change WPVULNDBID to WPVDB

bug/bundler_fix
Christian Mehlmauer 2014-10-03 17:13:18 +02:00
parent 33b37727c7
commit f45b89503d
15 changed files with 20 additions and 20 deletions

View File

@ -108,7 +108,7 @@ class Msf::Module::SiteReference < Msf::Module::Reference
self.site = "http://www.kb.cert.org/vuls/id/#{in_ctx_val}"
elsif (in_ctx_id == 'ZDI')
self.site = "http://www.zerodayinitiative.com/advisories/ZDI-#{in_ctx_val}"
elsif (in_ctx_id == 'WPVULNDBID')
elsif (in_ctx_id == 'WPVDB')
self.site = "https://wpvulndb.com/vulnerabilities/#{in_ctx_val}"
elsif (in_ctx_id == 'URL')
self.site = in_ctx_val.to_s

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'URL', 'http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html' ],
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ],
[ 'WPVULNDBID', '7542' ]
[ 'WPVDB', '7542' ]
],
'DisclosureDate' => 'Aug 07 2014'
))

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
['URL', 'http://www.breaksec.com/?p=6362'],
['URL', 'http://mashable.com/2014/08/06/wordpress-xml-blowup-dos/'],
['URL', 'https://core.trac.wordpress.org/changeset/29404'],
['WPVULNDBID', '7526']
['WPVDB', '7526']
],
'DisclosureDate'=> 'Aug 6 2014'
))

View File

@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
[
['OSVDB', '88744'],
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242'],
['WPVULNDBID', '6621']
['WPVDB', '6621']
],
'Author' =>
[

View File

@ -33,12 +33,12 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2009-4140'],
['OSVDB', '59051'],
['EDB', '10532'],
['WPVULNDBID', '6787'],
['WPVULNDBID', '6788'],
['WPVULNDBID', '6789'],
['WPVULNDBID', '6790'],
['WPVULNDBID', '6791'],
['WPVULNDBID', '6792']
['WPVDB', '6787'],
['WPVDB', '6788'],
['WPVDB', '6789'],
['WPVDB', '6790'],
['WPVDB', '6791'],
['WPVDB', '6792']
],
'Payload' =>
{

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
['EDB', '18991'],
['OSVDB' '82652'],
['BID', '53805'],
['WPVULNDBID', '6231']
['WPVDB', '6231']
],
'Privileged' => false,
'Platform' => 'php',

View File

@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2005-2612'],
['OSVDB', '18672'],
['BID', '14533'],
['WPVULNDBID', '6034']
['WPVDB', '6034']
],
'Privileged' => false,
'Payload' =>

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ],
[ 'WPVULNDBID', '7441' ]
[ 'WPVDB', '7441' ]
],
'Privileged' => false,
'Platform' => ['php'],

View File

@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '59316' ],
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ],
[ 'WPVULNDBID', '6622' ]
[ 'WPVDB', '6622' ]
],
'Privileged' => false,
'Platform' => ['php'],

View File

@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['OSVDB', '87353'],
['URL', 'http://secunia.com/advisories/51037/'],
['WPVULNDBID', '6103']
['WPVDB', '6103']
],
'Privileged' => false,
'Payload' =>

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
['BID', '53809'],
['EDB', '18993'],
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-asset-manager-shell-upload-vulnerability.html'],
['WPVULNDBID', '6106']
['WPVDB', '6106']
],
'Platform' => 'php',
'Arch' => ARCH_PHP,

View File

@ -34,7 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
['CVE', '2012-4915'],
['OSVDB', '88891'],
['URL', 'http://secunia.com/advisories/50832'],
['WPVULNDBID', '6073']
['WPVDB', '6073']
],
'Privileged' => false,
'Payload' =>

View File

@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
['BID', '53787'],
['EDB', '18987'],
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-wp-property-shell-upload-vulnerability.html'],
['WPVULNDBID', '6225']
['WPVDB', '6225']
],
'Platform' => 'php',
'Arch' => ARCH_PHP,

View File

@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['URL', 'http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html'],
['WPVULNDBID', '7118']
['WPVDB', '7118']
],
'Privileged' => false,
'Platform' => ['php'],

View File

@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
['URL', 'http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html'],
['URL', 'http://www.mailpoet.com/security-update-part-2/'],
['URL', 'https://plugins.trac.wordpress.org/changeset/943427/wysija-newsletters/trunk/helpers/back.php'],
['WPVULNDBID', '6680']
['WPVDB', '6680']
],
'Privileged' => false,
'Platform' => ['php'],