Skip to content

Commit 5e31a32

Browse files
committed
Add missing ranks
../exec_shellcode.rb Rank = Great This exploit is missing autodetection and version checks, but should be ranked Great due to high number of possible targets ../cfme_manageiq_evm_upload_exec.rb Rank = Great This exploit implements a check to assess target availability, and the vulnerability does not require any user action ../dlink_dcs_930l_authenticated_remote_command_execution Rank = Excellent Exploit utilizes command injection ../efw_chpasswd_exec Rank = Excellent Exploit utilizes command injection ../foreman_openstack_satellite_code_exec Rank = Excellent Exploit utilizes code injection ../nginx_chunked_size Rank = Great Exploit has explicit targets with nginx version auto-detection ../tp_link_sc2020n_authenticated_telnet_injection Rank = Excellent See dlink_dcs_930l_authenticated_remote_command_execution, exploit uses OS Command Injection ../hp_smhstart Rank = Average Must be specific user to exploit, no autodetection, specific versions only
1 parent 66a585a commit 5e31a32

8 files changed

+8
-0
lines changed

modules/exploits/firefox/local/exec_shellcode.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
require 'msf/core/payload/firefox'
88

99
class MetasploitModule < Msf::Exploit::Local
10+
Rank = GreatRanking # Missing autodetection, but has widespread targetability
1011

1112
include Msf::Payload::Firefox
1213
include Msf::Exploit::Remote::FirefoxPrivilegeEscalation

modules/exploits/linux/http/cfme_manageiq_evm_upload_exec.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
require 'msf/core'
77

88
class MetasploitModule < Msf::Exploit::Remote
9+
Rank = GreatRanking
910

1011
include Msf::Exploit::Remote::HttpClient
1112
include Msf::Exploit::FileDropper

modules/exploits/linux/http/dlink_dcs_930l_authenticated_remote_command_execution.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
require 'msf/core'
77

88
class MetasploitModule < Msf::Exploit::Remote
9+
Rank = ExcellentRanking
910

1011
include Msf::Exploit::Remote::Telnet
1112
include Msf::Exploit::Remote::HttpClient

modules/exploits/linux/http/efw_chpasswd_exec.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
require 'msf/core'
77

88
class MetasploitModule < Msf::Exploit::Remote
9+
Rank = ExcellentRanking
910

1011
include Msf::Exploit::Remote::HttpClient
1112
include Msf::Exploit::CmdStager

modules/exploits/linux/http/foreman_openstack_satellite_code_exec.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
require 'msf/core'
77

88
class MetasploitModule < Msf::Exploit::Remote
9+
Rank = ExcellentRanking
910

1011
include Msf::Exploit::Remote::HttpClient
1112

modules/exploits/linux/http/nginx_chunked_size.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
require 'msf/core'
77

88
class MetasploitModule < Msf::Exploit::Remote
9+
Rank = GreatRanking
910

1011
include Exploit::Remote::Tcp
1112

modules/exploits/linux/http/tp_link_sc2020n_authenticated_telnet_injection.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
require 'msf/core'
77

88
class MetasploitModule < Msf::Exploit::Remote
9+
Rank = ExcellentRanking
910

1011
include Msf::Exploit::Remote::Telnet
1112
include Msf::Exploit::Remote::HttpClient

modules/exploits/linux/local/hp_smhstart.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
require 'msf/core/exploit/exe'
1010

1111
class MetasploitModule < Msf::Exploit::Local
12+
Rank = AverageRanking
1213

1314
include Msf::Exploit::EXE
1415
include Msf::Post::File

0 commit comments

Comments
 (0)