Forum Discussion
GusC
Bronze III
2 months agoCVE-2021-25281 (SaltStack) – Offensive
Need tips to get going with this, information on the exploit is sparse. I have the port, just need some help creating the correct command line. Not much out there on the internet on this. I have ...
ArthurDent
Bronze II
2 months agoI'm in the same boat. I've added print statements to the script, and found that no matter what I send, I'm getting a 503 response code back. However, I can connect to the port with curl or a browser, and it does respond with a list of actions, including the one that should be able to be exploited. I haven't figured out what to send in the script to make it work.
- GusC2 months ago
Bronze III
nmap 10.102.145.94
curl -k https://10.102.145.94:8000
{"return": "Welcome", "clients": ["local", "local_async", "local_batch", "local_subset", "runner", "runner_async", "ssh", "wheel", "wheel_async"]}
ssh-keygen -t rsa -f ~/Desktop/public_key
- ArthurDent2 months ago
Bronze II
Thanks!