Skip to content

Commit b08d1ad

Browse files
author
Brent Cook
committed
Revert "Land rapid7#6812, remove broken OSVDB references"
This reverts commit 2b016e0, reversing changes made to 7b1d959.
1 parent 9862a2f commit b08d1ad

File tree

1,543 files changed

+1687
-35
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,543 files changed

+1687
-35
lines changed

data/exploits/php/rfi-locations.dat

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Compiled by RSnake 02/01/2010 Mostly from milw0rm and elsewhere.
1+
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
22
# Change XXpathXX to the path of your backdoor. Note that you may need to
33
# try it against every directory on the target and because of how this was
44
# culled you may need to add a question mark to your own XXpathXX URL:

lib/msf/core/db_manager/import/nikto.rb

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,16 @@ def import_nikto_xml(args={}, &block)
4040
}
4141
# Always report it as a note.
4242
report_note(desc_data)
43+
# Sometimes report it as a vuln, too.
44+
# XXX: There's a Vuln.info field but nothing reads from it? See Bug #5837
45+
if item.attributes['osvdbid'].to_i != 0
46+
desc_data[:refs] = ["OSVDB-#{item.attributes['osvdbid']}"]
47+
desc_data[:name] = "NIKTO-#{item.attributes['id']}"
48+
desc_data.delete(:data)
49+
desc_data.delete(:type)
50+
desc_data.delete(:update)
51+
report_vuln(desc_data)
52+
end
4353
end
4454
end
4555
end

lib/msf/core/db_manager/import/nmap.rb

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -182,6 +182,7 @@ def import_nmap_xml(args={}, &block)
182182
:info => 'Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution',
183183
:refs =>['CVE-2008-4250',
184184
'BID-31874',
185+
'OSVDB-49243',
185186
'CWE-94',
186187
'MSFT-MS08-067',
187188
'MSF-Microsoft Server Service Relative Path Stack Corruption',
@@ -203,6 +204,8 @@ def import_nmap_xml(args={}, &block)
203204
'BID-18325',
204205
'BID-18358',
205206
'BID-18424',
207+
'OSVDB-26436',
208+
'OSVDB-26437',
206209
'MSFT-MS06-025',
207210
'MSF-Microsoft RRAS Service RASMAN Registry Overflow',
208211
'NSS-21689']
@@ -221,6 +224,7 @@ def import_nmap_xml(args={}, &block)
221224
:info => 'Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution',
222225
# Add more refs based on nessus/nexpose .. results
223226
:refs =>['CVE-2007-1748',
227+
'OSVDB-34100',
224228
'MSF-Microsoft DNS RPC Service extractQuotedChar()',
225229
'NSS-25168']
226230
}

lib/msf/core/db_manager/module_cache.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,7 @@ def remove_module_details(mtype, refname)
158158
# +edb+:: Matches modules with the given Exploit-DB ID.
159159
# +name+:: Matches modules with the given full name or name.
160160
# +os+, +platform+:: Matches modules with the given platform or target name.
161+
# +osvdb+:: Matches modules with the given OSVDB ID.
161162
# +ref+:: Matches modules with the given reference ID.
162163
# +type+:: Matches modules with the given type.
163164
#
@@ -276,7 +277,7 @@ def search_modules(search_string)
276277

277278
query = query.includes(:refs).references(:refs)
278279
union_conditions << Mdm::Module::Ref.arel_table[:name].matches_any(formatted_values)
279-
when 'cve', 'bid', 'edb'
280+
when 'cve', 'bid', 'osvdb', 'edb'
280281
formatted_values = value_set.collect { |value|
281282
prefix = keyword.upcase
282283

lib/msf/core/module/reference.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ def self.from_s(str)
7777

7878
#
7979
# Initializes a site reference from an array. ary[0] is the site and
80-
# ary[1] is the site context identifier, such as CVE.
80+
# ary[1] is the site context identifier, such as OSVDB.
8181
#
8282
def self.from_a(ary)
8383
return nil if (ary.length < 2)
@@ -95,7 +95,9 @@ def initialize(in_ctx_id = 'Unknown', in_ctx_val = '')
9595
self.ctx_id = in_ctx_id
9696
self.ctx_val = in_ctx_val
9797

98-
if (in_ctx_id == 'CVE')
98+
if (in_ctx_id == 'OSVDB')
99+
self.site = "http://www.osvdb.org/#{in_ctx_val}"
100+
elsif (in_ctx_id == 'CVE')
99101
self.site = "http://cvedetails.com/cve/#{in_ctx_val}/"
100102
elsif (in_ctx_id == 'CWE')
101103
self.site = "https://cwe.mitre.org/data/definitions/#{in_ctx_val}.html"
@@ -148,7 +150,7 @@ def from_s(str)
148150
#
149151
attr_reader :site
150152
#
151-
# The context identifier of the site, such as CVE.
153+
# The context identifier of the site, such as OSVDB.
152154
#
153155
attr_reader :ctx_id
154156
#

lib/msf/core/module/search.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,8 @@ def search_filter(search_string)
8686
match = [t,w] if refs.any? { |ref| ref =~ /^cve\-/i and ref =~ r }
8787
when 'bid'
8888
match = [t,w] if refs.any? { |ref| ref =~ /^bid\-/i and ref =~ r }
89+
when 'osvdb'
90+
match = [t,w] if refs.any? { |ref| ref =~ /^osvdb\-/i and ref =~ r }
8991
when 'edb'
9092
match = [t,w] if refs.any? { |ref| ref =~ /^edb\-/i and ref =~ r }
9193
end

lib/msf/ui/console/command_dispatcher/core.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1615,6 +1615,7 @@ def cmd_search_help
16151615
'cve' => 'Modules with a matching CVE ID',
16161616
'edb' => 'Modules with a matching Exploit-DB ID',
16171617
'name' => 'Modules with a matching descriptive name',
1618+
'osvdb' => 'Modules with a matching OSVDB ID',
16181619
'platform' => 'Modules affecting this platform',
16191620
'ref' => 'Modules with a matching ref',
16201621
'type' => 'Modules of a specific type (exploit, auxiliary, or post)',

modules/auxiliary/admin/2wire/xslt_password_reset.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ def initialize(info={})
2626
'References' =>
2727
[
2828
[ 'CVE', '2007-4387' ],
29+
[ 'OSVDB', '37667' ],
2930
[ 'BID', '36075' ],
3031
[ 'URL', 'http://seclists.org/bugtraq/2007/Aug/225' ],
3132
],

modules/auxiliary/admin/android/google_play_store_uxss_xframe_rce.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ def initialize(info = {})
3838
'References' => [
3939
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2014/09/15/major-android-bug-is-a-privacy-disaster-cve-2014-6041'],
4040
[ 'URL', 'http://1337day.com/exploit/description/22581' ],
41+
[ 'OSVDB', '110664' ],
4142
[ 'CVE', '2014-6041' ]
4243
],
4344
'DefaultAction' => 'WebServer'

modules/auxiliary/admin/backupexec/dump.rb

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ def initialize(info = {})
2727
'References' =>
2828
[
2929
['CVE', '2005-2611'],
30+
['OSVDB', '18695'],
3031
['BID', '14551'],
3132
['URL', 'http://www.fpns.net/willy/msbksrc.lzh'],
3233
],

0 commit comments

Comments
 (0)