Skip to content

Commit d4b196b

Browse files
committed
Update exploits to note target authors
Target authors were selected based on comments that indicated that the author was only responsible for a set of descrete targets. Authors that were noted as assisting with target testing, check module development, etc. were left at the module level.
1 parent 276623f commit d4b196b

File tree

12 files changed

+44
-37
lines changed

12 files changed

+44
-37
lines changed

modules/exploits/linux/persistence/init_systemd.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,12 @@ def initialize(info = {})
3434
'License' => MSF_LICENSE,
3535
'Author' => [
3636
'h00die <mike@shorebreaksecurity.com>',
37-
'Cale Black' # user target
3837
],
3938
'Platform' => ['unix', 'linux'],
4039
'Privileged' => true,
4140
'Targets' => [
4241
['systemd', {}],
43-
['systemd user', {}]
42+
['systemd user', { 'Author' => 'Cale Black' }]
4443
],
4544
'DefaultTarget' => 0,
4645
'Arch' => [

modules/exploits/multi/http/struts_code_exec_classloader.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,7 @@ def initialize(info = {})
2727
'Author' => [
2828
'Mark Thomas', # Vulnerability Discovery
2929
'Przemyslaw Celej', # Vulnerability Discovery
30-
'Redsadic <julian.vilas[at]gmail.com>', # Metasploit Module
31-
'Matthew Hall <hallm[at]sec-1.com>' # SMB target
30+
'Redsadic <julian.vilas[at]gmail.com>' # Metasploit Module
3231
],
3332
'License' => MSF_LICENSE,
3433
'References' => [
@@ -71,6 +70,7 @@ def initialize(info = {})
7170
'Windows / Tomcat 6 & 7 and GlassFish 4 (Remote SMB Resource)',
7271
{
7372
'Arch' => ARCH_JAVA,
73+
'Author' => 'Matthew Hall <hallm[at]sec-1.com>',
7474
'Platform' => 'win'
7575
}
7676
]

modules/exploits/multi/misc/indesign_server_soap.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ def initialize(info = {})
2121
The exploit drops the payload on the server and must be removed manually.
2222
},
2323
'Author' => [
24-
'h0ng10', # Vulnerability discovery / Metasploit module
25-
'juan vazquez' # MacOSX target
24+
'h0ng10' # Vulnerability discovery / Metasploit module
2625
],
2726
'License' => MSF_LICENSE,
2827
'Privileged' => false,
@@ -43,6 +42,7 @@ def initialize(info = {})
4342
'Indesign CS6 Server / Mac OS X Snow Leopard 64 bits',
4443
{
4544
'Arch' => ARCH_X64,
45+
'Author' => 'juan vazquez',
4646
'Platform' => 'osx'
4747
}
4848
]

modules/exploits/multi/sap/sap_mgmt_con_osexec_payload.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ def initialize(info = {})
2121
'Name' => 'SAP Management Console OSExecute Payload Execution',
2222
'License' => MSF_LICENSE,
2323
'Author' => [
24-
'Chris John Riley', # Original module, windows target
25-
'juan vazquez' # Linux target
24+
'Chris John Riley' # Original module, windows target
2625
],
2726
'Description' => %q{
2827
This module executes an arbitrary payload through the SAP Management Console
@@ -44,6 +43,7 @@ def initialize(info = {})
4443
'Linux',
4544
{
4645
'Arch' => ARCH_X86,
46+
'Author' => 'juan vazquez',
4747
'Platform' => 'linux'
4848
}
4949
],

modules/exploits/multi/script/web_delivery.rb

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,10 +62,7 @@ def initialize(info = {})
6262
'Casey Smith', # AppLocker bypass research and vulnerability discovery (@subTee)
6363
'Trenton Ivey', # AppLocker MSF Module (kn0)
6464
'g0tmi1k', # @g0tmi1k // https://blog.g0tmi1k.com/ - additional features
65-
'bcoles', # support for targets: pubprn, SyncAppvPublishingServer and Linux wget
66-
'Matt Nelson', # @enigma0x3 // pubprn discovery
6765
'phra', # @phraaaaaaa // https://iwantmore.pizza/ - AMSI/SBL bypass
68-
'Nick Landers', # @monoxgas // SyncAppvPublishingServer discovery
6966
],
7067
'DefaultOptions' => {
7168
'Payload' => 'python/meterpreter/reverse_tcp',
@@ -110,12 +107,20 @@ def initialize(info = {})
110107
],
111108
[
112109
'pubprn', {
110+
'Author' => [
111+
'bcoles',
112+
'Matt Nelson' # @enigma0x3
113+
],
113114
'Platform' => 'win',
114115
'Arch' => [ARCH_X86, ARCH_X64]
115116
}
116117
],
117118
[
118119
'SyncAppvPublishingServer', {
120+
'Author' => [
121+
'bcoles',
122+
'Nick Landers' # @monoxgas
123+
],
119124
'Platform' => 'win',
120125
'Arch' => [ARCH_X86, ARCH_X64]
121126
}
@@ -128,6 +133,7 @@ def initialize(info = {})
128133
],
129134
[
130135
'Linux', {
136+
'Author' => 'bcoles',
131137
'Platform' => 'linux',
132138
'Arch' => [ARCH_X86, ARCH_X64]
133139
}

modules/exploits/windows/browser/mozilla_mchannel.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ def initialize(info = {})
3434
'License' => MSF_LICENSE,
3535
'Author' => [
3636
'regenrecht', # discovery
37-
'Rh0', # metasploit module
38-
'mr_me <steventhomasseeley[at]gmail.com>' # win7 target
37+
'Rh0' # metasploit module
3938
],
4039
'References' => [
4140
['CVE', '2011-0065'],
@@ -71,6 +70,7 @@ def initialize(info = {})
7170
'Firefox 3.6.16 on Windows 7 + Java',
7271
{
7372
'Arch' => ARCH_X86,
73+
'Author' => 'mr_me <steventhomasseeley[at]gmail.com>',
7474
'Fakevtable' => 0x1000,
7575
'Fakefunc' => 0x100002a4,
7676
'Ppppr' => 0x7c3410c0,

