various fixes, mostly consistency changes to disclosure dates
git-svn-id: file:///home/svn/framework3/trunk@9525 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
30f3e8fda2
commit
fa505a4069
|
@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20010627-ios-http-level.shtml'],
|
||||
[ 'OSVDB', '578' ],
|
||||
],
|
||||
'DisclosureDate' => 'June 27 2001'))
|
||||
'DisclosureDate' => 'Jun 27 2001'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
'Name' => 'Oracle URL Download',
|
||||
'Description' => %q{
|
||||
This module will create a java class which enables the download
|
||||
of a binary from a webserver to the oracle filesystem.
|
||||
of a binary from a webserver to the oracle filesystem.
|
||||
},
|
||||
'Author' => [ 'CG' ],
|
||||
'License' => MSF_LICENSE,
|
||||
|
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[
|
||||
[ 'URL', 'http://www.argeniss.com/research/oraclesqlinj.zip' ],
|
||||
],
|
||||
# Where did this date come from? -jjd
|
||||
'DisclosureDate' => 'Feb 2003'))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20000514-ios-http-server.shtml'],
|
||||
[ 'OSVDB', '1302' ],
|
||||
],
|
||||
'DisclosureDate' => 'April 26 2000'))
|
||||
'DisclosureDate' => 'Apr 26 2000'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'OSVDB', '37643'],
|
||||
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],
|
||||
],
|
||||
'DisclosureDate' => 'February 22 2007'))
|
||||
'DisclosureDate' => 'Feb 22 2007'))
|
||||
|
||||
register_options([
|
||||
OptInt.new('SPORT', [true, 'The source port used to send the malicious HTTP response', 80]),
|
||||
|
|
|
@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ],
|
||||
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
|
||||
],
|
||||
'DisclosureDate' => 'Nov 11, 2008'))
|
||||
'DisclosureDate' => 'Oct 13 2008'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
|
|||
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
|
||||
|
||||
],
|
||||
'DisclosureDate' => 'Jan 2009'))
|
||||
'DisclosureDate' => 'Oct 13 2008'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -21,21 +21,21 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Apple OS X iTunes 8.1.1 ITMS Overflow',
|
||||
'Description' => %q{
|
||||
This modules exploits a stack-based buffer overflow in iTunes
|
||||
This modules exploits a stack-based buffer overflow in iTunes
|
||||
itms:// URL parsing. It is accessible from the browser and
|
||||
in Safari, itms urls will be opened in iTunes automatically.
|
||||
Because iTunes is multithreaded, only vfork-based payloads should
|
||||
be used.
|
||||
},
|
||||
'Author' => [ 'Will Drewry <redpig@dataspill.org>' ],
|
||||
'Author' => [ 'Will Drewry <redpig [at] dataspill.org>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2009-0950' ],
|
||||
['OSVDB', '54833'],
|
||||
['URL', 'http://support.apple.com/kb/HT3592'],
|
||||
['URL', 'http://redpig.dataspill.org/2009/05/drive-by-attack-for-itunes-811.html'],
|
||||
[ 'OSVDB', '54833' ],
|
||||
[ 'URL', 'http://support.apple.com/kb/HT3592' ],
|
||||
[ 'URL', 'http://redpig.dataspill.org/2009/05/drive-by-attack-for-itunes-811.html' ]
|
||||
],
|
||||
'Payload' =>
|
||||
{
|
||||
|
@ -62,7 +62,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
]
|
||||
],
|
||||
'DisclosureDate' => 'June 1, 2009',
|
||||
'DisclosureDate' => 'Jun 01 2009',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
'Targets' => [[ 'Automatic', { }]],
|
||||
'DisclosureDate' => 'July 22 2009',
|
||||
'DisclosureDate' => 'Jul 22 2009',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Platform' => 'php',
|
||||
'Arch' => ARCH_PHP,
|
||||
'Targets' => [[ 'Automatic', { }]],
|
||||
'DisclosureDate' => 'August 25 2005',
|
||||
'DisclosureDate' => 'Aug 25 2005',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
],
|
||||
],
|
||||
'DisclosureDate' => '',
|
||||
'DisclosureDate' => 'Apr 11 2005',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -56,7 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Adobe Reader v9.0.0 (Windows XP SP3 English)', { 'Ret' => 0x0166B550 } ], # Ret * 5 == 0x07018A90 (BIB.dll)
|
||||
[ 'Adobe Reader v8.1.2 (Windows XP SP2 English)', { 'Ret' => 0x9B004870 } ], # Ret * 5 == 0x07017A30 (BIB.dll)
|
||||
],
|
||||
