Land #1837, broken references
commit
42d8173d17
|
@ -21,6 +21,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://www.ruby-doc.org/stdlib-1.9.3/libdoc/drb/rdoc/DRb.html' ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'EDB', '24456' ],
|
||||
[ 'OSVDB' '89960' ]
|
||||
[ 'OSVDB', '89960' ]
|
||||
],
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -27,8 +27,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
#['OSVDB', ''],
|
||||
#['EDB', ''],
|
||||
['OSVDB', '90645'],
|
||||
['EDB', '24547'],
|
||||
],
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -21,7 +21,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' => [ 'savant42' ], #with module help from kos
|
||||
'License' => MSF_LICENSE,
|
||||
'References' => [ 'URL', 'http://dev.metasploit.com/redmine/issues/5610'],
|
||||
'References' => [
|
||||
['URL', 'http://dev.metasploit.com/redmine/issues/5610']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -26,11 +26,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB' => '50421'],
|
||||
['CVE' => '2008-6825'],
|
||||
['BID' => '30135'],
|
||||
['EDB' => '6026' ],
|
||||
['URL' => 'http://www.trixbox.org/']
|
||||
['OSVDB', '50421'],
|
||||
['CVE', '2008-6825'],
|
||||
['BID', '30135'],
|
||||
['EDB', '6026' ],
|
||||
['URL', 'http://www.trixbox.org/']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -16,17 +16,21 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
def initialize
|
||||
super(
|
||||
'Name' => 'ManageEngine Applications Manager Authenticated Code Execution',
|
||||
'Description' => %q{
|
||||
'Description' => %q{
|
||||
This module logs into the Manage Engine Appplications Manager to upload a
|
||||
payload to the file system and a batch script that executes the payload. },
|
||||
'Author' => 'Jacob Giannantonio <JGiannan[at]gmail.com>',
|
||||
'Platform' => 'win',
|
||||
'Author' => 'Jacob Giannantonio <JGiannan[at]gmail.com>',
|
||||
'Platform' => 'win',
|
||||
'DisclosureDate' => 'Apr 08 2011',
|
||||
'Targets' =>
|
||||
'References' =>
|
||||
[
|
||||
[ 'EDB', '17152' ],
|
||||
],
|
||||
'Targets' =>
|
||||
[
|
||||
['Automatic',{}],
|
||||
],
|
||||
'DefaultTarget' => 0
|
||||
'DefaultTarget' => 0
|
||||
)
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -33,6 +33,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' => [ 'thelightcosine' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'URL', 'http://msdn.microsoft.com/en-us/library/windows/desktop/aa384426(v=vs.85).aspx' ],
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
|
Loading…
Reference in New Issue