Land #5325, WP RevSlider disclosure date fix

bug/bundler_fix
William Vu 2015-05-09 14:34:03 -05:00
commit 79a8f37857
No known key found for this signature in database
GPG Key ID: 68BD00CE25866743
1 changed files with 7 additions and 6 deletions

View File

@ -6,6 +6,7 @@
require 'msf/core' require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking Rank = ExcellentRanking
include Msf::HTTP::Wordpress include Msf::HTTP::Wordpress
@ -13,10 +14,10 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'Wordpress RevSlider File Upload and Execute Vulnerability', 'Name' => 'WordPress RevSlider File Upload and Execute Vulnerability',
'Description' => %q{ 'Description' => %q{
This module exploits an arbitrary PHP code upload in the WordPress ThemePunch This module exploits an arbitrary PHP code upload in the WordPress ThemePunch
Revolution Slider ( revslider ) plugin, version 3.0.95 and prior. The Slider Revolution (RevSlider) plugin, versions 3.0.95 and prior. The
vulnerability allows for arbitrary file upload and remote code execution. vulnerability allows for arbitrary file upload and remote code execution.
}, },
'Author' => 'Author' =>
@ -27,16 +28,16 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
['URL', 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/'], ['OSVDB', '115118'],
['EDB', '35385'], ['EDB', '35385'],
['WPVDB', '7954'], ['WPVDB', '7954'],
['OSVDB', '115118'] ['URL', 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/']
], ],
'Privileged' => false, 'Privileged' => false,
'Platform' => 'php', 'Platform' => 'php',
'Arch' => ARCH_PHP, 'Arch' => ARCH_PHP,
'Targets' => [['ThemePunch Revolution Slider (revslider) 3.0.95', {}]], 'Targets' => [['ThemePunch Revolution Slider (revslider) 3.0.95', {}]],
'DisclosureDate' => 'Nov 26 2015', 'DisclosureDate' => 'Nov 26 2014',
'DefaultTarget' => 0) 'DefaultTarget' => 0)
) )
end end
@ -91,6 +92,6 @@ class Metasploit3 < Msf::Exploit::Remote
else else
fail_with(Failure::Unknown, 'ERROR') fail_with(Failure::Unknown, 'ERROR')
end end
end end
end end