Added wpvulndb links

bug/bundler_fix
Christian Mehlmauer 2014-10-02 23:03:31 +02:00
parent 0820a4fe6a
commit 33b37727c7
15 changed files with 45 additions and 24 deletions

View File

@ -93,21 +93,23 @@ class Msf::Module::SiteReference < Msf::Module::Reference
self.ctx_val = in_ctx_val
if (in_ctx_id == 'OSVDB')
self.site = 'http://www.osvdb.org/' + in_ctx_val.to_s
self.site = "http://www.osvdb.org/#{in_ctx_val}"
elsif (in_ctx_id == 'CVE')
self.site = "http://cvedetails.com/cve/#{in_ctx_val.to_s}/"
self.site = "http://cvedetails.com/cve/#{in_ctx_val}/"
elsif (in_ctx_id == 'CWE')
self.site = "http://cwe.mitre.org/data/definitions/#{in_ctx_val.to_s}.html"
self.site = "http://cwe.mitre.org/data/definitions/#{in_ctx_val}.html"
elsif (in_ctx_id == 'BID')
self.site = 'http://www.securityfocus.com/bid/' + in_ctx_val.to_s
self.site = "http://www.securityfocus.com/bid/#{in_ctx_val}"
elsif (in_ctx_id == 'MSB')
self.site = 'http://technet.microsoft.com/en-us/security/bulletin/' + in_ctx_val.to_s
self.site = "http://technet.microsoft.com/en-us/security/bulletin/#{in_ctx_val}"
elsif (in_ctx_id == 'EDB')
self.site = 'http://www.exploit-db.com/exploits/' + in_ctx_val.to_s
self.site = "http://www.exploit-db.com/exploits/#{in_ctx_val}"
elsif (in_ctx_id == 'US-CERT-VU')
self.site = 'http://www.kb.cert.org/vuls/id/' + in_ctx_val.to_s
self.site = "http://www.kb.cert.org/vuls/id/#{in_ctx_val}"
elsif (in_ctx_id == 'ZDI')
self.site = 'http://www.zerodayinitiative.com/advisories/ZDI-' + in_ctx_val.to_s
self.site = "http://www.zerodayinitiative.com/advisories/ZDI-#{in_ctx_val}"
elsif (in_ctx_id == 'WPVULNDBID')
self.site = "https://wpvulndb.com/vulnerabilities/#{in_ctx_val}"
elsif (in_ctx_id == 'URL')
self.site = in_ctx_val.to_s
else

View File

@ -25,7 +25,8 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
[ 'URL', 'http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html' ],
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ]
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ],
[ 'WPVULNDBID', '7542' ]
],
'DisclosureDate' => 'Aug 07 2014'
))

View File

@ -29,7 +29,8 @@ class Metasploit3 < Msf::Auxiliary
['URL', 'http://wordpress.org/news/2014/08/wordpress-3-9-2/'],
['URL', 'http://www.breaksec.com/?p=6362'],
['URL', 'http://mashable.com/2014/08/06/wordpress-xml-blowup-dos/'],
['URL', 'https://core.trac.wordpress.org/changeset/29404']
['URL', 'https://core.trac.wordpress.org/changeset/29404'],
['WPVULNDBID', '7526']
],
'DisclosureDate'=> 'Aug 6 2014'
))

View File

@ -25,7 +25,8 @@ class Metasploit3 < Msf::Auxiliary
'References' =>
[
['OSVDB', '88744'],
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242']
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242'],
['WPVULNDBID', '6621']
],
'Author' =>
[

View File

@ -32,7 +32,13 @@ class Metasploit3 < Msf::Exploit::Remote
['BID', '37314'],
['CVE', '2009-4140'],
['OSVDB', '59051'],
['EDB', '10532']
['EDB', '10532'],
['WPVULNDBID', '6787'],
['WPVULNDBID', '6788'],
['WPVULNDBID', '6789'],
['WPVULNDBID', '6790'],
['WPVULNDBID', '6791'],
['WPVULNDBID', '6792']
],
'Payload' =>
{

View File

@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
[
['EDB', '18991'],
['OSVDB' '82652'],
['BID', '53805']
['BID', '53805'],
['WPVULNDBID', '6231']
],
'Privileged' => false,
'Platform' => 'php',

View File

@ -27,6 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2005-2612'],
['OSVDB', '18672'],
['BID', '14533'],
['WPVULNDBID', '6034']
],
'Privileged' => false,
'Payload' =>
@ -34,9 +35,9 @@ class Metasploit3 < Msf::Exploit::Remote
'DisableNops' => true,
'Compat' =>
{
'ConnectionType' => 'find',
'ConnectionType' => 'find'
},
'Space' => 512,
'Space' => 512
},
'Platform' => 'php',
'Arch' => ARCH_PHP,

View File

@ -29,7 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ]
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ],
[ 'WPVULNDBID', '7441' ]
],
'Privileged' => false,
'Platform' => ['php'],

View File

@ -38,7 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'OSVDB', '92652' ],
[ 'BID', '59316' ],
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ]
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ],
[ 'WPVULNDBID', '6622' ]
],
'Privileged' => false,
'Platform' => ['php'],

View File

@ -23,13 +23,14 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'Charlie Eriksen <charlie[at]ceriksen.com>',
'Charlie Eriksen <charlie[at]ceriksen.com>'
],
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '87353'],
['URL', 'http://secunia.com/advisories/51037/'],
['WPVULNDBID', '6103']
],
'Privileged' => false,
'Payload' =>
@ -37,8 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
'DisableNops' => true,
'Compat' =>
{
'ConnectionType' => 'find',
},
'ConnectionType' => 'find'
}
},
'Platform' => 'php',
'Arch' => ARCH_PHP,

View File

@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
['OSVDB', '82653'],
['BID', '53809'],
['EDB', '18993'],
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-asset-manager-shell-upload-vulnerability.html']
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-asset-manager-shell-upload-vulnerability.html'],
['WPVULNDBID', '6106']
],
'Platform' => 'php',
'Arch' => ARCH_PHP,

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2012-4915'],
['OSVDB', '88891'],
['URL', 'http://secunia.com/advisories/50832'],
['WPVULNDBID', '6073']
],
'Privileged' => false,
'Payload' =>

View File

@ -31,7 +31,8 @@ class Metasploit3 < Msf::Exploit::Remote
['OSVDB', '82656'],
['BID', '53787'],
['EDB', '18987'],
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-wp-property-shell-upload-vulnerability.html']
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-wp-property-shell-upload-vulnerability.html'],
['WPVULNDBID', '6225']
],
'Platform' => 'php',
'Arch' => ARCH_PHP,

View File

@ -34,7 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html']
['URL', 'http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html'],
['WPVULNDBID', '7118']
],
'Privileged' => false,
'Platform' => ['php'],

View File

@ -38,7 +38,8 @@ class Metasploit3 < Msf::Exploit::Remote
[
['URL', 'http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html'],
['URL', 'http://www.mailpoet.com/security-update-part-2/'],
['URL', 'https://plugins.trac.wordpress.org/changeset/943427/wysija-newsletters/trunk/helpers/back.php']
['URL', 'https://plugins.trac.wordpress.org/changeset/943427/wysija-newsletters/trunk/helpers/back.php'],
['WPVULNDBID', '6680']
],
'Privileged' => false,
'Platform' => ['php'],