Skip to content

Commit 3b28b23

Browse files
committed
Land rapid7#4712, @todb-r7's release fixes
2 parents 5b2eb98 + c633c71 commit 3b28b23

File tree

7 files changed

+22
-20
lines changed

7 files changed

+22
-20
lines changed

modules/auxiliary/admin/http/manageengine_dir_listing.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ def initialize(info={})
2222
using the default credentials for the administrator and guest accounts; alternatively
2323
you can provide a pre-authenticated cookie or a username / password combo. For IT360
2424
targets enter the RPORT of the OpManager instance (usually 8300). This module has been
25-
tested on both Windows and Linux with several different versions Windows paths have to
25+
tested on both Windows and Linux with several different versions. Windows paths have to
2626
be escaped with 4 backslashes on the command line. There is a companion module that
27-
allows you to download an arbitrary file. This vulnerability has been fixed in Applications
27+
allows for arbitrary file download. This vulnerability has been fixed in Applications
2828
Manager v11.9 b11912 and OpManager 11.6.
2929
},
3030
'Author' =>

modules/auxiliary/admin/http/manageengine_file_download.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ module will attempt to login using the default credentials for the administrator
2222
and password combo. For IT360 targets enter the RPORT of the OpManager instance (usually
2323
8300). This module has been tested on both Windows and Linux with several different
2424
versions. Windows paths have to be escaped with 4 backslashes on the command line. There is
25-
a companion module that allows you to list the contents of any directory recursively. This
25+
a companion module that allows the recursive listing of any directory. This
2626
vulnerability has been fixed in Applications Manager v11.9 b11912 and OpManager 11.6.
2727
},
2828
'Author' =>

modules/auxiliary/scanner/http/wordpress_ghost_scanner.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ class Metasploit3 < Msf::Auxiliary
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'WordPress XMLRPC Ghost Vulnerability Scanner',
14+
'Name' => 'WordPress XMLRPC GHOST Vulnerability Scanner',
1515
'Description' => %q{
16-
This module can be used to determine hosts vulnerable to the Ghost vulnerability via
16+
This module can be used to determine hosts vulnerable to the GHOST vulnerability via
1717
a call to the WordPress XMLRPC interface. If the target is vulnerable, the system
18-
will segfault and return a server error. On patched systems a normal XMLRPC error
18+
will segfault and return a server error. On patched systems, a normal XMLRPC error
1919
is returned.
2020
},
2121
'Author' =>

modules/exploits/unix/webapp/wp_pixabay_images_upload.rb

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Wordpress Pixabay Images PHP Code Upload',
16+
'Name' => 'WordPress Pixabay Images PHP Code Upload',
1717
'Description' => %q{
18-
This module exploits multiple vulnerabilities in the Wordpress plugin Pixabay
18+
This module exploits multiple vulnerabilities in the WordPress plugin Pixabay
1919
Images 2.3.6. The plugin does not check the host of a provided download URL
2020
which can be used to store and execute malicious PHP code on the system.
2121
},
@@ -74,7 +74,7 @@ def call_payload(file_name)
7474

7575
def exploit
7676
unless wordpress_and_online?
77-
fail_with(Failure::NoTarget, "#{peer} - #{target_uri} does not seeem to be Wordpress site")
77+
fail_with(Failure::NoTarget, "#{peer} - #{target_uri} does not seeem to be WordPress site")
7878
end
7979

8080
print_status("#{peer} - Starting up web service...")
@@ -120,7 +120,7 @@ def exploit
120120
def check
121121
res = wordpress_and_online?
122122
unless res
123-
vprint_error("#{peer} - It doesn't look like a Wordpress site")
123+
vprint_error("#{peer} - It doesn't look like a WordPress site")
124124
return Exploit::CheckCode::Unknown
125125
end
126126

modules/exploits/unix/webapp/wp_platform_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ class Metasploit3 < Msf::Exploit::Remote
1313
def initialize(info = {})
1414
super(update_info(
1515
info,
16-
'Name' => 'Remote Code Execution in Wordpress Platform Theme',
16+
'Name' => 'Remote Code Execution in WordPress Platform Theme',
1717
'Description' => %q{
18-
The Wordpress Theme "platform" contains a remote code execution vulnerability
18+
The WordPress Theme "platform" contains a remote code execution vulnerability
1919
through an unchecked admin_init call. The theme includes the uploaded file
2020
from it's temp filename with php's include function.
2121
},

modules/exploits/windows/browser/malwarebytes_update_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
require 'msf/core'
77

88
class Metasploit3 < Msf::Exploit::Remote
9-
Rank = NormalRanking
9+
Rank = GoodRanking # Would be Great except MBAE doesn't version check
1010

1111
include Msf::Exploit::EXE
1212
include Msf::Exploit::Remote::HttpServer
@@ -22,8 +22,8 @@ def initialize(info = {})
2222
This module exploits a vulnerability in the update functionality of
2323
Malwarebytes Anti-Malware consumer before 2.0.3 and Malwarebytes
2424
Anti-Exploit consumer 1.03.1.1220.
25-
Due to the lack of proper update package validation a man-in-the-middle
26-
attacker could execute arbitrary code by spoofing the update server
25+
Due to the lack of proper update package validation, a man-in-the-middle
26+
(MITM) attacker could execute arbitrary code by spoofing the update server
2727
data-cdn.mbamupdates.com and uploading an executable. This module has
2828
been tested successfully with MBAM 2.0.2.1012 and MBAE 1.03.1.1220.
2929
},

modules/exploits/windows/local/ms15_004_tswbproxy.rb

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,13 @@ def initialize(info={})
1616
super(update_info(info, {
1717
'Name' => 'MS15-004 Microsoft Remote Desktop Services Web Proxy IE Sandbox Escape',
1818
'Description' => %q{
19-
This module abuses a process creation policy in Internet Explorer's sandbox, specifically
20-
the Microsoft Remote Desktop Services Web Proxy IE one, which allows the attacker to escape
21-
the Protected Mode, and execute code with Medium Integrity. At the moment, this module only
22-
bypass Protected Mode on Windows 7 SP1 and prior (32 bits). This module has been tested
23-
successfully on Windows 7 SP1 (32 bits) with IE 8 and IE 11.
19+
This module abuses a process creation policy in Internet Explorer's
20+
sandbox; specifically, Microsoft's RemoteApp and Desktop Connections runtime
21+
proxy, TSWbPrxy.exe. This vulnerability allows the attacker to escape the
22+
Protected Mode and execute code with Medium Integrity. At the moment, this
23+
module only bypass Protected Mode on Windows 7 SP1 and prior (32 bits). This
24+
module has been tested successfully on Windows 7 SP1 (32 bits) with IE 8 and IE
25+
11.
2426
},
2527
'License' => MSF_LICENSE,
2628
'Author' =>

0 commit comments

Comments
 (0)