modules/exploits/windows/browser/mozilla_reduceright.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,7 @@ def initialize(info = {})
2626
'Yan Ivnitskiy', # Matasano Security (Initial discovery with Chris?)
2727
'Matteo Memelli', # PoC from Exploit-DB
2828
'dookie2000ca', # "Helping" ryujin (Matteo)
29-
'sinn3r', # Metasploit
30-
'mr_me <steventhomasseeley[at]gmail.com>', # XP target (no aslr)
31-
'TecR0c <roccogiovannicalvi[at]gmail.com>', # XP target (no aslr)
29+
'sinn3r' # Metasploit
3230
],
3331
'References' => [
3432
['CVE', '2011-2371'],
@@ -52,6 +50,10 @@ def initialize(info = {})
5250
# Windows XP (no JAVA)
5351
'Mozilla Firefox 3.6.16 (no JAVA)',
5452
{
53+
'Author' => [
54+
'mr_me <steventhomasseeley[at]gmail.com>',
55+
'TecR0c <roccogiovannicalvi[at]gmail.com>',
56+
],
5557
'pivot' => 0x104C26F0, # 1st pivot [push esi;pop esp;and [esi+44],0;xor eax,eax;pop esi;retn 4]
5658
'pivot2' => 0x10055326, # 2nd pivot [add esp,40;ret]
5759
}

modules/exploits/windows/fileformat/aol_desktop_linktag.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,7 @@ def initialize(info = {})
2323
'Author' => [
2424
'sup3r', # Initial disclosure, poc (9.5)
2525
'sickn3ss', # 9.6 poc
26-
'sinn3r', # Metasploit
27-
'mr_me <steventhomasseeley[at]gmail.com>', # NX bypass target
28-
'silent_dream', # Win 7 target
26+
'sinn3r' # Metasploit
2927
],
3028
'References' => [
3129
[ 'CVE', '2011-10027' ],
@@ -53,6 +51,7 @@ def initialize(info = {})
5351
[
5452
'AOL Desktop 9.6 on Windows XP SP3 - NX bypass',
5553
{
54+
'Author' => 'mr_me <steventhomasseeley[at]gmail.com>',
5655
'Ret' => 0x6C02D216, # PUSH ESI, POP ESP, POP ESI, POP EDI, POP EDI, RETN 8
5756
'vp' => 0x7C801AD4, # (kernel32.dll) => VirtualProtect()
5857
'Offset' => 5368, # offset to rop
@@ -62,6 +61,7 @@ def initialize(info = {})
6261
[
6362
'AOL Desktop 9.6 on Windows 7',
6463
{
64+
'Author' => 'silent_dream',
6565
'Ret' => 0x63227D6D, # JMP ESP in coolapi.dll
6666
'Offset' => 4327, # Offset to EIP
6767
'Max' => 8000, # Buffer max. Can be more

modules/exploits/windows/fileformat/blazedvd_plf.rb

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,7 @@ def initialize(info = {})
2020
},
2121
'License' => MSF_LICENSE,
2222
'Author' => [
23-
'MC', # Developed target 5.1
24-
'Deepak Rathore', # ExploitDB PoC
25-
'Spencer McIntyre', # Developed taget 6.2
26-
'Ken Smith' # Developed target 6.2
23+
'Deepak Rathore' # ExploitDB PoC
2724
],
2825
'References' => [
2926
[ 'CVE', '2006-6199' ],
@@ -46,6 +43,7 @@ def initialize(info = {})
4643
[
4744
'BlazeDVD 6.2',
4845
{
46+
'Author' => [ 'Ken Smith', 'Spencer McIntyre' ],
4947
'Payload' =>
5048
{
5149
# Stackpivot => add esp,0xfffff254
@@ -56,6 +54,7 @@ def initialize(info = {})
5654
[
5755
'BlazeDVD 5.1',
5856
{
57+
'Author' => 'MC',
5958
'Ret' => 0x100101e7,
6059
'Payload' =>
6160
{

modules/exploits/windows/http/dup_scout_enterprise_login_bof.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,7 @@ def initialize(info = {})
3131
'License' => MSF_LICENSE,
3232
'Author' => [
3333
'sickness', # Original discovery and exploit
34-
'Chris Higgins', # msf Module -- @ch1gg1ns
35-
'bcoles', # Automatic targetting and v9.9.14 target
34+
'Chris Higgins' # msf Module -- @ch1gg1ns
3635
],
3736
'References' => [
3837
['CVE', '2017-13696'],
@@ -50,11 +49,12 @@ def initialize(info = {})
5049
'BadChars' => "\x00\x0a\x0d\x25\x26\x2b\x3d"
5150
},
5251
'Targets' => [
53-
[ 'Automatic', { 'auto' => true } ],
52+
[ 'Automatic', { 'Author' => 'bcoles', 'auto' => true } ],
5453
[
5554
'Dup Scout Enterprise 9.9.14 (x86)',
5655
{
5756
# 0x100b5612 : push esp # ret | ascii {PAGE_EXECUTE_READ} [libspp.dll] ASLR: False, Rebase: False, SafeSEH: False, OS: False, v-1.0-
57+
'Author' => 'bcoles',
5858
'Version' => '9.9.14',
5959
'Ret' => 0x100b5612,
6060
'Offset' => 780

0 commit comments

Comments
 (0)