commit
3b0a01e6dc
|
@ -11,12 +11,12 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Ruby-on-Rails Action View MIME Memory Exhaustion',
|
'Name' => 'Ruby on Rails Action View MIME Memory Exhaustion',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a Denial of Service (DoS) condition in Action View that requires
|
This module exploits a Denial of Service (DoS) condition in Action View that requires
|
||||||
a controller action. By sending a specially crafted content-type header to a rails
|
a controller action. By sending a specially crafted content-type header to a Rails
|
||||||
application, it is possible for it to store the invalid MIME type, and may eventually
|
application, it is possible for it to store the invalid MIME type, and may eventually
|
||||||
consumes all memory if enough invalid MIMEs are given.
|
consume all memory if enough invalid MIMEs are given.
|
||||||
|
|
||||||
Versions 3.0.0 and other later versions are affected, fixed in 4.0.2 and 3.2.16.
|
Versions 3.0.0 and other later versions are affected, fixed in 4.0.2 and 3.2.16.
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'vBulletin Password Collector via nodeid SQL Injection',
|
'Name' => 'vBulletin Password Collector via nodeid SQL Injection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has been
|
This module exploits a SQL injection vulnerability found in vBulletin 5 that has been
|
||||||
used in the wild since March 2013. This module can be used to extract the web application's
|
used in the wild since March 2013. This module can be used to extract the web application's
|
||||||
usernames and hashes, which could be used to authenticate into the vBulletin admin control
|
usernames and hashes, which could be used to authenticate into the vBulletin admin control
|
||||||
panel.
|
panel.
|
||||||
|
|
|
@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection',
|
'Name' => 'vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a SQL Injection vulnerability found in vBulletin 5 that has
|
This module exploits a SQL injection vulnerability found in vBulletin 5 that has
|
||||||
been used in the wild since March 2013. This module uses the sqli to extract the
|
been used in the wild since March 2013. This module uses the sqli to extract the
|
||||||
web application's usernames and hashes. With the retrieved information tries to
|
web application's usernames and hashes. With the retrieved information tries to
|
||||||
log into the admin control panel in order to deploy the PHP payload. This module
|
log into the admin control panel in order to deploy the PHP payload. This module
|
||||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Post
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Windows Gather Skype, Firefox, and Chrome Artifacts',
|
'Name' => 'Windows Gather Skype, Firefox, and Chrome Artifacts',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
Gathers Skype chat logs, Firefox history, and Chrome history data from the victim machine.
|
Gathers Skype chat logs, Firefox history, and Chrome history data from the target machine.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Joshua Harper (@JonValt) <josh at radixtx dot com>' ],
|
'Author' => [ 'Joshua Harper (@JonValt) <josh at radixtx dot com>' ],
|
||||||
|
|
|
@ -11,7 +11,7 @@ class Metasploit4 < Msf::Post
|
||||||
|
|
||||||
def initialize(info={})
|
def initialize(info={})
|
||||||
super( update_info( info,
|
super( update_info( info,
|
||||||
'Name' => 'Testing Meterpreter ExtAPI Stuff',
|
'Name' => 'Test Meterpreter ExtAPI Stuff',
|
||||||
'Description' => %q{ This module will test Windows Extended API methods },
|
'Description' => %q{ This module will test Windows Extended API methods },
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' => [ 'Ben Campbell'],
|
'Author' => [ 'Ben Campbell'],
|
||||||
|
|
Loading…
Reference in New Issue