updated check and docs that 14.2 may not be vuln

bug/bundler_fix
h00die 2016-06-21 16:48:09 -04:00
parent 15a3d739c0
commit 9cb57d78d7
2 changed files with 14 additions and 2 deletions

View File

@ -4,6 +4,18 @@
Exploit-db: [edb](https://www.exploit-db.com/apps/2fa84367ba4f14afab9f51cd3e93606d-tiki-14.2.7z) Exploit-db: [edb](https://www.exploit-db.com/apps/2fa84367ba4f14afab9f51cd3e93606d-tiki-14.2.7z)
Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts) Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts)
Of note, there is some discussion if 14.2 is vuln or not.
```
1. Exploit-DB says in the title (may be wrong) 14.2 is vuln.
2. The linked app Exploit-DB has is 14.2.
3. Its verified on Exploit-DB.
```
vs
```
1. Manual print statement testing from the PoC on 14.2 doesn't seem to be vuln
2. The [notice](https://tiki.org/article414-Important-Security-Fix-for-all-versions-of-Tiki) seems to say 14.2 is the update that fixes the problem
```
### Creating A Testing Environment ### Creating A Testing Environment
1. Create a fresh Ubuntu 16.04 w/ a LAMP install 1. Create a fresh Ubuntu 16.04 w/ a LAMP install

View File

@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
The calendar module is NOT enabled by default. When enbled, The calendar module is NOT enabled by default. When enbled,
the default permissions are set to NOT allow anonymous users the default permissions are set to NOT allow anonymous users
to access. to access.
Vulnerable versions: <=14.2, <=12.5 LTS, <=9.11 LTS and <=6.15 Vulnerable versions: <=14.1, <=12.4 LTS, <=9.10 LTS and <=6.14
Verified/Tested against 14.1 Verified/Tested against 14.1
), ),
'Author' => 'Author' =>
@ -123,7 +123,7 @@ class MetasploitModule < Msf::Exploit::Remote
if res if res
if res.body =~ /You do not have permission to view the calendar/ if res.body =~ /You do not have permission to view the calendar/
fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required") fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required")
elsif res.body =~ /#{flag}/ elsif res.body =~ />#{flag}</
Exploit::CheckCode::Vulnerable Exploit::CheckCode::Vulnerable
else else
Exploit::CheckCode::Safe Exploit::CheckCode::Safe