automatic module_metadata_base.json update

master
Metasploit 2019-04-27 10:46:27 -07:00
parent 147b9fef98
commit 1fd0654038
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 35 additions and 0 deletions

View File

@ -52093,6 +52093,41 @@
"notes": { "notes": {
} }
}, },
"exploit_linux/local/apt_package_manager_persistence": {
"name": "APT Package Manager Persistence",
"full_name": "exploit/linux/local/apt_package_manager_persistence",
"rank": 600,
"disclosure_date": "1999-03-09",
"type": "exploit",
"author": [
"Aaron Ringo"
],
"description": "This module will run a payload when the package manager is used. No\n handler is ran automatically so you must configure an appropriate\n exploit/multi/handler to connect. This module creates a pre-invoke hook\n for APT in apt.conf.d. The hook name syntax is numeric followed by text.",
"references": [
],
"platform": "Linux,Unix",
"arch": "cmd, x86, x64, armle, aarch64, ppc, mipsle, mipsbe",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Automatic"
],
"mod_time": "2019-04-26 13:11:40 +0000",
"path": "/modules/exploits/linux/local/apt_package_manager_persistence.rb",
"is_install_path": true,
"ref_name": "linux/local/apt_package_manager_persistence",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_linux/local/asan_suid_executable_priv_esc": { "exploit_linux/local/asan_suid_executable_priv_esc": {
"name": "AddressSanitizer (ASan) SUID Executable Privilege Escalation", "name": "AddressSanitizer (ASan) SUID Executable Privilege Escalation",
"full_name": "exploit/linux/local/asan_suid_executable_priv_esc", "full_name": "exploit/linux/local/asan_suid_executable_priv_esc",