various fixes, mostly consistency changes to disclosure dates

git-svn-id: file:///home/svn/framework3/trunk@9525 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2010-06-15 07:18:08 +00:00
parent 30f3e8fda2
commit fa505a4069
53 changed files with 68 additions and 67 deletions

View File

@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20010627-ios-http-level.shtml'],
[ 'OSVDB', '578' ],
],
'DisclosureDate' => 'June 27 2001'))
'DisclosureDate' => 'Jun 27 2001'))
register_options(
[

View File

@ -20,7 +20,7 @@ class Metasploit3 < Msf::Auxiliary
'Name' => 'Oracle URL Download',
'Description' => %q{
This module will create a java class which enables the download
of a binary from a webserver to the oracle filesystem.
of a binary from a webserver to the oracle filesystem.
},
'Author' => [ 'CG' ],
'License' => MSF_LICENSE,
@ -29,6 +29,7 @@ class Metasploit3 < Msf::Auxiliary
[
[ 'URL', 'http://www.argeniss.com/research/oraclesqlinj.zip' ],
],
# Where did this date come from? -jjd
'DisclosureDate' => 'Feb 2003'))
register_options(

View File

@ -37,7 +37,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20000514-ios-http-server.shtml'],
[ 'OSVDB', '1302' ],
],
'DisclosureDate' => 'April 26 2000'))
'DisclosureDate' => 'Apr 26 2000'))
register_options(
[

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'OSVDB', '37643'],
[ 'URL', 'https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1394'],
],
'DisclosureDate' => 'February 22 2007'))
'DisclosureDate' => 'Feb 22 2007'))
register_options([
OptInt.new('SPORT', [true, 'The source port used to send the malicious HTTP response', 80]),

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'URL', 'http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuoct2008.html' ],
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
],
'DisclosureDate' => 'Nov 11, 2008'))
'DisclosureDate' => 'Oct 13 2008'))
register_options(
[

View File

@ -33,7 +33,7 @@ class Metasploit3 < Msf::Auxiliary
[ 'URL', 'http://www.appsecinc.com/resources/alerts/oracle/2008-10.shtml' ],
],
'DisclosureDate' => 'Jan 2009'))
'DisclosureDate' => 'Oct 13 2008'))
register_options(
[

View File

@ -21,21 +21,21 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Apple OS X iTunes 8.1.1 ITMS Overflow',
'Description' => %q{
This modules exploits a stack-based buffer overflow in iTunes
This modules exploits a stack-based buffer overflow in iTunes
itms:// URL parsing. It is accessible from the browser and
in Safari, itms urls will be opened in iTunes automatically.
Because iTunes is multithreaded, only vfork-based payloads should
be used.
},
'Author' => [ 'Will Drewry <redpig@dataspill.org>' ],
'Author' => [ 'Will Drewry <redpig [at] dataspill.org>' ],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2009-0950' ],
['OSVDB', '54833'],
['URL', 'http://support.apple.com/kb/HT3592'],
['URL', 'http://redpig.dataspill.org/2009/05/drive-by-attack-for-itunes-811.html'],
[ 'OSVDB', '54833' ],
[ 'URL', 'http://support.apple.com/kb/HT3592' ],
[ 'URL', 'http://redpig.dataspill.org/2009/05/drive-by-attack-for-itunes-811.html' ]
],
'Payload' =>
{
@ -62,7 +62,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
]
],
'DisclosureDate' => 'June 1, 2009',
'DisclosureDate' => 'Jun 01 2009',
'DefaultTarget' => 0))
end

View File

@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => 'php',
'Arch' => ARCH_PHP,
'Targets' => [[ 'Automatic', { }]],
'DisclosureDate' => 'July 22 2009',
'DisclosureDate' => 'Jul 22 2009',
'DefaultTarget' => 0))
register_options(

View File

@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Platform' => 'php',
'Arch' => ARCH_PHP,
'Targets' => [[ 'Automatic', { }]],
'DisclosureDate' => 'August 25 2005',
'DisclosureDate' => 'Aug 25 2005',
'DefaultTarget' => 0))
register_options(

View File

@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
],
],
'DisclosureDate' => '',
'DisclosureDate' => 'Apr 11 2005',
'DefaultTarget' => 0))
register_options(

View File

@ -56,7 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Adobe Reader v9.0.0 (Windows XP SP3 English)', { 'Ret' => 0x0166B550 } ], # Ret * 5 == 0x07018A90 (BIB.dll)
[ 'Adobe Reader v8.1.2 (Windows XP SP2 English)', { 'Ret' => 0x9B004870 } ], # Ret * 5 == 0x07017A30 (BIB.dll)
],
'DisclosureDate' => 'Feb 2009',
'DisclosureDate' => 'Feb 19 2009',
'DefaultTarget' => 0))
end

