File tree Expand file tree Collapse file tree 1 file changed +3
-1
lines changed
modules/exploits/windows/antivirus Expand file tree Collapse file tree 1 file changed +3
-1
lines changed Original file line number Diff line number Diff line change @@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
15
15
16
16
def initialize ( info = { } )
17
17
super ( update_info ( info ,
18
- 'Name' => 'Symantec Endpoint Protection Manager Remote Command Execution' ,
18
+ 'Name' => 'Symantec Endpoint Protection Manager /servlet/ConsoleServlet Remote Command Execution' ,
19
19
'Description' => %q{
20
20
This module exploits XXE and SQL injection flaws in Symantec Endpoint Protection Manager
21
21
versions 11.0, 12.0 and 12.1. When supplying a specially crafted XML external entity (XXE) request an attacker
@@ -35,6 +35,8 @@ def initialize(info = {})
35
35
[ 'CVE' , '2013-5014' ] ,
36
36
[ 'CVE' , '2013-5015' ] ,
37
37
[ 'EDB' , '31853' ] ,
38
+ [ 'OSVDB' , '103305' ] ,
39
+ [ 'OSVDB' , '103306' ] ,
38
40
[ 'URL' , 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140218-0_Symantec_Endpoint_Protection_Multiple_critical_vulnerabilities_wo_poc_v10.txt' ]
39
41
] ,
40
42
'Arch' => ARCH_X86 ,
You can’t perform that action at this time.
0 commit comments