automatic module_metadata_base.json update
parent
6765ed80d6
commit
dc5a3052b7
|
@ -100489,11 +100489,13 @@
|
|||
"disclosure_date": "2014-06-19",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Nicholas Nam <nick@executionflow.org>"
|
||||
"Nicholas Nam <nick@executionflow.org>",
|
||||
"Imran E. Dawoodjee <imrandawoodjee.infosec@gmail.com>"
|
||||
],
|
||||
"description": "This module exploits the embedded Lua interpreter in the admin web interface for\n versions 4.3.8 and below. When supplying a specially crafted HTTP POST request\n an attacker can use os.execute() to execute arbitrary system commands on\n the target with SYSTEM privileges.",
|
||||
"description": "This module exploits the embedded Lua interpreter in the admin web interface for\n versions 3.0.0 and above. When supplying a specially crafted HTTP POST request\n an attacker can use os.execute() to execute arbitrary system commands on\n the target with SYSTEM privileges.",
|
||||
"references": [
|
||||
"URL-http://www.wftpserver.com"
|
||||
"URL-http://www.wftpserver.com",
|
||||
"URL-https://www.wftpserver.com/help/ftpserver/index.html?administrator_console.htm"
|
||||
],
|
||||
"platform": "Windows",
|
||||
"arch": "x86",
|
||||
|
@ -100514,9 +100516,9 @@
|
|||
"https"
|
||||
],
|
||||
"targets": [
|
||||
"Windows VBS Stager"
|
||||
"Wing FTP Server >= 3.0.0"
|
||||
],
|
||||
"mod_time": "2017-07-24 06:26:21 +0000",
|
||||
"mod_time": "2019-02-10 14:26:13 +0000",
|
||||
"path": "/modules/exploits/windows/ftp/wing_ftp_admin_exec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/ftp/wing_ftp_admin_exec",
|
||||
|
|
Loading…
Reference in New Issue