-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Erlang cookie rce exploit module #11089
Conversation
Let me know if you guy's want me to change anything else. Been a while since I did a contribution so might be sloppy haha. |
This should work on Windows as well (but test to be sure). And hence, doesn't belong in the |
Please add documentation, see https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/module_doc_template.md |
Let me know what you guy's think of the changes made. @OJ you were right it works on a windows install however I can't get the powershell base64 encoded payload to execute 🤔 any thoughts?
I also added documentation as requested 😄 |
Maybe it's due to payload length on the command line? Which Windows payload are you trying? |
I tried using |
I would prefer that the protocol chunks were documented better, with each term labeled for what it does. The Erlang documentation on the subject is pretty comprehensive, and the BERT project can help test out individual items. http://erlang.org/doc/apps/erts/erl_dist_protocol.html |
Went ahead and added the appropriate comments to the packets being sent. Let me know what you think. |
This is much better, thanks! It will help a lot if we ever need to update it or run into a bug. |
No problem 😄 |
@msjenkins-r7 test this please. |
Release NotesThe Erlang Cookie RCE module has been added to the framework. This attempts to authenticate to an Erlang Port Mapper Daemon with a user provided cookie to run commands on a remote server. |
cheers 🍻 |
@wetw0rk thanks for the contribution |
This is awesome! Nice work! |
Thanks guys happy to contribute 😄 🎉 |
Erlang Port Mapper Daemon Cookie RCE
The erlang port mapper daemon is used to coordinate distributed erlang instances. Should an attacker get the authentication cookie RCE is trivial. Usually, this cookie is named ".erlang.cookie" and varies on location.
Verification
This exploit was tested on a fresh
Ubuntu 16.04.5 LTS
, however it should work on any Linux/Unix system.msfconsole
use exploit/multi/misc/erlang_cookie_rce
set COOKIE EXAMPLE
set RHOST 127.0.0.1
set RPORT 25672
exploit