From 599979be3764ea2fecf73d8a5574cfeba93ecdc6 Mon Sep 17 00:00:00 2001 From: Kevin Kirsche Date: Fri, 18 May 2018 14:49:12 -0400 Subject: [PATCH] Add AKA and remove filename --- .../exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb b/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb index 3f96300edd..d52779fa15 100644 --- a/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb +++ b/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb @@ -34,6 +34,7 @@ class MetasploitModule < Msf::Exploit::Remote ['CVE', '2018-1111'], ['URL', 'https://twitter.com/_fel1x/status/996388421273882626?lang=en'], ['URL', 'https://access.redhat.com/security/vulnerabilities/3442151'], + ['AKA', 'DynoRoot'], ['URL', 'https://dynoroot.ninja/'], ['URL', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1111'], ['URL', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1111'] @@ -53,7 +54,7 @@ class MetasploitModule < Msf::Exploit::Remote 'DisclosureDate' => 'May 15 2018' )) - deregister_options('DOMAINNAME', 'HOSTNAME', 'URL') + deregister_options('DOMAINNAME', 'HOSTNAME', 'URL', 'FILENAME') end def exploit