View File

@ -29,8 +29,8 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2006-5650' ],
[ 'OSVDB', '30220'],
[ 'BID', '20930' ],
[ 'OSVDB', '30220' ],
[ 'BID', '20930' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-06-037/' ],
],
'Payload' =>
@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'DisclosureDate' => 'Nov 6, 2006',
'DisclosureDate' => 'Nov 06 2006',
'DefaultTarget' => 0))
register_options(

View File

@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { }],
],
# 'DisclosureDate' => 'Mmm DD 2009',
'DisclosureDate' => 'Nov 14 2009',
'DefaultTarget' => 0))
end

View File

@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Windows XP SP2-SP3 IE 6.0/7.0', { 'Ret' => 0x0A0A0A0A } ]
],
'DisclosureDate' => 'March 16 2008',
'DisclosureDate' => 'Mar 16 2008',
'DefaultTarget' => 0))
end

View File

@ -49,7 +49,7 @@ class Metasploit3 < Msf::Exploit::Remote
# Tested ok patrickw 20090303
[ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0A0A0A0A } ],
],
'DisclosureDate' => 'June 6 2007',
'DisclosureDate' => 'Jun 6 2007',
'DefaultTarget' => 0))
end

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows 2000 Pro English All', { 'Ret' => 0x75022ac4 } ],
],
'DisclosureDate' => 'July 05 2007',
'DisclosureDate' => 'Jul 05 2007',
'DefaultTarget' => 0))
end

View File

@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Windows XP Pro SP2 English', { 'Offset' => 483, 'Ret' => 0x7c941eed } ],
],
'DisclosureDate' => 'July 7 2007',
'DisclosureDate' => 'Jul 7 2007',
'DefaultTarget' => 0))
end

View File

@ -66,7 +66,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ]
],
'DisclosureDate' => 'June 09, 2010',
'DisclosureDate' => 'Jun 09 2010',
'DefaultTarget' => 0))
register_options(

View File

@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0A0A0A0A } ]
],
'DisclosureDate' => 'June 16 2008',
'DisclosureDate' => 'Jun 16 2008',
'DefaultTarget' => 0))
end

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Windows XP SP0-SP3 / IE 6.0 SP0-2 & IE 7.0 English', { 'Offset' => 32, 'Ret' => 0x0C0C0C0C } ]
],
'DisclosureDate' => 'March 8 2008',
'DisclosureDate' => 'Mar 8 2008',
'DefaultTarget' => 0))
end

View File

@ -46,7 +46,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'DisclosureDate' => 'Sep 7, 2009',
'DisclosureDate' => 'Sep 07 2009',
'DefaultTarget' => 0))
register_options(

View File

@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'DisclosureDate' => 'Jan 15, 2009',
'DisclosureDate' => 'Jan 15 2009',
'DefaultTarget' => 0))
end

View File

@ -22,7 +22,7 @@ class Metasploit3 < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Tumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in the vcst_eu.dll
This module exploits a stack buffer overflow in the vcst_eu.dll
FileTransfer Module (1.0.0.5) ActiveX control in the Tumbleweed
SecureTransport suite. By sending an overly long string to the
TransferFile() 'remotefile' function, an attacker may be able
@ -33,9 +33,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2008-1724'],
[ 'OSVDB', '44252'],
[ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ],
[ 'CVE', '2008-1724' ],
[ 'OSVDB', '44252' ],
[ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ]
],
'DefaultOptions' =>
{
@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows 2000 Pro English', { 'Ret' => 0x75022ac4 } ],
[ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ],
],
'DisclosureDate' => '07 Apr 2008',
'DisclosureDate' => 'Apr 07 2008',
'DefaultTarget' => 0))
end

View File

@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Windows XP SP0-SP3 / Windows Vista / IE 6.0 SP0-SP2 / IE 7', { 'Ret' => 0x0c0c0c0c } ]
],
'DisclosureDate' => 'June 16 2008',
'DisclosureDate' => 'Jun 16 2008',
'DefaultTarget' => 0))
end

View File

@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows XP SP0/SP1 Pro English', { 'Offset' => 1032, 'Ret' => 0x71aa32ad } ],
[ 'Windows 2000 Pro English All', { 'Offset' => 1032, 'Ret' => 0x75022ac4 } ]
],
'DisclosureDate' => 'June 5 2007',
'DisclosureDate' => 'Jun 5 2007',
'DefaultTarget' => 0))
end

View File

@ -42,7 +42,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'Automatic', { } ],
],
'DisclosureDate' => 'May 29, 2007',
'DisclosureDate' => 'May 29 2007',
'DefaultTarget' => 0))
register_options(

