Skip to content

Commit 1f767df

Browse files
author
jvazquez-r7
committed
Land rapid7#2190, @todb-r7's (more than) cosmetic changes
2 parents 5ef1e50 + 8431eb7 commit 1f767df

File tree

11 files changed

+38
-37
lines changed

11 files changed

+38
-37
lines changed

modules/exploits/linux/http/pineapp_ldapsyncnow_exec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ def initialize(info = {})
2929
'License' => MSF_LICENSE,
3030
'References' =>
3131
[
32-
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-185/']
32+
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-185/' ],
33+
[ 'OSVDB', '95781' ]
3334
],
3435
'Platform' => ['unix'],
3536
'Arch' => ARCH_CMD,

modules/exploits/linux/http/pineapp_livelog_exec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ def initialize(info = {})
2929
'License' => MSF_LICENSE,
3030
'References' =>
3131
[
32-
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-184/']
32+
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-184/'],
33+
[ 'OSVDB', '95779']
3334
],
3435
'Platform' => ['unix'],
3536
'Arch' => ARCH_CMD,

modules/exploits/linux/http/pineapp_test_li_conn_exec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ def initialize(info = {})
2929
'License' => MSF_LICENSE,
3030
'References' =>
3131
[
32-
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-188/']
32+
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-13-188/'],
33+
[ 'OSVDB', '95782']
3334
],
3435
'Platform' => ['unix'],
3536
'Arch' => ARCH_CMD,

modules/exploits/multi/http/struts_default_action_mapper.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
##
22
# This file is part of the Metasploit Framework and may be subject to
33
# redistribution and commercial restrictions. Please see the Metasploit
4-
# Framework web site for more information on licensing and terms of use.
4+
# web site for more information on licensing and terms of use.
55
# http://metasploit.com/framework/
66
##
77

modules/exploits/windows/local/ms13_005_hwnd_broadcast.rb

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
##
2-
# ## This file is part of the Metasploit Framework and may be subject to
2+
# This file is part of the Metasploit Framework and may be subject to
33
# redistribution and commercial restrictions. Please see the Metasploit
44
# web site for more information on licensing and terms of use.
55
# http://metasploit.com/
@@ -22,21 +22,19 @@ def initialize(info={})
2222
super( update_info( info,
2323
'Name' => 'MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation',
2424
'Description' => %q{
25-
The Windows kernel does not properly isolate broadcast messages from low integrity
26-
applications from medium or high integrity applications. This allows commands to be
27-
broadcasted to an open medium or high integrity command prompts allowing escalation
28-
of privileges. We can spawn a medium integrity command prompt, after spawning a low
29-
integrity command prompt, by using the Win+Shift+# combination to specify the
30-
position of the command prompt on the taskbar. We can then broadcast our command
31-
and hope that the user is away and doesn't corrupt it by interacting with the UI.
32-
Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2,
33-
Server 2012, RT. But Spawning a command prompt with the shortcut key does not work
34-
in Vista so you will have to check if the user is already running a command prompt
35-
and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded
36-
payload from a Web location. The FILE technique will drop an executable to the
37-
file system, set it to medium integrity and execute it. The TYPE technique will
38-
attempt to execute a powershell encoded payload directly from the command line but
39-
it may take some time to complete.
25+
Due to a problem with isolating window broadcast messages in the Windows kernel,
26+
an attacker can broadcast commands from a lower Integrity Level process to a
27+
higher Integrity Level process, thereby effecting a privilege escalation. This
28+
issue affects Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, and
29+
RT. Note that spawning a command prompt with the shortcut key combination Win+Shift+#
30+
does not work in Vista, so the attacker will have to check if the user is already
31+
running a command prompt and set SPAWN_PROMPT false.
32+
33+
Three exploit techniques are available with this module. The WEB technique will
34+
execute a powershell encoded payload from a Web location. The FILE technique
35+
will drop an executable to the file system, set it to medium integrity and execute
36+
it. The TYPE technique will attempt to execute a powershell encoded payload directly
37+
from the command line, but may take some time to complete.
4038
},
4139
'License' => MSF_LICENSE,
4240
'Author' =>

modules/exploits/windows/misc/psh_web_delivery.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info = {})
1616
super(update_info(info,
17-
'Name' => 'Powershell Payload Web Delivery',
17+
'Name' => 'PowerShell Payload Web Delivery',
1818
'Description' => %q{
19-
This module quickly fires up a web server that serves the payload in powershell.
20-
The provided command will start powershell and then download and execute the
21-
payload. The IEX command can also be extracted to execute directly from powershell.
19+
This module quickly fires up a web server that serves the payload in PowerShell.
20+
The provided command will start PowerShell and then download and execute the
21+
payload. The IEX command can also be extracted to execute directly from PowerShell.
2222
The main purpose of this module is to quickly establish a session on a target
2323
machine when the attacker has to manually type in the command himself, e.g. RDP
2424
Session, Local Access or maybe Remote Command Exec. This attack vector does not

modules/payloads/stagers/windows/reverse_https_proxy.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ module Metasploit3
1818
def initialize(info = {})
1919
super(merge_info(info,
2020
'Name' => 'Reverse HTTPS Stager with Support for Custom Proxy',
21-
'Description' => 'Tunnel communication over HTTP using SSL, supports custom proxy',
21+
'Description' => 'Tunnel communication over HTTP using SSL with custom proxy support',
2222
'Author' => ['hdm','corelanc0d3r <peter.ve[at]corelan.be>', 'amaloteaux'],
2323
'License' => MSF_LICENSE,
2424
'Platform' => 'win',

modules/post/linux/gather/ecryptfs_creds.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ def initialize(info={})
2121
super( update_info(info,
2222
'Name' => 'Gather eCryptfs Metadata',
2323
'Description' => %q{
24-
This module will grab the contents of user's .ecrypts directory on
25-
the targeted machine. Grabbed "wrapped-passphrase" files can be
26-
cracked with JtR to get "mount passphrases".
24+
This module will collect the contents of all users' .ecrypts directories on
25+
the targeted machine. Collected "wrapped-passphrase" files can be
26+
cracked with John the Ripper (JtR) to recover "mount passphrases".
2727
},
2828
'License' => MSF_LICENSE,
2929
'Author' => ['Dhiru Kholia <dhiru[at]openwall.com>'],

modules/post/multi/gather/gpg_creds.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ def initialize(info={})
2121
super( update_info(info,
2222
'Name' => 'Multi Gather GnuPG Credentials Collection',
2323
'Description' => %q{
24-
This module will collect the contents of user's .gnupg directory on the targeted
25-
machine. Password protected secret keyrings can be cracked with JtR.
24+
This module will collect the contents of all users' .gnupg directories on the targeted
25+
machine. Password protected secret keyrings can be cracked with John the Ripper (JtR).
2626
},
2727
'License' => MSF_LICENSE,
2828
'Author' => ['Dhiru Kholia <dhiru[at]openwall.com>'],

modules/post/multi/gather/pgpass_creds.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ def initialize(info={})
2222
super( update_info(info,
2323
'Name' => 'Multi Gather pgpass Credentials',
2424
'Description' => %q{
25-
This module will collect the contents of user's .pgpass or pgpass.conf and
26-
parse them for credentials.
25+
This module will collect the contents of all users' .pgpass or pgpass.conf
26+
file and parse them for credentials.
2727
},
2828
'License' => MSF_LICENSE,
2929
'Author' => ['Zach Grace <zgrace[at]403labs.com>'],

0 commit comments

Comments
 (0)