Allow quotes in CmdStagerFlavor metadata

bug/bundler_fix
jvazquez-r7 2014-02-08 17:11:47 -06:00 committed by Spencer McIntyre
parent 37d0dd59e8
commit 870fa96bd4
32 changed files with 36 additions and 36 deletions

View File

@ -209,8 +209,8 @@ module Exploit::CmdStager
end
def target_flavor
return target.opts['CmdStagerFlavor'] if target && target.opts['CMDStagerFlavor']
return module_info['CmdStagerFlavor'] if module_info['CMDStagerFlavor']
return target.opts['CmdStagerFlavor'].to_sym if target && target.opts['CMDStagerFlavor']
return module_info['CmdStagerFlavor'].to_sym if module_info['CMDStagerFlavor']
nil
end

View File

@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['Linux mipsel Payload', { } ]
],
'CmdStagerFlavor' => :echo,
'CmdStagerFlavor' => 'echo',
'DefaultTarget' => 0,
))

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
{
'Arch' => ARCH_X86,
'Platform' => 'win',
'CmdStagerFlavor' => :vbs
'CmdStagerFlavor' => 'vbs'
}
],
[ 'HP SiteScope 11.20 / Linux',

View File

@ -42,22 +42,22 @@ class Metasploit3 < Msf::Exploit::Remote
['Linux', {
'Platform' => 'linux',
'Arch' => ARCH_X86,
'CmdStagerFlavor' => :bourne
'CmdStagerFlavor' => 'bourne'
}],
['Linux (x64)', {
'Platform' => 'linux',
'Arch' => ARCH_X86_64,
'CmdStagerFlavor' => :bourne
'CmdStagerFlavor' => 'bourne'
}],
['Windows', {
'Platform' => 'win',
'Arch' => ARCH_X86,
'CmdStagerFlavor' => :vbs
'CmdStagerFlavor' => 'vbs'
}],
['Windows (x64)', {
'Platform' => 'win',
'Arch' => ARCH_X86_64,
'CmdStagerFlavor' => :vbs
'CmdStagerFlavor' => 'vbs'
}],
],
'Privileged' => false,

View File

@ -37,7 +37,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
# Tested on Hyperic HQ versions 4.5.2-win32 and 4.6.6-win32 on Windows XP SP3 and Ubuntu 10.04
['Automatic', {} ],
['Windows', {'Arch' => ARCH_X86, 'Platform' => 'win', 'CmdStagerFlavor' => :vbs}],
['Windows', {'Arch' => ARCH_X86, 'Platform' => 'win', 'CmdStagerFlavor' => 'vbs'}],
['Linux', {'Arch' => ARCH_X86, 'Platform' => 'linux' }],
['Unix CMD', {'Arch' => ARCH_CMD, 'Platform' => 'unix', 'Payload' => {'BadChars' => "\x22"}}]
],

View File

@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => %w{ win linux unix },
'Targets' =>
[
['Windows', {'Arch' => ARCH_X86, 'Platform' => 'win', 'CmdStagerFlavor' => :vbs}],
['Windows', {'Arch' => ARCH_X86, 'Platform' => 'win', 'CmdStagerFlavor' => 'vbs'}],
['Linux', { 'Arch' => ARCH_X86, 'Platform' => 'linux' }],
['Unix CMD', {'Arch' => ARCH_CMD, 'Platform' => 'unix', 'Payload' => {'BadChars' => "\x22"}}]
],

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => %w{ win unix },
'Targets' =>
[
[ 'Windows', { 'Arch'=>ARCH_X86, 'Platform'=>'win', 'CmdStagerFlavor' => :vbs} ],
[ 'Windows', { 'Arch'=>ARCH_X86, 'Platform'=>'win', 'CmdStagerFlavor' => 'vbs'} ],
[ 'Unix', { 'Arch'=>ARCH_CMD, 'Platform'=>'unix', 'Payload'=>{'BadChars' => "\x22"}} ]
],
'DisclosureDate' => 'Dec 06 2012'))

View File

@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
{
'Arch' => ARCH_X86,
'Platform' => 'win',
'CmdStagerFlavor' => :tftp
'CmdStagerFlavor' => 'tftp'
}
],
['Linux Universal',

View File

@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
{
'Arch' => ARCH_X86,
'Platform' => 'win',
'CmdStagerFlavor' => :tftp
'CmdStagerFlavor' => 'tftp'
}
],
['Linux Universal',

View File

@ -57,7 +57,7 @@ class Metasploit4 < Msf::Exploit::Remote
{
'Arch' => ARCH_X86,
'Platform' => 'win',
'CmdStagerFlavor' => :vbs
'CmdStagerFlavor' => 'vbs'
},
],
],

