revise spelling, add heartbleed and tidy checks

bug/bundler_fix
Brent Cook 2017-06-28 18:50:20 -04:00
parent 461ab4501d
commit d20036e0fb
16 changed files with 28 additions and 26 deletions

View File

@ -32,7 +32,7 @@ class MetasploitModule < Msf::Auxiliary
'lcamtuf' # CVE-2014-6278
],
'References' => [
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CVE', '2014-6278' ],
[ 'OSVDB', '112004' ],

View File

@ -33,8 +33,8 @@ class MetasploitModule < Msf::Auxiliary
],
'References' =>
[
[ 'AKA', 'doublepulsar' ],
[ 'AKA', 'eternalblue' ],
[ 'AKA', 'DOUBLEPULSAR' ],
[ 'AKA', 'ETERNALBLUE' ],
[ 'CVE', '2017-0143'],
[ 'CVE', '2017-0144'],
[ 'CVE', '2017-0145'],

View File

@ -130,13 +130,14 @@ class MetasploitModule < Msf::Auxiliary
],
'References' =>
[
['CVE', '2014-0160'],
['US-CERT-VU', '720951'],
['URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A'],
['URL', 'http://heartbleed.com/'],
['URL', 'https://github.com/FiloSottile/Heartbleed'],
['URL', 'https://gist.github.com/takeshixx/10107280'],
['URL', 'http://filippo.io/Heartbleed/']
[ 'AKA', 'Heartbleed' ],
[ 'CVE', '2014-0160' ],
[ 'US-CERT-VU', '720951' ],
[ 'URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A' ],
[ 'URL', 'http://heartbleed.com/' ],
[ 'URL', 'https://github.com/FiloSottile/Heartbleed' ],
[ 'URL', 'https://gist.github.com/takeshixx/10107280' ],
[ 'URL', 'http://filippo.io/Heartbleed/' ]
],
'DisclosureDate' => 'Apr 7 2014',
'License' => MSF_LICENSE,

View File

@ -36,7 +36,7 @@ class MetasploitModule < Msf::Auxiliary
],
'DefaultAction' => 'Service',
'References' => [
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CWE', '94' ],
[ 'OSVDB', '112004' ],

View File

@ -30,10 +30,11 @@ class MetasploitModule < Msf::Auxiliary
'DefaultAction' => 'Capture',
'References' =>
[
['CVE', '2014-0160'],
['US-CERT-VU', '720951'],
['URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A'],
['URL', 'http://heartbleed.com/']
[ 'AKA', 'Heartbleed' ],
[ 'CVE', '2014-0160' ],
[ 'US-CERT-VU', '720951' ],
[ 'URL', 'https://www.us-cert.gov/ncas/alerts/TA14-098A' ],
[ 'URL', 'http://heartbleed.com/' ]
],
'DisclosureDate' => 'Apr 07 2014'
)

View File

@ -18,7 +18,7 @@ class MetasploitModule < Msf::Exploit::Remote
},
'Author' => 'hdm',
'References' => [
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CWE', '94' ],
[ 'OSVDB', '112004' ],

View File

@ -24,7 +24,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'EDB', '34839' ],
[ 'CVE', '2014-6271']
],

View File

@ -27,7 +27,7 @@ class MetasploitModule < Msf::Exploit::Remote
],
'References' =>
[
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CWE', '94' ],
[ 'OSVDB', '112004' ],

View File

@ -25,7 +25,7 @@ class MetasploitModule < Msf::Exploit::Remote
'lcamtuf' # CVE-2014-6278
],
'References' => [
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CVE', '2014-6278' ],
[ 'CWE', '94' ],

View File

@ -22,7 +22,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Brendan Coles <bcoles[at]gmail.com>' # msf
],
'References' => [
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CVE', '2014-6278' ],
[ 'CWE', '94' ],

View File

@ -30,7 +30,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'OSVDB', '121681' ],
[ 'EDB', '36836' ],
[ 'URL', 'https://www.damballa.com/perlbotnado/' ],

View File

@ -33,7 +33,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'URL', 'https://conorpp.com/blog/a-close-look-at-an-operating-botnet/' ],
[ 'URL', 'https://twitter.com/MrMookie/status/673389285676965889' ], # Matt's discovery
[ 'URL', 'https://www.alienvault.com/open-threat-exchange/blog/elasticzombie-botnet-exploiting-elasticsearch-vulnerabilities' ] # details of what an fBot is

View File

@ -28,7 +28,7 @@ class MetasploitModule < Msf::Exploit::Local
],
'References' =>
[
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CWE', '94' ],
[ 'OSVDB', '112004' ],

View File

@ -32,7 +32,7 @@ class MetasploitModule < Msf::Exploit::Remote
'Arch' => ARCH_CMD,
'References' =>
[
[ 'AKA', 'shellshock' ],
[ 'AKA', 'Shellshock' ],
[ 'CVE', '2014-6271' ],
[ 'CWE', '94' ],
[ 'OSVDB', '112004' ],

View File

@ -47,7 +47,7 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'AKA', 'eternalblue' ],
[ 'AKA', 'ETERNALBLUE' ],
[ 'MSB', 'MS17-010' ],
[ 'CVE', '2017-0143' ],
[ 'CVE', '2017-0144' ],

View File

@ -184,7 +184,7 @@ class Msftidy
warn("Invalid WPVDB reference") if value !~ /^\d+$/
when 'PACKETSTORM'
warn("Invalid PACKETSTORM reference") if value !~ /^\d+$/
when 'URL'
when 'URL' || 'AKA'
if value =~ /^http:\/\/cvedetails\.com\/cve/
warn("Please use 'CVE' for '#{value}'")
elsif value =~ /^http:\/\/www\.securityfocus\.com\/bid\//