automatic module_metadata_base.json update

4.x
Metasploit 2018-12-03 14:41:29 -08:00
parent 67155d33cf
commit 655601968e
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 44 additions and 0 deletions

View File

@ -74136,6 +74136,50 @@
"notes": {
}
},
"exploit_unix/local/emacs_movemail": {
"name": "Emacs movemail Privilege Escalation",
"full_name": "exploit/unix/local/emacs_movemail",
"rank": 600,
"disclosure_date": "1986-08-01",
"type": "exploit",
"author": [
"Markus Hess",
"Cliff Stoll",
"wvu <wvu@metasploit.com>"
],
"description": "This module exploits a SUID installation of the Emacs movemail utility\n to run a command as root by writing to 4.3BSD's /usr/lib/crontab.local.\n The vulnerability is documented in Cliff Stoll's book The Cuckoo's Egg.",
"references": [
"URL-https://en.wikipedia.org/wiki/Movemail",
"URL-https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg",
"URL-http://pdf.textfiles.com/academics/wilyhacker.pdf",
"URL-https://www.gnu.org/software/emacs/manual/html_node/efaq/Security-risks-with-Emacs.html",
"URL-https://www.gnu.org/software/emacs/manual/html_node/emacs/Movemail.html",
"URL-https://mailutils.org/manual/html_node/movemail.html"
],
"is_server": true,
"is_client": false,
"platform": "Unix",
"arch": "cmd",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"/usr/lib/crontab.local"
],
"mod_time": "2018-12-03 12:22:40 +0000",
"path": "/modules/exploits/unix/local/emacs_movemail.rb",
"is_install_path": true,
"ref_name": "unix/local/emacs_movemail",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_unix/local/exim_perl_startup": {
"name": "Exim \"perl_startup\" Privilege Escalation",
"full_name": "exploit/unix/local/exim_perl_startup",