View File

@ -67,7 +67,7 @@ class Metasploit4 < Msf::Exploit::Remote
{
'Arch' => ARCH_X86_64,
'Platform' => 'win',
'CmdStagerFlavor' => :vbs
'CmdStagerFlavor' => 'vbs'
}
]
],

View File

@ -68,7 +68,7 @@ class Metasploit4 < Msf::Exploit::Remote
{
'Arch' => ARCH_X86_64,
'Platform' => 'win',
'CmdStagerFlavor' => :vbs
'CmdStagerFlavor' => 'vbs'
}
]
],

View File

@ -61,7 +61,7 @@ class Metasploit3 < Msf::Exploit::Remote
}
]
],
'CmdStagerFlavor' => [ :bourne, :echo, :printf ],
'CmdStagerFlavor' => %w{ bourne echo printf },
'DefaultTarget' => 0,
# For the CVE
'DisclosureDate' => 'Jan 01 1999'

View File

@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'Platform' => ['linux'],
'Arch' => ARCH_X86,
'CmdStagerFlavor' => :echo,
'CmdStagerFlavor' => 'echo',
'Targets' =>
[
['ZeroShell 2.0 RC2', {}]

View File

@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'Privileged' => true,
'Platform' => 'win',
'CmdStagerFlavor' => :tftp,
'CmdStagerFlavor' => 'tftp',
'DefaultTarget' => 0,
'DisclosureDate' => 'Jul 26 2010'))

View File

@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
}
]
],
'CmdStagerFlavor' => :tftp,
'CmdStagerFlavor' => 'tftp',
'Privileged' => true,
'Platform' => 'win',
'DefaultTarget' => 0,

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DisclosureDate' => 'Jun 09 2009',
'DefaultTarget' => 0))
end

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
# Tested on Windows XP and Windows 2003
[ 'EMC Replication Manager 5.2.1 / Windows Native Payload', { } ]
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultOptions' =>
{
'WfsDelay' => 5

View File

@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
}
]
],
'CmdStagerFlavor' => :tftp,
'CmdStagerFlavor' => 'tftp',
'Privileged' => true,
'Platform' => 'win',
'DisclosureDate' => 'Apr 13 2011',

View File

@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Privileged' => true,
'Platform' => 'win',
'Arch' => ARCH_X86,
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'Targets' =>
[
[ 'HP SiteScope 11.20 (with Operations Agent) / Windows 2003 SP2', {} ]

View File

@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
}
]
],
'CmdStagerFlavor' => :tftp,
'CmdStagerFlavor' => 'tftp',
'Privileged' => true,
'Platform' => 'win',
'DisclosureDate' => 'Jul 13 2010',

View File

@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit
}
]
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultTarget' => 0,
'Privileged' => false
))

View File

@ -38,7 +38,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ]
],
'CmdStagerFlavor' => :tftp,
'CmdStagerFlavor' => 'tftp',
'DefaultTarget' => 0,
'DisclosureDate' => 'May 15 2001'
))

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
# w2k w/sp0, IIS5.0, mdac 2.7 RTM, sql2000, handunsf.reg, over xp_cmdshell, reverse_tcp
[ 'Automatic', { } ],
],
'CmdStagerFlavor' => :tftp,
'CmdStagerFlavor' => 'tftp',
'DefaultTarget' => 0,
'DisclosureDate' => 'Jul 17 1998'
)

View File

@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
}
]
],
'CmdStagerFlavor' => :tftp,
'CmdStagerFlavor' => 'tftp',
'Privileged' => true,
'Platform' => 'win',
'DisclosureDate' => 'May 15 2008',

View File

@ -55,7 +55,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultTarget' => 0
))

View File

@ -58,7 +58,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultTarget' => 0,
'DisclosureDate' => 'May 30 2000'
))

View File

@ -83,7 +83,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultTarget' => 0,
'DisclosureDate' => 'May 30 2000'
))

View File

@ -44,7 +44,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ], # Confirmed on MySQL 4.1.22, 5.5.9, and 5.1.56 (64bit)
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultTarget' => 0,
'DisclosureDate' => 'Jan 16 2009' # Date of Bernardo's blog post.
))

View File

@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
# This module has been tested on Oracle 10g Release 1
# where the Oracle Job Scheduler runs as SYSTEM on Windows
'Targets' => [['Automatic',{}]],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'Privileged' => true,
'DisclosureDate' => 'Jan 01 2007',
'DefaultTarget' => 0))

View File

@ -45,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'ABB MicroSCADA Pro SYS600 9.3', { } ]
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultTarget' => 0,
'Privileged' => false,
'DisclosureDate' => 'Apr 05 2013'

View File

@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Windows', { } ],
],
'CmdStagerFlavor' => :vbs,
'CmdStagerFlavor' => 'vbs',
'DefaultTarget' => 0,
'DisclosureDate' => 'Nov 01 2012'
))