Title enhancement, OSVDB refs
parent
1a7a5c2977
commit
c01fc829ab
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Symantec Endpoint Protection Manager Remote Command Execution',
|
||||
'Name' => 'Symantec Endpoint Protection Manager /servlet/ConsoleServlet Remote Command Execution',
|
||||
'Description' => %q{
|
||||
This module exploits XXE and SQL injection flaws in Symantec Endpoint Protection Manager
|
||||
versions 11.0, 12.0 and 12.1. When supplying a specially crafted XML external entity (XXE) request an attacker
|
||||
|
@ -35,6 +35,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'CVE', '2013-5014' ],
|
||||
[ 'CVE', '2013-5015' ],
|
||||
[ 'EDB', '31853'],
|
||||
[ 'OSVDB', '103305'],
|
||||
[ 'OSVDB', '103306'],
|
||||
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140218-0_Symantec_Endpoint_Protection_Multiple_critical_vulnerabilities_wo_poc_v10.txt' ]
|
||||
],
|
||||
'Arch' => ARCH_X86,
|
||||
|
|
Loading…
Reference in New Issue