Minor fixup for release
* Adds some new refs. * Fixes a typo in a module desc. * Fixes a weird slash continuation for string building (See #2589)bug/bundler_fix
parent
c5778f51d7
commit
84572c58a8
|
@ -30,6 +30,8 @@ class Metasploit4 < Msf::Auxiliary
|
|||
'References' =>
|
||||
[
|
||||
['CVE', '2013-3617'],
|
||||
['OSVDB', '99141'],
|
||||
['BID', '63431'],
|
||||
['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats']
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -25,6 +25,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Author' => 'Brendan Coles <bcoles[at]gmail.com>',
|
||||
'References' =>
|
||||
[
|
||||
['OSVDB' => '99199'],
|
||||
['BID' => '63411'],
|
||||
['URL' => 'http://bugs.processmaker.com/view.php?id=13436']
|
||||
],
|
||||
'Payload' =>
|
||||
|
|
|
@ -19,7 +19,7 @@ class Metasploit4 < Msf::Exploit
|
|||
This module exploits a stack-based buffer overflow on Beetel Connection Manager. The
|
||||
vulnerability exists in the parising of the UserName parameter in the NetConfig.ini
|
||||
file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP
|
||||
SP3 and Windows 7 SP1.b
|
||||
SP3 and Windows 7 SP1.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
|
@ -62,8 +62,7 @@ class Metasploit4 < Msf::Exploit
|
|||
def exploit
|
||||
section = datastore["SECTION"]
|
||||
|
||||
sploit = "[#{section}]\r\n" \
|
||||
"UserName=#{shell_popper}"
|
||||
sploit = "[#{section}]\r\nUserName=#{shell_popper}"
|
||||
|
||||
file_create(sploit)
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue