Skip to content

Commit 79a8f37

Browse files
committed
Land rapid7#5325, WP RevSlider disclosure date fix
2 parents 706e304 + eeb87a3 commit 79a8f37

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

modules/exploits/unix/webapp/wp_revslider_upload_execute.rb

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,18 @@
66
require 'msf/core'
77

88
class Metasploit3 < Msf::Exploit::Remote
9+
910
Rank = ExcellentRanking
1011

1112
include Msf::HTTP::Wordpress
1213
include Msf::Exploit::FileDropper
1314

1415
def initialize(info = {})
1516
super(update_info(info,
16-
'Name' => 'Wordpress RevSlider File Upload and Execute Vulnerability',
17+
'Name' => 'WordPress RevSlider File Upload and Execute Vulnerability',
1718
'Description' => %q{
1819
This module exploits an arbitrary PHP code upload in the WordPress ThemePunch
19-
Revolution Slider ( revslider ) plugin, version 3.0.95 and prior. The
20+
Slider Revolution (RevSlider) plugin, versions 3.0.95 and prior. The
2021
vulnerability allows for arbitrary file upload and remote code execution.
2122
},
2223
'Author' =>
@@ -27,16 +28,16 @@ def initialize(info = {})
2728
'License' => MSF_LICENSE,
2829
'References' =>
2930
[
30-
['URL', 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/'],
31+
['OSVDB', '115118'],
3132
['EDB', '35385'],
3233
['WPVDB', '7954'],
33-
['OSVDB', '115118']
34+
['URL', 'https://whatisgon.wordpress.com/2014/11/30/another-revslider-vulnerability/']
3435
],
3536
'Privileged' => false,
3637
'Platform' => 'php',
3738
'Arch' => ARCH_PHP,
3839
'Targets' => [['ThemePunch Revolution Slider (revslider) 3.0.95', {}]],
39-
'DisclosureDate' => 'Nov 26 2015',
40+
'DisclosureDate' => 'Nov 26 2014',
4041
'DefaultTarget' => 0)
4142
)
4243
end
@@ -91,6 +92,6 @@ def exploit
9192
else
9293
fail_with(Failure::Unknown, 'ERROR')
9394
end
94-
9595
end
96+
9697
end

0 commit comments

Comments
 (0)