Skip to content

Commit b207a88

Browse files
committed
Fix references to LDAP Datastore Options
1 parent a847038 commit b207a88

File tree

2 files changed

+30
-13
lines changed

2 files changed

+30
-13
lines changed

documentation/modules/auxiliary/gather/vmware_vcenter_vmdir_ldap.md

Lines changed: 28 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -36,18 +36,33 @@ If you already have the LDAP base DN, you may set it in this option.
3636
### VMware vCenter Server 6.7 virtual appliance on ESXi
3737

3838
```
39-
msf5 > use auxiliary/gather/vmware_vcenter_vmdir_ldap
40-
msf5 auxiliary(gather/vmware_vcenter_vmdir_ldap) > options
39+
msf6 auxiliary(gather/vmware_vcenter_vmdir_ldap) > show options
4140
42-
Name Current Setting Required Description
43-
---- --------------- -------- -----------
44-
BASE_DN no LDAP base DN if you already have it
45-
DOMAIN no The domain to authenticate to
46-
PASSWORD no The password to authenticate with
47-
RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
48-
RPORT 636 yes The target port
49-
SSL true no Enable SSL on the LDAP connection
50-
USERNAME no The username to authenticate with
41+
Module options (auxiliary/gather/vmware_vcenter_vmdir_ldap):
42+
43+
Name Current Setting Required Description
44+
---- --------------- -------- -----------
45+
BASE_DN no LDAP base DN if you already have it
46+
SSL true no Enable SSL on the LDAP connection
47+
48+
49+
Used when connecting via an existing SESSION:
50+
51+
Name Current Setting Required Description
52+
---- --------------- -------- -----------
53+
SESSION no The session to run this module on
54+
55+
56+
Used when making a new connection via RHOSTS:
57+
58+
Name Current Setting Required Description
59+
---- --------------- -------- -----------
60+
LDAPDomain no The domain to authenticate to
61+
LDAPPassword no The password to authenticate with
62+
LDAPUsername no The username to authenticate with
63+
RHOSTS no The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
64+
metasploit.html
65+
RPORT 636 no The target port
5166
5267
5368
Auxiliary action:
@@ -57,6 +72,8 @@ Auxiliary action:
5772
Dump Dump all LDAP data
5873
5974
75+
76+
View the full module info with the info, or info -d command.
6077
msf5 auxiliary(gather/vmware_vcenter_vmdir_ldap) > set rhosts [redacted]
6178
rhosts => [redacted]
6279
msf5 auxiliary(gather/vmware_vcenter_vmdir_ldap) > run

modules/auxiliary/gather/vmware_vcenter_vmdir_ldap.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,12 +91,12 @@ def run
9191

9292
# Look for an entry with a non-empty vmwSTSPrivateKey attribute
9393
unless entries&.find { |entry| entry[:vmwstsprivatekey].any? }
94-
print_error("#{ldap.peerinfo} is NOT vulnerable to CVE-2020-3952") unless datastore['BIND_PW'].present?
94+
print_error("#{ldap.peerinfo} is NOT vulnerable to CVE-2020-3952") unless datastore['LDAPPassword'].present?
9595
print_error('Dump failed')
9696
return Exploit::CheckCode::Safe
9797
end
9898

99-
print_good("#{ldap.peerinfo} is vulnerable to CVE-2020-3952") unless datastore['BIND_PW'].present?
99+
print_good("#{ldap.peerinfo} is vulnerable to CVE-2020-3952") unless datastore['LDAPPassword'].present?
100100
pillage(entries)
101101

102102
# HACK: Stash discovered base DN in CheckCode reason

0 commit comments

Comments
 (0)