File tree Expand file tree Collapse file tree 1 file changed +9
-5
lines changed
modules/exploits/multi/ftp Expand file tree Collapse file tree 1 file changed +9
-5
lines changed Original file line number Diff line number Diff line change @@ -15,10 +15,13 @@ def initialize(info = {})
15
15
super ( update_info ( info ,
16
16
'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection' ,
17
17
'Description' => %q(
18
- This module exploits the code injection flaw known as shellshock which
19
- leverages specially crafted environment variables in Bash. This exploit
20
- specifically targets Pure-FTPd when configured to use an external
21
- program for authentication.
18
+ This module exploits the code injection flaw known as Shellshock, which leverages specially
19
+ crafted environment variables in Bash.
20
+
21
+ Please note that this exploit specifically targets Pure-FTPd compiled with the --with-extauth
22
+ flag, and an external Bash program for authentication. If the server is not set up this way,
23
+ understand that even if the operating system is vulnerable to Shellshock, it cannot be
24
+ exploited via Pure-FTPd.
22
25
) ,
23
26
'Author' =>
24
27
[
@@ -31,7 +34,8 @@ def initialize(info = {})
31
34
[ 'CVE' , '2014-6271' ] ,
32
35
[ 'OSVDB' , '112004' ] ,
33
36
[ 'EDB' , '34765' ] ,
34
- [ 'URL' , 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc' ]
37
+ [ 'URL' , 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc' ] ,
38
+ [ 'URL' , 'http://download.pureftpd.org/pub/pure-ftpd/doc/README.Authentication-Modules' ]
35
39
] ,
36
40
'Payload' =>
37
41
{
You can’t perform that action at this time.
0 commit comments