Skip to content

Commit

Permalink
Land #12294, Fix References Array for bypassuac modules
Browse files Browse the repository at this point in the history
  • Loading branch information
bcoles authored and msjenkins-r7 committed Sep 8, 2019
1 parent 3be42c7 commit 1dfccb1
Show file tree
Hide file tree
Showing 6 changed files with 22 additions and 28 deletions.
9 changes: 4 additions & 5 deletions modules/exploits/windows/local/bypassuac_eventvwr.rb
Expand Up @@ -52,12 +52,11 @@ def initialize(info={})
[ 'Windows x64', { 'Arch' => ARCH_X64 } ]
],
'DefaultTarget' => 0,
'References' => [
'References' =>
[
'URL', 'https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/',
'URL', 'https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1'
]
],
['URL', 'https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/'],
['URL', 'https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1']
],
'DisclosureDate'=> 'Aug 15 2016'
))
end
Expand Down
10 changes: 5 additions & 5 deletions modules/exploits/windows/local/bypassuac_fodhelper.rb
Expand Up @@ -52,12 +52,12 @@ def initialize(info = {})
[ 'Windows x64', { 'Arch' => ARCH_X64 } ]
],
'DefaultTarget' => 0,
'References' => [
'References' =>
[
'URL', 'https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/',
'URL', 'https://github.com/winscripting/UAC-bypass/blob/master/FodhelperBypass.ps1'
]
],
['URL', 'https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/'],
['URL', 'https://github.com/winscripting/UAC-bypass/blob/master/FodhelperBypass.ps1'],
['URL', 'https://www.bleepingcomputer.com/news/security/gootkit-malware-bypasses-windows-defender-by-setting-path-exclusions/']
],
'DisclosureDate' => 'May 12 2017'
)
)
Expand Down
9 changes: 4 additions & 5 deletions modules/exploits/windows/local/bypassuac_injection.rb
Expand Up @@ -44,12 +44,11 @@ def initialize(info={})
[ 'Windows x64', { 'Arch' => ARCH_X64 } ]
],
'DefaultTarget' => 0,
'References' => [
'References' =>
[
'URL', 'http://www.trustedsec.com/december-2010/bypass-windows-uac/',
'URL', 'http://www.pretentiousname.com/misc/W7E_Source/win7_uac_poc_details.html'
]
],
['URL', 'http://www.trustedsec.com/december-2010/bypass-windows-uac/'],
['URL', 'http://www.pretentiousname.com/misc/W7E_Source/win7_uac_poc_details.html']
],
'DisclosureDate'=> 'Dec 31 2010'
))

Expand Down
4 changes: 1 addition & 3 deletions modules/exploits/windows/local/bypassuac_injection_winsxs.rb
Expand Up @@ -39,9 +39,7 @@ def initialize(info={})
],
'DefaultTarget' => 0,
'References' => [
[
'URL', 'https://github.com/L3cr0f/DccwBypassUAC'
]
['URL', 'https://github.com/L3cr0f/DccwBypassUAC']
],
'DisclosureDate'=> 'Apr 06 2017'
))
Expand Down
9 changes: 4 additions & 5 deletions modules/exploits/windows/local/bypassuac_sluihijack.rb
Expand Up @@ -54,12 +54,11 @@ def initialize(info = {})
['Windows x64', { 'Arch' => ARCH_X64 }]
],
'DefaultTarget' => 0,
'References' => [
'References' =>
[
'URL', 'https://github.com/bytecode-77/slui-file-handler-hijack-privilege-escalation',
'URL', 'https://github.com/gushmazuko/WinBypass/blob/master/SluiHijackBypass.ps1'
]
],
['URL', 'https://github.com/bytecode-77/slui-file-handler-hijack-privilege-escalation'],
['URL', 'https://github.com/gushmazuko/WinBypass/blob/master/SluiHijackBypass.ps1']
],
'DisclosureDate' => 'Jan 15 2018'
)
)
Expand Down
9 changes: 4 additions & 5 deletions modules/exploits/windows/local/bypassuac_vbs.rb
Expand Up @@ -30,12 +30,11 @@ def initialize(info={})
[ 'Automatic', { 'Arch' => [ ARCH_X86, ARCH_X64 ] } ]
],
'DefaultTarget' => 0,
'References' => [
'References' =>
[
'URL', 'http://seclist.us/uac-bypass-vulnerability-in-the-windows-script-host.html',
'URL', 'https://github.com/Vozzie/uacscript'
]
],
['URL', 'http://seclist.us/uac-bypass-vulnerability-in-the-windows-script-host.html'],
['URL', 'https://github.com/Vozzie/uacscript']
],
'DisclosureDate'=> 'Aug 22 2015'
))

Expand Down

0 comments on commit 1dfccb1

Please sign in to comment.