This exploit targets ALCASAR <= 2.8.1, leveraging a command injection vulnerability via the HTTP Host header. It bypasses a flawed patch using a 'mailto:' payload and achieves remote code execution, including privilege escalation via sudo systemctl manipulation.
Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:ALCASAR <= 2.8.1
No auth needed
Prerequisites:Network access to the target ALCASAR server · Target server running ALCASAR <= 2.8.1