5
5
6
6
require 'msf/core'
7
7
8
- class Metasploit3 < Msf ::Auxiliary
8
+ class Metasploit4 < Msf ::Auxiliary
9
9
10
10
include Msf ::Auxiliary ::Report
11
11
include Msf ::Exploit ::Remote ::HttpClient
@@ -14,10 +14,10 @@ def initialize(info = {})
14
14
super ( update_info ( info ,
15
15
'Name' => 'NETGEAR ProSafe Network Management System 300 Authenticated File Download' ,
16
16
'Description' => %q{
17
- Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems.
18
- The application has a file download vulnerability that can be exploited by an
19
- authenticated remote attacker to download any file in the system..
20
- This module has been tested with versions 1.5.0.2, 1.4.0.17 and 1.1.0.13.
17
+ Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems.
18
+ The application has a file download vulnerability that can be exploited by an
19
+ authenticated remote attacker to download any file in the system..
20
+ This module has been tested with versions 1.5.0.2, 1.4.0.17 and 1.1.0.13.
21
21
} ,
22
22
'Author' =>
23
23
[
@@ -28,8 +28,8 @@ def initialize(info = {})
28
28
[
29
29
[ 'CVE' , '2016-1524' ] ,
30
30
[ 'US-CERT-VU' , '777024' ] ,
31
- [ 'URL' , 'TODO_GITHUB_URL ' ] ,
32
- [ 'URL' , 'TODO_FULLDISC_URL ' ]
31
+ [ 'URL' , 'https://raw.githubusercontent.com/pedrib/PoC/master/advisories/netgear_nms_rce.txt ' ] ,
32
+ [ 'URL' , 'http://seclists.org/fulldisclosure/2016/Feb/30 ' ]
33
33
] ,
34
34
'DisclosureDate' => 'Feb 4 2016' ) )
35
35
0 commit comments