Merge remote-tracking branch 'origin/pr/2' into ms08_067_check
commit
a2958d467c
|
@ -14,8 +14,8 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
def initialize
|
def initialize
|
||||||
super(
|
super(
|
||||||
'Name' => 'Scanner for MS08-067',
|
'Name' => 'MS08-067 Scanner',
|
||||||
'Description' => 'This module simply uses the check in the ms08_067_netapi.rc to scan a network for it',
|
'Description' => 'This module uses the check in ms08_067_netapi to scan a network for the vulnerability.',
|
||||||
'References' =>
|
'References' =>
|
||||||
[
|
[
|
||||||
[ 'CVE', '2008-4250'],
|
[ 'CVE', '2008-4250'],
|
||||||
|
@ -35,7 +35,6 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'DefaultOptions' => {}
|
'DefaultOptions' => {}
|
||||||
)
|
)
|
||||||
#deregister_options('MAILFROM', 'MAILTO')
|
|
||||||
register_options(
|
register_options(
|
||||||
[
|
[
|
||||||
OptString.new('SMBPIPE', [ true, "The pipe name to use (BROWSER, SRVSVC)", 'BROWSER']),
|
OptString.new('SMBPIPE', [ true, "The pipe name to use (BROWSER, SRVSVC)", 'BROWSER']),
|
||||||
|
@ -45,6 +44,12 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
def run_host(ip)
|
def run_host(ip)
|
||||||
if check_vuln == Msf::Exploit::CheckCode::Vulnerable
|
if check_vuln == Msf::Exploit::CheckCode::Vulnerable
|
||||||
print_good("#{ip}:#{rport} - MS08-067 VULNERABLE")
|
print_good("#{ip}:#{rport} - MS08-067 VULNERABLE")
|
||||||
|
report_vuln({
|
||||||
|
:host => ip,
|
||||||
|
:name => "MS08-067",
|
||||||
|
:info => "Vulnerability in Server service could allow remote code execution",
|
||||||
|
:refs => self.references
|
||||||
|
})
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue