Skip to content

Commit 0bc3099

Browse files
committed
Land rapid7#3453, release fixes
2 parents e02a134 + 19da7d5 commit 0bc3099

File tree

4 files changed

+13
-7
lines changed

4 files changed

+13
-7
lines changed

modules/auxiliary/gather/mongodb_js_inject_collection_enum.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,11 @@ def initialize(info={})
1919
},
2020
'License' => MSF_LICENSE,
2121
'Author' =>
22-
['Brandon Perry <bperry.volatile@gmail.com>'],
22+
['Brandon Perry <bperry.volatile[at]gmail.com>'],
2323
'References' =>
24-
[['URL', 'http://nosql.mypopescu.com/post/14453905385/attacking-nosql-and-node-js-server-side-javascript']],
24+
[
25+
['URL', 'http://nosql.mypopescu.com/post/14453905385/attacking-nosql-and-node-js-server-side-javascript']
26+
],
2527
'Platform' => ['linux', 'win'],
2628
'Privileged' => false,
2729
'DisclosureDate' => "Jun 7 2014"))

modules/exploits/android/fileformat/adobe_reader_pdf_js_interface.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,10 @@ def initialize(info = {})
1919
super(update_info(info,
2020
'Name' => 'Adobe Reader for Android addJavascriptInterface Exploit',
2121
'Description' => %q{
22-
Adobe Reader < 11.2.0 exposed insecure native interfaces to untrusted
23-
javascript in a PDF. This embeds the browser exploit from android/
24-
webview_addjavascriptinterface into a PDF to get a shell.
22+
Adobe Reader versions less than 11.2.0 exposes insecure native
23+
interfaces to untrusted javascript in a PDF. This module embeds the browser
24+
exploit from android/webview_addjavascriptinterface into a PDF to get a
25+
command shell on vulnerable versions of Reader.
2526
},
2627
'License' => MSF_LICENSE,
2728
'Author' => [

modules/payloads/singles/python/shell_reverse_tcp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module Metasploit3
1616
def initialize(info = {})
1717
super(merge_info(info,
1818
'Name' => 'Command Shell, Reverse TCP (via python)',
19-
'Description' => 'Creates an interactive shell via python, encodes with base64 by design. Compat with 2.3.3',
19+
'Description' => 'Creates an interactive shell via python, encodes with base64 by design. Compatible with Python 2.3.3',
2020
'Author' => 'Ben Campbell', # Based on RageLtMan's reverse_ssl
2121
'License' => MSF_LICENSE,
2222
'Platform' => 'python',

modules/post/firefox/manage/webcam_chat.rb

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,13 @@ def initialize(info={})
1515
super(update_info(info,
1616
'Name' => 'Firefox Webcam Chat on Privileged Javascript Shell',
1717
'Description' => %q{
18-
This module allows streaming a webcam from a Firefox Privileged Javascript Shell.
18+
This module allows streaming a webcam from a privileged Firefox Javascript shell.
1919
},
2020
'License' => MSF_LICENSE,
2121
'Author' => [ 'joev' ],
22+
'References' => [
23+
[ 'URL', 'http://www.rapid7.com/db/modules/exploit/firefox/local/exec_shellcode' ]
24+
],
2225
'DisclosureDate' => 'May 13 2014'
2326
))
2427

0 commit comments

Comments
 (0)