automatic module_metadata_base.json update

master
Metasploit 2019-03-05 10:50:41 -08:00
parent 6765ed80d6
commit dc5a3052b7
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 7 additions and 5 deletions

View File

@ -100489,11 +100489,13 @@
"disclosure_date": "2014-06-19",
"type": "exploit",
"author": [
"Nicholas Nam <nick@executionflow.org>"
"Nicholas Nam <nick@executionflow.org>",
"Imran E. Dawoodjee <imrandawoodjee.infosec@gmail.com>"
],
"description": "This module exploits the embedded Lua interpreter in the admin web interface for\n versions 4.3.8 and below. When supplying a specially crafted HTTP POST request\n an attacker can use os.execute() to execute arbitrary system commands on\n the target with SYSTEM privileges.",
"description": "This module exploits the embedded Lua interpreter in the admin web interface for\n versions 3.0.0 and above. When supplying a specially crafted HTTP POST request\n an attacker can use os.execute() to execute arbitrary system commands on\n the target with SYSTEM privileges.",
"references": [
"URL-http://www.wftpserver.com"
"URL-http://www.wftpserver.com",
"URL-https://www.wftpserver.com/help/ftpserver/index.html?administrator_console.htm"
],
"platform": "Windows",
"arch": "x86",
@ -100514,9 +100516,9 @@
"https"
],
"targets": [
"Windows VBS Stager"
"Wing FTP Server >= 3.0.0"
],
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2019-02-10 14:26:13 +0000",
"path": "/modules/exploits/windows/ftp/wing_ftp_admin_exec.rb",
"is_install_path": true,
"ref_name": "windows/ftp/wing_ftp_admin_exec",