Skip to content

Commit bdfb1bd

Browse files
committed
Shellshock: Naming consistency
1 parent f264919 commit bdfb1bd

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ def initialize(info = {})
1212
super(
1313
update_info(
1414
info,
15-
'Name' => 'Apache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner',
15+
'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection Scanner (Shellshock)',
1616
'Description' => %q{
1717
This module scans for the Shellshock vulnerability, a flaw in how the Bash shell
1818
handles external environment variables. This module targets CGI scripts in the

modules/exploits/linux/http/ipfire_bashbug_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ def initialize(info = {})
1111
super(
1212
update_info(
1313
info,
14-
'Name' => 'IPFire Bash Environment Variable Injection (Shellshock)',
14+
'Name' => 'IPFire Bash Environment Variable Code Injection (Shellshock)',
1515
'Description' => %q{
1616
IPFire, a free linux based open source firewall distribution,
1717
version <= 2.15 Update Core 82 contains an authenticated remote

modules/exploits/osx/local/vmware_bash_function_root.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
super(
1616
update_info(
1717
info,
18-
'Name' => 'OS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection (Shellshock)',
18+
'Name' => 'OS X VMWare Fusion Privilege Escalation via Bash Environment Variable Code Injection (Shellshock)',
1919
'Description' => %q{
2020
This module exploits the Shellshock vulnerability, a flaw in how the Bash shell
2121
handles external environment variables. This module targets the VMWare Fusion

modules/exploits/unix/smtp/qmail_bash_env_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ def initialize(info = {})
1212
super(
1313
update_info(
1414
info,
15-
'Name' => 'Qmail SMTP Bash Environment Variable Injection (Shellshock)',
15+
'Name' => 'Qmail SMTP Bash Environment Variable Code Injection (Shellshock)',
1616
'Description' => %q{
1717
This module exploits a shellshock vulnerability on Qmail, a public
1818
domain MTA written in C that runs on Unix systems.

0 commit comments

Comments
 (0)