From 1d1a495a93c96aaf1d9d9202bd8f83a7ccbded0b Mon Sep 17 00:00:00 2001 From: wchen-r7 Date: Wed, 13 Apr 2016 10:19:57 -0500 Subject: [PATCH] Style check --- .../unix/http/dell_kace_k1000_upload.rb | 30 ++++++++++--------- 1 file changed, 16 insertions(+), 14 deletions(-) diff --git a/modules/exploits/unix/http/dell_kace_k1000_upload.rb b/modules/exploits/unix/http/dell_kace_k1000_upload.rb index 86394fb8b5..b5780c1118 100644 --- a/modules/exploits/unix/http/dell_kace_k1000_upload.rb +++ b/modules/exploits/unix/http/dell_kace_k1000_upload.rb @@ -12,43 +12,45 @@ class MetasploitModule < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Dell KACE K1000 File Upload', - 'Description' => %q{ + 'Name' => 'Dell KACE K1000 File Upload', + 'Description' => %q{ This module exploits a file upload vulnerability in Kace K1000 versions 5.0 to 5.3, 5.4 prior to 5.4.76849 and 5.5 prior to 5.5.90547 which allows unauthenticated users to execute arbitrary commands under the context of the 'www' user. + This module also abuses the 'KSudoClient::RunCommandWait' function to gain root privileges. + This module has been tested successfully with Dell KACE K1000 version 5.3. }, - 'License' => MSF_LICENSE, - 'Privileged' => true, - 'Platform' => 'unix', # FreeBSD - 'Arch' => ARCH_CMD, - 'Author' => + 'License' => MSF_LICENSE, + 'Privileged' => true, + 'Platform' => 'unix', # FreeBSD + 'Arch' => ARCH_CMD, + 'Author' => [ 'Bradley Austin (steponequit)', # Initial discovery and exploit 'Brendan Coles ', # Metasploit ], - 'References' => + 'References' => [ ['URL', 'http://console-cowboys.blogspot.com/2014/03/the-curious-case-of-ninjamonkeypiratela.html'] ], - 'Payload' => + 'Payload' => { - 'Space' => 1024, - 'BadChars' => "\x00\x27", + 'Space' => 1024, + 'BadChars' => "\x00\x27", 'DisableNops' => true, - 'Compat' => + 'Compat' => { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic perl' } }, - 'DefaultTarget' => 0, - 'Targets' => + 'DefaultTarget' => 0, + 'Targets' => [ ['Automatic Targeting', { 'auto' => true }] ],