Commit e0393dff by Marcin Bury

Info targets replaced with devices.

parent af188ee4
...@@ -126,7 +126,7 @@ Display information about exploit: ...@@ -126,7 +126,7 @@ Display information about exploit:
Description: Description:
Module exploits D-Link DIR-300, DIR-600 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges. Module exploits D-Link DIR-300, DIR-600 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.
Targets: Devices:
- D-Link DIR 300 - D-Link DIR 300
- D-Link DIR 600 - D-Link DIR 600
......
...@@ -336,7 +336,7 @@ class RoutersploitInterpreter(BaseInterpreter): ...@@ -336,7 +336,7 @@ class RoutersploitInterpreter(BaseInterpreter):
if sub_command == info: if sub_command == info:
utils.pprint_dict_in_order( utils.pprint_dict_in_order(
self.module_metadata, self.module_metadata,
("name", "description", "targets", "authors", "references"), ("name", "description", "devices", "authors", "references"),
) )
utils.print_info() utils.print_info()
elif sub_command == options: elif sub_command == options:
......
...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit): ...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://www.exploit-db.com/exploits/9459/', 'https://www.exploit-db.com/exploits/9459/',
], ],
'targets': [ 'devices': [
'2Wire 2701HGV-W', '2Wire 2701HGV-W',
'2Wire 3800HGV-B', '2Wire 3800HGV-B',
'2Wire 3801HGV', '2Wire 3801HGV',
......
...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit): ...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://github.com/lucyoa/exploits/blob/master/asmax/asmax.txt', 'https://github.com/lucyoa/exploits/blob/master/asmax/asmax.txt',
], ],
'targets': [ 'devices': [
'Asmax AR 1004g', 'Asmax AR 1004g',
], ],
} }
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://www.securitum.pl/dh/asmax-ar-804-gu-compromise', 'http://www.securitum.pl/dh/asmax-ar-804-gu-compromise',
'https://www.exploit-db.com/exploits/8846/', 'https://www.exploit-db.com/exploits/8846/',
], ],
'targets': [ 'devices': [
'Asmax AR 804 gu', 'Asmax AR 804 gu',
], ],
} }
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://github.com/jduck/asus-cmd', 'https://github.com/jduck/asus-cmd',
], ],
'targets': [ 'devices': [
'ASUS RT-N66U', 'ASUS RT-N66U',
'ASUS RT-AC87U', 'ASUS RT-AC87U',
'ASUS RT-N56U', 'ASUS RT-N56U',
......
...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit): ...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://sintonen.fi/advisories/asus-router-auth-bypass.txt' 'https://sintonen.fi/advisories/asus-router-auth-bypass.txt'
], ],
'targets': [ 'devices': [
'ASUS RT-N10U, firmware 3.0.0.4.374_168', 'ASUS RT-N10U, firmware 3.0.0.4.374_168',
'ASUS RT-N56U, firmware 3.0.0.4.374_979', 'ASUS RT-N56U, firmware 3.0.0.4.374_979',
'ASUS DSL-N55U, firmware 3.0.0.4.374_1397', 'ASUS DSL-N55U, firmware 3.0.0.4.374_1397',
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2765', 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2765',
'https://www.exploit-db.com/exploits/17349/', 'https://www.exploit-db.com/exploits/17349/',
], ],
'targets': [ 'devices': [
'Belkin G', 'Belkin G',
'Belkin N150', 'Belkin N150',
], ],
......
...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit): ...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0403', 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0403',
'https://www.exploit-db.com/exploits/4941/', 'https://www.exploit-db.com/exploits/4941/',
], ],
'targets': [ 'devices': [
'Belkin G', 'Belkin G',
], ],
} }
......
...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit): ...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'http://www.belkin.com/us/support-article?articleNum=109400', 'http://www.belkin.com/us/support-article?articleNum=109400',
'http://www.kb.cert.org/vuls/id/774788', 'http://www.kb.cert.org/vuls/id/774788',
], ],
'targets': [ 'devices': [
'Belkin N150 1.00.07', 'Belkin N150 1.00.07',
'Belkin N150 1.00.08', 'Belkin N150 1.00.08',
'Belkin N150 1.00.09', 'Belkin N150 1.00.09',
......
...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit): ...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/35184/', 'https://www.exploit-db.com/exploits/35184/',
'https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014-1635/', 'https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014-1635/',
], ],
'targets': [ 'devices': [
'Belkin N750', 'Belkin N750',
] ]
} }
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/39568/', 'https://www.exploit-db.com/exploits/39568/',
'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash',
], ],
'targets': [ 'devices': [
'Cisco UCS Manager 2.1 (1b)', 'Cisco UCS Manager 2.1 (1b)',
], ],
} }
......
