Improve Oracle module Name fields

git-svn-id: file:///home/svn/framework3/trunk@11122 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-11-24 06:10:13 +00:00
parent 1fda94f438
commit 0d5c85b67a
21 changed files with 21 additions and 21 deletions

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle SID Enumeration.',
'Name' => 'Oracle SID Enumeration',
'Description' => %q{
This module simply queries the TNS listner for the Oracle SID.
With Oracle 9.2.0.8 and above the listener will be protected and

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize
super(
'Name' => 'Oracle Application Server Spy Servlet SID Enumeration.',
'Name' => 'Oracle Application Server Spy Servlet SID Enumeration',
'Description' => %q{
This module makes a request to the Oracle Application Server
in an attempt to discover the SID.

View File

@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle tnslsnr Service Version Query.',
'Name' => 'Oracle tnslsnr Service Version Query',
'Description' => %q{
This module simply queries the tnslsnr service for the Oracle build.
},

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE',
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE',
'Description' => %q{
The module exploits an sql injection flaw in the ALTER_HOTLOG_INTERNAL_CSOURCE
procedure of the PL/SQL package DBMS_CDC_IPUBLISH. Any user with execute privilege

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE',
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE',
'Description' => %q{
The module exploits an sql injection flaw in the ALTER_AUTOLOG_CHANGE_SOURCE
procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE',
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE',
'Description' => %q{
The module exploits an sql injection flaw in the DROP_CHANGE_SOURCE
procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET',
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET',
'Description' => %q{
The module exploits an sql injection flaw in the CREATE_CHANGE_SET
procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via DBMS_EXPORT_EXTENSION.',
'Name' => 'Oracle DB SQL Injection via DBMS_EXPORT_EXTENSION',
'Description' => %q{
This module will escalate a Oracle DB user to DBA by exploiting an
sql injection bug in the DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA package.

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML.',
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML',
'Description' => %q{
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
bug in the SYS.DBMS_METADATA.GET_GRANTED_XML package/function.

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.DBMS_METADATA.GET_XML.',
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_XML',
'Description' => %q{
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
bug in the SYS.DBMS_METADATA.GET_XML package/function.

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.DBMS_METADATA.OPEN.',
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.OPEN',
'Description' => %q{
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
bug in the SYS.DBMS_METADATA.OPEN package/function.

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger.',
'Name' => 'Oracle DB SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger',
'Description' => %q{
This module will escalate a Oracle DB user to MDSYS by exploiting an sql injection bug in
the MDSYS.SDO_TOPO_DROP_FTBL trigger. After that exploit escalate user to DBA using "CREATE ANY TRIGGER" privilege

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => ' DBMS_JVM_EXP_PERMS 10gR2, 11gR1/R2 OS Command Execution',
'Name' => 'Oracle DB 10gR2, 11gR1/R2 DBMS_JVM_EXP_PERMS OS Command Execution',
'Description' => %q{
This module exploits a flaw (0 day) in DBMS_JVM_EXP_PERMS package that allows
any user with create session privilege to grant themselves java IO privileges.

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => ' DBMS_JVM_EXP_PERMS 11g R1/R2 OS Code Execution',
'Name' => 'Oracle DB 11g R1/R2 DBMS_JVM_EXP_PERMS OS Code Execution',
'Description' => %q{
This module exploits a flaw (0 day) in DBMS_JVM_EXP_PERMS package that allows
any user with create session privilege to grant themselves java IO privileges.

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.LT.COMPRESSWORKSPACE.',
'Name' => 'Oracle DB SQL Injection via SYS.LT.COMPRESSWORKSPACE',
'Description' => %q{
This module exploits an sql injection flaw in the COMPRESSWORKSPACE
procedure of the PL/SQL package SYS.LT. Any user with execute

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method',
'Name' => 'Oracle DB SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method',
'Description' => %q{
This module will escalate a Oracle DB user to DBA by exploiting
an sql injection bug in the SYS.LT.FINDRICSET package via Evil

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.LT.MERGEWORKSPACE.',
'Name' => 'Oracle DB SQL Injection via SYS.LT.MERGEWORKSPACE',
'Description' => %q{
This module exploits an sql injection flaw in the MERGEWORKSPACE
procedure of the PL/SQL package SYS.LT. Any user with execute

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.LT.REMOVEWORKSPACE.',
'Name' => 'Oracle DB SQL Injection via SYS.LT.REMOVEWORKSPACE',
'Description' => %q{
This module exploits an sql injection flaw in the REMOVEWORKSPACE
procedure of the PL/SQL package SYS.LT. Any user with execute

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {})
super(update_info(info,
'Name' => 'SQL Injection via SYS.LT.ROLLBACKWORKSPACE.',
'Name' => 'Oracle DB SQL Injection via SYS.LT.ROLLBACKWORKSPACE',
'Description' => %q{
This module exploits an sql injection flaw in the ROLLBACKWORKSPACE
procedure of the PL/SQL package SYS.LT. Any user with execute

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle 8i TNS Listener (ARGUMENTS) Buffer Overflow.',
'Name' => 'Oracle 8i TNS Listener (ARGUMENTS) Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Oracle 8i. When
sending a specially crafted packet containing a overly long

View File

@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle TNS Listener SERVICE_NAME Buffer Overflow.',
'Name' => 'Oracle TNS Listener SERVICE_NAME Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in Oracle. When
sending a specially crafted packet containing a long SERVICE_NAME