automatic module_metadata_base.json update

4.x
Metasploit 2019-03-29 08:58:37 -07:00
parent b196d08339
commit 96d6db2fb9
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 6 additions and 6 deletions

View File

@ -43320,7 +43320,7 @@
"disclosure_date": "2017-08-31",
"type": "exploit",
"author": [
"timwr"
],
"description": "This module uses the su binary present on rooted devices to run\n a payload as root.\n\n A rooted Android device will contain a su binary (often linked with\n an application) that allows the user to run commands as root.\n This module will use the su binary to execute a command stager\n as root. The command stager will write a payload binary to a\n temporary directory, make it executable, execute it in the background,\n and finally delete the executable.\n\n On most devices the su binary will pop-up a prompt on the device\n asking the user for permission.",
"references": [
@ -43342,7 +43342,7 @@
"x64",
"mipsle"
],
"mod_time": "2018-10-01 17:50:33 +0000",
"mod_time": "2019-03-29 10:44:58 +0000",
"path": "/modules/exploits/android/local/su_exec.rb",
"is_install_path": true,
"ref_name": "android/local/su_exec",
@ -59611,7 +59611,7 @@
"disclosure_date": "2017-08-10",
"type": "exploit",
"author": [
"timwr"
],
"description": "This module exploits CVE-2017-1000117, which affects Git\n version 2.7.5 and lower. A submodule of the form 'ssh://' can be passed\n parameters from the username incorrectly. This can be used to inject\n commands to the operating system when the submodule is cloned.\n\n This module creates a fake git repository which contains a submodule\n containing the vulnerability. The vulnerability is triggered when the\n submodules are initialised.",
"references": [
@ -59630,7 +59630,7 @@
"targets": [
"Automatic"
],
"mod_time": "2018-10-18 11:24:54 +0000",
"mod_time": "2019-03-29 10:44:58 +0000",
"path": "/modules/exploits/multi/http/git_submodule_command_exec.rb",
"is_install_path": true,
"ref_name": "multi/http/git_submodule_command_exec",
@ -59647,7 +59647,7 @@
"disclosure_date": "2018-10-05",
"type": "exploit",
"author": [
"timwr"
],
"description": "This module exploits CVE-2018-17456, which affects Git\n versions 2.14.5, 2.15.3, 2.16.5, 2.17.2, 2.18.1, and 2.19.1 and lower.\n\n When a submodule url which starts with a dash e.g \"-u./payload\" is passed\n as an argument to git clone, the file \"payload\" inside the repository\n is executed.\n\n This module creates a fake git repository which contains a submodule\n containing the vulnerability. The vulnerability is triggered when the\n submodules are initialised (e.g git clone --recurse-submodules URL)",
"references": [
@ -59668,7 +59668,7 @@
"targets": [
"Automatic"
],
"mod_time": "2018-11-14 10:57:36 +0000",
"mod_time": "2019-03-29 10:44:58 +0000",
"path": "/modules/exploits/multi/http/git_submodule_url_exec.rb",
"is_install_path": true,
"ref_name": "multi/http/git_submodule_url_exec",