Skip to content

Commit aa00661

Browse files
author
Brent Cook
committed
Land rapid7#8518, update CVE references where modules report_vuln
2 parents 4198efa + b932aae commit aa00661

21 files changed

+45
-5
lines changed

modules/auxiliary/scanner/dns/dns_amp.rb

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,12 @@ def initialize
1919
third party.
2020
},
2121
'Author' => [ 'xistence <xistence[at]0x90.nl>'], # Original scanner module
22-
'License' => MSF_LICENSE
22+
'License' => MSF_LICENSE,
23+
'References' =>
24+
[
25+
['CVE', '2006-0987'],
26+
['CVE', '2006-0988'],
27+
]
2328
)
2429

2530
register_options( [
@@ -124,7 +129,7 @@ def scanner_process(data, shost, sport)
124129
:port => datastore['RPORT'],
125130
:proto => 'udp', :name => "DNS",
126131
:info => "DNS amplification - #{data.length} bytes [#{amp.round(2)}x Amplification]",
127-
:refs => [ "CVE-2006-0987", "CVE-2006-0988" ])
132+
:refs => self.references)
128133
end
129134

130135
# If these flags are set, we get a valid response but recursion is not available

modules/auxiliary/scanner/http/host_header_injection.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ def initialize(info = {})
2121
'License' => MSF_LICENSE,
2222
'References' =>
2323
[
24+
['CVE', '2016-10073'], # validate, an instance of a described attack approach from the original reference
2425
['URL', 'http://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html']
2526
]
2627
))

modules/auxiliary/scanner/http/jenkins_command.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ def initialize(info = {})
2626
],
2727
'References' =>
2828
[
29+
['CVE', '2015-8103'], # see link and validate, https://highon.coffee/blog/jenkins-api-unauthenticated-rce-exploit/ states this is another issue
30+
['URL', 'https://jenkins.io/security/advisory/2015-11-11/'],
2931
['URL', 'https://www.pentestgeek.com/penetration-testing/hacking-jenkins-servers-with-no-password/'],
3032
['URL', 'https://wiki.jenkins-ci.org/display/JENKINS/Jenkins+Script+Console'],
3133
],

modules/auxiliary/scanner/http/trace.rb

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,12 @@ def initialize
2020
'Jay Turla <@shipcod3>' , #Cross-Site Tracing (XST) Checker
2121
'CG' #HTTP TRACE Detection
2222
],
23-
'License' => MSF_LICENSE
23+
'License' => MSF_LICENSE,
24+
'References' =>
25+
[
26+
['CVE', '2005-3398'], # early case where this vector applied to a specific application.
27+
['URL', 'https://www.owasp.org/index.php/Cross_Site_Tracing']
28+
]
2429
)
2530
end
2631

modules/auxiliary/scanner/ipmi/ipmi_cipher_zero.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ def initialize
2323
'License' => MSF_LICENSE,
2424
'References' =>
2525
[
26+
['CVE', '2013-4782'],
2627
['URL', 'http://fish2.com/ipmi/cipherzero.html'],
2728
['OSVDB', '93038'],
2829
['OSVDB', '93039'],

modules/auxiliary/scanner/misc/sercomm_backdoor_scanner.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ def initialize(info={})
2424
'License' => MSF_LICENSE,
2525
'References' =>
2626
[
27+
[ 'CVE', '2014-0659' ],
2728
[ 'OSVDB', '101653' ],
2829
[ 'URL', 'https://github.com/elvanderb/TCP-32764' ]
2930
],

modules/auxiliary/scanner/ntp/ntp_peer_list_dos.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ def initialize
2424
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2525
'References' =>
2626
[
27+
['CVE', '2013-5211'], # see also scanner/ntp/ntp_monlist.rb
2728
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
2829
['URL', 'http://r-7.co/R7-2014-12']
2930
],

modules/auxiliary/scanner/ntp/ntp_peer_list_sum_dos.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ def initialize
2424
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2525
'References' =>
2626
[
27+
['CVE', '2013-5211'], # see also scanner/ntp/ntp_monlist.rb
2728
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
2829
['URL', 'http://r-7.co/R7-2014-12']
2930
],

modules/auxiliary/scanner/ntp/ntp_readvar.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ def initialize(info = {})
2626
'License' => MSF_LICENSE,
2727
'References' =>
2828
[
29+
['CVE', '2013-5211'], # see also scanner/ntp/ntp_monlist.rb
2930
[ 'URL', 'http://www.rapid7.com/vulndb/lookup/ntp-clock-variables-disclosure' ]
3031
]
3132
)

modules/auxiliary/scanner/ntp/ntp_req_nonce_dos.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ def initialize
2525
'Author' => 'Jon Hart <jon_hart[at]rapid7.com>',
2626
'References' =>
2727
[
28+
['CVE', '2013-5211'], # see also scanner/ntp/ntp_monlist.rb
2829
['URL', 'https://github.com/rapid7/metasploit-framework/pull/3696'],
2930
['URL', 'http://r-7.co/R7-2014-12']
3031
],

0 commit comments

Comments
 (0)