From 0b56c71bbeaa1c554d490fad9f6bb3e63bab187e Mon Sep 17 00:00:00 2001 From: JD Date: Sat, 18 Mar 2023 18:16:57 +0000 Subject: [PATCH] changes to linuxki for secgen testing --- .../unix/http/linuxki_rce/manifests/apache.pp | 4 +++- .../http/linuxki_rce/manifests/install.pp | 4 ++++ .../unix/http/linuxki_rce/secgen_metadata.xml | 20 +++++-------------- 3 files changed, 12 insertions(+), 16 deletions(-) diff --git a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp index fbaf7a1dd..b103ce21a 100644 --- a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp +++ b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/apache.pp @@ -4,6 +4,8 @@ class linuxki_rce::apache { Exec { path => ['/bin', '/usr/bin', '/usr/local/bin', '/sbin', '/usr/sbin'] } + $port = '80' #$secgen_parameters['port'][0] + file { '/etc/apache2/sites-enabled/000-default.conf': ensure => absent, } @@ -15,7 +17,7 @@ class linuxki_rce::apache { mpm_module => 'prefork', } -> ::apache::vhost { 'linuxki': - port => '80', + port => $port, options => 'FollowSymLinks', override => 'All', docroot => '/opt/', diff --git a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp index 49b080c34..2ab249183 100644 --- a/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp +++ b/modules/vulnerabilities/unix/http/linuxki_rce/manifests/install.pp @@ -4,6 +4,10 @@ class linuxki_rce::install { Exec { path => [ '/bin/', '/sbin/' , '/usr/bin/', '/usr/sbin/' ] } + exec { 'apt update': + command => 'apt-get update', + } + # Maybe automate linux-headers to use uname -r? ensure_packages(['make', 'elfutils', 'php', 'linux-headers-4.19.0-21-amd64']) diff --git a/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml b/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml index 2fae26f32..91298e7fb 100644 --- a/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml +++ b/modules/vulnerabilities/unix/http/linuxki_rce/secgen_metadata.xml @@ -6,14 +6,14 @@ LinuxKI Toolset 6.01 Remote Command Execution James Davis MIT - This - module exploits a vulnerability in LinuxKI Toolset 6.01 and below which allows + + This module exploits a vulnerability in LinuxKI Toolset 6.01 and below which allows remote code execution. The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability. - http + misc in_the_wild user_rwx remote @@ -23,10 +23,9 @@ port strings_to_leak leaked_filenames - strings_to_pre_leak - **CHECK THIS** + 80 @@ -50,22 +49,13 @@ https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-1 - - - webapp - services/unix/http/apache_stretch_compatible/apache + .*apache.*compatible.* - - services/unix/http/**check versions** - - - \ No newline at end of file