Land #3136, release fixes

bug/bundler_fix
William Vu 2014-03-24 12:24:07 -05:00
commit f12171d1a0
No known key found for this signature in database
GPG Key ID: E761DCB4C1629024
6 changed files with 15 additions and 16 deletions

View File

@ -84,7 +84,7 @@ class Metasploit3 < Msf::Auxiliary
file = datastore['FILEPATH'].unpack("H*")[0] file = datastore['FILEPATH'].unpack("H*")[0]
catid = datastore['CATEGORYID'] catid = datastore['CATEGORYID']
payload = catid.to_s payload = catid.to_s
payload << ") UNION ALL SELECT CONCAT(0x#{front_marker.unpack('H*')[0]}" payload << ") UNION ALL SELECT CONCAT(0x#{front_marker.unpack('H*')[0]}"
payload << ",IFNULL(CAST(HEX(LOAD_FILE(" payload << ",IFNULL(CAST(HEX(LOAD_FILE("
payload << "0x#{file})) AS CHAR),0x20),0x#{back_marker.unpack('H*')[0]})#" payload << "0x#{file})) AS CHAR),0x20),0x#{back_marker.unpack('H*')[0]})#"

View File

@ -15,9 +15,10 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => "Quantum vmPRO Backdoor Command", 'Name' => "Quantum vmPRO Backdoor Command",
'Description' => %q{ 'Description' => %q{
This module abuses a backdoor command in vmPRO 3.1.2. Any user, even without admin This module abuses a backdoor command in Quantum vmPRO. Any user, even one without admin
privileges, can get access to the restricted SSH shell. By using the hidden backdoor privileges, can get access to the restricted SSH shell. By using the hidden backdoor
"shell-escape" command it's possible to drop to a real root bash shell. "shell-escape" command it's possible to drop to a real root bash shell. This module
has been tested successfully on Quantum vmPRO 3.1.2.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>

View File

@ -13,15 +13,14 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info={}) def initialize(info={})
super(update_info(info, super(update_info(info,
'Name' => "Array Networks vAPV and vxAG Private Key Privelege Escalation Code Execution", 'Name' => "Array Networks vAPV and vxAG Private Key Privilege Escalation Code Execution",
'Description' => %q{ 'Description' => %q{
This module exploits a default hardcoded private SSH key or default hardcoded This module exploits a default hardcoded private SSH key or default hardcoded
login and password in the vAPV 8.3.2.17 and vxAG 9.2.0.34 appliances made login and password in the vAPV 8.3.2.17 and vxAG 9.2.0.34 appliances made
by Array Networks. After logged in as the unprivileged user, it's possible to by Array Networks. After logged in as the unprivileged user, it's possible to modify
modify the world writable file /ca/bin/monitor.sh with our arbitrary code. the world-writable file /ca/bin/monitor.sh with attacker-supplied arbitrary code.
Execution of the arbitrary code is possible by using the backend tool, running Execution is possible by using the backend tool, running setuid, to turn the debug
setuid, to turn the debug monitoring on. This makes it possible to trigger our monitoring on. This makes it possible to trigger a payload with root privileges.
payload with root privileges.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>
@ -79,7 +78,6 @@ class Metasploit3 < Msf::Exploit::Remote
datastore['RHOST'] datastore['RHOST']
end end
def rport def rport
datastore['RPORT'] datastore['RPORT']
end end
@ -118,7 +116,7 @@ class Metasploit3 < Msf::Exploit::Remote
end end
def login_user_pass(user, pass) def login_user_pass(user, pass)
print_status("#{rhost}:#{rport} - Attempt to login with '#{user}:#{pass}'") print_status("#{rhost}:#{rport} - Attempting to login with '#{user}:#{pass}'")
opts = { opts = {
:auth_methods => ['password', 'keyboard-interactive'], :auth_methods => ['password', 'keyboard-interactive'],

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info, super(update_info(info,
'Name' => "FreePBX config.php Remote Code Execution", 'Name' => "FreePBX config.php Remote Code Execution",
'Description' => %q{ 'Description' => %q{
This module exploits a vulnerability found in FreePBX version 2.9, 2.10, 2.11. This module exploits a vulnerability found in FreePBX version 2.9, 2.10, and 2.11.
It's possible to inject arbitrary PHP functions and commands in the "/admin/config.php" It's possible to inject arbitrary PHP functions and commands in the "/admin/config.php"
parameters "function" and "args". parameters "function" and "args".
}, },

View File

@ -15,10 +15,10 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => "MS14-012 Internet Explorer TextRange Use-After-Free", 'Name' => "MS14-012 Internet Explorer TextRange Use-After-Free",
'Description' => %q{ 'Description' => %q{
This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw
was most likely introduced back in 2013, therefore only certain builds of MSHTML are was most likely introduced in 2013, therefore only certain builds of MSHTML are
affected. In our testing with IE9, these vulnerable builds appear to be between affected. In our testing with IE9, these vulnerable builds appear to be between
9.0.8112.16496 and 9.0.8112.16533, which implies August 2013 until early March 2014 9.0.8112.16496 and 9.0.8112.16533, which implies the vulnerability shipped between
(before the patch). August 2013, when it was introduced, until the fix issued in early March 2014.
}, },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => 'Author' =>

View File

@ -13,7 +13,7 @@ class Metasploit4 < Msf::Post
def initialize(info={}) def initialize(info={})
super( update_info( info, super( update_info( info,
'Name' => 'Testing Get Envs', 'Name' => 'Test Post::Common Get Envs',
'Description' => %q{ This module will test Post::Common get envs API methods }, 'Description' => %q{ This module will test Post::Common get envs API methods },
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Author' => [ 'Ben Campbell'], 'Author' => [ 'Ben Campbell'],