Restruct [lint]
parent
c3ce5be9c6
commit
fac1e178a4
|
@ -4,10 +4,11 @@ info:
|
||||||
name: Cisco IOS 12.2(55)SE11 Remote Code Execution
|
name: Cisco IOS 12.2(55)SE11 Remote Code Execution
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: critical
|
severity: critical
|
||||||
tags: cve,cve2017,cisco,rce,network
|
|
||||||
reference: |
|
reference: |
|
||||||
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
|
- https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
|
||||||
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
|
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/dos/cisco/ios_telnet_rocem.md
|
||||||
|
description: RCE exploit code is available for Cisco Catalyst 2960 switch model. This exploit is firmware dependent.
|
||||||
|
tags: cve,cve2017,cisco,rce,network
|
||||||
|
|
||||||
network:
|
network:
|
||||||
- inputs:
|
- inputs:
|
||||||
|
@ -18,7 +19,6 @@ network:
|
||||||
host:
|
host:
|
||||||
- "{{Hostname}}:23"
|
- "{{Hostname}}:23"
|
||||||
read-size: 1024
|
read-size: 1024
|
||||||
|
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
|
|
Loading…
Reference in New Issue