Name | wp_esri_arcmap_unsanitizedscript |
CVE | CVE-2012-1661 |
Exploit Pack | White_Phosphorus |
Description | ESRI ArcMap Unsanitized Clientside Script Execution |
Notes | References: http://www.osvdb.org/82986 CVE Name: CVE-2012-1661 VENDOR: ESRI Notes: This is a client-side exploit - run the module and send the created file to the target user. All payloads are served over SMB via wp_smbserver_backdoor. Windows based CANVAS users must first disable the native Windows SMB server before running the module. On Windows 7 this is done by disabling the 'Server' and 'TCP/IP NetBIOS Helper' services and rebooting the system. Instructions: 1. Disable native SMB server and reboot 2. Run wp_esri_arcmap_unsanitizedscript 3. Send created file to target user Repeatability: Unlimited Date public: 2012-06-14 CVE Url: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1661 CVSS: 10.0 |
Learn more about the CANVAS Exploit Pack here: White_Phosphorus |