William Vu
|
1da40b5deb
|
Change HAVE_POPEN to USE_POPEN
PS target doesn't support it, so the option should be renamed.
|
2016-10-14 11:58:39 -05:00 |
William Vu
|
5b46e72aea
|
Update module logic
|
2016-10-13 17:40:16 -05:00 |
William Vu
|
6f4f2bfa5f
|
Add PS target and remove MIFF
|
2016-10-13 17:39:55 -05:00 |
William Vu
|
e70ba8110d
|
Update references
|
2016-10-13 17:35:55 -05:00 |
William Vu
|
88bb2e2295
|
Update description
|
2016-10-13 17:35:30 -05:00 |
William Vu
|
9128ba3e57
|
Add popen() vuln to ImageMagick exploit
So... we've actually been sitting on this vuln for a while now. Now that
the cat's out of the bag [1], I'm updating the module. :)
Thanks to @hdm for his sharp eye. ;x
[1] http://permalink.gmane.org/gmane.comp.security.oss.general/19669
|
2016-06-02 11:35:37 -05:00 |
William Vu
|
1bc2ec9c11
|
Update vulnerable versions to include 6.x (legacy)
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
26b749ff5a
|
Add default LHOST
This is a massive workaround and probably shouldn't be done. :-)
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
5c713d9f75
|
Set default payload
Land #6849 for this to be effective.
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
232cc114de
|
Change placeholder text to something useful
A la Shellshock. :)
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
f32c7ba569
|
Add template generation details
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
23a0517a01
|
Update description
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
d7b76c3ab4
|
Add more references
|
2016-05-05 14:18:42 -05:00 |
William Vu
|
5c04db7a09
|
Add ImageMagick exploit
|
2016-05-05 14:18:42 -05:00 |