automatic module_metadata_base.json update

This commit is contained in:
Metasploit
2019-07-02 10:59:24 -07:00
parent df85377ff3
commit eeca72d39b
+2 -1
View File
@@ -121072,6 +121072,7 @@
"tyranid",
"enigma0x3",
"nyshone69",
"lokiuox",
"Carter Brainerd (cbrnrd)"
],
"description": "There's a task in Windows Task Scheduler called \"SilentCleanup\" which, while it's executed as Users, automatically runs with elevated privileges.\n When it runs, it executes the file %windir%\\system32\\cleanmgr.exe. Since it runs as Users, and we can control user's environment variables,\n %windir% (normally pointing to C:\\Windows) can be changed to point to whatever we want, and it'll run as admin.",
@@ -121093,7 +121094,7 @@
"targets": [
"Microsoft Windows"
],
"mod_time": "2019-06-27 11:38:16 +0000",
"mod_time": "2019-07-02 12:36:07 +0000",
"path": "/modules/exploits/windows/local/bypassuac_silentcleanup.rb",
"is_install_path": true,
"ref_name": "windows/local/bypassuac_silentcleanup",