Polish up module
parent
fe907dfe98
commit
eeb87a3489
|
@ -6,6 +6,7 @@
|
|||
require 'msf/core'
|
||||
|
||||
class Metasploit3 < Msf::Exploit::Remote
|
||||
|
||||
Rank = ExcellentRanking
|
||||
|
||||
include Msf::HTTP::Wordpress
|
||||
|
@ -13,10 +14,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Wordpress RevSlider File Upload and Execute Vulnerability',
|
||||
'Name' => 'WordPress RevSlider File Upload and Execute Vulnerability',
|
||||
'Description' => %q{
|
||||
This module exploits an arbitrary PHP code upload in the WordPress ThemePunch
|
||||
Revolution Slider ( revslider ) plugin, version 3.0.95 and prior. The
|
||||
Slider Revolution (RevSlider) plugin, versions 3.0.95 and prior. The
|
||||
vulnerability allows for arbitrary file upload and remote code execution.
|
||||
},
|
||||
'Author' =>
|
||||
|
@ -27,10 +28,10 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['URL', 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/'],
|
||||
['OSVDB', '115118'],
|
||||
['EDB', '35385'],
|
||||
['WPVDB', '7954'],
|
||||
['OSVDB', '115118']
|
||||
['URL', 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => 'php',
|
||||
|
@ -91,6 +92,6 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
else
|
||||
fail_with(Failure::Unknown, 'ERROR')
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue