GSoC/Meterpreter_Web_Console
Dhiraj Mishra 2018-09-18 19:23:39 +05:30 committed by GitHub
parent 03d50f2773
commit 1b220514bb
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 4 deletions

View File

@ -1,16 +1,17 @@
## This module requires Metasploit: https://metasploit.com/download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Post
Rank = GoodRanking
Rank = GoodRanking
include Msf::Post::File
include Msf::Post::Windows::Registry
def initialize(info = {})
super(update_info(info,
'Name' => 'Win32k Elevation of Privilege Vulnerability',
'Name' => 'Wink32.sys fails to handle objects in memory (Win32k Elevation of Privilege Vulnerability)',
'Description' => %q{
This module exploits elevation of privilege vulnerability exists in Windows 7 and 2008 R2
when the Win32k component fails to properly handle objects in memory. An attacker who
@ -19,6 +20,7 @@ class MetasploitModule < Msf::Post
accounts with full user rights.},
'References' =>
[
['BID', '104034'],
['CVE', '2018-8120'],
['URL', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120'],
['URL', 'http://bigric3.blogspot.com/2018/05/cve-2018-8120-analysis-and-exploit.html'],
@ -31,7 +33,7 @@ class MetasploitModule < Msf::Post
'Anton Cherepanov', # Vulnerability discovery
'Dhiraj Mishra <dhiraj@notsosecure.com>' # Metasploit module
],
'DisclosureDate' => 'Aug 05 2018',
'DisclosureDate' => 'May 9 2018',
'Arch' => [ARCH_X64, ARCH_X86],
'SessionTypes' => ['meterpreter'],
'License' => MSF_LICENSE