Skip to content

Commit f12171d

Browse files
committed
Land rapid7#3136, release fixes
2 parents c7ba7e4 + cfdd64d commit f12171d

File tree

6 files changed

+15
-16
lines changed

6 files changed

+15
-16
lines changed

modules/auxiliary/gather/joomla_weblinks_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ def run
8484
file = datastore['FILEPATH'].unpack("H*")[0]
8585
catid = datastore['CATEGORYID']
8686

87-
payload = catid.to_s
87+
payload = catid.to_s
8888
payload << ") UNION ALL SELECT CONCAT(0x#{front_marker.unpack('H*')[0]}"
8989
payload << ",IFNULL(CAST(HEX(LOAD_FILE("
9090
payload << "0x#{file})) AS CHAR),0x20),0x#{back_marker.unpack('H*')[0]})#"

modules/exploits/linux/ssh/quantum_vmpro_backdoor.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,10 @@ def initialize(info={})
1515
super(update_info(info,
1616
'Name' => "Quantum vmPRO Backdoor Command",
1717
'Description' => %q{
18-
This module abuses a backdoor command in vmPRO 3.1.2. Any user, even without admin
18+
This module abuses a backdoor command in Quantum vmPRO. Any user, even one without admin
1919
privileges, can get access to the restricted SSH shell. By using the hidden backdoor
20-
"shell-escape" command it's possible to drop to a real root bash shell.
20+
"shell-escape" command it's possible to drop to a real root bash shell. This module
21+
has been tested successfully on Quantum vmPRO 3.1.2.
2122
},
2223
'License' => MSF_LICENSE,
2324
'Author' =>

modules/exploits/unix/ssh/array_vxag_vapv_privkey_privesc.rb

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,14 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info={})
1515
super(update_info(info,
16-
'Name' => "Array Networks vAPV and vxAG Private Key Privelege Escalation Code Execution",
16+
'Name' => "Array Networks vAPV and vxAG Private Key Privilege Escalation Code Execution",
1717
'Description' => %q{
1818
This module exploits a default hardcoded private SSH key or default hardcoded
1919
login and password in the vAPV 8.3.2.17 and vxAG 9.2.0.34 appliances made
20-
by Array Networks. After logged in as the unprivileged user, it's possible to
21-
modify the world writable file /ca/bin/monitor.sh with our arbitrary code.
22-
Execution of the arbitrary code is possible by using the backend tool, running
23-
setuid, to turn the debug monitoring on. This makes it possible to trigger our
24-
payload with root privileges.
20+
by Array Networks. After logged in as the unprivileged user, it's possible to modify
21+
the world-writable file /ca/bin/monitor.sh with attacker-supplied arbitrary code.
22+
Execution is possible by using the backend tool, running setuid, to turn the debug
23+
monitoring on. This makes it possible to trigger a payload with root privileges.
2524
},
2625
'License' => MSF_LICENSE,
2726
'Author' =>
@@ -79,7 +78,6 @@ def rhost
7978
datastore['RHOST']
8079
end
8180

82-
8381
def rport
8482
datastore['RPORT']
8583
end
@@ -118,7 +116,7 @@ def login_key(user)
118116
end
119117

120118
def login_user_pass(user, pass)
121-
print_status("#{rhost}:#{rport} - Attempt to login with '#{user}:#{pass}'")
119+
print_status("#{rhost}:#{rport} - Attempting to login with '#{user}:#{pass}'")
122120

123121
opts = {
124122
:auth_methods => ['password', 'keyboard-interactive'],

modules/exploits/unix/webapp/freepbx_config_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def initialize(info={})
1414
super(update_info(info,
1515
'Name' => "FreePBX config.php Remote Code Execution",
1616
'Description' => %q{
17-
This module exploits a vulnerability found in FreePBX version 2.9, 2.10, 2.11.
17+
This module exploits a vulnerability found in FreePBX version 2.9, 2.10, and 2.11.
1818
It's possible to inject arbitrary PHP functions and commands in the "/admin/config.php"
1919
parameters "function" and "args".
2020
},

modules/exploits/windows/browser/ms14_012_textrange.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,10 @@ def initialize(info={})
1515
'Name' => "MS14-012 Internet Explorer TextRange Use-After-Free",
1616
'Description' => %q{
1717
This module exploits a use-after-free vulnerability found in Internet Explorer. The flaw
18-
was most likely introduced back in 2013, therefore only certain builds of MSHTML are
18+
was most likely introduced in 2013, therefore only certain builds of MSHTML are
1919
affected. In our testing with IE9, these vulnerable builds appear to be between
20-
9.0.8112.16496 and 9.0.8112.16533, which implies August 2013 until early March 2014
21-
(before the patch).
20+
9.0.8112.16496 and 9.0.8112.16533, which implies the vulnerability shipped between
21+
August 2013, when it was introduced, until the fix issued in early March 2014.
2222
},
2323
'License' => MSF_LICENSE,
2424
'Author' =>

test/modules/post/test/get_env.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit4 < Msf::Post
1313

1414
def initialize(info={})
1515
super( update_info( info,
16-
'Name' => 'Testing Get Envs',
16+
'Name' => 'Test Post::Common Get Envs',
1717
'Description' => %q{ This module will test Post::Common get envs API methods },
1818
'License' => MSF_LICENSE,
1919
'Author' => [ 'Ben Campbell'],

0 commit comments

Comments
 (0)