Beautify metadata
parent
3768cf0a69
commit
ddda0b2f4b
|
@ -12,17 +12,16 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'ManageEngine ServiceDesk / AssetExplorer / SupportCenter / IT360 Authenticated File Upload',
|
||||
'Name' => 'ManageEngine Multiple Products Authenticated File Upload',
|
||||
'Description' => %q{
|
||||
This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk /
|
||||
AssetExplorer / SupportCenter / IT360 when uploading attachment files. The JSP that accepts
|
||||
This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk,
|
||||
AssetExplorer, SupportCenter and IT360 when uploading attachment files. The JSP that accepts
|
||||
the upload does not handle correctly '../' sequences, which can be abused to write
|
||||
anywhere in the file system.
|
||||
Authentication is needed to exploit this vulnerability, but this module will attempt
|
||||
to login using the default credentials for the administrator and guest accounts;
|
||||
alternatively you can provide a pre-authenticated cookie or a username / password combo.
|
||||
For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400).
|
||||
All versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer,
|
||||
in the file system. Authentication is needed to exploit this vulnerability, but this module
|
||||
will attempt to login using the default credentials for the administrator and guest
|
||||
accounts. Alternatively you can provide a pre-authenticated cookie or a username / password
|
||||
combo. For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400). All
|
||||
versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer,
|
||||
SupportCenter and IT360 (including MSP) are vulnerable. At the time of release of this
|
||||
module, only ServiceDesk v9 has been fixed in build 9031 and above. This module has been
|
||||
been tested successfully in Windows and Linux on several versions.
|
||||
|
@ -46,17 +45,17 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Targets' =>
|
||||
[
|
||||
[ 'Automatic', { } ],
|
||||
[ 'ServiceDesk Plus v5-v7.1 < b7016/AssetExplorer v4/SupportCenter v5-v7.9 - Java Universal',
|
||||
[ 'ServiceDesk Plus v5-v7.1 < b7016/AssetExplorer v4/SupportCenter v5-v7.9',
|
||||
{
|
||||
'attachment_path' => '/workorder/Attachment.jsp'
|
||||
}
|
||||
],
|
||||
[ 'ServiceDesk Plus/Plus MSP v7.1 >= b7016 - v9.0 < b9031/AssetExplorer v5-v6.1 - Java Universal',
|
||||
[ 'ServiceDesk Plus/Plus MSP v7.1 >= b7016 - v9.0 < b9031/AssetExplorer v5-v6.1',
|
||||
{
|
||||
'attachment_path' => '/common/FileAttachment.jsp'
|
||||
}
|
||||
],
|
||||
[ 'IT360 v8-v10.4 - Java Universal',
|
||||
[ 'IT360 v8-v10.4',
|
||||
{
|
||||
'attachment_path' => '/common/FileAttachment.jsp'
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue