File tree Expand file tree Collapse file tree 2 files changed +14
-2
lines changed
documentation/modules/exploit/linux/http
modules/exploits/linux/http Expand file tree Collapse file tree 2 files changed +14
-2
lines changed Original file line number Diff line number Diff line change 4
4
Exploit-db: [ edb] ( https://www.exploit-db.com/apps/2fa84367ba4f14afab9f51cd3e93606d-tiki-14.2.7z )
5
5
Archived Copy: [ github] ( https://github.com/h00die/MSF-Testing-Scripts )
6
6
7
+ Of note, there is some discussion if 14.2 is vuln or not.
8
+ ```
9
+ 1. Exploit-DB says in the title (may be wrong) 14.2 is vuln.
10
+ 2. The linked app Exploit-DB has is 14.2.
11
+ 3. Its verified on Exploit-DB.
12
+ ```
13
+ vs
14
+ ```
15
+ 1. Manual print statement testing from the PoC on 14.2 doesn't seem to be vuln
16
+ 2. The [notice](https://tiki.org/article414-Important-Security-Fix-for-all-versions-of-Tiki) seems to say 14.2 is the update that fixes the problem
17
+ ```
18
+
7
19
### Creating A Testing Environment
8
20
9
21
1 . Create a fresh Ubuntu 16.04 w/ a LAMP install
Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ def initialize(info = {})
20
20
The calendar module is NOT enabled by default. When enbled,
21
21
the default permissions are set to NOT allow anonymous users
22
22
to access.
23
- Vulnerable versions: <=14.2 , <=12.5 LTS, <=9.11 LTS and <=6.15
23
+ Vulnerable versions: <=14.1 , <=12.4 LTS, <=9.10 LTS and <=6.14
24
24
Verified/Tested against 14.1
25
25
) ,
26
26
'Author' =>
@@ -123,7 +123,7 @@ def check
123
123
if res
124
124
if res . body =~ /You do not have permission to view the calendar/
125
125
fail_with ( Failure ::NoAccess , "#{ peer } - Additional Permissions Required" )
126
- elsif res . body =~ /#{ flag } /
126
+ elsif res . body =~ /> #{ flag } < /
127
127
Exploit ::CheckCode ::Vulnerable
128
128
else
129
129
Exploit ::CheckCode ::Safe
You can’t perform that action at this time.
0 commit comments