Land #3928, release fixes
commit
5df614d39b
|
@ -13,10 +13,10 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Description' => %q{
|
||||
The WordPress custom-contact-forms plugin <= 5.1.0.3 allows unauthenticated users to download
|
||||
a SQL dump of the plugins database tables. It's also possible to upload files containing
|
||||
sql statements which will be executed. The module first tries to extract the WordPress
|
||||
SQL statements which will be executed. The module first tries to extract the WordPress
|
||||
table prefix from the dump and then attempts to create a new admin user.
|
||||
},
|
||||
'Author' =>
|
||||
'Author' =>
|
||||
[
|
||||
'Marc-Alexandre Montpas', # Vulnerability discovery
|
||||
'Christian Mehlmauer' # Metasploit module
|
||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
vulnerability exists in the pmd service, due to the insecure usage of functions like
|
||||
strcpy and strcat while handling stack_option packets with user controlled data. In
|
||||
order to bypass ASLR this module uses a proto_tbl packet to leak an libov pointer from
|
||||
the stack and finally build the rop chain to avoid NX.
|
||||
the stack and finally build the ROP chain to avoid NX.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'ManageEngine OpManager / Social IT Arbitrary File Upload',
|
||||
'Name' => 'ManageEngine OpManager and Social IT Arbitrary File Upload',
|
||||
'Description' => %q{
|
||||
This module exploits a file upload vulnerability in ManageEngine OpManager and Social IT.
|
||||
The vulnerability exists in the FileCollector servlet which accepts unauthenticated
|
||||
|
|
Loading…
Reference in New Issue