'DisclosureDate' => 'Feb 2009',
|
||||
'DisclosureDate' => 'Feb 19 2009',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -29,8 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2006-5650' ],
|
||||
[ 'OSVDB', '30220'],
|
||||
[ 'BID', '20930' ],
|
||||
[ 'OSVDB', '30220' ],
|
||||
[ 'BID', '20930' ],
|
||||
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-06-037/' ],
|
||||
],
|
||||
'Payload' =>
|
||||
|
@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Automatic', { } ],
|
||||
],
|
||||
'DisclosureDate' => 'Nov 6, 2006',
|
||||
'DisclosureDate' => 'Nov 06 2006',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Automatic', { }],
|
||||
],
|
||||
# 'DisclosureDate' => 'Mmm DD 2009',
|
||||
'DisclosureDate' => 'Nov 14 2009',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Windows XP SP2-SP3 IE 6.0/7.0', { 'Ret' => 0x0A0A0A0A } ]
|
||||
],
|
||||
'DisclosureDate' => 'March 16 2008',
|
||||
'DisclosureDate' => 'Mar 16 2008',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# Tested ok patrickw 20090303
|
||||
[ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0A0A0A0A } ],
|
||||
],
|
||||
'DisclosureDate' => 'June 6 2007',
|
||||
'DisclosureDate' => 'Jun 6 2007',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows 2000 Pro English All', { 'Ret' => 0x75022ac4 } ],
|
||||
|
||||
],
|
||||
'DisclosureDate' => 'July 05 2007',
|
||||
'DisclosureDate' => 'Jul 05 2007',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Windows XP Pro SP2 English', { 'Offset' => 483, 'Ret' => 0x7c941eed } ],
|
||||
],
|
||||
'DisclosureDate' => 'July 7 2007',
|
||||
'DisclosureDate' => 'Jul 7 2007',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -66,7 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Automatic', { } ]
|
||||
],
|
||||
'DisclosureDate' => 'June 09, 2010',
|
||||
'DisclosureDate' => 'Jun 09 2010',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0A0A0A0A } ]
|
||||
],
|
||||
'DisclosureDate' => 'June 16 2008',
|
||||
'DisclosureDate' => 'Jun 16 2008',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Windows XP SP0-SP3 / IE 6.0 SP0-2 & IE 7.0 English', { 'Offset' => 32, 'Ret' => 0x0C0C0C0C } ]
|
||||
],
|
||||
'DisclosureDate' => 'March 8 2008',
|
||||
'DisclosureDate' => 'Mar 8 2008',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Automatic', { } ],
|
||||
],
|
||||
'DisclosureDate' => 'Sep 7, 2009',
|
||||
'DisclosureDate' => 'Sep 07 2009',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Automatic', { } ],
|
||||
],
|
||||
'DisclosureDate' => 'Jan 15, 2009',
|
||||
'DisclosureDate' => 'Jan 15 2009',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
end
|
||||
|
|
|
@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Tumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow',
|
||||
'Description' => %q{
|
||||
This module exploits a stack buffer overflow in the vcst_eu.dll
|
||||
This module exploits a stack buffer overflow in the vcst_eu.dll
|
||||
FileTransfer Module (1.0.0.5) ActiveX control in the Tumbleweed
|
||||
SecureTransport suite. By sending an overly long string to the
|
||||
TransferFile() 'remotefile' function, an attacker may be able
|
||||
|
@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2008-1724'],
|
||||
[ 'OSVDB', '44252'],
|
||||
[ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ],
|
||||
[ 'CVE', '2008-1724' ],
|
||||
[ 'OSVDB', '44252' ],
|
||||
[ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ]
|
||||
],
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
|
@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows 2000 Pro English', { 'Ret' => 0x75022ac4 } ],
|
||||
[ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ],
|
||||
],
|
||||
'DisclosureDate' => '07 Apr 2008',
|
||||
'DisclosureDate' => 'Apr 07 2008',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0c0c0c0c } ]
|
||||
],
|
||||
'DisclosureDate' => 'June 16 2008',
|
||||
'DisclosureDate' => 'Jun 16 2008',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows XP SP0/SP1 Pro English', { 'Offset' => 1032, 'Ret' => 0x71aa32ad } ],
|
||||
[ 'Windows 2000 Pro English All', { 'Offset' => 1032, 'Ret' => 0x75022ac4 } ]
|
||||
],
|
||||
'DisclosureDate' => 'June 5 2007',
|
||||
