Land #10873, Add notes to exploit modules

GSoC/Meterpreter_Web_Console
Jacob Robles 2018-11-02 14:11:11 -05:00
commit 6bc4b71ca3
No known key found for this signature in database
GPG Key ID: 3EC9F18F2B12401C
20 changed files with 128 additions and 24 deletions

View File

@ -44,7 +44,14 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'DefaultOptions' => { 'WfsDelay' => 75 }, 'DefaultOptions' => { 'WfsDelay' => 75 },
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'DisclosureDate' => 'Oct 15 2016')) 'DisclosureDate' => 'Oct 15 2016',
'Notes' =>
{
'Stability' => [ CRASH_SAFE, ],
'SideEffects' => [ ARTIFACTS_ON_DISK, ],
'Reliability' => [ REPEATABLE_SESSION, ],
},
))
register_options( register_options(
[ [

View File

@ -62,10 +62,13 @@ class MetasploitModule < Msf::Exploit::Remote
}, },
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'DisclosureDate' => 'Sep 24 2014', 'DisclosureDate' => 'Sep 24 2014',
'Notes' => 'Notes' =>
{ {
'AKA' => ['Shellshock'] 'AKA' => [ 'Shellshock' ],
} 'Stability' => [ CRASH_SAFE, ],
'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, ],
'Reliability' => [ REPEATABLE_SESSION, ],
},
)) ))
register_options( register_options(
[ [

View File

@ -16,7 +16,7 @@ class MetasploitModule < Msf::Exploit::Remote
This module uses the Jenkins-CI Groovy script console to execute This module uses the Jenkins-CI Groovy script console to execute
OS commands using Java. OS commands using Java.
}, },
'Author' => 'Author' =>
[ [
'Spencer McIntyre', 'Spencer McIntyre',
'jamcut', 'jamcut',
@ -45,7 +45,14 @@ class MetasploitModule < Msf::Exploit::Remote
['Unix CMD', {'Arch' => ARCH_CMD, 'Platform' => 'unix', 'Payload' => {'BadChars' => "\x22"}}] ['Unix CMD', {'Arch' => ARCH_CMD, 'Platform' => 'unix', 'Payload' => {'BadChars' => "\x22"}}]
], ],
'DisclosureDate' => 'Jan 18 2013', 'DisclosureDate' => 'Jan 18 2013',
'DefaultTarget' => 0)) 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_SAFE, ],
'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, ],
'Reliability' => [ REPEATABLE_SESSION, ],
},
))
register_options( register_options(
[ [

View File

@ -34,7 +34,14 @@ class MetasploitModule < Msf::Exploit::Remote
[ 'Windows', { 'Arch'=>ARCH_X86, 'Platform'=>'win', 'CmdStagerFlavor' => 'vbs'} ], [ 'Windows', { 'Arch'=>ARCH_X86, 'Platform'=>'win', 'CmdStagerFlavor' => 'vbs'} ],
[ 'Unix', { 'Arch'=>ARCH_CMD, 'Platform'=>'unix', 'Payload'=>{'BadChars' => "\x22"}} ] [ 'Unix', { 'Arch'=>ARCH_CMD, 'Platform'=>'unix', 'Payload'=>{'BadChars' => "\x22"}} ]
], ],
'DisclosureDate' => 'Dec 06 2012')) 'DisclosureDate' => 'Dec 06 2012',
'Notes' =>
{
'Stability' => [ CRASH_SAFE, ],
'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, ],
'Reliability' => [ REPEATABLE_SESSION, ],
},
))
register_options( register_options(
[ [

View File

@ -43,7 +43,13 @@ class MetasploitModule < Msf::Exploit::Remote
['PHPMailer <5.2.18', {}], ['PHPMailer <5.2.18', {}],
['PHPMailer 5.2.18 - 5.2.19', {}] ['PHPMailer 5.2.18 - 5.2.19', {}]
], ],
'DefaultTarget' => 0 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_SAFE, ],
'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, ],
'Reliability' => [ REPEATABLE_SESSION, ],
},
)) ))
register_options( register_options(

View File

@ -113,7 +113,13 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
# For the CVE # For the CVE
'DisclosureDate' => 'Jan 01 1999' 'DisclosureDate' => 'Jan 01 1999',
'Notes' =>
{
'Stability' => [ CRASH_SAFE, ],
'SideEffects' => [ ARTIFACTS_ON_DISK, IOC_IN_LOGS, ],
'Reliability' => [ REPEATABLE_SESSION, ],
},
) )
register_options( register_options(

View File

@ -43,7 +43,13 @@ class MetasploitModule < Msf::Exploit::Remote
'Arch' => ARCH_CMD, 'Arch' => ARCH_CMD,
'Targets' => [ [ 'Automatic', { } ] ], 'Targets' => [ [ 'Automatic', { } ] ],
'DisclosureDate' => 'Jul 13 2011', 'DisclosureDate' => 'Jul 13 2011',
'DefaultTarget' => 0)) 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_SAFE, ],
'Reliability' => [ REPEATABLE_SESSION, ],
},
))
end end
def exploit def exploit

View File

@ -67,7 +67,13 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'Privileged' => false, 'Privileged' => false,
'DisclosureDate' => 'Aug 03 2009', 'DisclosureDate' => 'Aug 03 2009',
'DefaultTarget' => 0)) 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_SERVICE_DOWN, ],
'SideEffects' => [ SCREEN_EFFECTS, ],
},
))
register_options( register_options(
[ [

