From 494ed394d4cf3a189bf67c8a5d18609c4bc7ba51 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Fri, 15 May 2020 05:23:46 -0500 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index d3bb2d497786..2638203512a1 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -144245,7 +144245,7 @@ "modpr0be", "sinn3r " ], - "description": "This module exploits a vulnerability found in Distinct TFTP server. The\n software contains a directory traversal vulnerability that allows a remote\n attacker to write arbitrary file to the file system, which results in\n code execution under the context of 'SYSTEM'.", + "description": "This module exploits a directory traversal vulnerability in the TFTP\n Server component of Distinct Intranet Servers version 3.10 which\n allows a remote attacker to write arbitrary files to the server file\n system, resulting in code execution under the context of 'SYSTEM'.\n This module has been tested successfully on TFTP Server version 3.10\n on Windows XP SP3 (EN).", "references": [ "OSVDB-80984", "EDB-18718", @@ -144262,9 +144262,9 @@ ], "targets": [ - "Distinct TFTP 3.10 on Windows" + "Automatic" ], - "mod_time": "2017-07-24 06:26:21 +0000", + "mod_time": "2020-05-14 05:22:36 +0000", "path": "/modules/exploits/windows/tftp/distinct_tftp_traversal.rb", "is_install_path": true, "ref_name": "windows/tftp/distinct_tftp_traversal", @@ -144273,7 +144273,7 @@ "default_credential": false, "notes": { }, - "needs_cleanup": null + "needs_cleanup": true }, "exploit_windows/tftp/dlink_long_filename": { "name": "D-Link TFTP 1.0 Long Filename Buffer Overflow",