Skip to content

Commit 81b4efc

Browse files
committed
Fix requires for PhpEXE
And incidentally fix some msftidy complaints
1 parent f91719b commit 81b4efc

12 files changed

+13
-19
lines changed

lib/msf/core/exploit/mixins.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@
1515
require 'msf/core/exploit/kernel_mode'
1616
require 'msf/core/exploit/exe'
1717
require 'msf/core/exploit/ropdb'
18+
require 'msf/core/exploit/php_exe'
1819

1920
# CmdStagers
2021
require 'msf/core/exploit/cmdstager'

lib/msf/core/exploit/php_exe.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,12 @@
66
#
77
###
88

9-
require 'msf/core/payload/php'
10-
119
module Msf
1210
module Exploit::PhpEXE
1311
include Exploit::EXE
12+
13+
require 'msf/core/payload'
14+
require 'msf/core/payload/php'
1415
include Payload::Php
1516

1617
#

modules/exploits/linux/http/vcms_upload.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
##
77

88
require 'msf/core'
9-
require 'msf/core/exploit/php_exe'
109

1110
class Metasploit3 < Msf::Exploit::Remote
1211
Rank = ExcellentRanking

modules/exploits/multi/http/auxilium_upload_exec.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
##
77

88
require 'msf/core'
9-
require 'msf/core/exploit/php_exe'
109

1110
class Metasploit3 < Msf::Exploit::Remote
1211
Rank = ExcellentRanking

modules/exploits/multi/http/eaton_nsm_code_exec.rb

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
##
77

88
require 'msf/core'
9-
require 'msf/core/exploit/php_exe'
109

1110
class Metasploit3 < Msf::Exploit::Remote
1211
Rank = ExcellentRanking
@@ -16,13 +15,15 @@ class Metasploit3 < Msf::Exploit::Remote
1615

1716
def initialize(info = {})
1817
super(update_info(info,
19-
'Name' => 'Network Shutdown Module <= 3.21 (sort_values) Remote PHP Code Injection',
18+
'Name' => 'Network Shutdown Module (sort_values) Remote PHP Code Injection',
2019
'Description' => %q{
21-
This module exploits a vulnerability in lib/dbtools.inc which uses
22-
unsanitized user input inside a eval() call. Additionally the base64 encoded
23-
user credentials are extracted from the database of the application. Please
24-
note that in order to be able to steal credentials, the vulnerable service
25-
must have at least one USV module (an entry in the "nodes" table in mgedb.db)
20+
This module exploits a vulnerability in Eaton Network Shutdown Module
21+
version <= 3.21, in lib/dbtools.inc which uses unsanitized user input
22+
inside a eval() call. Additionally the base64 encoded user credentials
23+
are extracted from the database of the application. Please note that
24+
in order to be able to steal credentials, the vulnerable service must
25+
have at least one USV module (an entry in the "nodes" table in
26+
mgedb.db)
2627
},
2728
'Author' =>
2829
[

modules/exploits/multi/http/mobilecartly_upload_exec.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
##
77

88
require 'msf/core'
9-
require 'msf/core/exploit/php_exe'
109

1110
class Metasploit3 < Msf::Exploit::Remote
1211
Rank = ExcellentRanking

modules/exploits/multi/http/polarcms_upload_exec.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@
77

88

99
require 'msf/core'
10-
require 'msf/core/exploit/php_exe'
1110

1211
class Metasploit3 < Msf::Exploit::Remote
1312
Rank = ExcellentRanking

modules/exploits/multi/http/sflog_upload_exec.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
##
77

88
require 'msf/core'
9-
require 'msf/core/exploit/php_exe'
109

1110
class Metasploit3 < Msf::Exploit::Remote
1211
Rank = ExcellentRanking

modules/exploits/unix/webapp/invision_pboard_unserialize_exec.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
##
77

88
require 'msf/core'
9-
require 'msf/core/exploit/php_exe'
109

1110
class Metasploit3 < Msf::Exploit::Remote
1211
Rank = ExcellentRanking
@@ -16,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
1615

1716
def initialize(info = {})
1817
super(update_info(info,
19-
'Name' => 'Invision IP.Board <= 3.3.4 unserialize() PHP Code Execution',
18+
'Name' => 'Invision IP.Board unserialize() PHP Code Execution',
2019
'Description' => %q{
2120
This module exploits a php unserialize() vulnerability in Invision IP.Board
2221
<= 3.3.4 which could be abused to allow unauthenticated users to execute arbitrary

modules/exploits/unix/webapp/projectpier_upload_exec.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@
66
##
77

88
require 'msf/core'
9-
require 'msf/core/exploit/php_exe'
109

1110
class Metasploit3 < Msf::Exploit::Remote
1211
Rank = ExcellentRanking

0 commit comments

Comments
 (0)