diff --git a/modules/auxiliary/scanner/http/dlink_user_agent_backdoor.rb b/modules/auxiliary/scanner/http/dlink_user_agent_backdoor.rb index 3e0cbf3d99..1b36a906ce 100644 --- a/modules/auxiliary/scanner/http/dlink_user_agent_backdoor.rb +++ b/modules/auxiliary/scanner/http/dlink_user_agent_backdoor.rb @@ -17,23 +17,26 @@ class Metasploit3 < Msf::Auxiliary def initialize super( - 'Name' => 'DLink User-Agent Backdoor Scanner', - 'Description' => %q{ + 'Name' => 'DLink User-Agent Backdoor Scanner', + 'Description' => %q{ This module attempts to find DLink devices running Alphanetworks web interfaces affected by the backdoor found on the User-Agent header. This module has been tested successfully on a DIR-100 device with firmware version v1.13. }, - 'Author' => + 'Author' => [ 'Craig Heffner', # vulnerability discovery 'Michael Messner ', # Metasploit module 'juan vazquez' # minor help with msf module ], - 'License' => MSF_LICENSE, - 'References' => + 'License' => MSF_LICENSE, + 'References' => [ [ 'URL', 'http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/' ] ], + # First documented in detail by Craig, but looks like it's been known + # (at least to the Russians :-) ) since 2010 - see post at forum.codenet.ru + 'DisclosureDate' => "Oct 12 2013" ) end