Skip to content

Commit 4cc1f24

Browse files
committed
Land rapid7#1996, references for several modules
2 parents 2202635 + 322ba27 commit 4cc1f24

11 files changed

+31
-16
lines changed

modules/exploits/multi/browser/java_jre17_jmxbean.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ def initialize( info = {} )
3737
'References' =>
3838
[
3939
[ 'CVE', '2013-0422' ],
40+
[ 'OSVDB', '89059' ],
4041
[ 'US-CERT-VU', '625617' ],
4142
[ 'URL', 'http://malware.dontneedcoffee.com/2013/01/0-day-17u10-spotted-in-while-disable.html' ],
4243
[ 'URL', 'http://labs.alienvault.com/labs/index.php/2013/new-year-new-java-zeroday/' ],

modules/exploits/multi/http/familycms_less_exec.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ def initialize(info={})
2929
],
3030
'References' =>
3131
[
32+
[ 'OSVDB', '77492' ],
3233
[ 'URL', 'https://www.familycms.com/blog/2011/11/security-vulnerability-fcms-2-5-2-7-1/' ],
3334
[ 'URL', 'http://sourceforge.net/apps/trac/fam-connections/ticket/407' ],
3435
[ 'URL', 'http://rwx.biz.nf/advisories/fc_cms_rce_adv.html' ],

modules/exploits/multi/http/freenas_exec_raw.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,8 @@ def initialize(info = {})
2727
'License' => MSF_LICENSE,
2828
'References' =>
2929
[
30-
[ 'URL', 'http://sourceforge.net/projects/freenas/files/stable/0.7.2/NOTES%200.7.2.5543.txt/download' ],
30+
[ 'OSVDB', '94441' ],
31+
[ 'URL', 'http://sourceforge.net/projects/freenas/files/stable/0.7.2/NOTES%200.7.2.5543.txt/download' ]
3132
],
3233
'Payload' =>
3334
{

modules/exploits/multi/http/jboss_deploymentfilerepository.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ def initialize(info = {})
2929
'References' =>
3030
[
3131
[ 'CVE', '2010-0738' ], # by using VERB other than GET/POST
32+
[ 'OSVDB', '64171' ],
3233
[ 'URL', 'http://www.redteam-pentesting.de/publications/jboss' ],
3334
[ 'URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=574105' ],
3435
],

modules/exploits/multi/http/mobilecartly_upload_exec.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,9 @@ def initialize(info={})
3131
],
3232
'References' =>
3333
[
34-
['EDB', '20422'],
35-
['BID', '55399']
34+
[ 'OSVDB', '85509' ],
35+
[ 'EDB', '20422 '],
36+
[ 'BID', '55399 ']
3637
],
3738
'Payload' =>
3839
{

modules/exploits/multi/http/movabletype_upgrade_exec.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,11 @@ def initialize(info = {})
3737
],
3838
'References' =>
3939
[
40-
['CVE', '2012-6315'], # superseded by CVE-2013-0209 (duplicate)
41-
['CVE', '2013-0209'],
42-
['URL', 'http://www.sec-1.com/blog/?p=402'],
43-
['URL', 'http://www.movabletype.org/2013/01/movable_type_438_patch.html']
40+
[ 'CVE', '2012-6315' ], # superseded by CVE-2013-0209 (duplicate)
41+
[ 'CVE', '2013-0209' ],
42+
[ 'OSVDB', '89322' ],
43+
[ 'URL', 'http://www.sec-1.com/blog/?p=402' ],
44+
[ 'URL', 'http://www.movabletype.org/2013/01/movable_type_438_patch.html' ]
4445
],
4546
'Arch' => ARCH_CMD,
4647
'Payload' =>

modules/exploits/multi/http/phpmyadmin_3522_backdoor.rb

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,13 @@ def initialize(info = {})
2222
},
2323
'Author' => [ 'hdm' ],
2424
'License' => MSF_LICENSE,
25-
'References' => [ ['URL', 'http://www.phpmyadmin.net/home_page/security/PMASA-2012-5.php'] ],
25+
'References' =>
26+
[
27+
[ 'CVE', '2012-5159' ],
28+
[ 'OSVDB', '85739' ],
29+
[ 'EDB', '21834' ],
30+
[ 'URL', 'http://www.phpmyadmin.net/home_page/security/PMASA-2012-5.php' ]
31+
],
2632
'Privileged' => false,
2733
'Payload' =>
2834
{

modules/exploits/multi/http/rails_xml_yaml_code_exec.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,9 @@ def initialize(info = {})
3838
'License' => MSF_LICENSE,
3939
'References' =>
4040
[
41-
['CVE', '2013-0156'],
42-
['URL', 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156']
41+
[ 'CVE', '2013-0156' ],
42+
[ 'OSVDB', '89026' ],
43+
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156' ]
4344
],
4445
'Platform' => 'ruby',
4546
'Arch' => ARCH_RUBY,

modules/exploits/multi/http/testlink_upload_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ def initialize(info={})
2929
],
3030
'References' =>
3131
[
32-
['URL', 'http://itsecuritysolutions.org/2012-08-13-TestLink-1.9.3-multiple-vulnerabilities/']
33-
#['OSVDB', ''],
34-
#['EDB', ''],
32+
[ 'OSVDB', '85446' ],
33+
[ 'EDB', '20500' ],
34+
[ 'URL', 'http://itsecuritysolutions.org/2012-08-13-TestLink-1.9.3-multiple-vulnerabilities/' ]
3535
],
3636
'Payload' =>
3737
{

modules/exploits/osx/browser/safari_file_policy.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,10 @@ def initialize(info={})
3939
],
4040
'References' =>
4141
[
42-
['CVE', '2011-3230'],
43-
['URL', 'http://vttynotes.blogspot.com/2011/10/cve-2011-3230-launch-any-file-path-from.html#comments'],
44-
['URL', 'http://support.apple.com/kb/HT5000']
42+
[ 'CVE', '2011-3230' ],
43+
[ 'OSVDB', '76389' ],
44+
[ 'URL', 'http://vttynotes.blogspot.com/2011/10/cve-2011-3230-launch-any-file-path-from.html#comments' ],
45+
[ 'URL', 'http://support.apple.com/kb/HT5000' ]
4546
],
4647
'Payload' =>
4748
{

0 commit comments

Comments
 (0)