Skip to content

Commit 009d6a4

Browse files
committed
Update description
1 parent bf7936a commit 009d6a4

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

modules/exploits/linux/misc/drb_remote_codeexec.rb

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,10 @@ def initialize(info = {})
1313
super(update_info(info,
1414
'Name' => 'Distributed Ruby Send instance_eval/syscall Code Execution',
1515
'Description' => %q{
16-
This module exploits remote code execution vulnerabilities in dRuby
16+
This module exploits remote code execution vulnerabilities in dRuby.
17+
18+
If the dRuby application sets $SAFE = 1, the instance_eval target will fail.
19+
In this event, the syscall target is preferred. This can be set with target 1.
1720
},
1821
'Author' => [ 'joernchen <joernchen[at]phenoelit.de>' ], #(Phenoelit)
1922
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)