change WPVULNDBID to WPVDB
parent
33b37727c7
commit
f45b89503d
|
@ -108,7 +108,7 @@ class Msf::Module::SiteReference < Msf::Module::Reference
|
|||
self.site = "http://www.kb.cert.org/vuls/id/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'ZDI')
|
||||
self.site = "http://www.zerodayinitiative.com/advisories/ZDI-#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'WPVULNDBID')
|
||||
elsif (in_ctx_id == 'WPVDB')
|
||||
self.site = "https://wpvulndb.com/vulnerabilities/#{in_ctx_val}"
|
||||
elsif (in_ctx_id == 'URL')
|
||||
self.site = in_ctx_val.to_s
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'URL', 'http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html' ],
|
||||
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ],
|
||||
[ 'WPVULNDBID', '7542' ]
|
||||
[ 'WPVDB', '7542' ]
|
||||
],
|
||||
'DisclosureDate' => 'Aug 07 2014'
|
||||
))
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
['URL', 'http://www.breaksec.com/?p=6362'],
|
||||
['URL', 'http://mashable.com/2014/08/06/wordpress-xml-blowup-dos/'],
|
||||
['URL', 'https://core.trac.wordpress.org/changeset/29404'],
|
||||
['WPVULNDBID', '7526']
|
||||
['WPVDB', '7526']
|
||||
],
|
||||
'DisclosureDate'=> 'Aug 6 2014'
|
||||
))
|
||||
|
|
|
@ -26,7 +26,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
['OSVDB', '88744'],
|
||||
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242'],
|
||||
['WPVULNDBID', '6621']
|
||||
['WPVDB', '6621']
|
||||
],
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -33,12 +33,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2009-4140'],
|
||||
['OSVDB', '59051'],
|
||||
['EDB', '10532'],
|
||||
['WPVULNDBID', '6787'],
|
||||
['WPVULNDBID', '6788'],
|
||||
['WPVULNDBID', '6789'],
|
||||
['WPVULNDBID', '6790'],
|
||||
['WPVULNDBID', '6791'],
|
||||
['WPVULNDBID', '6792']
|
||||
['WPVDB', '6787'],
|
||||
['WPVDB', '6788'],
|
||||
['WPVDB', '6789'],
|
||||
['WPVDB', '6790'],
|
||||
['WPVDB', '6791'],
|
||||
['WPVDB', '6792']
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['EDB', '18991'],
|
||||
['OSVDB' '82652'],
|
||||
['BID', '53805'],
|
||||
['WPVULNDBID', '6231']
|
||||
['WPVDB', '6231']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => 'php',
|
||||
|
|
|
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2005-2612'],
|
||||
['OSVDB', '18672'],
|
||||
['BID', '14533'],
|
||||
['WPVULNDBID', '6034']
|
||||
['WPVDB', '6034']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ],
|
||||
[ 'WPVULNDBID', '7441' ]
|
||||
[ 'WPVDB', '7441' ]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
|
@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'BID', '59316' ],
|
||||
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],
|
||||
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ],
|
||||
[ 'WPVULNDBID', '6622' ]
|
||||
[ 'WPVDB', '6622' ]
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
|
@ -30,7 +30,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['OSVDB', '87353'],
|
||||
['URL', 'http://secunia.com/advisories/51037/'],
|
||||
['WPVULNDBID', '6103']
|
||||
['WPVDB', '6103']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['BID', '53809'],
|
||||
['EDB', '18993'],
|
||||
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-asset-manager-shell-upload-vulnerability.html'],
|
||||
['WPVULNDBID', '6106']
|
||||
['WPVDB', '6106']
|
||||
],
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -34,7 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['CVE', '2012-4915'],
|
||||
['OSVDB', '88891'],
|
||||
['URL', 'http://secunia.com/advisories/50832'],
|
||||
['WPVULNDBID', '6073']
|
||||
['WPVDB', '6073']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Payload' =>
|
||||
|
|
|
@ -32,7 +32,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['BID', '53787'],
|
||||
['EDB', '18987'],
|
||||
['URL', 'http://www.opensyscom.fr/Actualites/wordpress-plugins-wp-property-shell-upload-vulnerability.html'],
|
||||
['WPVULNDBID', '6225']
|
||||
['WPVDB', '6225']
|
||||
],
|
||||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
|
|
|
@ -35,7 +35,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
['URL', 'http://blog.sucuri.net/2014/07/disclosure-insecure-nonce-generation-in-wptouch.html'],
|
||||
['WPVULNDBID', '7118']
|
||||
['WPVDB', '7118']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
|
@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['URL', 'http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html'],
|
||||
['URL', 'http://www.mailpoet.com/security-update-part-2/'],
|
||||
['URL', 'https://plugins.trac.wordpress.org/changeset/943427/wysija-newsletters/trunk/helpers/back.php'],
|
||||
['WPVULNDBID', '6680']
|
||||
['WPVDB', '6680']
|
||||
],
|
||||
'Privileged' => false,
|
||||
'Platform' => ['php'],
|
||||
|
|
Loading…
Reference in New Issue