From 0d5c85b67a88b1875190b301b6242e90773066c7 Mon Sep 17 00:00:00 2001 From: Joshua Drake Date: Wed, 24 Nov 2010 06:10:13 +0000 Subject: [PATCH] Improve Oracle module Name fields git-svn-id: file:///home/svn/framework3/trunk@11122 4d416f70-5f16-0410-b530-b9f4589650da --- modules/auxiliary/scanner/oracle/sid_enum.rb | 2 +- modules/auxiliary/scanner/oracle/spy_sid.rb | 2 +- modules/auxiliary/scanner/oracle/tnslsnr_version.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_export_extension.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb | 2 +- modules/auxiliary/sqli/oracle/dbms_metadata_open.rb | 2 +- modules/auxiliary/sqli/oracle/droptable_trigger.rb | 2 +- modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb | 2 +- modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb | 2 +- modules/auxiliary/sqli/oracle/lt_compressworkspace.rb | 2 +- modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb | 2 +- modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb | 2 +- modules/auxiliary/sqli/oracle/lt_removeworkspace.rb | 2 +- modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb | 2 +- modules/exploits/windows/oracle/tns_arguments.rb | 2 +- modules/exploits/windows/oracle/tns_service_name.rb | 2 +- 21 files changed, 21 insertions(+), 21 deletions(-) diff --git a/modules/auxiliary/scanner/oracle/sid_enum.rb b/modules/auxiliary/scanner/oracle/sid_enum.rb index f7d49add65..5b95784c95 100644 --- a/modules/auxiliary/scanner/oracle/sid_enum.rb +++ b/modules/auxiliary/scanner/oracle/sid_enum.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'Oracle SID Enumeration.', + 'Name' => 'Oracle SID Enumeration', 'Description' => %q{ This module simply queries the TNS listner for the Oracle SID. With Oracle 9.2.0.8 and above the listener will be protected and diff --git a/modules/auxiliary/scanner/oracle/spy_sid.rb b/modules/auxiliary/scanner/oracle/spy_sid.rb index b371614053..58bea05db3 100644 --- a/modules/auxiliary/scanner/oracle/spy_sid.rb +++ b/modules/auxiliary/scanner/oracle/spy_sid.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'Oracle Application Server Spy Servlet SID Enumeration.', + 'Name' => 'Oracle Application Server Spy Servlet SID Enumeration', 'Description' => %q{ This module makes a request to the Oracle Application Server in an attempt to discover the SID. diff --git a/modules/auxiliary/scanner/oracle/tnslsnr_version.rb b/modules/auxiliary/scanner/oracle/tnslsnr_version.rb index 97a01968db..020699b14e 100644 --- a/modules/auxiliary/scanner/oracle/tnslsnr_version.rb +++ b/modules/auxiliary/scanner/oracle/tnslsnr_version.rb @@ -19,7 +19,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'Oracle tnslsnr Service Version Query.', + 'Name' => 'Oracle tnslsnr Service Version Query', 'Description' => %q{ This module simply queries the tnslsnr service for the Oracle build. }, diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb index af21ffc078..3e6461fa01 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_ipublish.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE', + 'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_IPUBLISH.ALTER_HOTLOG_INTERNAL_CSOURCE', 'Description' => %q{ The module exploits an sql injection flaw in the ALTER_HOTLOG_INTERNAL_CSOURCE procedure of the PL/SQL package DBMS_CDC_IPUBLISH. Any user with execute privilege diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb index 5f25325c3f..f2a87579bb 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE', + 'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.ALTER_AUTOLOG_CHANGE_SOURCE', 'Description' => %q{ The module exploits an sql injection flaw in the ALTER_AUTOLOG_CHANGE_SOURCE procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb index 0a558ed5b9..33317254f6 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish2.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE', + 'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.DROP_CHANGE_SOURCE', 'Description' => %q{ The module exploits an sql injection flaw in the DROP_CHANGE_SOURCE procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege diff --git a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb index d8f648efe4..4a439ef7ff 100644 --- a/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb +++ b/modules/auxiliary/sqli/oracle/dbms_cdc_publish3.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET', + 'Name' => 'Oracle DB SQL Injection via SYS.DBMS_CDC_PUBLISH.CREATE_CHANGE_SET', 'Description' => %q{ The module exploits an sql injection flaw in the CREATE_CHANGE_SET procedure of the PL/SQL package DBMS_CDC_PUBLISH. Any user with execute privilege diff --git a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb index 2cd9b3df34..bd30a09cdd 100644 --- a/modules/auxiliary/sqli/oracle/dbms_export_extension.rb +++ b/modules/auxiliary/sqli/oracle/dbms_export_extension.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via DBMS_EXPORT_EXTENSION.', + 'Name' => 'Oracle DB SQL Injection via DBMS_EXPORT_EXTENSION', 'Description' => %q{ This module will escalate a Oracle DB user to DBA by exploiting an sql injection bug in the DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA package. diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb index ca5edfe6cb..a9c22160d1 100644 --- a/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb +++ b/modules/auxiliary/sqli/oracle/dbms_metadata_get_granted_xml.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML.', + 'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_GRANTED_XML', 'Description' => %q{ This module will escalate a Oracle DB user to DBA by exploiting an sql injection bug in the SYS.DBMS_METADATA.GET_GRANTED_XML package/function. diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb index aeb21f33cc..1f104fe074 100644 --- a/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb +++ b/modules/auxiliary/sqli/oracle/dbms_metadata_get_xml.