Skip to content

Commit 158d497

Browse files
committed
More references and pass msftidy
1 parent 7a7b6cb commit 158d497

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

modules/exploits/multi/http/phpwiki_ploticus_exec.rb

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,10 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Phpwiki ploticus Remote Code Execution',
16+
'Name' => 'Phpwiki Ploticus Remote Code Execution',
1717
'Description' => %q{
18-
The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via command injection.
18+
The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary
19+
code via command injection.
1920
},
2021
'Author' =>
2122
[
@@ -27,7 +28,9 @@ def initialize(info = {})
2728
[
2829
[ 'CVE', '2014-5519' ],
2930
[ 'OSVDB', '110576' ],
30-
[ 'EDB', '34451']
31+
[ 'EDB', '34451'],
32+
[ 'URL', 'https://sourceforge.net/p/phpwiki/code/8974/?page=1' ], # This commit prevents exploitation
33+
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Aug/77' ] # The day the vuln went public
3134
],
3235
'Payload' =>
3336
{

0 commit comments

Comments
 (0)