We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent bf7936a commit 009d6a4Copy full SHA for 009d6a4
modules/exploits/linux/misc/drb_remote_codeexec.rb
@@ -13,7 +13,10 @@ def initialize(info = {})
13
super(update_info(info,
14
'Name' => 'Distributed Ruby Send instance_eval/syscall Code Execution',
15
'Description' => %q{
16
- This module exploits remote code execution vulnerabilities in dRuby
+ This module exploits remote code execution vulnerabilities in dRuby.
17
+
18
+ If the dRuby application sets $SAFE = 1, the instance_eval target will fail.
19
+ In this event, the syscall target is preferred. This can be set with target 1.
20
},
21
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
22
'License' => MSF_LICENSE,
0 commit comments