@@ -22,14 +22,14 @@ class Metasploit3 < Msf::Post
2222 include Msf ::Exploit ::Local ::Linux
2323 include Msf ::Exploit ::Local ::Unix
2424
25- def initialize ( info = { } )
26- super ( update_info ( info , {
27- 'Name' => 'Multi Escalate Metasploit pcap_log Local Privilege Escalation' ,
28- 'Description' => %q{
29- Metasploit < 4.4 contains a vulnerable 'pcap_log' plugin which, when used with the default settings,
30- creates pcap files in /tmp with predictable file names. This exploits this by hard-linking these
31- filenames to /etc/passwd, then sending a packet with a priviliged user entry contained within.
32- This, and all the other packets, are appended to /etc/passwd.
25+ def initialize ( info = { } )
26+ super ( update_info ( info , {
27+ 'Name' => 'Multi Escalate Metasploit pcap_log Local Privilege Escalation' ,
28+ 'Description' => %q{
29+ Metasploit < 4.4 contains a vulnerable 'pcap_log' plugin which, when used with the default settings,
30+ creates pcap files in /tmp with predictable file names. This exploits this by hard-linking these
31+ filenames to /etc/passwd, then sending a packet with a priviliged user entry contained within.
32+ This, and all the other packets, are appended to /etc/passwd.
3333
3434 Successful exploitation results in the creation of a new superuser account.
3535
0 commit comments