Skip to content

Commit c666d04

Browse files
author
Brent Cook
committed
Land rapid7#5043 @todb-r7's release fixups
2 parents 86d8aab + d1318d1 commit c666d04

File tree

3 files changed

+16
-12
lines changed

3 files changed

+16
-12
lines changed

modules/auxiliary/admin/http/wp_wplms_privilege_escalation.rb

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,16 @@ def initialize(info = {})
1313
info,
1414
'Name' => 'WordPress WPLMS Theme Privilege Escalation',
1515
'Description' => %q{
16-
The WordPress WPLMS theme from version 1.5.2 to 1.8.4.1 allows authenticated users of
17-
any user level to set any system option via a lack of validation in the import_data function
18-
of /includes/func.php.
16+
The WordPress WPLMS theme from version 1.5.2 to 1.8.4.1 allows an
17+
authenticated user of any user level to set any system option due to a lack of
18+
validation in the import_data function of /includes/func.php.
1919
2020
The module first changes the admin e-mail address to prevent any
21-
notifications being sent to the actual administrator during the attack, re-enables user
22-
registration in case it has been disabled and sets the default role to be administrator.
23-
This will allow for the user to create a new account with admin privileges via the default
24-
registration page found at /wp-login.php?action=register.
21+
notifications being sent to the actual administrator during the attack,
22+
re-enables user registration in case it has been disabled and sets the default
23+
role to be administrator. This will allow for the user to create a new account
24+
with admin privileges via the default registration page found at
25+
/wp-login.php?action=register.
2526
},
2627
'Author' =>
2728
[

modules/auxiliary/gather/ms14_052_xmldom.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ def initialize(info={})
1515
super(update_info(info,
1616
'Name' => "MS14-052 Microsoft Internet Explorer XMLDOM Filename Disclosure",
1717
'Description' => %q{
18-
This module will use the Microsoft XMLDOM object to enumerate a remote user's filenames.
18+
This module will use the Microsoft XMLDOM object to enumerate a remote machine's filenames.
1919
It will try to do so against Internet Explorer 8 and Internet Explorer 9. To use it, you
20-
must supply your own list of file paths. Each file's format should look like this:
20+
must supply your own list of file paths. Each file path should look like this:
2121
c:\\\\windows\\\\system32\\\\calc.exe
2222
},
2323
'License' => MSF_LICENSE,

modules/post/windows/gather/credentials/mssql_local_hashdump.rb

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,14 @@ def initialize(info={})
1717
super( update_info( info,
1818
'Name' => 'Windows Gather Local SQL Server Hash Dump',
1919
'Description' => %q{ This module extracts the usernames and password
20-
hashes from a MSSQL server and stores them in the loot using the
21-
same technique in mssql_local_auth_bypass (Credits: Scott Sutherland)
20+
hashes from an MSSQL server and stores them as loot. It uses the
21+
same technique in mssql_local_auth_bypass.
2222
},
2323
'License' => MSF_LICENSE,
24-
'Author' => [ 'Mike Manzotti <mike.manzotti[at]dionach.com>'],
24+
'Author' => [
25+
'Mike Manzotti <mike.manzotti[at]dionach.com>',
26+
'nullbind' # Original technique
27+
],
2528
'Platform' => [ 'win' ],
2629
'SessionTypes' => [ 'meterpreter' ],
2730
'References' =>

0 commit comments

Comments
 (0)