File tree Expand file tree Collapse file tree 1 file changed +7
-7
lines changed
modules/exploits/windows/misc Expand file tree Collapse file tree 1 file changed +7
-7
lines changed Original file line number Diff line number Diff line change 1
1
# Based on WebDAV Application DLL Hijacker module
2
2
require 'msf/core'
3
3
4
- class Metasploit3 < Msf ::Exploit ::Remote
4
+ class MetasploitModule < Msf ::Exploit ::Remote
5
5
Rank = NormalRanking
6
6
7
7
include Msf ::Exploit ::Remote ::HttpServer ::HTML
8
8
include Msf ::Exploit ::EXE
9
9
10
10
def initialize ( info = { } )
11
11
super ( update_info ( info ,
12
- 'Name' => 'DLL side loading vulnerability in VMware Host Guest Client Redirector' ,
12
+ 'Name' => 'DLL Side Loading Vulnerability in VMware Host Guest Client Redirector' ,
13
13
'Description' => %q{
14
- A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector,
15
- a component of VMware Tools. This issue can be exploited by luring a victim into
16
- opening a document from the attacker's share. An attacker can exploit this issue to
17
- execute arbitrary code with the privileges of the target user. This can potentially
18
- result in the attacker taking complete control of the affected system. If the WebDAV
14
+ A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector,
15
+ a component of VMware Tools. This issue can be exploited by luring a victim into
16
+ opening a document from the attacker's share. An attacker can exploit this issue to
17
+ execute arbitrary code with the privileges of the target user. This can potentially
18
+ result in the attacker taking complete control of the affected system. If the WebDAV
19
19
Mini-Redirector is enabled, it is possible to exploit this issue over the internet.
20
20
} ,
21
21
'Author' => 'Yorick Koster' ,
You can’t perform that action at this time.
0 commit comments