lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CANNa7-W3YV_HsXwqByB25vB1ZOeNvUDtG2inPZs3o3t7z51bLQ@mail.gmail.com>
Date: Wed, 24 Oct 2018 09:29:10 -0700
From: Ron Bowes <ron@...llsecurity.net>
To: fulldisclosure@...lists.org
Subject: [FD] Critical vulnerability in Cisco WebEx - "WebExec"

During a pentest a couple months back, me and my coworker (Jeff) stumbled
upon an 0-day in Cisco WebEx. It's neat because it's a remote code
execution vulnerability in a client-side app due to bad ACLs.

Here's a high-level doc we put together: https://webexec.org

And a technical deep dive:
https://blog.skullsecurity.org/2018/technical-rundown-of-webexec

You'll find Nmap and Metasploit modules linked from there.

Cheers!
Ron

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