File tree Expand file tree Collapse file tree 3 files changed +11
-11
lines changed Expand file tree Collapse file tree 3 files changed +11
-11
lines changed Original file line number Diff line number Diff line change @@ -14,8 +14,8 @@ def initialize(info = {})
14
14
super ( update_info ( info ,
15
15
'Name' => 'F5 BigIP Backend Cookie Disclosure' ,
16
16
'Description' => %q{
17
- This module identify F5 BigIP Load Balancers and leaks backends
18
- information through cookies.
17
+ This module identifies F5 BigIP load balancers and leaks backend
18
+ information through cookies inserted by the BigIP devices .
19
19
} ,
20
20
'Author' => [ 'Thanat0s <thanspam[at]trollprod.org>' ] ,
21
21
'References' =>
@@ -96,13 +96,13 @@ def run
96
96
cookie = get_cookie ( ) # Get the cookie
97
97
# If the cookie is not found, stop process
98
98
if cookie . empty? || cookie [ :id ] . nil?
99
- print_error ( "#{ peer } - F5 Server Load Balancing cookie not found" )
99
+ print_error ( "#{ peer } - F5 Server load balancing cookie not found" )
100
100
break
101
101
end
102
102
103
103
# Print the cookie name on the first request
104
104
if i == 0
105
- print_status ( "#{ peer } - F5 Server Load Balancing \" #{ cookie [ :id ] } \" found" )
105
+ print_status ( "#{ peer } - F5 Server load balancing cookie \" #{ cookie [ :id ] } \" found" )
106
106
end
107
107
108
108
back_end = cookie_decode ( cookie [ :value ] )
Original file line number Diff line number Diff line change @@ -17,9 +17,9 @@ def initialize(info = {})
17
17
'Name' => 'Apache Struts ClassLoader Manipulation Remote Code Execution' ,
18
18
'Description' => %q{
19
19
This module exploits a remote command execution vulnerability in Apache Struts
20
- versions < 2.3.16.2. This issue is caused because the ParametersInterceptor allows
21
- access to 'class' parameter which is directly mapped to getClass() method and
22
- allows ClassLoader manipulation, which allows remote attackers to execute arbitrary
20
+ versions < 2.3.16.2. This vulnerability is due to the ParametersInterceptor, which allows
21
+ access to 'class' parameter that is directly mapped to getClass() method and
22
+ allows ClassLoader manipulation. As a result, this can allow remote attackers to execute arbitrary
23
23
Java code via crafted parameters.
24
24
} ,
25
25
'Author' =>
Original file line number Diff line number Diff line change 8
8
require 'rex'
9
9
10
10
class Metasploit3 < Msf ::Exploit ::Local
11
- Rank = GreatRanking
11
+ Rank = AverageRanking
12
12
13
13
include Msf ::Post ::File
14
14
include Msf ::Post ::Windows ::Priv
@@ -20,11 +20,11 @@ def initialize(info={})
20
20
super ( update_info ( info , {
21
21
'Name' => 'Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)' ,
22
22
'Description' => %q{
23
- A kernel pool overflow in Win32k which allows local privilege escalation.
23
+ This module leverages a kernel pool overflow in Win32k which allows local privilege escalation.
24
24
The kernel shellcode nulls the ACL for the winlogon.exe process (a SYSTEM process).
25
25
This allows any unprivileged process to freely migrate to winlogon.exe, achieving
26
- privilege escalation. Used in pwn2own 2013 by MWR to break out of chrome's sandbox.
27
- NOTE: when you exit the meterpreter session, winlogon .exe is likely to crash.
26
+ privilege escalation. This exploit was used in pwn2own 2013 by MWR to break out of chrome's sandbox.
27
+ NOTE: when a meterpreter session started by this exploit exits, winlogin .exe is likely to crash.
28
28
} ,
29
29
'License' => MSF_LICENSE ,
30
30
'Author' =>
You can’t perform that action at this time.
0 commit comments