View File

@ -26,14 +26,14 @@ class Metasploit3 < Msf::Exploit::Remote
},
'License' => MSF_LICENSE,
'Author' =>
[
[
# Metasploit implementation
'natron',
# bl4cksecurity blog explanation of vuln [see References]
'xort', 'redsand',
# obfuscation techniques and pdf template from util_printf
'MC', 'Didier Stevens <didier.stevens[at]gmail.com>',
],
],
'Version' => '$Revision$',
'References' =>
[
@ -56,7 +56,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Adobe Reader v9.0.0 (Windows XP SP3 English)', { 'Ret' => 0x0166B550 } ], # Ret * 5 == 0x07018A90 (BIB.dll)
[ 'Adobe Reader v8.1.2 (Windows XP SP2 English)', { 'Ret' => 0x9B004870 } ], # Ret * 5 == 0x07017A30 (BIB.dll)
],
'DisclosureDate' => 'Feb 2009',
'DisclosureDate' => 'Feb 19 2009',
'DefaultTarget' => 0))
register_options([

View File

@ -63,7 +63,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
],
'Privileged' => false,
'DisclosureDate' => 'February 2 2009',
'DisclosureDate' => 'Feb 2 2009',
'DefaultTarget' => 0))
register_options(

View File

@ -55,7 +55,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows XP SP3 French', { 'Ret' => 0x72c6170b } ], # seh return in msacm.drv
],
'Privileged' => false,
'DisclosureDate' => 'March 18 2010',
'DisclosureDate' => 'Mar 18 2010',
'DefaultTarget' => 0))
register_options(

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Zinf Universal 2.2.1', { 'Ret' => 0x1204f514 } ], #pop esi; pop ebx; ret - ./Plugins/zinf.ui
],
'Privileged' => false,
'DisclosureDate' => '24 Sep 2004',
'DisclosureDate' => 'Sep 24 2004',
'DefaultTarget' => 0))
register_options(

View File

@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows XP Pro SP1 English', { 'Ret' => 0x77dc5527 } ],
],
'Privileged' => true,
'DisclosureDate' => 'April 28 2003',
'DisclosureDate' => 'Apr 28 2003',
'DefaultTarget' => 0))
register_options(

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows XP Universal', { 'Ret' => "\xfd\x21\x40" } ], # 0x004021fd p/p/r in ftp.exe
],
'Privileged' => false,
'DisclosureDate' => 'April 11 2010',
'DisclosureDate' => 'Apr 11 2010',
'DefaultTarget' => 0))
register_options(

View File

@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'SAP DB 7.4 WebTools', { 'Ret' => 0x1003c95a } ], # wapi.dll 7.4.3.0
],
'DisclosureDate' => 'July 5 2007',
'DisclosureDate' => 'Jul 5 2007',
'DefaultTarget' => 0))
register_options( [ Opt::RPORT(9999) ], self.class )

View File

@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows 2000 Pro English SP0', { 'Ret' => '0x6e8f3e24' } ],
[ 'Windows 2000 Pro English SP1-SP2', { 'Ret' => '0x6e8f8cc4' } ],
],
'DisclosureDate' => 'June 18 2001',
'DisclosureDate' => 'Jun 18 2001',
'DefaultTarget' => 0))
register_options([Opt::RPORT(80)], self.class)

View File

@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows 2003 SP0 English', { 'Ret' => 0x77c5cee8 } ]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'July 18 2007'))
'DisclosureDate' => 'Jul 18 2007'))
end
def exploit

View File

@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
['MailEnable 1.54 Pro Universal', { 'Ret' => 0x1001c019 } ] #MEAISP.DLL
],
'DisclosureDate' => '',
'DisclosureDate' => 'Oct 03 2005',
'DefaultTarget' => 0))
end

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'MDaemon Version 9.6.4', { 'Ret' => 0x64dc118b } ], # p/p/r HashCash.dll
],
'DisclosureDate' => 'March 13 2008',
'DisclosureDate' => 'Mar 13 2008',
'DefaultTarget' => 0))
end

View File

@ -48,7 +48,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'Privileged' => true,
'DefaultTarget' => 0,
'DisclosureDate' => 'March 21 2008'))
'DisclosureDate' => 'Mar 21 2008'))
register_options([Opt::RPORT(623)], self.class)

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'Privileged' => true,
'DefaultTarget' => 0,
'DisclosureDate' => 'July 24 2007'))
'DisclosureDate' => 'Jul 24 2007'))
register_options([Opt::RPORT(3050)], self.class)
end

