Land #4011, module description cleanup
commit
972efd423c
|
@ -19,8 +19,8 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
super(
|
super(
|
||||||
'Name' => 'HP Operations Manager Perfd Environment Scanner',
|
'Name' => 'HP Operations Manager Perfd Environment Scanner',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module will enumerate the environment
|
This module will enumerate the process list of a remote machine by abusing
|
||||||
HP Operation Manager via daemon perfd.
|
HP Operation Manager's unauthenticated 'perfd' daemon.
|
||||||
},
|
},
|
||||||
'Author' => [ 'Roberto Soares Espreto <robertoespreto[at]gmail.com>' ],
|
'Author' => [ 'Roberto Soares Espreto <robertoespreto[at]gmail.com>' ],
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
|
|
|
@ -16,7 +16,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'Jenkins-CI Login Utility',
|
'Name' => 'Jenkins-CI Login Utility',
|
||||||
'Description' => 'This module simply attempts to login to a Jenkins-CI instance using a specific user/pass.',
|
'Description' => 'This module attempts to login to a Jenkins-CI instance using a specific user/pass.',
|
||||||
'Author' => [ 'Nicholas Starke <starke.nicholas[at]gmail.com>' ],
|
'Author' => [ 'Nicholas Starke <starke.nicholas[at]gmail.com>' ],
|
||||||
'License' => MSF_LICENSE
|
'License' => MSF_LICENSE
|
||||||
)
|
)
|
||||||
|
@ -67,7 +67,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
print_good "#{ip}:#{rport} - LOGIN SUCCESSFUL: #{result.credential}"
|
print_good "#{ip}:#{rport} - LOGIN SUCCESSFUL: #{result.credential}"
|
||||||
else
|
else
|
||||||
invalidate_login(credential_data)
|
invalidate_login(credential_data)
|
||||||
print_status "#{ip}:#{rport} - LOGIN FAILED: #{result.credential} (#{result.status})"
|
vprint_status "#{ip}:#{rport} - LOGIN FAILED: #{result.credential} (#{result.status})"
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Wordpress InfusionSoft Upload Vulnerability',
|
'Name' => 'Wordpress InfusionSoft Upload Vulnerability',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits an arbitrary PHP code upload in the wordpress Infusionsoft Gravity
|
This module exploits an arbitrary PHP code upload in the WordPress Infusionsoft Gravity
|
||||||
Forms plugin, versions from 1.5.3 to 1.5.10. The vulnerability allows for arbitrary file
|
Forms plugin, versions from 1.5.3 to 1.5.10. The vulnerability allows for arbitrary file
|
||||||
upload and remote code execution.
|
upload and remote code execution.
|
||||||
},
|
},
|
||||||
|
|
|
@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Name' => "Rejetto HttpFileServer Remote Command Execution",
|
'Name' => "Rejetto HttpFileServer Remote Command Execution",
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
Rejetto HttpFileServer (HFS) is vulnerable to remote command execution attack due to a
|
Rejetto HttpFileServer (HFS) is vulnerable to remote command execution attack due to a
|
||||||
poor regex in the file ParserLib.pas. This module exploit the HFS scripting commands by
|
poor regex in the file ParserLib.pas. This module exploits the HFS scripting commands by
|
||||||
using '%00' to bypass the filtering. This module has been tested successfully on HFS 2.3b
|
using '%00' to bypass the filtering. This module has been tested successfully on HFS 2.3b
|
||||||
over Windows XP SP3, Windows 7 SP1 and Windows 8.
|
over Windows XP SP3, Windows 7 SP1 and Windows 8.
|
||||||
},
|
},
|
||||||
|
|
Loading…
Reference in New Issue