Make msftidy compliant

bug/bundler_fix
jvazquez-r7 2013-08-23 15:14:13 -05:00
parent 413474f417
commit f3415f4147
1 changed files with 14 additions and 6 deletions

View File

@ -37,10 +37,18 @@ class Metasploit3 < Msf::Exploit::Local
ran the sudo command.
},
'License' => MSF_LICENSE,
'Author' => [ 'joev <jvennix[at]rapid7.com>'],
'Author' =>
[
'Todd C. Miller', # Vulnerability discovery
'joev <jvennix[at]rapid7.com>' # Metasploit module
],
'Platform' => [ 'osx' ],
'SessionTypes' => [ 'shell', 'meterpreter'],
'References' => [['CVE', '2013-1775']],
'References' =>
[
['CVE', '2013-1775'],
['OSVDB', '90677']
],
'Platform' => 'osx',
'Arch' => [ ARCH_X86, ARCH_X64, ARCH_CMD ],
'Targets' => [
@ -62,7 +70,8 @@ class Metasploit3 < Msf::Exploit::Local
]
],
'DefaultOptions' => { "PrependFork" => true },
'DefaultTarget' => 0
'DefaultTarget' => 0,
'DisclosureDate' => 'Feb 28 2013'
))
end
@ -73,7 +82,7 @@ class Metasploit3 < Msf::Exploit::Local
sudo_vn = $1
sudo_vn_parts = sudo_vn.split(/[\.p]/).map(&:to_i)
# check vn between 1.6.0 through 1.7.10p6
# and 1.8.0 through 1.8.6p6
# and 1.8.0 through 1.8.6p6
if not vn_bt(sudo_vn, VULNERABLE_VERSION_RANGES)
print_error "sudo version #{sudo_vn} not vulnerable."
return Exploit::CheckCode::Safe
@ -84,8 +93,7 @@ class Metasploit3 < Msf::Exploit::Local
end
if not user_in_admin_group?
print_error "sudo version is vulnerable, but user is not in the "+
"admin group (necessary to change the date)."
print_error "sudo version is vulnerable, but user is not in the admin group (necessary to change the date)."
Exploit::CheckCode::Safe
end
# one root for you sir