Skip to content

Commit 6e3739a

Browse files
committed
Land rapid7#3698, release fixes
2 parents 1ee83ff + 6d9833e commit 6e3739a

File tree

6 files changed

+30
-20
lines changed

6 files changed

+30
-20
lines changed

modules/auxiliary/admin/http/jboss_bshdeployer.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize
1515
'Description' => %q{
1616
This module can be used to install a WAR file payload on JBoss servers that have
1717
an exposed "jmx-console" application. The payload is put on the server by
18-
using the jboss.system:BSHDeployer\'s createScriptDeployment() method.
18+
using the jboss.system:BSHDeployer's createScriptDeployment() method.
1919
},
2020
'Author' =>
2121
[
@@ -79,7 +79,7 @@ def deploy_action(app_base, stager_name, war_data)
7979
# call the stager to deploy our real payload war
8080
stager_uri = '/' + stager_name + '/' + stager_name + '.jsp'
8181
payload_data = "#{rand_text_alpha(8+rand(8))}=#{Rex::Text.uri_encode(encoded_payload)}"
82-
print_status("#{peer} - Calling stager #{stager_uri } to deploy final payload...")
82+
print_status("#{peer} - Calling stager #{stager_uri} to deploy final payload...")
8383
res = deploy('method' => 'POST',
8484
'data' => payload_data,
8585
'uri' => stager_uri)

modules/auxiliary/scanner/ntp/ntp_peer_list_dos.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,15 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit "PEER_LIST" queries and
2121
return responses that are larger in size or greater in quantity than
22-
the request, allowing remote attackers to cause a denial of service
23-
(traffic amplification) via spoofed requests.
22+
the request, allowing remote attackers to cause a distributed, reflected
23+
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
24+
requests.
2425
},
2526
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2627
'References' =>
2728
[
28-
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
29+
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
30+
['URL', 'http://r-7.co/R7-2014-12']
2931
],
3032
'DisclosureDate' => 'Aug 25 2014',
3133
'License' => MSF_LICENSE

modules/auxiliary/scanner/ntp/ntp_peer_list_sum_dos.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,15 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit "PEER_LIST_SUM" queries and
2121
return responses that are larger in size or greater in quantity than
22-
the request, allowing remote attackers to cause a denial of service
23-
(traffic amplification) via spoofed requests.
22+
the request, allowing remote attackers to cause a distributed, reflected
23+
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
24+
requests.
2425
},
2526
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2627
'References' =>
2728
[
28-
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
29+
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
30+
['URL', 'http://r-7.co/R7-2014-12']
2931
],
3032
'DisclosureDate' => 'Aug 25 2014',
3133
'License' => MSF_LICENSE

modules/auxiliary/scanner/ntp/ntp_req_nonce_dos.rb

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,17 @@ def initialize
1818
'Name' => 'NTP Mode 6 REQ_NONCE DRDoS Scanner',
1919
'Description' => %q{
2020
This module identifies NTP servers which permit mode 6 REQ_NONCE requests that
21-
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
21+
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
2222
respond to REQ_NONCE requests with a response larger than the request,
23-
allowing remote attackers to cause a denial of services (traffic
24-
amplification) via spoofed requests.
23+
allowing remote attackers to cause a distributed, reflected
24+
denial of service (aka, "DRDoS" or traffic amplification) via spoofed
25+
requests.
2526
},
2627
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2728
'References' =>
2829
[
29-
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
30+
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
31+
['URL', 'http://r-7.co/R7-2014-12']
3032
],
3133
'DisclosureDate' => 'Aug 25 2014',
3234
'License' => MSF_LICENSE

modules/auxiliary/scanner/ntp/ntp_reslist_dos.rb

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,15 +19,17 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit "reslist" queries and
2121
obtains the list of restrictions placed on various network interfaces,
22-
networks or hosts. The reslist feature allows remote
23-
attackers to cause a denial of service (traffic amplification) via
24-
spoofed requests. The more interfaces, networks or host with specific
25-
restrictions, the greater the amplification.
22+
networks or hosts. The reslist feature allows remote
23+
attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or
24+
traffic amplification) via spoofed requests. The more interfaces, networks
25+
or hosts with specific restrictions, the greater the amplification.
26+
requests.
2627
},
2728
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2829
'References' =>
2930
[
30-
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
31+
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
32+
['URL', 'http://r-7.co/R7-2014-12']
3133
],
3234
'DisclosureDate' => 'Aug 25 2014',
3335
'License' => MSF_LICENSE

modules/auxiliary/scanner/ntp/ntp_unsettrap_dos.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,15 @@ def initialize
1919
'Description' => %q{
2020
This module identifies NTP servers which permit mode 6 UNSETTRAP requests that
2121
can be used to conduct DRDoS attacks. In some configurations, NTP servers will
22-
respond to UNSETTRAP requests with multiple packets, allowing remote attackers to
23-
cause a denial of services (traffic amplification) via spoofed requests.
22+
respond to UNSETTRAP requests with multiple packets, allowing remote attackers
23+
to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic
24+
amplification) via spoofed requests.
2425
},
2526
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2627
'References' =>
2728
[
28-
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696']
29+
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
30+
['URL', 'http://r-7.co/R7-2014-12']
2931
],
3032
'DisclosureDate' => 'Aug 25 2014',
3133
'License' => MSF_LICENSE

0 commit comments

Comments
 (0)