Added wpvulndb links
parent
0820a4fe6a
commit
33b37727c7
|
@ -93,21 +93,23 @@ class Msf::Module::SiteReference < Msf::Module::Reference
|
|||
self.ctx_val = in_ctx_val
|
||||
|
||||
if (in_ctx_id == 'OSVDB')
|
||||
self.site = 'http://www.osvdb.org/' + in_ctx_val.to_s
|
||||
self.site = "http://www.osvdb.org/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'CVE')
|
||||
self.site = "http://cvedetails.com/cve/#{in_ctx_val.to_s}/"
|
||||
self.site = "http://cvedetails.com/cve/#{in_ctx_val}/"
|
||||
elsif (in_ctx_id == 'CWE')
|
||||
self.site = "http://cwe.mitre.org/data/definitions/#{in_ctx_val.to_s}.html"
|
||||
self.site = "http://cwe.mitre.org/data/definitions/#{in_ctx_val}.html"
|
||||
elsif (in_ctx_id == 'BID')
|
||||
self.site = 'http://www.securityfocus.com/bid/' + in_ctx_val.to_s
|
||||
self.site = "http://www.securityfocus.com/bid/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'MSB')
|
||||
self.site = 'http://technet.microsoft.com/en-us/security/bulletin/' + in_ctx_val.to_s
|
||||
self.site = "http://technet.microsoft.com/en-us/security/bulletin/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'EDB')
|
||||
self.site = 'http://www.exploit-db.com/exploits/' + in_ctx_val.to_s
|
||||
self.site = "http://www.exploit-db.com/exploits/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'US-CERT-VU')
|
||||
self.site = 'http://www.kb.cert.org/vuls/id/' + in_ctx_val.to_s
|
||||
self.site = "http://www.kb.cert.org/vuls/id/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'ZDI')
|
||||
self.site = 'http://www.zerodayinitiative.com/advisories/ZDI-' + in_ctx_val.to_s
|
||||
self.site = "http://www.zerodayinitiative.com/advisories/ZDI-#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'WPVULNDBID')
|
||||
self.site = "https://wpvulndb.com/vulnerabilities/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'URL')
|
||||
self.site = in_ctx_val.to_s
|
||||
else
|
||||
|
|
|
@ -25,7 +25,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html' ],
|
||||
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ]
|
||||
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ],
|
||||
[ 'WPVULNDBID', '7542' ]
|
||||
],
|
||||
'DisclosureDate' => 'Aug 07 2014'
|
||||
))
|
||||
|
|
|
@ -29,7 +29,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
['URL', 'http://wordpress.org/news/2014/08/wordpress-3-9-2/'],
|
||||
['URL', 'http://www.breaksec.com/?p=6362'],
|
||||
['URL', 'http://mashable.com/2014/08/06/wordpress-xml-blowup-dos/'],
|
||||
['URL', 'https://core.trac.wordpress.org/changeset/29404']
|
||||
['URL', 'https://core.trac.wordpress.org/changeset/29404'],
|
||||
['WPVULNDBID', '7526']
|
||||
],
|
||||
'DisclosureDate'=> 'Aug 6 2014'
|
||||
))
|
||||
|
|
|
@ -25,7 +25,8 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
['OSVDB', '88744'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242']
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242'],
|
||||
['WPVULNDBID', '6621']
|
||||
],
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -32,7 +32,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['BID', '37314'],
|
||||
['CVE', '2009-4140'],
|
||||
['OSVDB', '59051'],
|
||||
['EDB', '10532']
|
||||
['EDB', '10532'],
|
||||
['WPVULNDBID', '6787'],
|
||||
['WPVULNDBID', '6788'],
|
||||
['WPVULNDBID', '6789'],
|
||||
['WPVULNDBID', '6790'],
|
||||
['WPVULNDBID', '6791'],
|
||||
['WPVULNDBID', '6792']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['EDB', '18991'],
|
||||
['OSVDB' '82652'],
|
||||
['BID', '53805']
|
||||
['BID', '53805'],
|
||||
['WPVULNDBID', '6231']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => 'php',
|
||||
|
|
|
@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2005-2612'],
|
||||
['OSVDB', '18672'],
|
||||
['BID', '14533'],
|
||||
['WPVULNDBID', '6034']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
@ -34,9 +35,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'DisableNops' => true,
|
||||
'Compat' =>
|
||||
{
|
||||
'ConnectionType' => 'find',
|
||||
'ConnectionType' => 'find'
|
||||
},
|
||||
'Space' => 512,
|
||||
'Space' => 512
|
||||
},
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -29,7 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ]
|
||||
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ],
|
||||
[ 'WPVULNDBID', '7441' ]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
|
@ -38,7 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'OSVDB', '92652' ],
|
||||
[ 'BID', '59316' ],
|
||||
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],
|
||||
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ]
|
||||
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ],
|
||||
[ 'WPVULNDBID', '6622' ]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
|
@ -23,13 +23,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' =>
|
||||
[
|
||||
'Charlie Eriksen <charlie[at]ceriksen.com>',
|
||||
'Charlie Eriksen <charlie[at]ceriksen.com>'
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB', '87353'],
|
||||
['URL', 'http://secunia.com/advisories/51037/'],
|
||||
['WPVULNDBID', '6103']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
@ -37,8 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'DisableNops' => true,
|
||||
'Compat' =>
|
||||
{
|
||||
'ConnectionType' => 'find',
|
||||
},
|
||||
'ConnectionType' => 'find'
|
||||
}
|
||||
},
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '82653'],
|
||||
['BID', '53809'],
|
||||
['EDB', '18993'],
|
||||
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-asset-manager-shell-upload-vulnerability.html']
|
||||
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-asset-manager-shell-upload-vulnerability.html'],
|
||||
['WPVULNDBID', '6106']
|
||||
],
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2012-4915'],
|
||||
['OSVDB', '88891'],
|
||||
['URL', 'http://secunia.com/advisories/50832'],
|
||||
['WPVULNDBID', '6073']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['OSVDB', '82656'],
|
||||
['BID', '53787'],
|
||||
['EDB', '18987'],
|
||||
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-wp-property-shell-upload-vulnerability.html']
|
||||
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-wp-property-shell-upload-vulnerability.html'],
|
||||
['WPVULNDBID', '6225']
|
||||
],
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -34,7 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html']
|
||||
['URL', 'http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html'],
|
||||
['WPVULNDBID', '7118']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
|
@ -38,7 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['URL', 'http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html'],
|
||||
['URL', 'http://www.mailpoet.com/security-update-part-2/'],
|
||||
['URL', 'https://plugins.trac.wordpress.org/changeset/943427/wysija-newsletters/trunk/helpers/back.php']
|
||||
['URL', 'https://plugins.trac.wordpress.org/changeset/943427/wysija-newsletters/trunk/helpers/back.php'],
|
||||
['WPVULNDBID', '6680']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
Loading…
Reference in New Issue