'DisclosureDate' => 'Jun 5 2007',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'Automatic', { } ],
|
||||
],
|
||||
'DisclosureDate' => 'May 29, 2007',
|
||||
'DisclosureDate' => 'May 29 2007',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -26,14 +26,14 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
[
|
||||
# Metasploit implementation
|
||||
'natron',
|
||||
# bl4cksecurity blog explanation of vuln [see References]
|
||||
'xort', 'redsand',
|
||||
# obfuscation techniques and pdf template from util_printf
|
||||
'MC', 'Didier Stevens <didier.stevens[at]gmail.com>',
|
||||
],
|
||||
],
|
||||
'Version' => '$Revision$',
|
||||
'References' =>
|
||||
[
|
||||
|
@ -56,7 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Adobe Reader v9.0.0 (Windows XP SP3 English)', { 'Ret' => 0x0166B550 } ], # Ret * 5 == 0x07018A90 (BIB.dll)
|
||||
[ 'Adobe Reader v8.1.2 (Windows XP SP2 English)', { 'Ret' => 0x9B004870 } ], # Ret * 5 == 0x07017A30 (BIB.dll)
|
||||
],
|
||||
'DisclosureDate' => 'Feb 2009',
|
||||
'DisclosureDate' => 'Feb 19 2009',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options([
|
||||
|
|
|
@ -63,7 +63,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'February 2 2009',
|
||||
'DisclosureDate' => 'Feb 2 2009',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -55,7 +55,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows XP SP3 French', { 'Ret' => 0x72c6170b } ], # seh return in msacm.drv
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'March 18 2010',
|
||||
'DisclosureDate' => 'Mar 18 2010',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Zinf Universal 2.2.1', { 'Ret' => 0x1204f514 } ], #pop esi; pop ebx; ret - ./Plugins/zinf.ui
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => '24 Sep 2004',
|
||||
'DisclosureDate' => 'Sep 24 2004',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows XP Pro SP1 English', { 'Ret' => 0x77dc5527 } ],
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DisclosureDate' => 'April 28 2003',
|
||||
'DisclosureDate' => 'Apr 28 2003',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows XP Universal', { 'Ret' => "\xfd\x21\x40" } ], # 0x004021fd p/p/r in ftp.exe
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'April 11 2010',
|
||||
'DisclosureDate' => 'Apr 11 2010',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'SAP DB 7.4 WebTools', { 'Ret' => 0x1003c95a } ], # wapi.dll 7.4.3.0
|
||||
],
|
||||
'DisclosureDate' => 'July 5 2007',
|
||||
'DisclosureDate' => 'Jul 5 2007',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options( [ Opt::RPORT(9999) ], self.class )
|
||||
|
|
|
@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows 2000 Pro English SP0', { 'Ret' => '0x6e8f3e24' } ],
|
||||
[ 'Windows 2000 Pro English SP1-SP2', { 'Ret' => '0x6e8f8cc4' } ],
|
||||
],
|
||||
'DisclosureDate' => 'June 18 2001',
|
||||
'DisclosureDate' => 'Jun 18 2001',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options([Opt::RPORT(80)], self.class)
|
||||
|
|
|
@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows 2003 SP0 English', { 'Ret' => 0x77c5cee8 } ]
|
||||
],
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'July 18 2007'))
|
||||
'DisclosureDate' => 'Jul 18 2007'))
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
|
|
@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
['MailEnable 1.54 Pro Universal', { 'Ret' => 0x1001c019 } ] #MEAISP.DLL
|
||||
],
|
||||
'DisclosureDate' => '',
|
||||
'DisclosureDate' => 'Oct 03 2005',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[
|
||||
[ 'MDaemon Version 9.6.4', { 'Ret' => 0x64dc118b } ], # p/p/r HashCash.dll
|
||||
],
|
||||
'DisclosureDate' => 'March 13 2008',
|
||||
'DisclosureDate' => 'Mar 13 2008',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'Privileged' => true,
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'March 21 2008'))
|
||||
'DisclosureDate' => 'Mar 21 2008'))
|
||||
|
||||
register_options([Opt::RPORT(623)], self.class)
|
||||
|
||||
|
|
|
@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'Privileged' => true,
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'July 24 2007'))
|
||||
'DisclosureDate' => 'Jul 24 2007'))
|
||||
|
||||
register_options([Opt::RPORT(3050)], self.class)
|
||||
end