...@@ -27,10 +27,8 @@ class Exploit(exploits.Exploit): ...@@ -27,10 +27,8 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://packetstormsecurity.com/files/126129/Comtrend-CT-5361T-Password-Disclosure.html' 'https://packetstormsecurity.com/files/126129/Comtrend-CT-5361T-Password-Disclosure.html'
], ],
'targets': [ 'devices': [
'Comtrend CT 5361T (more likely CT 536X)\n' + 'Comtrend CT 5361T (more likely CT 536X)',
'Software Version: A111-312SSG-T02_R01\n' +
'Wireless Driver Version: 4.150.10.15.cpe2.2'
] ]
} }
......
...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit): ...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'http://www.devttys0.com/wp-content/uploads/2010/12/dlink_php_vulnerability.pdf', 'http://www.devttys0.com/wp-content/uploads/2010/12/dlink_php_vulnerability.pdf',
], ],
'targets': [ 'devices': [
'D-Link DIR-300', 'D-Link DIR-300',
'D-Link DIR-600', 'D-Link DIR-600',
'D-Link DIR-615 revD', 'D-Link DIR-615 revD',
......
...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit): ...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'http://seclists.org/bugtraq/2013/Dec/11' 'http://seclists.org/bugtraq/2013/Dec/11'
], ],
'targets': [ 'devices': [
'D-Link DIR-300 (all)', 'D-Link DIR-300 (all)',
'D-Link DIR-600 (all)', 'D-Link DIR-600 (all)',
'D-Link DIR-615 (fw 4.0)', 'D-Link DIR-615 (fw 4.0)',
......
...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit): ...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'http://www.s3cur1ty.de/home-network-horror-days', 'http://www.s3cur1ty.de/home-network-horror-days',
'http://www.s3cur1ty.de/m1adv2013-003', 'http://www.s3cur1ty.de/m1adv2013-003',
], ],
'targets': [ 'devices': [
'D-Link DIR 300', 'D-Link DIR 300',
'D-Link DIR 600', 'D-Link DIR 600',
] ]
......
...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit): ...@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://packetstormsecurity.com/files/120591/dlinkdir645-bypass.txt' 'https://packetstormsecurity.com/files/120591/dlinkdir645-bypass.txt'
], ],
'targets': [ 'devices': [
'D-Link DIR-645 (Versions < 1.03)', 'D-Link DIR-645 (Versions < 1.03)',
] ]
} }
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdf', 'http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdf',
], ],
'targets': [ 'devices': [
'DNS-320L 1.03b04', 'DNS-320L 1.03b04',
'DNS-327L, 1.02', 'DNS-327L, 1.02',
] ]
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'http://seclists.org/fulldisclosure/2015/May/129' 'http://seclists.org/fulldisclosure/2015/May/129'
], ],
'targets': [ 'devices': [
'D-Link DSL-2750B EU_1.01', 'D-Link DSL-2750B EU_1.01',
], ],
} }
......
...@@ -25,7 +25,7 @@ class Exploit(exploits.Exploit): ...@@ -25,7 +25,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/39409/', 'https://www.exploit-db.com/exploits/39409/',
'http://ipositivesecurity.blogspot.com/2016/02/dlink-dvgn5402sp-multiple-vuln.html', 'http://ipositivesecurity.blogspot.com/2016/02/dlink-dvgn5402sp-multiple-vuln.html',
], ],
'targets': [ 'devices': [
'D-Link DVG-N5402SP', 'D-Link DVG-N5402SP',
] ]
} }
......
...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit): ...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://www.exploit-db.com/exploits/39581/', 'https://www.exploit-db.com/exploits/39581/',
], ],
'targets': [ 'devices': [
'D-Link DWR-932', 'D-Link DWR-932',
] ]
} }
......
...@@ -33,7 +33,7 @@ class Exploit(exploits.Exploit): ...@@ -33,7 +33,7 @@ class Exploit(exploits.Exploit):
'http://www.s3cur1ty.de/home-network-horror-days', 'http://www.s3cur1ty.de/home-network-horror-days',
'http://www.s3cur1ty.de/m1adv2013-003', 'http://www.s3cur1ty.de/m1adv2013-003',
], ],
'targets': [ 'devices': [
'FortiGate OS Version 4.x-5.0.7', 'FortiGate OS Version 4.x-5.0.7',
] ]
} }
......
