Do final / minor cleanup

bug/bundler_fix
jvazquez-r7 2014-04-09 23:19:12 -05:00
parent 8dce80fd30
commit 386e2e3d29
1 changed files with 7 additions and 7 deletions

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Fritz!Box Webcm Unauthenticated Command Injection',
'Description' => %q{
Different Fritz!Box devices are vulnerable to an unauthenticated OS command injection.
Different Fritz!Box devices are vulnerable to an unauthenticated OS command injection.
This module was tested on a Fritz!Box 7270 from the LAN side. The vendor reported the
following devices vulnerable: 7570, 7490, 7390, 7360, 7340, 7330, 7272, 7270,
7170 Annex A A/CH, 7170 Annex B English, 7170 Annex A English, 7140, 7113, 6840 LTE,
@ -23,7 +23,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'unknown', # Vulnerability discovery
'Unknown', # Vulnerability discovery
'Fabian Braeunlein <fabian@breaking.systems>', # Metasploit PoC with wget method
'Michael Messner <devnull@s3cur1ty.de>' # Metasploit module
],
@ -40,7 +40,6 @@ class Metasploit3 < Msf::Exploit::Remote
],
'DisclosureDate' => 'Feb 11 2014',
'Privileged' => true,
'Platform' => 'linux',
'Payload' =>
{
'DisableNops' => true
@ -49,13 +48,14 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'MIPS Little Endian',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux',
'Arch' => ARCH_MIPSLE
}
],
[ 'MIPS Big Endian',
{
'Arch' => ARCH_MIPS,
'Platform' => 'linux'
'Platform' => 'linux',
'Arch' => ARCH_MIPS
}
],
],
@ -78,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote
return Exploit::CheckCode::Vulnerable
end
rescue ::Rex::ConnectionError
return Exploit::CheckCode::Safe
return Exploit::CheckCode::Unknown
end
Exploit::CheckCode::Safe