revise spelling, add heartbleed and tidy checks
parent
461ab4501d
commit
d20036e0fb
|
@ -32,7 +32,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
'lcamtuf' # CVE-2014-6278
|
||||
],
|
||||
'References' => [
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CVE', '2014-6278' ],
|
||||
[ 'OSVDB', '112004' ],
|
||||
|
|
|
@ -33,8 +33,8 @@ class MetasploitModule < Msf::Auxiliary
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'doublepulsar' ],
|
||||
[ 'AKA', 'eternalblue' ],
|
||||
[ 'AKA', 'DOUBLEPULSAR' ],
|
||||
[ 'AKA', 'ETERNALBLUE' ],
|
||||
[ 'CVE', '2017-0143'],
|
||||
[ 'CVE', '2017-0144'],
|
||||
[ 'CVE', '2017-0145'],
|
||||
|
|
|
@ -130,13 +130,14 @@ class MetasploitModule < Msf::Auxiliary
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2014-0160'],
|
||||
['US-CERT-VU', '720951'],
|
||||
['URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A'],
|
||||
['URL', 'http://heartbleed.com/'],
|
||||
['URL', 'https://github.com/FiloSottile/Heartbleed'],
|
||||
['URL', 'https://gist.github.com/takeshixx/10107280'],
|
||||
['URL', 'http://filippo.io/Heartbleed/']
|
||||
[ 'AKA', 'Heartbleed' ],
|
||||
[ 'CVE', '2014-0160' ],
|
||||
[ 'US-CERT-VU', '720951' ],
|
||||
[ 'URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A' ],
|
||||
[ 'URL', 'http://heartbleed.com/' ],
|
||||
[ 'URL', 'https://github.com/FiloSottile/Heartbleed' ],
|
||||
[ 'URL', 'https://gist.github.com/takeshixx/10107280' ],
|
||||
[ 'URL', 'http://filippo.io/Heartbleed/' ]
|
||||
],
|
||||
'DisclosureDate' => 'Apr 7 2014',
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -36,7 +36,7 @@ class MetasploitModule < Msf::Auxiliary
|
|||
],
|
||||
'DefaultAction' => 'Service',
|
||||
'References' => [
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CWE', '94' ],
|
||||
[ 'OSVDB', '112004' ],
|
||||
|
|
|
@ -30,10 +30,11 @@ class MetasploitModule < Msf::Auxiliary
|
|||
'DefaultAction' => 'Capture',
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2014-0160'],
|
||||
['US-CERT-VU', '720951'],
|
||||
['URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A'],
|
||||
['URL', 'http://heartbleed.com/']
|
||||
[ 'AKA', 'Heartbleed' ],
|
||||
[ 'CVE', '2014-0160' ],
|
||||
[ 'US-CERT-VU', '720951' ],
|
||||
[ 'URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A' ],
|
||||
[ 'URL', 'http://heartbleed.com/' ]
|
||||
],
|
||||
'DisclosureDate' => 'Apr 07 2014'
|
||||
)
|
||||
|
|
|
@ -18,7 +18,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
},
|
||||
'Author' => 'hdm',
|
||||
'References' => [
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CWE', '94' ],
|
||||
[ 'OSVDB', '112004' ],
|
||||
|
|
|
@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'EDB', '34839' ],
|
||||
[ 'CVE', '2014-6271']
|
||||
],
|
||||
|
|
|
@ -27,7 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CWE', '94' ],
|
||||
[ 'OSVDB', '112004' ],
|
||||
|
|
|
@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'lcamtuf' # CVE-2014-6278
|
||||
],
|
||||
'References' => [
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CVE', '2014-6278' ],
|
||||
[ 'CWE', '94' ],
|
||||
|
|
|
@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Brendan Coles <bcoles[at]gmail.com>' # msf
|
||||
],
|
||||
'References' => [
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CVE', '2014-6278' ],
|
||||
[ 'CWE', '94' ],
|
||||
|
|
|
@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'OSVDB', '121681' ],
|
||||
[ 'EDB', '36836' ],
|
||||
[ 'URL', 'https://www.damballa.com/perlbotnado/' ],
|
||||
|
|
|
@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'URL', 'https://conorpp.com/blog/a-close-look-at-an-operating-botnet/' ],
|
||||
[ 'URL', 'https://twitter.com/MrMookie/status/673389285676965889' ], # Matt's discovery
|
||||
[ 'URL', 'https://www.alienvault.com/open-threat-exchange/blog/elasticzombie-botnet-exploiting-elasticsearch-vulnerabilities' ] # details of what an fBot is
|
||||
|
|
|
@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CWE', '94' ],
|
||||
[ 'OSVDB', '112004' ],
|
||||
|
|
|
@ -32,7 +32,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'Arch' => ARCH_CMD,
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'shellshock' ],
|
||||
[ 'AKA', 'Shellshock' ],
|
||||
[ 'CVE', '2014-6271' ],
|
||||
[ 'CWE', '94' ],
|
||||
[ 'OSVDB', '112004' ],
|
||||
|
|
|
@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'AKA', 'eternalblue' ],
|
||||
[ 'AKA', 'ETERNALBLUE' ],
|
||||
[ 'MSB', 'MS17-010' ],
|
||||
[ 'CVE', '2017-0143' ],
|
||||
[ 'CVE', '2017-0144' ],
|
||||
|
|
|
@ -184,7 +184,7 @@ class Msftidy
|
|||
warn("Invalid WPVDB reference") if value !~ /^\d+$/
|
||||
when 'PACKETSTORM'
|
||||
warn("Invalid PACKETSTORM reference") if value !~ /^\d+$/
|
||||
when 'URL'
|
||||
when 'URL' || 'AKA'
|
||||
if value =~ /^http:\/\/cvedetails\.com\/cve/
|
||||
warn("Please use 'CVE' for '#{value}'")
|
||||
elsif value =~ /^http:\/\/www\.securityfocus\.com\/bid\//
|
||||
|
|
Loading…
Reference in New Issue