...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit): ...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://community.rapid7.com/community/infosec/blog/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor', 'https://community.rapid7.com/community/infosec/blog/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor',
], ],
'targets': [ 'devices': [
'Juniper ScreenOS 6.2.0r15 to 6.2.0r18', 'Juniper ScreenOS 6.2.0r15 to 6.2.0r18',
'Juniper ScreenOS 6.3.0r12 to 6.3.0r20', 'Juniper ScreenOS 6.3.0r12 to 6.3.0r20',
] ]
......
...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit): ...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://www.exploit-db.com/exploits/24475/', 'https://www.exploit-db.com/exploits/24475/',
], ],
'targets': [ 'devices': [
'Linksys E1500/E2500', 'Linksys E1500/E2500',
] ]
} }
......
...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit): ...@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'http://seclists.org/bugtraq/2010/Jun/93', 'http://seclists.org/bugtraq/2010/Jun/93',
], ],
'targets': [ 'devices': [
'Linksys WAP54Gv3', 'Linksys WAP54Gv3',
] ]
} }
......
...@@ -25,7 +25,7 @@ class Exploit(exploits.Exploit): ...@@ -25,7 +25,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'http://mis.fortunecook.ie/' 'http://mis.fortunecook.ie/'
], ],
'targets': [ 'devices': [
'multi' 'multi'
] ]
} }
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://firmware.re/vulns/acsa-2015-001.php', 'http://firmware.re/vulns/acsa-2015-001.php',
'https://www.blackhat.com/docs/asia-16/materials/asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf', 'https://www.blackhat.com/docs/asia-16/materials/asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf',
], ],
'targets': [ 'devices': [
'Netgear WG102', 'Netgear WG102',
'Netgear WG103', 'Netgear WG103',
'Netgear WN604', 'Netgear WN604',
......
...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit): ...@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit):
'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2015-007_Netgear_WNR1000v4_AuthBypass.txt', 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2015-007_Netgear_WNR1000v4_AuthBypass.txt',
'http://www.shellshocklabs.com/2015/09/part-1en-hacking-netgear-jwnr2010v5.html', 'http://www.shellshocklabs.com/2015/09/part-1en-hacking-netgear-jwnr2010v5.html',
], ],
'targets': [ 'devices': [
'Netgear N300', 'Netgear N300',
'Netgear JNR1010v2', 'Netgear JNR1010v2',
'Netgear JNR3000', 'Netgear JNR3000',
......
...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit): ...@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://firmware.re/vulns/acsa-2015-002.php', 'http://firmware.re/vulns/acsa-2015-002.php',
'https://www.blackhat.com/docs/asia-16/materials/asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf', 'https://www.blackhat.com/docs/asia-16/materials/asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf',
], ],
'targets': [ 'devices': [
'Netgear ProSafe WC9500', 'Netgear ProSafe WC9500',
'Netgear ProSafe WC7600', 'Netgear ProSafe WC7600',
'Netgear ProSafe WC7520', 'Netgear ProSafe WC7520',
......
...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit): ...@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
'references': [ 'references': [
'https://www.exploit-db.com/exploits/31894/', 'https://www.exploit-db.com/exploits/31894/',
], ],
'targets': [ 'devices': [
'Technicolor TC7200', 'Technicolor TC7200',
] ]
} }
......
...@@ -31,7 +31,7 @@ class Exploit(exploits.Exploit): ...@@ -31,7 +31,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/39701/' 'https://www.exploit-db.com/exploits/39701/'
], ],
'targets': [ 'devices': [
'AirOS 6.x' 'AirOS 6.x'
] ]
} }
......
...@@ -290,7 +290,7 @@ class RoutersploitInterpreterTest(unittest.TestCase): ...@@ -290,7 +290,7 @@ class RoutersploitInterpreterTest(unittest.TestCase):
@mock.patch('__builtin__.print') @mock.patch('__builtin__.print')
def test_command_show_info(self, mock_print): def test_command_show_info(self, mock_print):
metadata = { metadata = {
'targets': 'target_desc', 'devices': 'target_desc',
'authors': 'authors_desc', 'authors': 'authors_desc',
'references': 'references_desc', 'references': 'references_desc',
'description': 'description_desc', 'description': 'description_desc',
...@@ -308,7 +308,7 @@ class RoutersploitInterpreterTest(unittest.TestCase): ...@@ -308,7 +308,7 @@ class RoutersploitInterpreterTest(unittest.TestCase):
mock.call('name_desc'), mock.call('name_desc'),
mock.call('\nDescription:'), mock.call('\nDescription:'),
mock.call('description_desc'), mock.call('description_desc'),
mock.call('\nTargets:'), mock.call('\nDevices:'),
mock.call('target_desc'), mock.call('target_desc'),
mock.call('\nAuthors:'), mock.call('\nAuthors:'),
mock.call('authors_desc'), mock.call('authors_desc'),
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment