Skip to content

Commit 23ef828

Browse files
committed
Merge branch 'java_0day_refs' of github.com:jvazquez-r7/metasploit-framework into jvazquez-r7-java_0day_refs
Conflicts: modules/exploits/multi/browser/java_jre17_jmxbean.rb
2 parents 6471a70 + 2c05af7 commit 23ef828

File tree

6 files changed

+13
-11
lines changed

6 files changed

+13
-11
lines changed
File renamed without changes.

external/source/exploits/j7u10_jmx/Makefile renamed to external/source/exploits/cve-2013-0422/Makefile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ CLASSES = \
1111
all: $(CLASSES:.java=.class)
1212

1313
install:
14-
mv Exploit.class ../../../../data/exploits/j7u10_jmx/
15-
mv B.class ../../../../data/exploits/j7u10_jmx/
14+
mv Exploit.class ../../../../data/exploits/cve-2013-0422/
15+
mv B.class ../../../../data/exploits/cve-2013-0422/
1616

1717
clean:
1818
rm -rf *.class

modules/exploits/multi/browser/java_jre17_jmxbean.rb

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,17 @@ def initialize( info = {} )
2727
vulnerability affects Java version 7u10 and earlier.
2828
},
2929
'License' => MSF_LICENSE,
30-
'Author' => [
31-
'Unknown', # Vulnerability discovery
32-
'egypt', # Metasploit module
33-
'sinn3r', # Metasploit module
34-
'juan vazquez' # Metasploit module
35-
],
30+
'Author' =>
31+
[
32+
'Unknown', # Vulnerability discovery
33+
'egypt', # Metasploit module
34+
'sinn3r', # Metasploit module
35+
'juan vazquez' # Metasploit module
36+
],
3637
'References' =>
3738
[
3839
[ 'CVE', '2013-0422' ],
40+
[ 'US-CERT-VU', '625617' ],
3941
[ 'URL', 'http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html' ],
4042
[ 'URL', 'http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/' ]
4143
],
@@ -70,14 +72,14 @@ def initialize( info = {} )
7072
],
7173
'DefaultTarget' => 0,
7274
'DisclosureDate' => 'Jan 10 2013'
73-
))
75+
))
7476
end
7577

7678

7779
def setup
78-
path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "Exploit.class")
80+
path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "Exploit.class")
7981
@exploit_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) }
80-
path = File.join(Msf::Config.install_root, "data", "exploits", "j7u10_jmx", "B.class")
82+
path = File.join(Msf::Config.install_root, "data", "exploits", "cve-2013-0422", "B.class")
8183
@loader_class = File.open(path, "rb") {|fd| fd.read(fd.stat.size) }
8284

8385
@exploit_class_name = rand_text_alpha("Exploit".length)

0 commit comments

Comments
 (0)