Skip to content

Commit f7e709d

Browse files
committed
Land rapid7#3941, new WPVDB reference
2 parents 6f50ef5 + f45b895 commit f7e709d

15 files changed

+45
-24
lines changed

lib/msf/core/module/reference.rb

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -93,21 +93,23 @@ def initialize(in_ctx_id = 'Unknown', in_ctx_val = '')
9393
self.ctx_val = in_ctx_val
9494

9595
if (in_ctx_id == 'OSVDB')
96-
self.site = 'http://www.osvdb.org/' + in_ctx_val.to_s
96+
self.site = "http://www.osvdb.org/#{in_ctx_val}"
9797
elsif (in_ctx_id == 'CVE')
98-
self.site = "http://cvedetails.com/cve/#{in_ctx_val.to_s}/"
98+
self.site = "http://cvedetails.com/cve/#{in_ctx_val}/"
9999
elsif (in_ctx_id == 'CWE')
100-
self.site = "http://cwe.mitre.org/data/definitions/#{in_ctx_val.to_s}.html"
100+
self.site = "http://cwe.mitre.org/data/definitions/#{in_ctx_val}.html"
101101
elsif (in_ctx_id == 'BID')
102-
self.site = 'http://www.securityfocus.com/bid/' + in_ctx_val.to_s
102+
self.site = "http://www.securityfocus.com/bid/#{in_ctx_val}"
103103
elsif (in_ctx_id == 'MSB')
104-
self.site = 'http://technet.microsoft.com/en-us/security/bulletin/' + in_ctx_val.to_s
104+
self.site = "http://technet.microsoft.com/en-us/security/bulletin/#{in_ctx_val}"
105105
elsif (in_ctx_id == 'EDB')
106-
self.site = 'http://www.exploit-db.com/exploits/' + in_ctx_val.to_s
106+
self.site = "http://www.exploit-db.com/exploits/#{in_ctx_val}"
107107
elsif (in_ctx_id == 'US-CERT-VU')
108-
self.site = 'http://www.kb.cert.org/vuls/id/' + in_ctx_val.to_s
108+
self.site = "http://www.kb.cert.org/vuls/id/#{in_ctx_val}"
109109
elsif (in_ctx_id == 'ZDI')
110-
self.site = 'http://www.zerodayinitiative.com/advisories/ZDI-' + in_ctx_val.to_s
110+
self.site = "http://www.zerodayinitiative.com/advisories/ZDI-#{in_ctx_val}"
111+
elsif (in_ctx_id == 'WPVDB')
112+
self.site = "https://wpvulndb.com/vulnerabilities/#{in_ctx_val}"
111113
elsif (in_ctx_id == 'URL')
112114
self.site = in_ctx_val.to_s
113115
else

modules/auxiliary/admin/http/wp_custom_contact_forms.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,8 @@ def initialize(info = {})
2525
'References' =>
2626
[
2727
[ 'URL', 'http://blog.sucuri.net/2014/08/database-takeover-in-custom-contact-forms.html' ],
28-
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ]
28+
[ 'URL', 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.3&old=997569&new_path=%2Fcustom-contact-forms%2Ftags%2F5.1.0.4&new=997569&sfp_email=&sfph_mail=' ],
29+
[ 'WPVDB', '7542' ]
2930
],
3031
'DisclosureDate' => 'Aug 07 2014'
3132
))

modules/auxiliary/dos/http/wordpress_xmlrpc_dos.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ def initialize(info = {})
2929
['URL', 'http://wordpress.org/news/2014/08/wordpress-3-9-2/'],
3030
['URL', 'http://www.breaksec.com/?p=6362'],
3131
['URL', 'http://mashable.com/2014/08/06/wordpress-xml-blowup-dos/'],
32-
['URL', 'https://core.trac.wordpress.org/changeset/29404']
32+
['URL', 'https://core.trac.wordpress.org/changeset/29404'],
33+
['WPVDB', '7526']
3334
],
3435
'DisclosureDate'=> 'Aug 6 2014'
3536
))

