From dc5a3052b7dc9c8b87d22da832e2b92d435f0094 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Tue, 5 Mar 2019 10:50:41 -0800 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index a49432cb0b..a29a4a61c3 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -100489,11 +100489,13 @@ "disclosure_date": "2014-06-19", "type": "exploit", "author": [ - "Nicholas Nam " + "Nicholas Nam ", + "Imran E. Dawoodjee " ], - "description": "This module exploits the embedded Lua interpreter in the admin web interface for\n versions 4.3.8 and below. When supplying a specially crafted HTTP POST request\n an attacker can use os.execute() to execute arbitrary system commands on\n the target with SYSTEM privileges.", + "description": "This module exploits the embedded Lua interpreter in the admin web interface for\n versions 3.0.0 and above. When supplying a specially crafted HTTP POST request\n an attacker can use os.execute() to execute arbitrary system commands on\n the target with SYSTEM privileges.", "references": [ - "URL-http://www.wftpserver.com" + "URL-http://www.wftpserver.com", + "URL-https://www.wftpserver.com/help/ftpserver/index.html?administrator_console.htm" ], "platform": "Windows", "arch": "x86", @@ -100514,9 +100516,9 @@ "https" ], "targets": [ - "Windows VBS Stager" + "Wing FTP Server >= 3.0.0" ], - "mod_time": "2017-07-24 06:26:21 +0000", + "mod_time": "2019-02-10 14:26:13 +0000", "path": "/modules/exploits/windows/ftp/wing_ftp_admin_exec.rb", "is_install_path": true, "ref_name": "windows/ftp/wing_ftp_admin_exec",