Skip to content

Commit 0d7efca

Browse files
committed
add in AKB analysis link and fix some typos
1 parent aff9e07 commit 0d7efca

File tree

2 files changed

+8
-4
lines changed

2 files changed

+8
-4
lines changed

documentation/modules/auxiliary/gather/progress_moveit_sftp_fileread_cve_2024_5806.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@ following version are affected:
99
The module can establish an authenticated SFTP session for a MOVEit Transfer user. The module allows for both listing
1010
the contents of a directory, and the reading of an arbitrary file.
1111

12+
Read our AttackerKB [Rapid7 Analysis](https://attackerkb.com/topics/44EZLG2xgL/cve-2024-5806/rapid7-analysis)
13+
for a full technical description of both the vulnerability and exploitation.
14+
1215
## Testing
1316
1. Installation requires a valid trial license that can be obtained by going here:
1417
https://www.ipswitch.com/forms/free-trials/moveit-transfer
@@ -18,7 +21,7 @@ the contents of a directory, and the reading of an arbitrary file.
1821
5. Log in as the sysadmin and create a new Organization (e.g. `TestOrg`).
1922
6. In the `Home` section, click the "Act as administrator in the TestOrg organization" button.
2023
7. In the `Users` section, create a new normal user (e.g. `testuser1`) in the new Organization.
21-
8. In the `Folders` section, navigate the `testuser1` Home folder and create some files and folders.
24+
8. In the `Folders` section, navigate to the `testuser1` Home folder and create some files and folders.
2225
9. The SFTP service will be running by default. No further configuration is required.
2326

2427
## Verification Steps
@@ -27,7 +30,7 @@ the contents of a directory, and the reading of an arbitrary file.
2730
2. `use auxiliary/gather/progress_moveit_sftp_fileread_cve_2024_5806`
2831
3. `set RHOST <TARGET_IP_ADDRESS>`
2932
4. `set STORE_LOOT false`
30-
5. `set TARGETUSER <TARGET_USERNAME>`
33+
5. `set TARGETUSER <TARGET_USERNAME>` (Must be a valid username on the target server, for example `testuser1`)
3134
6. `set TARGETFILE /`
3235
7. `check`
3336
8. `run`
@@ -44,7 +47,7 @@ A valid username to authenticate as. (default: nil).
4447
### TARGETFILE
4548
The full path of a target file or directory to read. If a directory path is specified, the output will be the
4649
directories contents. If a file path is specified, the output will be the files contents. In order to learn
47-
what files you can read, you cna first read the root directories (/) contents.(default: /).
50+
what files you can read, you can first read the root directories (/) contents. (default: /).
4851

4952
## Scenarios
5053

modules/auxiliary/gather/progress_moveit_sftp_fileread_cve_2024_5806.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,9 @@ def initialize(info = {})
3232
],
3333
'References' => [
3434
['CVE', '2024-5806'],
35-
# ['URL', 'https://attackerkb.com/topics/2k7UrkHyl3/cve-2024-5806/rapid7-analysis']
35+
['URL', 'https://attackerkb.com/topics/44EZLG2xgL/cve-2024-5806/rapid7-analysis'] # AttackerKB Rapid7 Analysis.
3636
],
37+
'DisclosureDate' => '2024-06-25',
3738
'DefaultOptions' => {
3839
'RPORT' => 22,
3940
'SSL' => true

0 commit comments

Comments
 (0)