Drupal

Scan

nmap -sC -sV -oA output 10.x.x.x

80     IIS 7.5 drupal = Windows 2008 R2
135    rpc
49154  rpc
 
DirBuster found 'rest': /rest/ — 200

http://10.x.x.x  ..drupal

drupscan

  • Works but too old - last updated like 2013

  • github/tibillys

droopescan

drupalgeddon (msf)

drupalgeddon (no msf)

Serialization Vulnerability - 41564.php

  • Search and Download the php exploit

  • ippsec includes Custom phpCode for:

    • Uploading and Execution

    • Requires php-curl

  • Exploit will download json files that could have secrets

Json Cookies

  • Exploit will save json files locally

  • Check them for details, and session cookies to steal

  • Create a New Cookie, and you might get Admin

Dupal PHP Module

  • If you can access Drupal:

    • Enable the PHP Filter

    • Create an Article that has PHP

Webshell

  • Use the ippsec phpCode

  • Execute commands and upload

Enumeration

  • systeminfo will tell us the OS version and Patch level

  • Hotfix 'N/A' might mean we dont have access, or there are no patches

  • OS/Patch level will help us with KernelExploit

Last updated

Was this helpful?