@@ -22,14 +22,14 @@ class Metasploit3 < Msf::Post
22
22
include Msf ::Exploit ::Local ::Linux
23
23
include Msf ::Exploit ::Local ::Unix
24
24
25
- def initialize ( info = { } )
26
- super ( update_info ( info , {
27
- 'Name' => 'Multi Escalate Metasploit pcap_log Local Privilege Escalation' ,
28
- 'Description' => %q{
29
- Metasploit < 4.4 contains a vulnerable 'pcap_log' plugin which, when used with the default settings,
30
- creates pcap files in /tmp with predictable file names. This exploits this by hard-linking these
31
- filenames to /etc/passwd, then sending a packet with a priviliged user entry contained within.
32
- This, and all the other packets, are appended to /etc/passwd.
25
+ def initialize ( info = { } )
26
+ super ( update_info ( info , {
27
+ 'Name' => 'Multi Escalate Metasploit pcap_log Local Privilege Escalation' ,
28
+ 'Description' => %q{
29
+ Metasploit < 4.4 contains a vulnerable 'pcap_log' plugin which, when used with the default settings,
30
+ creates pcap files in /tmp with predictable file names. This exploits this by hard-linking these
31
+ filenames to /etc/passwd, then sending a packet with a priviliged user entry contained within.
32
+ This, and all the other packets, are appended to /etc/passwd.
33
33
34
34
Successful exploitation results in the creation of a new superuser account.
35
35
0 commit comments