webPromedium

Lab 322 — NetPulse — IP Spoofing to RCE via Polling Agent API

hackadvisor

Task: NetPulse monitoring platform with internal Agent API protected by IP-based authentication behind nginx; script-type data sources execute shell commands with unsanitized parameters. Solution: spoof source IP via X-Forwarded-For: 127.0.0.1 to access agent API, then inject OS commands through poller_id parameter in script data source execution to read /root/flag.txt.

$ ls tags/ techniques/
internal_api_abusehoneypot_flag_detectionip_spoofing_via_x_forwarded_for_headerip_based_authentication_bypasscommand_injection_via_unsanitized_parameterscript_data_source_exploitation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups