Compare commits

...

10 Commits

Author SHA1 Message Date
Tod Beardsley 2abd79b312 Updating trusted_service_path from master
Now with more references.
2012-08-15 14:52:12 -05:00
Tod Beardsley 4ac6861bb4 Apostrophe 2012-08-15 14:19:41 -05:00
Tod Beardsley 582f98f90d Fix up description a little 2012-08-15 13:57:14 -05:00
Tod Beardsley 3d8712e3c1 Picking up sinn3r's fix for trusted_service_path 2012-08-15 13:51:01 -05:00
Tod Beardsley 118a9b1e0f Msftidy fix and adding OSVDB 2012-08-15 13:49:22 -05:00
Tod Beardsley c00200eb73 Recapitalizing GlobalSCAPE
According to

http://kb.globalscape.com/Search.aspx?Keywords=globalscape

this seems to be the preferred capitalization.
2012-08-15 13:24:44 -05:00
Tod Beardsley 4571e5aad1 Merge branch 'master' into release 2012-08-14 12:27:48 -05:00
Tod Beardsley 589fb3a942 Merge branch 'master' into release
Conflicts:
	modules/exploits/windows/local/current_user_psexec.rb

Resolved conflict by including Post::Common in psexec module.
2012-08-14 12:09:07 -05:00
Tod Beardsley 2596d543a1 Out of 4.4.0, and into 4.5.0-dev 2012-08-07 09:53:19 -05:00
Tod Beardsley 26ce017980 Msftidy.rb cleanup on recent modules.
Notably, DisclosureDate is required for other module parsers, so let's
not ignore those, even if you have to guess at the disclosure or call
the module's publish date the disclosure date.
2012-08-04 12:19:38 -05:00
4 changed files with 14 additions and 9 deletions
@@ -23,7 +23,8 @@ class Metasploit3 < Msf::Auxiliary
},
'References' =>
[
['EDB', '19790']
['EDB', '19790'],
['OSVDB', '83817']
],
'Author' =>
[
@@ -73,4 +74,4 @@ class Metasploit3 < Msf::Auxiliary
print_good("File saved as: #{p}")
end
end
end
@@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'globalSCAPE CuteZIP Stack Buffer Overflow',
'Name' => 'GlobalSCAPE CuteZIP Stack Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow vulnerability in version 2.1
of CuteZIP.
@@ -29,12 +29,16 @@ class Metasploit3 < Msf::Exploit::Local
To some software developers, this is an unexpected behavior, which becomes a
security problem if an attacker is able to place a malicious executable in one
of these unexpected paths, sometimes escalate privileges if run as SYSTEM.
Some softwares such as OpenVPN 2.1.1, or OpenSSH Server 5, etc... all have the
Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the
same problem.
The offensive technique is also described in Writing Secure Code (2nd Edition),
Chapter 23, in the section "Calling Processes Security" on page 676.
},
'References' =>
[
['URL', 'http://msdn.microsoft.com/en-us/library/windows/desktop/ms682425(v=vs.85).aspx']
['URL', 'http://msdn.microsoft.com/en-us/library/windows/desktop/ms682425(v=vs.85).aspx'],
['URL', 'http://www.microsoft.com/learning/en/us/book.aspx?id=5957&locale=en-us'] #pg 676
],
'DisclosureDate' => "Oct 25 2001",
'License' => MSF_LICENSE,
@@ -135,9 +139,11 @@ class Metasploit3 < Msf::Exploit::Local
if tried
print_error("Unable to start #{svr_name}")
return
else
tried = true
end
case s
case s.message
when 1
# Service already started, restart again
service_stop(svr_name)
@@ -147,8 +153,6 @@ class Metasploit3 < Msf::Exploit::Local
service_change_startup(svr_name, 'manual')
retry
end
tried = true
end
+1 -1
View File
@@ -16,7 +16,7 @@ class Metasploit3 < Msf::Post
super(update_info(info,
'Name' => 'OSX Gather Keychain Enumeration',
'Description' => %q{
This module presents a way to quickly go through the current users keychains and
This module presents a way to quickly go through the current user's keychains and
collect data such as email accounts, servers, and other services. Please note:
when using the GETPASS option, the user will have to manually enter the password,
and then click 'allow' in order to collect each password.