File tree Expand file tree Collapse file tree 1 file changed +2
-3
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +2
-3
lines changed Original file line number Diff line number Diff line change @@ -43,7 +43,8 @@ def initialize(info={})
43
43
[
44
44
[ 'CVE' , '2014-3704' ] ,
45
45
[ 'URL' , 'https://www.drupal.org/SA-CORE-2014-005' ] ,
46
- [ 'URL' , 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html' ]
46
+ [ 'URL' , 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html' ] ,
47
+ [ 'URL' , 'https://www.whitewinterwolf.com/posts/2017/11/16/drupageddon-revisited-a-new-path-from-sql-injection-to-remote-command-execution-cve-2014-3704/' ]
47
48
] ,
48
49
'Privileged' => false ,
49
50
'Platform' => [ 'php' ] ,
@@ -72,8 +73,6 @@ def initialize(info={})
72
73
73
74
##
74
75
# Form-cache PHP injection method
75
- # See details on:
76
- # https://www.whitewinterwolf.com/posts/2017/11/16/drupageddon-revisited-a-new-path-from-sql-injection-to-remote-command-execution-cve-2014-3704/
77
76
##
78
77
79
78
def sql_insert ( id , value )
You can’t perform that action at this time.
0 commit comments