Style check
parent
b61175c6b4
commit
1d1a495a93
|
@ -12,43 +12,45 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Dell KACE K1000 File Upload',
|
||||
'Description' => %q{
|
||||
'Name' => 'Dell KACE K1000 File Upload',
|
||||
'Description' => %q{
|
||||
This module exploits a file upload vulnerability in Kace K1000
|
||||
versions 5.0 to 5.3, 5.4 prior to 5.4.76849 and 5.5 prior to 5.5.90547
|
||||
which allows unauthenticated users to execute arbitrary commands
|
||||
under the context of the 'www' user.
|
||||
|
||||
This module also abuses the 'KSudoClient::RunCommandWait' function
|
||||
to gain root privileges.
|
||||
|
||||
This module has been tested successfully with Dell KACE K1000
|
||||
version 5.3.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Privileged' => true,
|
||||
'Platform' => 'unix', # FreeBSD
|
||||
'Arch' => ARCH_CMD,
|
||||
'Author' =>
|
||||
'License' => MSF_LICENSE,
|
||||
'Privileged' => true,
|
||||
'Platform' => 'unix', # FreeBSD
|
||||
'Arch' => ARCH_CMD,
|
||||
'Author' =>
|
||||
[
|
||||
'Bradley Austin (steponequit)', # Initial discovery and exploit
|
||||
'Brendan Coles <bcoles[at]gmail.com>', # Metasploit
|
||||
],
|
||||
'References' =>
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://console-cowboys.blogspot.com/2014/03/the-curious-case-of-ninjamonkeypiratela.html']
|
||||
],
|
||||
'Payload' =>
|
||||
'Payload' =>
|
||||
{
|
||||
'Space' => 1024,
|
||||
'BadChars' => "\x00\x27",
|
||||
'Space' => 1024,
|
||||
'BadChars' => "\x00\x27",
|
||||
'DisableNops' => true,
|
||||
'Compat' =>
|
||||
'Compat' =>
|
||||
{
|
||||
'PayloadType' => 'cmd',
|
||||
'RequiredCmd' => 'generic perl'
|
||||
}
|
||||
},
|
||||
'DefaultTarget' => 0,
|
||||
'Targets' =>
|
||||
'DefaultTarget' => 0,
|
||||
'Targets' =>
|
||||
[
|
||||
['Automatic Targeting', { 'auto' => true }]
|
||||
],
|
||||
|
|
Loading…
Reference in New Issue