Skip to content

Commit 9bab77e

Browse files
committed
add urls
2 parents 5c4ac48 + b031ce4 commit 9bab77e

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

modules/exploits/multi/http/drupal_drupageddon.rb

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,9 @@ def initialize(info={})
2828
],
2929
'References' =>
3030
[
31-
['CVE', '2014-3704']
31+
['CVE', '2014-3704'],
32+
['URL', 'https://www.drupal.org/SA-CORE-2014-005'],
33+
['URL', 'http://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html']
3234
],
3335
'Privileged' => false,
3436
'Platform' => ['php'],
@@ -112,7 +114,6 @@ def extract_form_ids(content)
112114
def exploit
113115

114116
# TODO: Password hashing function
115-
# TODO: Check returns from regex matches, fail if nil
116117
# TODO: Check if option admin_role exists via admin/people/permissions/roles
117118

118119
# call login page to extract tokens
@@ -201,7 +202,6 @@ def exploit
201202
enabled_module_regex = /name="(.+)" value="1" checked="checked" class="form-checkbox"/
202203
enabled_matches = res.body.to_enum(:scan, enabled_module_regex).map { Regexp.last_match }
203204

204-
205205
unless enabled_matches
206206
fail_with(Failure::Unknown, "No modules enabled is incorrect, bailing.")
207207
end
@@ -338,4 +338,3 @@ def exploit
338338
)
339339
end
340340
end
341-

0 commit comments

Comments
 (0)