Skip to content

Commit 59ccf93

Browse files
author
Brent Cook
committed
Land rapid7#5267, update Title, OSVDB references for Symantec Endpoint Protection Manager
2 parents 1a7a5c2 + c01fc82 commit 59ccf93

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

modules/exploits/windows/antivirus/symantec_endpoint_manager_rce.rb

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'Symantec Endpoint Protection Manager Remote Command Execution',
18+
'Name' => 'Symantec Endpoint Protection Manager /servlet/ConsoleServlet Remote Command Execution',
1919
'Description' => %q{
2020
This module exploits XXE and SQL injection flaws in Symantec Endpoint Protection Manager
2121
versions 11.0, 12.0 and 12.1. When supplying a specially crafted XML external entity (XXE) request an attacker
@@ -35,6 +35,8 @@ def initialize(info = {})
3535
[ 'CVE', '2013-5014' ],
3636
[ 'CVE', '2013-5015' ],
3737
[ 'EDB', '31853'],
38+
[ 'OSVDB', '103305'],
39+
[ 'OSVDB', '103306'],
3840
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140218-0_Symantec_Endpoint_Protection_Multiple_critical_vulnerabilities_wo_poc_v10.txt' ]
3941
],
4042
'Arch' => ARCH_X86,

0 commit comments

Comments
 (0)