Skip to content

Commit 04a18fb

Browse files
committed
Updates modules to remove non-printable chars
1 parent 6450431 commit 04a18fb

20 files changed

+21
-21
lines changed

modules/auxiliary/admin/http/wp_gdpr_compliance_privesc.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
The Wordpress GDPR Compliance plugin <= v1.4.2 allows unauthenticated users to set
1616
wordpress administration options by overwriting values within the database.
1717
18-
The vulnerability is present in WordPresss admin-ajax.php, which allows unauthorized
18+
The vulnerability is present in WordPress's admin-ajax.php, which allows unauthorized
1919
users to trigger handlers and make configuration changes because of a failure to do
2020
capability checks when executing the 'save_setting' internal action.
2121

modules/auxiliary/scanner/http/apache_normalize_path.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
'Name' => 'Apache 2.4.49/2.4.50 Traversal RCE scanner',
1616
'Description' => %q{
1717
This module scans for an unauthenticated RCE vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773).
18-
If files outside of the document root are not protected by require all denied and CGI has been explicitly enabled,
18+
If files outside of the document root are not protected by 'require all denied' and CGI has been explicitly enabled,
1919
it can be used to execute arbitrary commands (Remote Command Execution).
2020
This vulnerability has been reintroduced in Apache 2.4.50 fix (CVE-2021-42013).
2121
},

modules/auxiliary/scanner/http/dolibarr_16_contact_dump.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
'Name' => 'Dolibarr 16 pre-auth contact database dump',
1717
'Description' => %q{
1818
Dolibarr version 16 < 16.0.5 is vulnerable to a pre-authentication contact database dump.
19-
An unauthenticated attacker may retrieve a companys entire customer file, prospects, suppliers,
19+
An unauthenticated attacker may retrieve a company's entire customer file, prospects, suppliers,
2020
and potentially employee information if a contact file exists.
2121
Both public and private notes are also included in the dump.
2222
},

modules/auxiliary/scanner/http/jira_user_enum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
'Description' => %q{
1919
This module exploits an information disclosure vulnerability that allows an
2020
unauthenticated user to enumerate users in the /ViewUserHover.jspa endpoint.
21-
This only affects Jira versions < 7.13.16, 8.0.0 version < 8.5.7, 8.6.0 version < 8.11.1
21+
This only affects Jira versions < 7.13.16, 8.0.0 <= version < 8.5.7, 8.6.0 <= version < 8.11.1
2222
Discovered by Mikhail Klyuchnikov @__mn1__
2323
This module has been tested on versions 8.4.1, 8.5.6, 8.10.1, 8.11.0
2424
},

modules/encoders/php/minify.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ def initialize
1111
'Name' => 'PHP Minify Encoder',
1212
'Description' => %q{
1313
This encoder minifies a PHP payload by removing leasing spaces, trailing
14-
new lines, comments,
14+
new lines, comments, ...
1515
},
1616
'Author' => 'Julien Voisin',
1717
'License' => BSD_LICENSE,

modules/exploits/linux/http/qnap_qts_rce_cve_2023_47218.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize(info = {})
2020
QuTS hero. QTS is a core part of the firmware for numerous QNAP entry and mid-level Network Attached Storage
2121
(NAS) devices, and QuTS hero is a core part of the firmware for numerous QNAP high-end and enterprise NAS devices.
2222
23-
The vulnerable endpoint is the quick.cgi component, exposed by the devices web based administration feature.
23+
The vulnerable endpoint is the quick.cgi component, exposed by the device's web based administration feature.
2424
The quick.cgi component is present in an uninitialized QNAP NAS device. This component is intended to be used
2525
during either manual or cloud based provisioning of a QNAP NAS device. Once a device has been successfully
2626
initialized, the quick.cgi component is disabled on the system.

modules/exploits/linux/http/solarview_unauth_rce_cve_2023_23333.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
info,
1919
'Name' => 'SolarView Compact unauthenticated remote command execution vulnerability.',
2020
'Description' => %q{
21-
CONTEC's SolarView Series enables you to monitor and visualize solar power and is only available in Japan.
21+
CONTEC's SolarView Series enables you to monitor and visualize solar power and is only available in Japan.
2222
This module exploits a command injection vulnerability on the SolarView Compact `v6.00` web application
2323
via vulnerable endpoint `downloader.php`.
2424
After exploitation, an attacker will have full access with the same user privileges under

modules/exploits/linux/local/cve_2023_0386_overlayfs_priv_esc.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ def initialize(info = {})
2525
This exploit targets the Linux kernel bug in OverlayFS.
2626
2727
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities
28-
was found in the Linux kernels OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount.
28+
was found in the Linux kernel's OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount.
2929
This uid mapping bug allows a local user to escalate their privileges on the system.
3030
},
3131
'License' => MSF_LICENSE,

modules/exploits/multi/http/apache_commons_text4shell.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
This exploit takes advantage of the StringSubstitutor interpolator class,
2020
which is included in the Commons Text library. A default interpolator
2121
allows for string lookups that can lead to Remote Code Execution. This
22-
is due to a logic flaw that makes the script”, “dns and url lookup
22+
is due to a logic flaw that makes the "script", "dns" and "url" lookup
2323
keys interpolated by default, as opposed to what it should be, according
2424
to the documentation of the StringLookupFactory class. Those keys allow
2525
an attacker to execute arbitrary code via lookups primarily using the

modules/exploits/multi/http/apache_normalize_path_rce.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def initialize(info = {})
1818
'Name' => 'Apache 2.4.49/2.4.50 Traversal RCE',
1919
'Description' => %q{
2020
This module exploit an unauthenticated RCE vulnerability which exists in Apache version 2.4.49 (CVE-2021-41773).
21-
If files outside of the document root are not protected by require all denied and CGI has been explicitly enabled,
21+
If files outside of the document root are not protected by 'require all denied' and CGI has been explicitly enabled,
2222
it can be used to execute arbitrary commands (Remote Command Execution).
2323
This vulnerability has been reintroduced in Apache 2.4.50 fix (CVE-2021-42013).
2424
},

0 commit comments

Comments
 (0)