automatic module_metadata_base.json update
parent
b196d08339
commit
96d6db2fb9
|
@ -43320,7 +43320,7 @@
|
|||
"disclosure_date": "2017-08-31",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
|
||||
"timwr"
|
||||
],
|
||||
"description": "This module uses the su binary present on rooted devices to run\n a payload as root.\n\n A rooted Android device will contain a su binary (often linked with\n an application) that allows the user to run commands as root.\n This module will use the su binary to execute a command stager\n as root. The command stager will write a payload binary to a\n temporary directory, make it executable, execute it in the background,\n and finally delete the executable.\n\n On most devices the su binary will pop-up a prompt on the device\n asking the user for permission.",
|
||||
"references": [
|
||||
|
@ -43342,7 +43342,7 @@
|
|||
"x64",
|
||||
"mipsle"
|
||||
],
|
||||
"mod_time": "2018-10-01 17:50:33 +0000",
|
||||
"mod_time": "2019-03-29 10:44:58 +0000",
|
||||
"path": "/modules/exploits/android/local/su_exec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "android/local/su_exec",
|
||||
|
@ -59611,7 +59611,7 @@
|
|||
"disclosure_date": "2017-08-10",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
|
||||
"timwr"
|
||||
],
|
||||
"description": "This module exploits CVE-2017-1000117, which affects Git\n version 2.7.5 and lower. A submodule of the form 'ssh://' can be passed\n parameters from the username incorrectly. This can be used to inject\n commands to the operating system when the submodule is cloned.\n\n This module creates a fake git repository which contains a submodule\n containing the vulnerability. The vulnerability is triggered when the\n submodules are initialised.",
|
||||
"references": [
|
||||
|
@ -59630,7 +59630,7 @@
|
|||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2018-10-18 11:24:54 +0000",
|
||||
"mod_time": "2019-03-29 10:44:58 +0000",
|
||||
"path": "/modules/exploits/multi/http/git_submodule_command_exec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/http/git_submodule_command_exec",
|
||||
|
@ -59647,7 +59647,7 @@
|
|||
"disclosure_date": "2018-10-05",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
|
||||
"timwr"
|
||||
],
|
||||
"description": "This module exploits CVE-2018-17456, which affects Git\n versions 2.14.5, 2.15.3, 2.16.5, 2.17.2, 2.18.1, and 2.19.1 and lower.\n\n When a submodule url which starts with a dash e.g \"-u./payload\" is passed\n as an argument to git clone, the file \"payload\" inside the repository\n is executed.\n\n This module creates a fake git repository which contains a submodule\n containing the vulnerability. The vulnerability is triggered when the\n submodules are initialised (e.g git clone --recurse-submodules URL)",
|
||||
"references": [
|
||||
|
@ -59668,7 +59668,7 @@
|
|||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2018-11-14 10:57:36 +0000",
|
||||
"mod_time": "2019-03-29 10:44:58 +0000",
|
||||
"path": "/modules/exploits/multi/http/git_submodule_url_exec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/http/git_submodule_url_exec",
|
||||
|
|
Loading…
Reference in New Issue