Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add more ranks #8335

Merged
merged 1 commit into from
May 8, 2017
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
6 changes: 2 additions & 4 deletions modules/exploits/linux/local/vmware_mount.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,8 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'
require 'rex'

class MetasploitModule < Msf::Exploit::Local
Rank = ExcellentRanking

include Msf::Exploit::EXE
include Msf::Post::File
Expand Down Expand Up @@ -55,7 +53,7 @@ def initialize(info={})
))
register_options([
OptString.new("WRITABLEDIR", [ true, "A directory where you can write files.", "/tmp" ]),
], self.class)
])
end

def check
Expand Down
5 changes: 2 additions & 3 deletions modules/exploits/multi/http/movabletype_upgrade_exec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,8 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Exploit::Remote::HttpClient

Expand Down Expand Up @@ -65,7 +64,7 @@ def initialize(info = {})
register_options(
[
OptString.new('TARGETURI', [true, 'The URI path of the Movable Type installation', '/mt'])
], self.class)
])
end

def check
Expand Down
6 changes: 3 additions & 3 deletions modules/exploits/multi/http/uptime_file_upload_2.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'
require 'nokogiri'

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::PhpEXE
Expand Down Expand Up @@ -52,14 +52,14 @@ def initialize(info = {})
Opt::RPORT(9999),
OptString.new('USERNAME', [true, 'The username to authenticate as', 'sample']),
OptString.new('PASSWORD', [true, 'The password to authenticate with', 'sample'])
], self.class)
])

register_advanced_options(
[
OptString.new('UptimeWindowsDirectory', [true, 'Uptime installation path for Windows', 'C:\\Program Files\\uptime software\\']),
OptString.new('UptimeLinuxDirectory', [true, 'Uptime installation path for Linux', '/usr/local/uptime/']),
OptString.new('CmdPath', [true, 'Path to cmd.exe', 'c:\\windows\\system32\\cmd.exe'])
], self.class)
])
end

def print_status(msg='')
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,12 +3,12 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'
require 'msf/core/exploit/php_exe'
require 'nokogiri'
require 'uri'

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::FileDropper
Expand Down Expand Up @@ -62,7 +62,7 @@ def initialize(info = {})
register_options(
[
OptString.new('TARGETURI', [true, 'The base path to Zpanel', '/zpanel'])
], self.class)
])
end

def get_setting(res, setting_name)
Expand Down
5 changes: 2 additions & 3 deletions modules/exploits/unix/webapp/spip_connect_exec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,8 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::HttpClient

Expand Down Expand Up @@ -46,7 +45,7 @@ def initialize(info = {})
register_options(
[
OptString.new('TARGETURI', [true, 'The base path to SPIP application', '/']),
], self.class)
])
end

def check
Expand Down
2 changes: 1 addition & 1 deletion modules/exploits/unix/webapp/wp_optimizepress_upload.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'
require 'uri'

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::HTTP::Wordpress
include Msf::Exploit::Remote::HttpClient
Expand Down
3 changes: 1 addition & 2 deletions modules/exploits/windows/ftp/wing_ftp_admin_exec.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,8 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::CmdStager
include Msf::Exploit::Remote::HttpClient

Expand Down
7 changes: 3 additions & 4 deletions modules/exploits/windows/http/novell_mdm_lfi.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,8 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::EXE
Expand Down Expand Up @@ -44,11 +43,11 @@ def initialize
register_options([
OptString.new('TARGETURI', [true, 'Path to the Novell Zenworks MDM install', '/']),
OptInt.new('RPORT', [true, "Default remote port", 80])
], self.class)
])

register_advanced_options([
OptBool.new('SSL', [true, "Negotiate SSL connection", false])
], self.class)
])
end

def get_version
Expand Down
6 changes: 2 additions & 4 deletions modules/exploits/windows/local/run_as.rb
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,8 @@
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'
require 'rex'

class MetasploitModule < Msf::Exploit::Local
Rank = ExcellentRanking
include Msf::Post::Windows::Runas
include Msf::Post::Windows::Priv

Expand Down Expand Up @@ -46,7 +44,7 @@ def initialize(info = {})
OptString.new('APPLICATION_NAME', [false, 'Application to be executed (lpApplicationName)', nil ]),
OptString.new('COMMAND_LINE', [false, 'Command line to execute (lpCommandLine)', nil ]),
OptBool.new('USE_CUSTOM_COMMAND', [true, 'Specify custom APPLICATION_NAME and COMMAND_LINE', false ])
], self.class)
])
end

def exploit
Expand Down