Skip to content

Commit 3729e9e

Browse files
committed
added description, references
1 parent 34ae9c3 commit 3729e9e

File tree

3 files changed

+10
-9
lines changed

3 files changed

+10
-9
lines changed

modules/auxiliary/admin/smb/webexec_command.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,8 @@ def initialize(info = {})
1717
super(update_info(info,
1818
'Name' => 'WebEx Remote Command Execution Utility',
1919
'Description' => %q{
20-
TODO
20+
This module enables the execution of a single command as System by exploiting a remote
21+
code execution vulnerability in Cisco's WebEx client software.
2122
},
2223

2324
'Author' => [
@@ -26,7 +27,8 @@ def initialize(info = {})
2627

2728
'License' => MSF_LICENSE,
2829
'References' => [
29-
# TODO
30+
['URL', 'https://webexec.org'],
31+
['CVE', '2018-15442']
3032
]
3133
))
3234

@@ -35,12 +37,9 @@ def initialize(info = {})
3537
OptString.new('RPORT', [true, 'The Target port', 445]),
3638
OptString.new('FORCE_GUI', [true, 'Ensure a GUI is created via wmic', 'false']),
3739
])
38-
39-
register_advanced_options([
40-
])
4140
end
4241

43-
# This is the main controle method
42+
# This is the main control method
4443
def run_host(ip)
4544
@smbshare = datastore['SMBSHARE']
4645
@ip = ip

modules/exploits/windows/local/webexec.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,12 @@ def initialize(info={})
1717
super( update_info( info,
1818
'Name' => 'WebEx local service permissions exploit',
1919
'Description' => %q{
20-
This module exploits a a flaw in the 'webexservice' Windows service, which runs as SYSTEM, can be used to run arbitrary commands locally, and can be started by limited users in default installations.
20+
This module exploits a flaw in the 'webexservice' Windows service, which runs as SYSTEM, can be used to run arbitrary commands locally, and can be started by limited users in default installations.
2121
},
2222
'References' =>
2323
[
24-
['URL', 'https://webexec.org']
24+
['URL', 'https://webexec.org'],
25+
['CVE', '2018-15442']
2526
],
2627
'DisclosureDate' => "Oct 09 2018",
2728
'License' => MSF_LICENSE,

modules/exploits/windows/smb/webexec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ def initialize(info = {})
2727
super(update_info(info,
2828
'Name' => 'WebExec Authenticated User Code Execution',
2929
'Description' => %q{
30-
This module uses a valid username and password of any level (or
30+
This module uses a valid username and password of any level (or
3131
password hash) to execute an arbitrary payload. This module is similar
3232
to the "psexec" module, except allows any non-guest account by default.
3333
},
@@ -44,6 +44,7 @@ def initialize(info = {})
4444
},
4545
'References' =>
4646
[
47+
['URL', 'https://webexec.org'],
4748
[ 'CVE', '2018-15442' ],
4849
],
4950
'Payload' =>

0 commit comments

Comments
 (0)