Update references URLs
parent
a636380e4b
commit
2be3433bdb
|
@ -43,7 +43,8 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
[
|
||||
['CVE', '2014-3704'],
|
||||
['URL', 'https://www.drupal.org/SA-CORE-2014-005'],
|
||||
['URL', 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html']
|
||||
['URL', 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html'],
|
||||
['URL', 'https://www.whitewinterwolf.com/posts/2017/11/16/drupageddon-revisited-a-new-path-from-sql-injection-to-remote-command-execution-cve-2014-3704/']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
@ -72,8 +73,6 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
|
||||
##
|
||||
# Form-cache PHP injection method
|
||||
# See details on:
|
||||
# https://www.whitewinterwolf.com/posts/2017/11/16/drupageddon-revisited-a-new-path-from-sql-injection-to-remote-command-execution-cve-2014-3704/
|
||||
##
|
||||
|
||||
def sql_insert(id, value)
|
||||
|
|
Loading…
Reference in New Issue