Beautify metadata
parent
3768cf0a69
commit
ddda0b2f4b
|
@ -12,51 +12,50 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'ManageEngine ServiceDesk / AssetExplorer / SupportCenter / IT360 Authenticated File Upload',
|
||||
'Description' => %q{
|
||||
This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk /
|
||||
AssetExplorer / SupportCenter / IT360 when uploading attachment files. The JSP that accepts
|
||||
'Name' => 'ManageEngine Multiple Products Authenticated File Upload',
|
||||
'Description' => %q{
|
||||
This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk,
|
||||
AssetExplorer, SupportCenter and IT360 when uploading attachment files. The JSP that accepts
|
||||
the upload does not handle correctly '../' sequences, which can be abused to write
|
||||
anywhere in the file system.
|
||||
Authentication is needed to exploit this vulnerability, but this module will attempt
|
||||
to login using the default credentials for the administrator and guest accounts;
|
||||
alternatively you can provide a pre-authenticated cookie or a username / password combo.
|
||||
For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400).
|
||||
All versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer,
|
||||
in the file system. Authentication is needed to exploit this vulnerability, but this module
|
||||
will attempt to login using the default credentials for the administrator and guest
|
||||
accounts. Alternatively you can provide a pre-authenticated cookie or a username / password
|
||||
combo. For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400). All
|
||||
versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer,
|
||||
SupportCenter and IT360 (including MSP) are vulnerable. At the time of release of this
|
||||
module, only ServiceDesk v9 has been fixed in build 9031 and above. This module has been
|
||||
been tested successfully in Windows and Linux on several versions.
|
||||
},
|
||||
'Author' =>
|
||||
'Author' =>
|
||||
[
|
||||
'Pedro Ribeiro <pedrib[at]gmail.com>', # Vulnerability Discovery and Metasploit module
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2014-5301' ],
|
||||
[ 'OSVDB', '116733' ],
|
||||
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_sd_file_upload.txt' ],
|
||||
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Jan/5' ]
|
||||
['CVE', '2014-5301'],
|
||||
['OSVDB', '116733'],
|
||||
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_sd_file_upload.txt'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2015/Jan/5']
|
||||
],
|
||||
'DefaultOptions' => { 'WfsDelay' => 30 },
|
||||
'Privileged' => false, # Privileged on Windows but not on Linux targets
|
||||
'Platform' => 'java',
|
||||
'Arch' => ARCH_JAVA,
|
||||
'Targets' =>
|
||||
'Privileged' => false, # Privileged on Windows but not on Linux targets
|
||||
'Platform' => 'java',
|
||||
'Arch' => ARCH_JAVA,
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Automatic', { } ],
|
||||
[ 'ServiceDesk Plus v5-v7.1 < b7016/AssetExplorer v4/SupportCenter v5-v7.9 - Java Universal',
|
||||
[ 'ServiceDesk Plus v5-v7.1 < b7016/AssetExplorer v4/SupportCenter v5-v7.9',
|
||||
{
|
||||
'attachment_path' => '/workorder/Attachment.jsp'
|
||||
}
|
||||
],
|
||||
[ 'ServiceDesk Plus/Plus MSP v7.1 >= b7016 - v9.0 < b9031/AssetExplorer v5-v6.1 - Java Universal',
|
||||
[ 'ServiceDesk Plus/Plus MSP v7.1 >= b7016 - v9.0 < b9031/AssetExplorer v5-v6.1',
|
||||
{
|
||||
'attachment_path' => '/common/FileAttachment.jsp'
|
||||
}
|
||||
],
|
||||
[ 'IT360 v8-v10.4 - Java Universal',
|
||||
[ 'IT360 v8-v10.4',
|
||||
{
|
||||
'attachment_path' => '/common/FileAttachment.jsp'
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue