Minor final cleanup
parent
b1a6b28af9
commit
ceaa99e64e
|
@ -25,28 +25,27 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
'unknown', # Vulnerability discovery
|
||||
'Fabian Braeunlein <fabian@breaking.systems>', #Metasploit PoC with wget method
|
||||
'Michael Messner <devnull@s3cur1ty.de>', # Metasploit module
|
||||
'juan vazquez' # minor help with msf module
|
||||
'Michael Messner <devnull@s3cur1ty.de>' # Metasploit module
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'OSVDB', '103289' ],
|
||||
[ 'BID', '65520' ],
|
||||
[ 'URL', 'http://www.kapple.de/?p=75' ], #vulnerability details with PoC
|
||||
[ 'URL', 'https://www.speckmarschall.de/hoere.htm' ], #probably the first published details (now censored)
|
||||
[ 'URL', 'http://pastebin.com/GnMKGmZ2' ], #published details uncensored from speckmarschall
|
||||
[ 'URL', 'http://www.avm.de/en/Sicherheit/update_list.html' ], #vendor site with a list of vulnerable devices
|
||||
[ 'URL', 'http://breaking.systems/blog/2014/04/avm-fritzbox-root-rce-from-patch-to-metasploit-module-ii' ], #wirteup with PoC
|
||||
[ 'BID', '65520' ],
|
||||
[ 'OSVDB', '103289' ]
|
||||
[ 'URL', 'http://breaking.systems/blog/2014/04/avm-fritzbox-root-rce-from-patch-to-metasploit-module-ii' ] #wirteup with PoC
|
||||
],
|
||||
'DisclosureDate' => 'Feb 11 2014',
|
||||
'Privileged' => true,
|
||||
'Platform' => %w{ linux },
|
||||
'Platform' => 'linux',
|
||||
'Arch' => ARCH_MIPSLE,
|
||||
'Payload' =>
|
||||
{
|
||||
'DisableNops' => true
|
||||
},
|
||||
'Arch' => ARCH_MIPSLE,
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Automatic Targeting', { } ],
|
||||
|
|
Loading…
Reference in New Issue