Land #10750, formatting and AKA reference fixes

4.x
William Vu 2018-10-05 03:32:40 -05:00 committed by Metasploit
parent 736a2dfdb7
commit 12cb3b4d3e
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
7 changed files with 110 additions and 119 deletions

View File

@ -40,10 +40,7 @@ class MetasploitModule < Msf::Auxiliary
], ],
'DisclosureDate' => 'Sep 24 2014', 'DisclosureDate' => 'Sep 24 2014',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Notes' => 'Notes' => {'AKA' => ['Shellshock']}
{
'AKA' => ['Shellshock']
}
)) ))
register_options([ register_options([

View File

@ -47,8 +47,7 @@ class MetasploitModule < Msf::Exploit
%w{URL https://seclists.org/oss-sec/2016/q3/682}, %w{URL https://seclists.org/oss-sec/2016/q3/682},
%w{URL https://github.com/ImageMagick/ImageMagick/commit/06c41ab}, %w{URL https://github.com/ImageMagick/ImageMagick/commit/06c41ab},
%w{URL https://github.com/ImageMagick/ImageMagick/commit/a347456}, %w{URL https://github.com/ImageMagick/ImageMagick/commit/a347456},
%w{URL http://permalink.gmane.org/gmane.comp.security.oss.general/19669}, %w{URL http://permalink.gmane.org/gmane.comp.security.oss.general/19669}
%w{AKA ImageTragick}
], ],
'DisclosureDate' => 'May 3 2016', 'DisclosureDate' => 'May 3 2016',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
@ -63,7 +62,8 @@ class MetasploitModule < Msf::Exploit
['MVG file', template: 'msf.mvg'], # convert msf.svg msf.mvg ['MVG file', template: 'msf.mvg'], # convert msf.svg msf.mvg
['PS file', template: 'msf.ps'] # PoC from taviso ['PS file', template: 'msf.ps'] # PoC from taviso
], ],
'DefaultTarget' => 0 'DefaultTarget' => 0,
'Notes' => {'AKA' => ['ImageTragick']}
)) ))
register_options([ register_options([

View File

@ -34,7 +34,7 @@ class MetasploitModule < Msf::Exploit::Remote
['URL', 'https://research.checkpoint.com/uncovering-drupalgeddon-2/'], ['URL', 'https://research.checkpoint.com/uncovering-drupalgeddon-2/'],
['URL', 'https://github.com/a2u/CVE-2018-7600'], ['URL', 'https://github.com/a2u/CVE-2018-7600'],
['URL', 'https://github.com/nixawk/labs/issues/19'], ['URL', 'https://github.com/nixawk/labs/issues/19'],
['URL', 'https://github.com/FireFart/CVE-2018-7600'], ['URL', 'https://github.com/FireFart/CVE-2018-7600']
], ],
'DisclosureDate' => 'Mar 28 2018', 'DisclosureDate' => 'Mar 28 2018',
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
@ -123,13 +123,7 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'DefaultTarget' => 0, # Automatic (PHP In-Memory) 'DefaultTarget' => 0, # Automatic (PHP In-Memory)
'DefaultOptions' => {'WfsDelay' => 2}, 'DefaultOptions' => {'WfsDelay' => 2},
'Notes' => 'Notes' => {'AKA' => ['SA-CORE-2018-002', 'Drupalgeddon 2']}
{
'AKA' => [
'SA-CORE-2018-002',
'Drupalgeddon 2'
]
}
)) ))
register_options([ register_options([