module

Kafka UI Unauthenticated Remote Command Execution via the Groovy Filter option.

Disclosed
Sep 27, 2023
Created
Feb 17, 2024

Description

A command injection vulnerability exists in Kafka ui between `v0.4.0` and `v0.7.1` allowing
an attacker to inject and execute arbitrary shell commands via the `groovy` filter parameter
at the `topic` section.

Authors

h00die-gr3y [email protected]
BobTheShopLifter and Thingstad

Platform

Linux,Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/linux/http/kafka_ui_unauth_rce_cve_2023_52251
msf exploit(kafka_ui_unauth_rce_cve_2023_52251) > show targets
...targets...
msf exploit(kafka_ui_unauth_rce_cve_2023_52251) > set TARGET < target-id >
msf exploit(kafka_ui_unauth_rce_cve_2023_52251) > show options
...show and set options...
msf exploit(kafka_ui_unauth_rce_cve_2023_52251) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.