Do minor style cleaning
parent
a77078b555
commit
da47d368e8
|
@ -16,9 +16,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'IPass Control Pipe Remote Command Execution',
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability in the IPass Client service. This service provides a
|
||||
named pipe which can be accessed by the user group BUILTIN\Users. This pipe can be abused
|
||||
to force the service to load a DLL from a SMB share.
|
||||
This module exploits a vulnerability in the IPass Client service. This service provides a
|
||||
named pipe which can be accessed by the user group BUILTIN\Users. This pipe can be abused
|
||||
to force the service to load a DLL from a SMB share.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
@ -33,24 +33,24 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'BID', '72265' ],
|
||||
[ 'URL', 'http://codewhitesec.blogspot.de/2015/02/how-i-could-ipass-your-client-security.html' ],
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
'EXITFUNC' => 'process',
|
||||
},
|
||||
'Payload' =>
|
||||
'Payload' =>
|
||||
{
|
||||
'Space' => 2048,
|
||||
'Space' => 2048,
|
||||
'DisableNops' => true
|
||||
},
|
||||
'Platform' => 'win',
|
||||
'Platform' => 'win',
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Windows x32', { 'Arch' => ARCH_X86 } ],
|
||||
[ 'Windows x64', { 'Arch' => ARCH_X86_64 } ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DisclosureDate' => 'Jan 21 2015',
|
||||
'DefaultTarget' => 0))
|
||||
'Privileged' => true,
|
||||
'DisclosureDate' => 'Jan 21 2015',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
Loading…
Reference in New Issue