File tree Expand file tree Collapse file tree 1 file changed +11
-3
lines changed
modules/exploits/windows/mysql Expand file tree Collapse file tree 1 file changed +11
-3
lines changed Original file line number Diff line number Diff line change @@ -30,13 +30,20 @@ def initialize(info = {})
30
30
'DisablePayloadHandler' => 'true'
31
31
} ,
32
32
'License' => MSF_LICENSE ,
33
- 'References' => [ ] ,
33
+ 'References' =>
34
+ [
35
+ [ 'CVE' , '2012-5613' ] , #DISPUTED
36
+ [ 'OSVDB' , '88118' ] ,
37
+ [ 'EDB' , '23083' ] ,
38
+ [ 'URL' , 'http://seclists.org/fulldisclosure/2012/Dec/13' ]
39
+ ] ,
34
40
'Platform' => 'win' ,
35
41
'Targets' =>
36
42
[
37
43
[ 'MySQL on Windows' , { } ]
38
44
] ,
39
45
'DefaultTarget' => 0 ,
46
+ 'DisclosureDate' => 'Dec 01 2012'
40
47
) )
41
48
42
49
register_options (
@@ -48,10 +55,11 @@ def initialize(info = {})
48
55
49
56
def check
50
57
m = mysql_login ( datastore [ 'USERNAME' ] , datastore [ 'PASSWORD' ] )
51
- return Exploit ::CheckCode ::Safe if not m
58
+ return Exploit ::CheckCode ::Safe unless m
52
59
53
60
return Exploit ::CheckCode ::Appears if is_windows?
54
- return Exploit ::CheckCode ::Safe
61
+
62
+ Exploit ::CheckCode ::Safe
55
63
end
56
64
57
65
def peer
You can’t perform that action at this time.
0 commit comments