From ddda0b2f4b1b2bd532a1aee88fb3ab2b0fb08fb8 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Mon, 19 Jan 2015 14:59:31 -0600 Subject: [PATCH] Beautify metadata --- .../multi/http/manageengine_auth_upload.rb | 47 +++++++++---------- 1 file changed, 23 insertions(+), 24 deletions(-) diff --git a/modules/exploits/multi/http/manageengine_auth_upload.rb b/modules/exploits/multi/http/manageengine_auth_upload.rb index 782f25b20c..d2b58a8414 100644 --- a/modules/exploits/multi/http/manageengine_auth_upload.rb +++ b/modules/exploits/multi/http/manageengine_auth_upload.rb @@ -12,51 +12,50 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'ManageEngine ServiceDesk / AssetExplorer / SupportCenter / IT360 Authenticated File Upload', - 'Description' => %q{ - This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk / - AssetExplorer / SupportCenter / IT360 when uploading attachment files. The JSP that accepts + 'Name' => 'ManageEngine Multiple Products Authenticated File Upload', + 'Description' => %q{ + This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk, + AssetExplorer, SupportCenter and IT360 when uploading attachment files. The JSP that accepts the upload does not handle correctly '../' sequences, which can be abused to write - anywhere in the file system. - Authentication is needed to exploit this vulnerability, but this module will attempt - to login using the default credentials for the administrator and guest accounts; - alternatively you can provide a pre-authenticated cookie or a username / password combo. - For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400). - All versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer, + in the file system. Authentication is needed to exploit this vulnerability, but this module + will attempt to login using the default credentials for the administrator and guest + accounts. Alternatively you can provide a pre-authenticated cookie or a username / password + combo. For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400). All + versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer, SupportCenter and IT360 (including MSP) are vulnerable. At the time of release of this module, only ServiceDesk v9 has been fixed in build 9031 and above. This module has been been tested successfully in Windows and Linux on several versions. }, - 'Author' => + 'Author' => [ 'Pedro Ribeiro ', # Vulnerability Discovery and Metasploit module ], - 'License' => MSF_LICENSE, - 'References' => + 'License' => MSF_LICENSE, + 'References' => [ - [ 'CVE', '2014-5301' ], - [ 'OSVDB', '116733' ], - [ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_sd_file_upload.txt' ], - [ 'URL', 'http://seclists.org/fulldisclosure/2015/Jan/5' ] + ['CVE', '2014-5301'], + ['OSVDB', '116733'], + ['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_sd_file_upload.txt'], + ['URL', 'http://seclists.org/fulldisclosure/2015/Jan/5'] ], 'DefaultOptions' => { 'WfsDelay' => 30 }, - 'Privileged' => false, # Privileged on Windows but not on Linux targets - 'Platform' => 'java', - 'Arch' => ARCH_JAVA, - 'Targets' => + 'Privileged' => false, # Privileged on Windows but not on Linux targets + 'Platform' => 'java', + 'Arch' => ARCH_JAVA, + 'Targets' => [ [ 'Automatic', { } ], - [ 'ServiceDesk Plus v5-v7.1 < b7016/AssetExplorer v4/SupportCenter v5-v7.9 - Java Universal', + [ 'ServiceDesk Plus v5-v7.1 < b7016/AssetExplorer v4/SupportCenter v5-v7.9', { 'attachment_path' => '/workorder/Attachment.jsp' } ], - [ 'ServiceDesk Plus/Plus MSP v7.1 >= b7016 - v9.0 < b9031/AssetExplorer v5-v6.1 - Java Universal', + [ 'ServiceDesk Plus/Plus MSP v7.1 >= b7016 - v9.0 < b9031/AssetExplorer v5-v6.1', { 'attachment_path' => '/common/FileAttachment.jsp' } ], - [ 'IT360 v8-v10.4 - Java Universal', + [ 'IT360 v8-v10.4', { 'attachment_path' => '/common/FileAttachment.jsp' }