June 23, 2022
In this tutorial, we will see how to perform a get a reverse shell by triggering a RCE (Remote Code Execution) vulnerability in Artica Pandora FMS. The vulnerability exists in the "Events" page of the FMS.
Click on "Events" and then "View events".
This is the captured request in Burp Suite. Send it to Burp Repeater.
Let's delete all the irrelevant stuff and only keep the parameters that are needed. Enter in a Bash reverse shell command for the value of the "target" parameter.
We receive a reverse shell on our netcat listener. It is important to have netcat listening before executing the reverse shell command.
If you liked reading this article, you can follow me on Twitter: mujtabareads.