File tree Expand file tree Collapse file tree 1 file changed +3
-4
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +3
-4
lines changed Original file line number Diff line number Diff line change @@ -28,7 +28,9 @@ def initialize(info={})
28
28
] ,
29
29
'References' =>
30
30
[
31
- [ 'CVE' , '2014-3704' ]
31
+ [ 'CVE' , '2014-3704' ] ,
32
+ [ 'URL' , 'https://www.drupal.org/SA-CORE-2014-005' ] ,
33
+ [ 'URL' , 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html' ]
32
34
] ,
33
35
'Privileged' => false ,
34
36
'Platform' => [ 'php' ] ,
@@ -112,7 +114,6 @@ def extract_form_ids(content)
112
114
def exploit
113
115
114
116
# TODO: Password hashing function
115
- # TODO: Check returns from regex matches, fail if nil
116
117
# TODO: Check if option admin_role exists via admin/people/permissions/roles
117
118
118
119
# call login page to extract tokens
@@ -201,7 +202,6 @@ def exploit
201
202
enabled_module_regex = /name="(.+)" value="1" checked="checked" class="form-checkbox"/
202
203
enabled_matches = res . body . to_enum ( :scan , enabled_module_regex ) . map { Regexp . last_match }
203
204
204
-
205
205
unless enabled_matches
206
206
fail_with ( Failure ::Unknown , "No modules enabled is incorrect, bailing." )
207
207
end
@@ -338,4 +338,3 @@ def exploit
338
338
)
339
339
end
340
340
end
341
-
You can’t perform that action at this time.
0 commit comments