module

IBM Lotus Notes Client URL Handler Command Injection

Disclosed
2012-06-18
Created
2018-05-30

Description

This module exploits a command injection vulnerability in the URL handler for
for the IBM Lotus Notes Client a specially crafted notes:// URL to execute arbitrary commands with also arbitrary
arguments. This module has been tested successfully on Windows XP SP3 with IE8,
Google Chrome 23.0.1271.97 m and IBM Lotus Notes Client 8.5.2.

Authors

Moritz Jodeit
Sean de Regge
juan vazquez juan.vazquez@metasploit.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/browser/notes_handler_cmdinject
msf exploit(notes_handler_cmdinject) > show targets
...targets...
msf exploit(notes_handler_cmdinject) > set TARGET < target-id >
msf exploit(notes_handler_cmdinject) > show options
...show and set options...
msf exploit(notes_handler_cmdinject) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.