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
],
|
||||
'Privileged' => true,
|
||||
'DefaultTarget' => 0,
|
||||
'DisclosureDate' => 'Apr 2, 2008'))
|
||||
'DisclosureDate' => 'Apr 02 2008'))
|
||||
|
||||
register_options([Opt::RPORT(3057)], self.class)
|
||||
end
|
||||
|
|
|
@ -73,7 +73,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['Top Layer Network Security Analyzer (OEM) Offset 1262 Windows Server 2003 English SP0/SP1', { 'Ret' => 0x77d16764, 'Offset' => 1262 } ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'July 24 2006'
|
||||
'DisclosureDate' => 'Jul 24 2006'
|
||||
))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows 2003 SP1 English', { 'Ret' => 0x773b24da } ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'July 25 2006'
|
||||
'DisclosureDate' => 'Jul 25 2006'
|
||||
))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows 2000 Pro English ALL', { 'Ret' => 0x75022ac4 } ],
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DisclosureDate' => 'December 19 2005',
|
||||
'DisclosureDate' => 'Dec 19 2005',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options([ Opt::RPORT(105)], self)
|
||||
|
|
|
@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
'Privileged' => false,
|
||||
|
||||
'DisclosureDate' => 'October 4 2004',
|
||||
'DisclosureDate' => 'Oct 4 2004',
|
||||
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
|
|
|
@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Novell GroupWise Messenger 1.0 Client', { 'Ret' => 0x1000e105 } ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'July 2 2008',
|
||||
'DisclosureDate' => 'Jul 2 2008',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'WinProxy <= 6.1 R1a Universal', { 'Ret' => 0x6020ba04 } ], # Asmdat.dll
|
||||
],
|
||||
'Privileged' => true,
|
||||
'DisclosureDate' => 'January 5 2005',
|
||||
'DisclosureDate' => 'Jan 5 2005',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'AIM Triton 1.0.4 Universal', { 'Ret' => 0x4017b3d9 } ], # coolcore45.dll
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'July 10 2006',
|
||||
'DisclosureDate' => 'Jul 10 2006',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
|
||||
'Privileged' => false,
|
||||
|
||||
'DisclosureDate' => 'July 10 2006',
|
||||
'DisclosureDate' => 'Jul 10 2006',
|
||||
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'SIPfoundry sipXphone 2.6.0.27 Universal', { 'Ret' => 0x08016aac } ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'July 10 2006',
|
||||
'DisclosureDate' => 'Jul 10 2006',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
[ 'Windows 2003 SP1 English', { 'Ret' => 0x76aa679b } ],
|
||||
],
|
||||
'Privileged' => false,
|
||||
'DisclosureDate' => 'December 16 2002',
|
||||
'DisclosureDate' => 'Dec 16 2002',
|
||||
'DefaultTarget' => 0))
|
||||
|
||||
register_options(
|
||||
|
|
|
@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['Windows XP SP2', {'Ret' => 0x74D31458} ], #oledlg.dll
|
||||
],
|
||||
'DefaultTarget' => 1,
|
||||
'DisclosureDate' => 'March 27 2008'))
|
||||
'DisclosureDate' => 'Mar 27 2008'))
|
||||
|
||||
register_options(
|
||||
[
|
||||
|
|
|
@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
['Windows XP SP2 English', { 'Platform' => 'win', 'Ret' => 0x71aa1b22 }],
|
||||
['Windows 2003 SP0 English', { 'Platform' => 'win', 'Ret' => 0x71bf175f }],
|
||||
],
|
||||
'DisclosureDate' => '',
|
||||
'DisclosureDate' => 'Aug 22 2005',
|
||||
'DefaultTarget' => 0))
|
||||
end
|
||||
|
||||
|
|
|
@ -363,7 +363,7 @@ class HttpCrawler
|
|||
hashreq['uri'] = canonicalize(hashreq['uri'])
|
||||
|
||||
if hashreq['rhost'] == self.ctarget and hashreq['rport'] == self.cport
|
||||
if !@ViewedQueue.include?(hashsig(hashreq))
|
||||
if !@ViewedQueue.include?(hashsig(hashreq))
|
||||
if @NotViewedQueue.read_all(hashreq).size > 0
|
||||
if $verbose
|
||||
puts "Already in queue to be viewed: #{hashreq['uri']}"
|
||||
|
@ -393,7 +393,7 @@ class HttpCrawler
|
|||
# basepath: base path/uri to determine absolute path when relative
|
||||
# data: body data, nil if GET and query = uri.query
|
||||
|
||||
|
||||
|
||||
uri = URI.parse(url)
|
||||
uritargetssl = (uri.scheme == "https") ? true : false
|
||||
|
||||
|
|
Loading…
Reference in New Issue