Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/gather/jasmin_ransomware_sqli.md
Views: 11784
Vulnerable Application
The Jasmin Ransomware web server contains an unauthenticated SQL injection vulnerability within the login functionality. As of April 15, 2024 this was still unpatched, so all versions are vulnerable. The last patch was in 2021, so it will likely not ever be patched.
Retrieving the victim's data may take a long amount of time. It is much quicker to get the logins, then just login to the site.
Install
create a LAMP server (using php 8.2 worked for me, 7.2 did not). Run the following commands:
Execute the following SQL commands:
Now setup the database: sudo mysql -u jasminadmin -p123456 jasmin_db < Web\ Panel/database/jasmin_db.sql
Verification Steps
Install the application
Start msfconsole
Do:
use auxiliary/gather/jasmin_ransomware_sqli
Do:
set rhosts [IP]
Do:
run
You should contents from the SQL Database.
Options
VICTIMS
Pull data from the Victim's table. Defaults to false
VICTIMLIMIT
Number of rows from the victim table to pull. Defaults to nil
which pulls all rows.