Skip to content

Commit 090d9b9

Browse files
committed
Land rapid7#4078, pureftpd_bash_env_exec desc. update
2 parents b8c9ef9 + 950fc46 commit 090d9b9

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

modules/exploits/multi/ftp/pureftpd_bash_env_exec.rb

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,13 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection',
1717
'Description' => %q(
18-
This module exploits the code injection flaw known as shellshock which
19-
leverages specially crafted environment variables in Bash. This exploit
20-
specifically targets Pure-FTPd when configured to use an external
21-
program for authentication.
18+
This module exploits the code injection flaw known as Shellshock, which leverages specially
19+
crafted environment variables in Bash.
20+
21+
Please note that this exploit specifically targets Pure-FTPd compiled with the --with-extauth
22+
flag, and an external Bash program for authentication. If the server is not set up this way,
23+
understand that even if the operating system is vulnerable to Shellshock, it cannot be
24+
exploited via Pure-FTPd.
2225
),
2326
'Author' =>
2427
[
@@ -31,7 +34,8 @@ def initialize(info = {})
3134
['CVE', '2014-6271'],
3235
['OSVDB', '112004'],
3336
['EDB', '34765'],
34-
['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc']
37+
['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc'],
38+
['URL', 'http://download.pureftpd.org/pub/pure-ftpd/doc/README.Authentication-Modules']
3539
],
3640
'Payload' =>
3741
{

0 commit comments

Comments
 (0)