diff --git a/modules/exploits/windows/local/trusted_service_path.rb b/modules/exploits/windows/local/trusted_service_path.rb index 3fb75db665..d19d4b8eea 100644 --- a/modules/exploits/windows/local/trusted_service_path.rb +++ b/modules/exploits/windows/local/trusted_service_path.rb @@ -31,10 +31,14 @@ class Metasploit3 < Msf::Exploit::Local of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some softwares such as OpenVPN 2.1.1, or OpenSSH Server 5, etc... all have the same problem. + + The offensive technique is also described in Writing Secure Code (2nd Edition), + Chapter 23, in the section "Calling Processes Security" on page 676. }, 'References' => [ - ['URL', 'http://msdn.microsoft.com/en-us/library/windows/desktop/ms682425(v=vs.85).aspx'] + ['URL', 'http://msdn.microsoft.com/en-us/library/windows/desktop/ms682425(v=vs.85).aspx'], + ['URL', 'http://www.microsoft.com/learning/en/us/book.aspx?id=5957&locale=en-us'] #pg 676 ], 'DisclosureDate' => "Oct 25 2001", 'License' => MSF_LICENSE, @@ -136,7 +140,7 @@ class Metasploit3 < Msf::Exploit::Local print_error("Unable to start #{svr_name}") return else - tried = true + tried = true end case s.message