Improve Oracle module Name fields
git-svn-id: file:///home/svn/framework3/trunk@11122 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
1fda94f438
commit
0d5c85b67a
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle SID Enumeration.',
|
||||
'Name' => 'Oracle SID Enumeration',
|
||||
'Description' => %q{
|
||||
This module simply queries the TNS listner for the Oracle SID.
|
||||
With Oracle 9.2.0.8 and above the listener will be protected and
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'Oracle Application Server Spy Servlet SID Enumeration.',
|
||||
'Name' => 'Oracle Application Server Spy Servlet SID Enumeration',
|
||||
'Description' => %q{
|
||||
This module makes a request to the Oracle Application Server
|
||||
in an attempt to discover the SID.
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle tnslsnr Service Version Query.',
|
||||
'Name' => 'Oracle tnslsnr Service Version Query',
|
||||
'Description' => %q{
|
||||
This module simply queries the tnslsnr service for the Oracle build.
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE',
|
||||
'Description' => %q{
|
||||
The module exploits an sql injection flaw in the ALTER_HOTLOG_INTERNAL_CSOURCE
|
||||
procedure of the PL/SQL package DBMS_CDC_IPUBLISH. Any user with execute privilege
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE',
|
||||
'Description' => %q{
|
||||
The module exploits an sql injection flaw in the ALTER_AUTOLOG_CHANGE_SOURCE
|
||||
procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE',
|
||||
'Description' => %q{
|
||||
The module exploits an sql injection flaw in the DROP_CHANGE_SOURCE
|
||||
procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET',
|
||||
'Description' => %q{
|
||||
The module exploits an sql injection flaw in the CREATE_CHANGE_SET
|
||||
procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via DBMS_EXPORT_EXTENSION.',
|
||||
'Name' => 'Oracle DB SQL Injection via DBMS_EXPORT_EXTENSION',
|
||||
'Description' => %q{
|
||||
This module will escalate a Oracle DB user to DBA by exploiting an
|
||||
sql injection bug in the DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA package.
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML.',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML',
|
||||
'Description' => %q{
|
||||
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
|
||||
bug in the SYS.DBMS_METADATA.GET_GRANTED_XML package/function.
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.DBMS_METADATA.GET_XML.',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_XML',
|
||||
'Description' => %q{
|
||||
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
|
||||
bug in the SYS.DBMS_METADATA.GET_XML package/function.
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.DBMS_METADATA.OPEN.',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.OPEN',
|
||||
'Description' => %q{
|
||||
This module will escalate a Oracle DB user to DBA by exploiting an sql injection
|
||||
bug in the SYS.DBMS_METADATA.OPEN package/function.
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger.',
|
||||
'Name' => 'Oracle DB SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger',
|
||||
'Description' => %q{
|
||||
This module will escalate a Oracle DB user to MDSYS by exploiting an sql injection bug in
|
||||
the MDSYS.SDO_TOPO_DROP_FTBL trigger. After that exploit escalate user to DBA using "CREATE ANY TRIGGER" privilege
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => ' DBMS_JVM_EXP_PERMS 10gR2, 11gR1/R2 OS Command Execution',
|
||||
'Name' => 'Oracle DB 10gR2, 11gR1/R2 DBMS_JVM_EXP_PERMS OS Command Execution',
|
||||
'Description' => %q{
|
||||
This module exploits a flaw (0 day) in DBMS_JVM_EXP_PERMS package that allows
|
||||
any user with create session privilege to grant themselves java IO privileges.
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => ' DBMS_JVM_EXP_PERMS 11g R1/R2 OS Code Execution',
|
||||
'Name' => 'Oracle DB 11g R1/R2 DBMS_JVM_EXP_PERMS OS Code Execution',
|
||||
'Description' => %q{
|
||||
This module exploits a flaw (0 day) in DBMS_JVM_EXP_PERMS package that allows
|
||||
any user with create session privilege to grant themselves java IO privileges.
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.LT.COMPRESSWORKSPACE.',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.LT.COMPRESSWORKSPACE',
|
||||
'Description' => %q{
|
||||
This module exploits an sql injection flaw in the COMPRESSWORKSPACE
|
||||
procedure of the PL/SQL package SYS.LT. Any user with execute
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method',
|
||||
'Description' => %q{
|
||||
This module will escalate a Oracle DB user to DBA by exploiting
|
||||
an sql injection bug in the SYS.LT.FINDRICSET package via Evil
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.LT.MERGEWORKSPACE.',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.LT.MERGEWORKSPACE',
|
||||
'Description' => %q{
|
||||
This module exploits an sql injection flaw in the MERGEWORKSPACE
|
||||
procedure of the PL/SQL package SYS.LT. Any user with execute
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.LT.REMOVEWORKSPACE.',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.LT.REMOVEWORKSPACE',
|
||||
'Description' => %q{
|
||||
This module exploits an sql injection flaw in the REMOVEWORKSPACE
|
||||
procedure of the PL/SQL package SYS.LT. Any user with execute
|
||||
|
|
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'SQL Injection via SYS.LT.ROLLBACKWORKSPACE.',
|
||||
'Name' => 'Oracle DB SQL Injection via SYS.LT.ROLLBACKWORKSPACE',
|
||||
'Description' => %q{
|
||||
This module exploits an sql injection flaw in the ROLLBACKWORKSPACE
|
||||
procedure of the PL/SQL package SYS.LT. Any user with execute
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle 8i TNS Listener (ARGUMENTS) Buffer Overflow.',
|
||||
'Name' => 'Oracle 8i TNS Listener (ARGUMENTS) Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Oracle 8i. When
|
||||
sending a specially crafted packet containing a overly long
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Oracle TNS Listener SERVICE_NAME Buffer Overflow.',
|
||||
'Name' => 'Oracle TNS Listener SERVICE_NAME Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in Oracle. When
|
||||
sending a specially crafted packet containing a long SERVICE_NAME
|
||||
|
|
Loading…
Reference in New Issue