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'Privileged' => true,
'DefaultTarget' => 0,
'DisclosureDate' => 'Apr 2, 2008'))
'DisclosureDate' => 'Apr 02 2008'))
register_options([Opt::RPORT(3057)], self.class)
end

View File

@ -73,7 +73,7 @@ class Metasploit3 < Msf::Exploit::Remote
['Top Layer Network Security Analyzer (OEM) Offset 1262 Windows Server 2003 English SP0/SP1', { 'Ret' => 0x77d16764, 'Offset' => 1262 } ],
],
'Privileged' => false,
'DisclosureDate' => 'July 24 2006'
'DisclosureDate' => 'Jul 24 2006'
))
register_options(

View File

@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows 2003 SP1 English', { 'Ret' => 0x773b24da } ],
],
'Privileged' => false,
'DisclosureDate' => 'July 25 2006'
'DisclosureDate' => 'Jul 25 2006'
))
register_options(

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows 2000 Pro English ALL', { 'Ret' => 0x75022ac4 } ],
],
'Privileged' => true,
'DisclosureDate' => 'December 19 2005',
'DisclosureDate' => 'Dec 19 2005',
'DefaultTarget' => 0))
register_options([ Opt::RPORT(105)], self)

View File

@ -53,7 +53,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Privileged' => false,
'DisclosureDate' => 'October 4 2004',
'DisclosureDate' => 'Oct 4 2004',
'DefaultTarget' => 0))

View File

@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Novell GroupWise Messenger 1.0 Client', { 'Ret' => 0x1000e105 } ],
],
'Privileged' => false,
'DisclosureDate' => 'July 2 2008',
'DisclosureDate' => 'Jul 2 2008',
'DefaultTarget' => 0))
register_options(

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'WinProxy <= 6.1 R1a Universal', { 'Ret' => 0x6020ba04 } ], # Asmdat.dll
],
'Privileged' => true,
'DisclosureDate' => 'January 5 2005',
'DisclosureDate' => 'Jan 5 2005',
'DefaultTarget' => 0))
register_options(

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'AIM Triton 1.0.4 Universal', { 'Ret' => 0x4017b3d9 } ], # coolcore45.dll
],
'Privileged' => false,
'DisclosureDate' => 'July 10 2006',
'DisclosureDate' => 'Jul 10 2006',
'DefaultTarget' => 0))
register_options(

View File

@ -54,7 +54,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Privileged' => false,
'DisclosureDate' => 'July 10 2006',
'DisclosureDate' => 'Jul 10 2006',
'DefaultTarget' => 0))

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'SIPfoundry sipXphone 2.6.0.27 Universal', { 'Ret' => 0x08016aac } ],
],
'Privileged' => false,
'DisclosureDate' => 'July 10 2006',
'DisclosureDate' => 'Jul 10 2006',
'DefaultTarget' => 0))
register_options(

View File

@ -50,7 +50,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'Windows 2003 SP1 English', { 'Ret' => 0x76aa679b } ],
],
'Privileged' => false,
'DisclosureDate' => 'December 16 2002',
'DisclosureDate' => 'Dec 16 2002',
'DefaultTarget' => 0))
register_options(

View File

@ -51,7 +51,7 @@ class Metasploit3 < Msf::Exploit::Remote
['Windows XP SP2', {'Ret' => 0x74D31458} ], #oledlg.dll
],
'DefaultTarget' => 1,
'DisclosureDate' => 'March 27 2008'))
'DisclosureDate' => 'Mar 27 2008'))
register_options(
[

View File

@ -52,7 +52,7 @@ class Metasploit3 < Msf::Exploit::Remote
['Windows XP SP2 English', { 'Platform' => 'win', 'Ret' => 0x71aa1b22 }],
['Windows 2003 SP0 English', { 'Platform' => 'win', 'Ret' => 0x71bf175f }],
],
'DisclosureDate' => '',
'DisclosureDate' => 'Aug 22 2005',
'DefaultTarget' => 0))
end

View File

@ -363,7 +363,7 @@ class HttpCrawler
hashreq['uri'] = canonicalize(hashreq['uri'])
if hashreq['rhost'] == self.ctarget and hashreq['rport'] == self.cport
if !@ViewedQueue.include?(hashsig(hashreq))
if !@ViewedQueue.include?(hashsig(hashreq))
if @NotViewedQueue.read_all(hashreq).size > 0
if $verbose
puts "Already in queue to be viewed: #{hashreq['uri']}"
@ -393,7 +393,7 @@ class HttpCrawler
# basepath: base path/uri to determine absolute path when relative
# data: body data, nil if GET and query = uri.query
uri = URI.parse(url)
uritargetssl = (uri.scheme == "https") ? true : false