Skip to content

Commit 38de5d6

Browse files
committed
Merge branch 'master' of github.com:rapid7/metasploit-framework
2 parents b061a0f + 9e912a2 commit 38de5d6

File tree

451 files changed

+101
-2228
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

451 files changed

+101
-2228
lines changed

lib/msf/core/db.rb

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -675,6 +675,13 @@ def report_session(opts)
675675
if sess_data[:desc]
676676
sess_data[:desc] = sess_data[:desc][0,255]
677677
end
678+
679+
# In the case of multi handler we cannot yet determine the true
680+
# exploit responsible. But we can at least show the parent versus
681+
# just the generic handler:
682+
if session.via_exploit == "exploit/multi/handler"
683+
sess_data[:via_exploit] = sess_data[:datastore]['ParentModule']
684+
end
678685

679686
s = ::Mdm::Session.new(sess_data)
680687
s.save!
@@ -684,19 +691,26 @@ def report_session(opts)
684691
end
685692

686693
# If this is a live session, we know the host is vulnerable to something.
687-
# If the exploit used was multi/handler, though, we don't know what
688-
# it's vulnerable to, so it isn't really useful to save it.
689-
if opts[:session] and session.via_exploit and session.via_exploit != "exploit/multi/handler"
694+
if opts[:session] and session.via_exploit
690695
return unless host
691696

692697
mod = framework.modules.create(session.via_exploit)
698+
699+
if session.via_exploit == "exploit/multi/handler"
700+
mod_fullname = sess_data[:datastore]['ParentModule']
701+
mod_name = ::Mdm::ModuleDetail.find_by_fullname(mod_fullname).name
702+
else
703+
mod_name = mod.name
704+
mod_fullname = mod.fullname
705+
end
706+
693707
vuln_info = {
694708
:host => host.address,
695-
:name => mod.name,
709+
:name => mod_name,
696710
:refs => mod.references,
697711
:workspace => wspace,
698712
:exploited_at => Time.now.utc,
699-
:info => "Exploited by #{mod.fullname} to create Session #{s.id}"
713+
:info => "Exploited by #{mod_fullname} to create Session #{s.id}"
700714
}
701715

702716
port = session.exploit_datastore["RPORT"]
@@ -706,10 +720,15 @@ def report_session(opts)
706720

707721
vuln = framework.db.report_vuln(vuln_info)
708722

723+
if session.via_exploit == "exploit/multi/handler"
724+
via_exploit = sess_data[:datastore]['ParentModule']
725+
else
726+
via_exploit = session.via_exploit
727+
end
709728
attempt_info = {
710729
:timestamp => Time.now.utc,
711730
:workspace => wspace,
712-
:module => session.via_exploit,
731+
:module => via_exploit,
713732
:username => session.username,
714733
:refs => mod.references,
715734
:session_id => s.id,

modules/auxiliary/admin/2wire/xslt_password_reset.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -24,7 +20,6 @@ def initialize(info={})
2420
configuration changes (such as resetting the password) as administrators.
2521
},
2622
'License' => MSF_LICENSE,
27-
'Version' => "$Revision$",
2823
'Author' =>
2924
[
3025
'hkm [at] hakim.ws', #Initial discovery, poc

modules/auxiliary/admin/backupexec/dump.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -30,7 +26,6 @@ def initialize(info = {})
3026
},
3127
'Author' => [ 'hdm', 'Unknown' ],
3228
'License' => MSF_LICENSE,
33-
'Version' => '$Revision$',
3429
'References' =>
3530
[
3631
['CVE', '2005-2611'],

modules/auxiliary/admin/backupexec/registry.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -30,7 +26,6 @@ def initialize(info = {})
3026
},
3127
'Author' => [ 'hdm' ],
3228
'License' => MSF_LICENSE,
33-
'Version' => '$Revision$',
3429
'References' =>
3530
[
3631
[ 'OSVDB', '17627' ],

modules/auxiliary/admin/cisco/cisco_secure_acs_bypass.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -20,7 +16,6 @@ class Metasploit4 < Msf::Auxiliary
2016
def initialize(info = {})
2117
super(update_info(info,
2218
'Name' => 'Cisco Secure ACS Version < 5.1.0.44.5 or 5.2.0.26.2 Unauthorized Password Change',
23-
'Version' => '$Revision$',
2419
'Description' => %q{
2520
This module exploits an authentication bypass issue which allows arbitrary
2621
password change requests to be issued for any user in the local store.

modules/auxiliary/admin/cisco/vpn_3000_ftp_bypass.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -30,7 +26,6 @@ def initialize(info = {})
3026
},
3127
'Author' => [ 'patrick' ],
3228
'License' => MSF_LICENSE,
33-
'Version' => '$Revision$',
3429
'References' =>
3530
[
3631
[ 'BID', '19680' ],

modules/auxiliary/admin/db2/db2rcmd.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -26,7 +22,6 @@ def initialize(info = {})
2622
},
2723
'Author' => [ 'MC' ],
2824
'License' => MSF_LICENSE,
29-
'Version' => '$Revision$',
3025
'References' =>
3126
[
3227
[ 'CVE', '2004-0795' ],

modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -31,8 +27,7 @@ def initialize(info = {})
3127
['OSVDB', '60035'],
3228
],
3329
'Author' => 'hdm',
34-
'License' => MSF_LICENSE,
35-
'Version' => '$Revision$'
30+
'License' => MSF_LICENSE
3631
))
3732

3833
register_options([

modules/auxiliary/admin/emc/alphastor_devicemanager_exec.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -25,7 +21,6 @@ def initialize(info = {})
2521
},
2622
'Author' => [ 'MC' ],
2723
'License' => MSF_LICENSE,
28-
'Version' => '$Revision$',
2924
'References' =>
3025
[
3126
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ],

modules/auxiliary/admin/emc/alphastor_librarymanager_exec.rb

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
##
2-
# $Id$
3-
##
4-
51
##
62
# This file is part of the Metasploit Framework and may be subject to
73
# redistribution and commercial restrictions. Please see the Metasploit
@@ -25,7 +21,6 @@ def initialize(info = {})
2521
},
2622
'Author' => [ 'MC' ],
2723
'License' => MSF_LICENSE,
28-
'Version' => '$Revision$',
2924
'References' =>
3025
[
3126
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=703' ],

0 commit comments

Comments
 (0)