lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CANNa7-W3YV_HsXwqByB25vB1ZOeNvUDtG2inPZs3o3t7z51bLQ@mail.gmail.com> Date: Wed, 24 Oct 2018 09:29:10 -0700 From: Ron Bowes <ron@...llsecurity.net> To: fulldisclosure@...lists.org Subject: [FD] Critical vulnerability in Cisco WebEx - "WebExec" During a pentest a couple months back, me and my coworker (Jeff) stumbled upon an 0-day in Cisco WebEx. It's neat because it's a remote code execution vulnerability in a client-side app due to bad ACLs. Here's a high-level doc we put together: https://webexec.org And a technical deep dive: https://blog.skullsecurity.org/2018/technical-rundown-of-webexec You'll find Nmap and Metasploit modules linked from there. Cheers! Ron _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/