Skip to content

Maltrail RCE CVE-2025-34073#365

Open
girlier wants to merge 18 commits intocliffe:masterfrom
girlier:maltrail
Open

Maltrail RCE CVE-2025-34073#365
girlier wants to merge 18 commits intocliffe:masterfrom
girlier:maltrail

Conversation

@girlier
Copy link
Copy Markdown

@girlier girlier commented Apr 30, 2026

Maltrail RCE CVE-2025-34073

Maltrail RCE Vulnerability Module with a multi-stage attack scenario (Off-the-trail). Off-the-trail CTF contains 3 flags. The first flag is inserted into the populated trails (fake malicious traffic). The Second is exploitable from CVE-2025-34073 through the Metasploit module. The third flag (root) is set to a misconfiguration found in writable_passwd and writable_shadow.

Application

Maltrail_Scenario-generator_flag-website

Module Implementation

< vulnerability module_path = " .*/ maltrail_rce " access = " remote " privilege = "user_rwx " >
     < input into = " strings_to_leak " >
           < generator type = " flag_generator " / >
     </ input >
     < input into = " maltrail_flag " >
          < generator type = " flag_generator " / >
     </ input >
     < input into = " data_volume " >
          < value > medium </ value > <! -- low , medium , high quantity of trails -- >
     </ input >
 </ vulnerability >

Options

image

Attributes

image

Tests

image

girlier and others added 18 commits February 13, 2026 21:56
- Replace maltrail-0.54.tar.gz with maltrail-0.53.tar.gz containing vulnerable version
- Update manifests/install.pp with version 0.53 references and correct extraction path
- Update secgen_metadata.xml with corrected CVE description (<= 0.53)
- Fix maltrail.conf with all required options for v0.53:
  - Add CAPTURE_BUFFER 1GB (mandatory option)
  - Add UPDATE_PERIOD 24 (mandatory option)
- Update maltrail.service.erb description to include version 0.53
- Remove empty <service/> tag from off_the_trail.xml to prevent random kibana selection
…a log

Implements comprehensive MalTrail data generation for the off_the_trail CTF scenario:

Generator Module (maltrail_data):
- Creates randomized threat events with synthetic IPs, domains, and URLs
- Generates configurable event volumes (low: 10-20, medium: 50-100, high: 500-1000)
- Embeds a second CTF flag within DNS query events to update.secgen-ctf.local
- Produces custom trails file for static threat detection

Vulnerability Module Updates:
- Adds maltrail_flag and data_volume inputs to secgen_metadata.xml
- Deploys helper scripts for log and trails generation at provisioning time
- Creates /var/log/maltrail/YYYY-MM-DD.log with synthetic events
- Creates /opt/maltrail/trails/custom.txt with custom threat indicators
- Fixes admin password hash in maltrail.conf

Scenario Updates:
- Adds dual-flag challenge structure to off_the_trail.xml
- Flag 1: Found via RCE exploitation and filesystem access
- Flag 2: Hidden in MalTrail web UI threat data (trail_info field)
- Downgrade MalTrail from v0.53 to v0.52 for CVE-2025-34073
- Rename configure.pp to config.pp for consistency
- Convert static maltrail.conf to ERB template
- Simplify metadata and remove redundant comments
- Use username_generator instead of hardcoded username
- Update off_the_trail scenario: lower difficulty, add privesc vuln
- Insert flag trail in middle of custom trails file
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant