William Vu
|
9128ba3e57
|
Add popen() vuln to ImageMagick exploit
So... we've actually been sitting on this vuln for a while now. Now that
the cat's out of the bag [1], I'm updating the module. :)
Thanks to @hdm for his sharp eye. ;x
[1] http://permalink.gmane.org/gmane.comp.security.oss.general/19669
|
2016-06-02 11:35:37 -05:00 |
William Vu
|
1bc2ec9c11
|
Update vulnerable versions to include 6.x (legacy)
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
26b749ff5a
|
Add default LHOST
This is a massive workaround and probably shouldn't be done. :-)
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
5c713d9f75
|
Set default payload
Land #6849 for this to be effective.
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
232cc114de
|
Change placeholder text to something useful
A la Shellshock. :)
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
f32c7ba569
|
Add template generation details
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
23a0517a01
|
Update description
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
d7b76c3ab4
|
Add more references
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
5c04db7a09
|
Add ImageMagick exploit
|
2016-05-05 14:18:42 -05:00 |