Skip to content

Commit 056fc14

Browse files
author
Jonathan Claudius
committed
Move Cisco ASA SSL VPN Esc to Aux
1 parent 186d20b commit 056fc14

File tree

1 file changed

+17
-22
lines changed

1 file changed

+17
-22
lines changed

modules/exploits/multi/http/cisco_ssl_vpn_priv_esc.rb renamed to modules/auxiliary/scanner/http/cisco_ssl_vpn_priv_esc.rb

Lines changed: 17 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,12 @@
55

66
require 'msf/core'
77

8-
class Metasploit3 < Msf::Exploit::Remote
8+
class Metasploit3 < Msf::Auxiliary
99
Rank = ExcellentRanking
1010

1111
include Msf::Exploit::Remote::HttpClient
12-
include Msf::Auxiliary::CommandShell
12+
include Msf::Auxiliary::Report
13+
include Msf::Auxiliary::Scanner
1314

1415
attr_accessor :ssh_socket
1516

@@ -33,25 +34,6 @@ def initialize(info = {})
3334
[ 'URL', 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa' ],
3435
[ 'URL', 'https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-005.txt' ]
3536
],
36-
'Targets' => [[ 'Automatic', {}]],
37-
'DefaultOptions' =>
38-
{
39-
'ExitFunction' => "none"
40-
},
41-
'Payload' =>
42-
{
43-
'Compat' => {
44-
'PayloadType' => 'cmd_interact',
45-
'ConnectionType' => 'find'
46-
}
47-
},
48-
'Platform' => 'unix',
49-
'Arch' => ARCH_CMD,
50-
'Targets' =>
51-
[
52-
['Cisco ASA', {} ],
53-
],
54-
'Privileged' => true,
5537
'DisclosureDate' => "April 9, 2014",
5638

5739
))
@@ -296,7 +278,20 @@ def exploit
296278

297279
if creds
298280
print_good("#{peer} - Successfully added level 15 account #{creds.join(", ")}")
299-
break
281+
282+
user, pass = creds
283+
284+
report_hash = {
285+
:host => rhost,
286+
:port => rport,
287+
:sname => 'Cisco ASA SSL VPN Privilege Escalation',
288+
:user => user,
289+
:pass => pass,
290+
:active => true,
291+
:type => 'password'
292+
}
293+
294+
report_auth_info(report_hash)
300295
else
301296
print_good("#{peer} - Failed to created user account")
302297
end

0 commit comments

Comments
 (0)