Minor fixup for release

* Adds some new refs.
  * Fixes a typo in a module desc.
  * Fixes a weird slash continuation for string building (See #2589)
bug/bundler_fix
Tod Beardsley 2013-11-04 12:10:38 -06:00
parent c5778f51d7
commit 84572c58a8
No known key found for this signature in database
GPG Key ID: 1EFFB682ADB9F193
3 changed files with 6 additions and 3 deletions

View File

@ -30,6 +30,8 @@ class Metasploit4 < Msf::Auxiliary
'References' => 'References' =>
[ [
['CVE', '2013-3617'], ['CVE', '2013-3617'],
['OSVDB', '99141'],
['BID', '63431'],
['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats'] ['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats']
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,

View File

@ -25,6 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
'Author' => 'Brendan Coles <bcoles[at]gmail.com>', 'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
'References' => 'References' =>
[ [
['OSVDB' => '99199'],
['BID' => '63411'],
['URL' => 'http://bugs.processmaker.com/view.php?id=13436'] ['URL' => 'http://bugs.processmaker.com/view.php?id=13436']
], ],
'Payload' => 'Payload' =>

View File

@ -19,7 +19,7 @@ class Metasploit4 < Msf::Exploit
This module exploits a stack-based buffer overflow on Beetel Connection Manager. The This module exploits a stack-based buffer overflow on Beetel Connection Manager. The
vulnerability exists in the parising of the UserName parameter in the NetConfig.ini vulnerability exists in the parising of the UserName parameter in the NetConfig.ini
file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP
SP3 and Windows 7 SP1.b SP3 and Windows 7 SP1.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
@ -62,8 +62,7 @@ class Metasploit4 < Msf::Exploit
def exploit def exploit
section = datastore["SECTION"] section = datastore["SECTION"]
sploit = "[#{section}]\r\n" \ sploit = "[#{section}]\r\nUserName=#{shell_popper}"
"UserName=#{shell_popper}"
file_create(sploit) file_create(sploit)
end end