updated check and docs that 14.2 may not be vuln
parent
15a3d739c0
commit
9cb57d78d7
|
@ -4,6 +4,18 @@
|
||||||
Exploit-db: [edb](https://www.exploit-db.com/apps/2fa84367ba4f14afab9f51cd3e93606d-tiki-14.2.7z)
|
Exploit-db: [edb](https://www.exploit-db.com/apps/2fa84367ba4f14afab9f51cd3e93606d-tiki-14.2.7z)
|
||||||
Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts)
|
Archived Copy: [github](https://github.com/h00die/MSF-Testing-Scripts)
|
||||||
|
|
||||||
|
Of note, there is some discussion if 14.2 is vuln or not.
|
||||||
|
```
|
||||||
|
1. Exploit-DB says in the title (may be wrong) 14.2 is vuln.
|
||||||
|
2. The linked app Exploit-DB has is 14.2.
|
||||||
|
3. Its verified on Exploit-DB.
|
||||||
|
```
|
||||||
|
vs
|
||||||
|
```
|
||||||
|
1. Manual print statement testing from the PoC on 14.2 doesn't seem to be vuln
|
||||||
|
2. The [notice](https://tiki.org/article414-Important-Security-Fix-for-all-versions-of-Tiki) seems to say 14.2 is the update that fixes the problem
|
||||||
|
```
|
||||||
|
|
||||||
### Creating A Testing Environment
|
### Creating A Testing Environment
|
||||||
|
|
||||||
1. Create a fresh Ubuntu 16.04 w/ a LAMP install
|
1. Create a fresh Ubuntu 16.04 w/ a LAMP install
|
||||||
|
|
|
@ -20,7 +20,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
The calendar module is NOT enabled by default. When enbled,
|
The calendar module is NOT enabled by default. When enbled,
|
||||||
the default permissions are set to NOT allow anonymous users
|
the default permissions are set to NOT allow anonymous users
|
||||||
to access.
|
to access.
|
||||||
Vulnerable versions: <=14.2, <=12.5 LTS, <=9.11 LTS and <=6.15
|
Vulnerable versions: <=14.1, <=12.4 LTS, <=9.10 LTS and <=6.14
|
||||||
Verified/Tested against 14.1
|
Verified/Tested against 14.1
|
||||||
),
|
),
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
@ -123,7 +123,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||||
if res
|
if res
|
||||||
if res.body =~ /You do not have permission to view the calendar/
|
if res.body =~ /You do not have permission to view the calendar/
|
||||||
fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required")
|
fail_with(Failure::NoAccess, "#{peer} - Additional Permissions Required")
|
||||||
elsif res.body =~ /#{flag}/
|
elsif res.body =~ />#{flag}</
|
||||||
Exploit::CheckCode::Vulnerable
|
Exploit::CheckCode::Vulnerable
|
||||||
else
|
else
|
||||||
Exploit::CheckCode::Safe
|
Exploit::CheckCode::Safe
|
||||||
|
|
Loading…
Reference in New Issue