Skip to content

Commit 7ad151e

Browse files
committed
gcore formatting update
1 parent 6683ba5 commit 7ad151e

File tree

2 files changed

+216
-209
lines changed

2 files changed

+216
-209
lines changed

documentation/modules/exploit/windows/http/geutebrueck_gcore_x64_rce_bo.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
## Vulnerable Application
22

3-
Geutebrück GCore Server 1.3.8.42,1.4.2.37 are vulnerable to a buffer overflow exploitation. Since this application is started with system privileges this allows a system remote code execution.
3+
Geutebrück GCore Server 1.3.8.42, 1.4.2.37 are vulnerable to a buffer overflow exploitation.
4+
Since this application is started with system privileges this allows a system remote code execution.
45

56
## Verification Steps
67

7-
1. Install Windows as basic OS (Tested with Win2012R2,Windows 7)
8+
1. Install Windows as basic OS (Tested with Win2012R2, Windows 7)
89
2. Install the Geutebrück GCore server
910
3. Verify that http://<your target ip>:13003/statistics/runningmoduleslist.xml available is.
1011
4. Start msfconsole
@@ -16,6 +17,9 @@
1617
10. You should get a shell as NT/SYSTEM.
1718

1819
## Scenarios
20+
21+
### Geutebrueck GCore 1.4.2.37
22+
1923
```
2024
msf exploit(geutebrueck_gcore_x64_rce_bo) > show options
2125
@@ -59,5 +63,7 @@ msf exploit(geutebrueck_gcore_x64_rce_bo) > exploit
5963
NT-AUTORITÄT\SYSTEM
6064
meterpreter >
6165
```
66+
6267
## Mitigation
68+
6369
Geutebrück released a new version and an update for the affected product which should be installed to fix the described vulnerabilities.

0 commit comments

Comments
 (0)