Skip to content

Commit 2be3433

Browse files
Update references URLs
1 parent a636380 commit 2be3433

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

modules/exploits/multi/http/drupal_drupageddon.rb

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,8 @@ def initialize(info={})
4343
[
4444
['CVE', '2014-3704'],
4545
['URL', 'https://www.drupal.org/SA-CORE-2014-005'],
46-
['URL', 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html']
46+
['URL', 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html'],
47+
['URL', 'https://www.whitewinterwolf.com/posts/2017/11/16/drupageddon-revisited-a-new-path-from-sql-injection-to-remote-command-execution-cve-2014-3704/']
4748
],
4849
'Privileged' => false,
4950
'Platform' => ['php'],
@@ -72,8 +73,6 @@ def initialize(info={})
7273

7374
##
7475
# Form-cache PHP injection method
75-
# See details on:
76-
# https://www.whitewinterwolf.com/posts/2017/11/16/drupageddon-revisited-a-new-path-from-sql-injection-to-remote-command-execution-cve-2014-3704/
7776
##
7877

7978
def sql_insert(id, value)

0 commit comments

Comments
 (0)