modules/auxiliary/gather/wp_w3_total_cache_hash_extract.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,8 @@ def initialize
2525
'References' =>
2626
[
2727
['OSVDB', '88744'],
28-
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242']
28+
['URL', 'http://seclists.org/fulldisclosure/2012/Dec/242'],
29+
['WPVDB', '6621']
2930
],
3031
'Author' =>
3132
[

modules/exploits/unix/webapp/open_flash_chart_upload_exec.rb

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,13 @@ def initialize(info={})
3232
['BID', '37314'],
3333
['CVE', '2009-4140'],
3434
['OSVDB', '59051'],
35-
['EDB', '10532']
35+
['EDB', '10532'],
36+
['WPVDB', '6787'],
37+
['WPVDB', '6788'],
38+
['WPVDB', '6789'],
39+
['WPVDB', '6790'],
40+
['WPVDB', '6791'],
41+
['WPVDB', '6792']
3642
],
3743
'Payload' =>
3844
{

modules/exploits/unix/webapp/php_wordpress_foxypress.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,8 @@ def initialize(info = {})
3131
[
3232
['EDB', '18991'],
3333
['OSVDB' '82652'],
34-
['BID', '53805']
34+
['BID', '53805'],
35+
['WPVDB', '6231']
3536
],
3637
'Privileged' => false,
3738
'Platform' => 'php',

modules/exploits/unix/webapp/php_wordpress_lastpost.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,16 +27,17 @@ def initialize(info = {})
2727
['CVE', '2005-2612'],
2828
['OSVDB', '18672'],
2929
['BID', '14533'],
30+
['WPVDB', '6034']
3031
],
3132
'Privileged' => false,
3233
'Payload' =>
3334
{
3435
'DisableNops' => true,
3536
'Compat' =>
3637
{
37-
'ConnectionType' => 'find',
38+
'ConnectionType' => 'find'
3839
},
39-
'Space' => 512,
40+
'Space' => 512
4041
},
4142
'Platform' => 'php',
4243
'Arch' => ARCH_PHP,

modules/exploits/unix/webapp/php_wordpress_optimizepress.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ def initialize(info = {})
2929
'License' => MSF_LICENSE,
3030
'References' =>
3131
[
32-
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ]
32+
[ 'URL', "http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/" ],
33+
[ 'WPVDB', '7441' ]
3334
],
3435
'Privileged' => false,
3536
'Platform' => ['php'],

modules/exploits/unix/webapp/php_wordpress_total_cache.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,8 @@ def initialize(info = {})
3838
[ 'OSVDB', '92652' ],
3939
[ 'BID', '59316' ],
4040
[ 'URL', 'http://wordpress.org/support/topic/pwn3d' ],
41-
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ]
41+
[ 'URL', 'http://www.acunetix.com/blog/web-security-zone/wp-plugins-remote-code-execution/' ],
42+
[ 'WPVDB', '6622' ]
4243
],
4344
'Privileged' => false,
4445
'Platform' => ['php'],

modules/exploits/unix/webapp/wp_advanced_custom_fields_exec.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,22 +23,23 @@ def initialize(info = {})
2323
},
2424
'Author' =>
2525
[
26-
'Charlie Eriksen <charlie[at]ceriksen.com>',
26+
'Charlie Eriksen <charlie[at]ceriksen.com>'
2727
],
2828
'License' => MSF_LICENSE,
2929
'References' =>
3030
[
3131
['OSVDB', '87353'],
3232
['URL', 'http://secunia.com/advisories/51037/'],
33+
['WPVDB', '6103']
3334
],
3435
'Privileged' => false,
3536
'Payload' =>
3637
{
3738
'DisableNops' => true,
3839
'Compat' =>
3940
{
40-
'ConnectionType' => 'find',
41-
},
41+
'ConnectionType' => 'find'
42+
}
4243
},
4344
'Platform' => 'php',
4445
'Arch' => ARCH_PHP,

0 commit comments

Comments
 (0)