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.DBMS_METADATA.GET_XML.', + 'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.GET_XML', 'Description' => %q{ This module will escalate a Oracle DB user to DBA by exploiting an sql injection bug in the SYS.DBMS_METADATA.GET_XML package/function. diff --git a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb index eceb9c2941..193b3fbe78 100644 --- a/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb +++ b/modules/auxiliary/sqli/oracle/dbms_metadata_open.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.DBMS_METADATA.OPEN.', + 'Name' => 'Oracle DB SQL Injection via SYS.DBMS_METADATA.OPEN', 'Description' => %q{ This module will escalate a Oracle DB user to DBA by exploiting an sql injection bug in the SYS.DBMS_METADATA.OPEN package/function. diff --git a/modules/auxiliary/sqli/oracle/droptable_trigger.rb b/modules/auxiliary/sqli/oracle/droptable_trigger.rb index 096dba859b..0f5bdb6fe9 100644 --- a/modules/auxiliary/sqli/oracle/droptable_trigger.rb +++ b/modules/auxiliary/sqli/oracle/droptable_trigger.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger.', + 'Name' => 'Oracle DB SQL Injection in MDSYS.SDO_TOPO_DROP_FTBL Trigger', 'Description' => %q{ This module will escalate a Oracle DB user to MDSYS by exploiting an sql injection bug in the MDSYS.SDO_TOPO_DROP_FTBL trigger. After that exploit escalate user to DBA using "CREATE ANY TRIGGER" privilege diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb index 2bb42b6ee8..985a8ea101 100644 --- a/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb +++ b/modules/auxiliary/sqli/oracle/jvm_os_code_10g.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => ' DBMS_JVM_EXP_PERMS 10gR2, 11gR1/R2 OS Command Execution', + 'Name' => 'Oracle DB 10gR2, 11gR1/R2 DBMS_JVM_EXP_PERMS OS Command Execution', 'Description' => %q{ This module exploits a flaw (0 day) in DBMS_JVM_EXP_PERMS package that allows any user with create session privilege to grant themselves java IO privileges. diff --git a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb index 60e56134c8..28a42ded7a 100644 --- a/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb +++ b/modules/auxiliary/sqli/oracle/jvm_os_code_11g.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => ' DBMS_JVM_EXP_PERMS 11g R1/R2 OS Code Execution', + 'Name' => 'Oracle DB 11g R1/R2 DBMS_JVM_EXP_PERMS OS Code Execution', 'Description' => %q{ This module exploits a flaw (0 day) in DBMS_JVM_EXP_PERMS package that allows any user with create session privilege to grant themselves java IO privileges. diff --git a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb index 58ee569d72..bb856c8ec5 100644 --- a/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_compressworkspace.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.LT.COMPRESSWORKSPACE.', + 'Name' => 'Oracle DB SQL Injection via SYS.LT.COMPRESSWORKSPACE', 'Description' => %q{ This module exploits an sql injection flaw in the COMPRESSWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute diff --git a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb index cb8ac3120f..4a9adeff53 100644 --- a/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb +++ b/modules/auxiliary/sqli/oracle/lt_findricset_cursor.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method', + 'Name' => 'Oracle DB SQL Injection via SYS.LT.FINDRICSET Evil Cursor Method', 'Description' => %q{ This module will escalate a Oracle DB user to DBA by exploiting an sql injection bug in the SYS.LT.FINDRICSET package via Evil diff --git a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb index 1bb8c37471..6e9e3f5b7a 100644 --- a/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_mergeworkspace.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.LT.MERGEWORKSPACE.', + 'Name' => 'Oracle DB SQL Injection via SYS.LT.MERGEWORKSPACE', 'Description' => %q{ This module exploits an sql injection flaw in the MERGEWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute diff --git a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb index 95b4c667a5..bdba27850f 100644 --- a/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_removeworkspace.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.LT.REMOVEWORKSPACE.', + 'Name' => 'Oracle DB SQL Injection via SYS.LT.REMOVEWORKSPACE', 'Description' => %q{ This module exploits an sql injection flaw in the REMOVEWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute diff --git a/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb b/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb index 7d7b214279..277623f4c0 100644 --- a/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb +++ b/modules/auxiliary/sqli/oracle/lt_rollbackworkspace.rb @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Auxiliary def initialize(info = {}) super(update_info(info, - 'Name' => 'SQL Injection via SYS.LT.ROLLBACKWORKSPACE.', + 'Name' => 'Oracle DB SQL Injection via SYS.LT.ROLLBACKWORKSPACE', 'Description' => %q{ This module exploits an sql injection flaw in the ROLLBACKWORKSPACE procedure of the PL/SQL package SYS.LT. Any user with execute diff --git a/modules/exploits/windows/oracle/tns_arguments.rb b/modules/exploits/windows/oracle/tns_arguments.rb index a702ba8ab1..4fa6aded55 100644 --- a/modules/exploits/windows/oracle/tns_arguments.rb +++ b/modules/exploits/windows/oracle/tns_arguments.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Oracle 8i TNS Listener (ARGUMENTS) Buffer Overflow.', + 'Name' => 'Oracle 8i TNS Listener (ARGUMENTS) Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in Oracle 8i. When sending a specially crafted packet containing a overly long diff --git a/modules/exploits/windows/oracle/tns_service_name.rb b/modules/exploits/windows/oracle/tns_service_name.rb index d62a97c70a..482935da80 100644 --- a/modules/exploits/windows/oracle/tns_service_name.rb +++ b/modules/exploits/windows/oracle/tns_service_name.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Oracle TNS Listener SERVICE_NAME Buffer Overflow.', + 'Name' => 'Oracle TNS Listener SERVICE_NAME Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in Oracle. When sending a specially crafted packet containing a long SERVICE_NAME