@@ -14,27 +14,31 @@ class Metasploit4 < Msf::Auxiliary
14
14
15
15
def initialize ( info = { } )
16
16
super ( update_info ( info ,
17
- 'Name' => '' ,
17
+ 'Name' => 'Gallery WD for Joomla! Unauthenticated SQL Injection Scanner ' ,
18
18
'Description' => %q{
19
+ This module will scan for Joomla! instances vulnerable to an unauthenticated SQL injection
20
+ within the Gallery WD for Joomla! extension version 1.2.5 and likely prior.
19
21
} ,
20
22
'Author' =>
21
23
[
24
+ 'CrashBandicoot' , #independent discovery/0day drop
25
+ 'bperry' #discovery/metasploit module
22
26
] ,
23
27
'License' => MSF_LICENSE ,
24
28
'References' =>
25
29
[
26
- [ 'CVE' , '2013-3621' ] ,
27
- [ 'CVE' , '2013-3623' ] ,
28
- [ 'URL' , 'https://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmi-firmware-vulnerabilities' ]
30
+ [ 'EDB' , '36563' ]
29
31
] ,
30
- 'DisclosureDate' => 'Nov 06 2013 ' ) )
32
+ 'DisclosureDate' => 'Mar 30 2015 ' ) )
31
33
34
+ register_options ( [
35
+ OptString . new ( 'TARGETURI' , [ true , 'Target URI of the Joomla! instance' , '/' ] )
36
+ ] , self . class )
32
37
end
33
38
34
39
def run_host ( ip )
35
-
36
- left_marker = Rex ::Text . rand_text_alpha ( 5 )
37
40
right_marker = Rex ::Text . rand_text_alpha ( 5 )
41
+ left_marker = Rex ::Text . rand_text_alpha ( 5 )
38
42
flag = Rex ::Text . rand_text_alpha ( 5 )
39
43
40
44
vprint_status ( "#{ peer } - Checking host" )
@@ -88,13 +92,13 @@ def run_host(ip)
88
92
result = res . body =~ /#{ left_marker } #{ flag } #{ right_marker } /
89
93
90
94
if result
91
- print_good ( "#{ peer } - Vulnerable to CVE-2013-3623 (close_window.cgi Buffer Overflow) " )
95
+ print_good ( "#{ peer } - Vulnerable to unauthenticated SQL injection within Gallery WD for Joomla! " )
92
96
report_vuln ( {
93
97
:host => rhost ,
94
98
:port => rport ,
95
99
:proto => 'tcp' ,
96
- :name => "Supermicro Onboard IPMI close_window.cgi Buffer Overflow " ,
97
- :refs => self . references . select { |ref | ref . ctx_val == "2013-3623 " }
100
+ :name => "Unauthenticated error-based SQL injection in Gallery WD for Joomla! " ,
101
+ :refs => self . references . select { |ref | ref . ctx_val == "36563 " }
98
102
} )
99
103
end
100
104
0 commit comments