View File

@ -63,7 +63,11 @@ class MetasploitModule < Msf::Exploit::Remote
[ 'Windows x86', { 'Arch' => ARCH_X86 } ] [ 'Windows x86', { 'Arch' => ARCH_X86 } ]
], ],
'DefaultTarget' => 0, # Default target is Automatic 'DefaultTarget' => 0, # Default target is Automatic
'DisclosureDate' => 'Jun 13 2017' 'DisclosureDate' => 'Jun 13 2017',
'Notes' =>
{
'Stability' => [ CRASH_SERVICE_RESTARTS, ],
},
) )
) )

View File

@ -49,7 +49,13 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'Privileged' => true, 'Privileged' => true,
'DisclosureDate' => 'Apr 1 2014')) 'DisclosureDate' => 'Apr 1 2014',
'Notes' =>
{
'Stability' => [ CRASH_SERVICE_DOWN, ],
'SideEffects' => [ SCREEN_EFFECTS, ],
},
))
register_options( register_options(
[ [

View File

@ -65,7 +65,12 @@ class MetasploitModule < Msf::Exploit::Local
[ 'Windows x86', { 'Arch' => ARCH_X86 } ] [ 'Windows x86', { 'Arch' => ARCH_X86 } ]
], ],
'DefaultTarget' => 0, # Default target is Automatic 'DefaultTarget' => 0, # Default target is Automatic
'DisclosureDate' => 'Jun 13 2017' 'DisclosureDate' => 'Jun 13 2017',
'Notes' =>
{
'Stability' => [ CRASH_SERVICE_RESTARTS, ],
'SideEffects' => [ ARTIFACTS_ON_DISK, ],
},
) )
) )

View File

@ -54,7 +54,11 @@ class MetasploitModule < Msf::Exploit::Local
['URL', 'https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt'] ['URL', 'https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt']
], ],
'DisclosureDate' => 'Jul 22 2014', 'DisclosureDate' => 'Jul 22 2014',
'DefaultTarget' => 0 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_OS_RESTARTS, ],
}
)) ))
end end

View File

@ -75,7 +75,11 @@ class MetasploitModule < Msf::Exploit::Local
%w(URL http://www.offensive-security.com/vulndev/ms11-080-voyage-into-ring-zero/) %w(URL http://www.offensive-security.com/vulndev/ms11-080-voyage-into-ring-zero/)
], ],
'DisclosureDate' => 'Nov 30 2011', 'DisclosureDate' => 'Nov 30 2011',
'DefaultTarget' => 0 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_OS_RESTARTS, ],
},
})) }))
end end

View File

@ -57,7 +57,11 @@ class MetasploitModule < Msf::Exploit::Local
[ 'URL', 'http://immunityproducts.blogspot.com/2013/11/exploiting-cve-2013-3881-win32k-null.html' ] [ 'URL', 'http://immunityproducts.blogspot.com/2013/11/exploiting-cve-2013-3881-win32k-null.html' ]
], ],
'DisclosureDate' => 'Oct 08 2013', 'DisclosureDate' => 'Oct 08 2013',
'DefaultTarget' => 0 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_OS_RESTARTS, ],
},
})) }))
end end

View File

@ -67,7 +67,11 @@ class MetasploitModule < Msf::Exploit::Local
['URL', 'http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/'] ['URL', 'http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/']
], ],
'DisclosureDate' => 'Oct 14 2014', 'DisclosureDate' => 'Oct 14 2014',
'DefaultTarget' => 0 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_OS_RESTARTS, ],
},
})) }))
end end

View File

@ -51,7 +51,11 @@ class MetasploitModule < Msf::Exploit::Local
['URL', 'https://technet.microsoft.com/library/security/MS15-051'] ['URL', 'https://technet.microsoft.com/library/security/MS15-051']
], ],
'DisclosureDate' => 'May 12 2015', 'DisclosureDate' => 'May 12 2015',
'DefaultTarget' => 0 'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ CRASH_OS_RESTARTS, ],
},
})) }))
end end

View File

@ -66,7 +66,14 @@ class MetasploitModule < Msf::Exploit::Remote
}, },
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'Privileged' => true, 'Privileged' => true,
'DisclosureDate' => 'Mar 22 2017')) 'DisclosureDate' => 'Mar 22 2017',
'Notes' =>
{
'Stability' => [ CRASH_SERVICE_RESTARTS ],
'SideEffects' => [ SCREEN_EFFECTS ],
'Reliability' => [ REPEATABLE_SESSION ],
},
))
end end
def check def check

View File

@ -54,7 +54,11 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'Privileged' => true, 'Privileged' => true,
'DisclosureDate' => 'Jan 31 2013' 'DisclosureDate' => 'Jan 31 2013',
'Notes' =>
{
'Stability' => [ CRASH_SERVICE_RESTARTS ],
},
) )
register_options([Opt::RPORT(3050)]) register_options([Opt::RPORT(3050)])

View File

@ -31,7 +31,12 @@ class MetasploitModule < Msf::Exploit::Remote
[ 'Powershell x64', { 'Platform' => 'win', 'Arch' => ARCH_X64 } ] [ 'Powershell x64', { 'Platform' => 'win', 'Arch' => ARCH_X64 } ]
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'DisclosureDate' => 'Oct 06 2016' 'DisclosureDate' => 'Oct 06 2016',
'Notes' =>
{
'SideEffects' => [ SCREEN_EFFECTS ],
'Stability' => [ CRASH_SAFE ],
},
)) ))
end end

View File

@ -40,7 +40,12 @@ class MetasploitModule < Msf::Exploit::Remote
], ],
'DefaultTarget' => 0, 'DefaultTarget' => 0,
'Privileged' => true, 'Privileged' => true,
'DisclosureDate' => 'May 22 2013')) 'DisclosureDate' => 'May 22 2013',
'Notes' =>
{
'Stability' => [ CRASH_SERVICE_RESTARTS ],
},
))
register_options( register_options(
[ [