Skip to content

Commit ceaa99e

Browse files
committed
Minor final cleanup
1 parent b1a6b28 commit ceaa99e

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

modules/exploits/linux/http/fritzbox_echo_exec.rb

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,28 +25,27 @@ def initialize(info = {})
2525
[
2626
'unknown', # Vulnerability discovery
2727
'Fabian Braeunlein <[email protected]>', #Metasploit PoC with wget method
28-
'Michael Messner <[email protected]>', # Metasploit module
29-
'juan vazquez' # minor help with msf module
28+
'Michael Messner <[email protected]>' # Metasploit module
3029
],
3130
'License' => MSF_LICENSE,
3231
'References' =>
3332
[
33+
[ 'OSVDB', '103289' ],
34+
[ 'BID', '65520' ],
3435
[ 'URL', 'http://www.kapple.de/?p=75' ], #vulnerability details with PoC
3536
[ 'URL', 'https://www.speckmarschall.de/hoere.htm' ], #probably the first published details (now censored)
3637
[ 'URL', 'http://pastebin.com/GnMKGmZ2' ], #published details uncensored from speckmarschall
3738
[ 'URL', 'http://www.avm.de/en/Sicherheit/update_list.html' ], #vendor site with a list of vulnerable devices
38-
[ 'URL', 'http://breaking.systems/blog/2014/04/avm-fritzbox-root-rce-from-patch-to-metasploit-module-ii' ], #wirteup with PoC
39-
[ 'BID', '65520' ],
40-
[ 'OSVDB', '103289' ]
39+
[ 'URL', 'http://breaking.systems/blog/2014/04/avm-fritzbox-root-rce-from-patch-to-metasploit-module-ii' ] #wirteup with PoC
4140
],
4241
'DisclosureDate' => 'Feb 11 2014',
4342
'Privileged' => true,
44-
'Platform' => %w{ linux },
43+
'Platform' => 'linux',
44+
'Arch' => ARCH_MIPSLE,
4545
'Payload' =>
4646
{
4747
'DisableNops' => true
4848
},
49-
'Arch' => ARCH_MIPSLE,
5049
'Targets' =>
5150
[
5251
[ 'Automatic Targeting', { } ],

0 commit comments

Comments
 (0)