You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits the Shellshock vulnerability, a flaw in how the Bash shell\n handles external environment variables. This module targets dhclient by responding\n to DHCP requests with a malicious hostname, domainname, and URL which are then\n passed to the configuration scripts as environment variables, resulting in code\n execution. Due to length restrictions and the unusual networking scenario at the\n time of exploitation, this module achieves code execution by writing the payload\n into /etc/crontab and then cleaning it up after a session is created.",
115006
+
"description": "This module exploits the Shellshock vulnerability, a flaw in how the Bash shell\n handles external environment variables. This module targets dhclient by responding\n to DHCP requests with a malicious hostname, domainname, and URL which are then\n passed to the configuration scripts as environment variables, resulting in code\n execution. Due to length restrictions and the unusual networking scenario at the\n time of exploitation, this module achieves code execution by writing the payload\n into /etc/crontab and then cleaning it up after a session is created.",
"description": "This module exploits the DynoRoot vulnerability, a flaw in how the\n NetworkManager integration script included in the DHCP client in\n Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier\n processes DHCP options. A malicious DHCP server, or an attacker on\n the local network able to spoof DHCP responses, could use this flaw\n to execute arbitrary commands with root privileges on systems using\n NetworkManager and configured to obtain network configuration using\n the DHCP protocol.",
115060
+
"description": "This module exploits the DynoRoot vulnerability, a flaw in how the\n NetworkManager integration script included in the DHCP client in\n Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier\n processes DHCP options. A malicious DHCP server, or an attacker on\n the local network able to spoof DHCP responses, could use this flaw\n to execute arbitrary commands with root privileges on systems using\n NetworkManager and configured to obtain network configuration using\n the DHCP protocol.",
0 commit comments