$secgen_parameters['port'][0]
+
file { '/etc/apache2/sites-enabled/000-default.conf':
ensure => absent,
}
@@ -15,7 +17,7 @@ class linuxki_rce::apache {
mpm_module => 'prefork',
}
-> ::apache::vhost { 'linuxki':
- port => '80',
+ port => $port,
options => 'FollowSymLinks',
override => 'All',
docroot => '/opt/',
diff --git a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp
index 49b080c34..2ab249183 100644
--- a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp
+++ b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp
@@ -4,6 +4,10 @@
class linuxki_rce::install {
Exec { path => [ '/bin/', '/sbin/' , '/usr/bin/', '/usr/sbin/' ] }
+ exec { 'apt update':
+ command => 'apt-get update',
+ }
+
# Maybe automate linux-headers to use uname -r?
ensure_packages(['make', 'elfutils', 'php', 'linux-headers-4.19.0-21-amd64'])
diff --git a/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml b/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml
index 2fae26f32..91298e7fb 100644
--- a/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml
+++ b/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml
@@ -6,14 +6,14 @@
LinuxKI Toolset 6.01 Remote Command Execution
James Davis
MIT
- This
- module exploits a vulnerability in LinuxKI Toolset 6.01 and below which allows
+
+ This module exploits a vulnerability in LinuxKI Toolset 6.01 and below which allows
remote code execution.
The kivis.php pid parameter received from the user is sent to the shell_exec function,
resulting in security vulnerability.
- http
+ misc
in_the_wild
user_rwx
remote
@@ -23,10 +23,9 @@
port
strings_to_leak
leaked_filenames
- strings_to_pre_leak
- **CHECK THIS**
+ 80
@@ -50,22 +49,13 @@
https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-1
-
-
-
webapp
- services/unix/http/apache_stretch_compatible/apache
+ .*apache.*compatible.*
-
- services/unix/http/**check versions**
-
-
-
\ No newline at end of file