Skip to content

Commit 134a674

Browse files
committed
Land rapid7#5312, @todb-r7's release fixes
2 parents 1469a15 + c9cb9ad commit 134a674

File tree

10 files changed

+21
-18
lines changed

10 files changed

+21
-18
lines changed

modules/auxiliary/dos/http/ms15_034_ulonglongadd.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'MS15-034 HTTP Protocol Stack Request Handling Denial-of-Service',
1818
'Description' => %q{
19-
This module will check if your hosts are vulnerable to CVE-2015-1635 (MS15-034). A
20-
vulnerability in the HTTP Protocol stack (HTTP.sys) that could result in arbitrary code
19+
This module will check if scanned hosts are vulnerable to CVE-2015-1635 (MS15-034), a
20+
vulnerability in the HTTP protocol stack (HTTP.sys) that could result in arbitrary code
2121
execution. This module will try to cause a denial-of-service.
2222
23-
Please note that you must supply a valid file resource for the TARGETURI option.
24-
By default, IIS may come with these settings that you could try: iisstart.htm,
25-
welcome.png, iis-85.png, etc.
23+
Please note that a valid file resource must be supplied for the TARGETURI option.
24+
By default, IIS provides 'welcome.png' and 'iis-85.png' as resources.
25+
Others may also exist, depending on configuration options.
2626
},
2727
'Author' =>
2828
[

modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info={})
1515
super(update_info(info,
1616
'Name' => 'Apple OSX/iOS/Windows Safari Non-HTTPOnly Cookie Theft',
1717
'Description' => %q{
18-
A vulnerability exists in versions of OSX/iOS/Windows Safari released
18+
A vulnerability exists in versions of OSX, iOS, and Windows Safari released
1919
before April 8, 2015 that allows the non-HTTPOnly cookies of any
2020
domain to be stolen.
2121
},

modules/auxiliary/gather/java_rmi_registry.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize
1616
'Name' => 'Java RMI Registry Interfaces Enumeration',
1717
'Description' => %q{
1818
This module gathers information from an RMI endpoint running an RMI registry
19-
interface. It enumerates the names bound into a registry and lookups each
19+
interface. It enumerates the names bound in a registry and looks up each
2020
remote reference.
2121
},
2222
'Author' => ['juan vazquez'],

modules/auxiliary/gather/ssllabs_scan.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -404,7 +404,8 @@ def initialize(info = {})
404404
super(update_info(info,
405405
'Name' => 'SSL Labs API Client',
406406
'Description' => %q{
407-
This module is a simple client for the SSL Labs APIs, designed for SSL/TLS assessment during a penetration testing.
407+
This module is a simple client for the SSL Labs APIs, designed for
408+
SSL/TLS assessment during a penetration test.
408409
},
409410
'License' => MSF_LICENSE,
410411
'Author' =>

modules/auxiliary/scanner/http/goahead_traversal.rb

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,11 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal',
16+
'Name' => 'Embedthis GoAhead Embedded Web Server Directory Traversal',
1717
'Description' => %q{
18-
This module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1,
19-
allowing to read arbitrary files with the web server privileges.
18+
This module exploits a directory traversal vulnerability in the Embedthis
19+
GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files
20+
with the web server privileges.
2021
},
2122
'References' =>
2223
[

modules/auxiliary/scanner/http/owa_iis_internal_ip.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,8 @@ def initialize
1414
super(
1515
'Name' => 'Outlook Web App (OWA) / Client Access Server (CAS) IIS HTTP Internal IP Disclosure',
1616
'Description' => %q{
17-
This module tests vulnerable IIS HTTP header file paths on Microsoft Exchange OWA 2003, CAS 2007, 2010, 2013 servers.
17+
This module tests vulnerable IIS HTTP header file paths on Microsoft
18+
Exchange OWA 2003 and CAS 2007, 2010, and 2013 servers.
1819
},
1920
'Author' =>
2021
[

modules/auxiliary/scanner/http/wp_mobileedition_file_read.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a directory traversal vulnerability in WordPress Plugin
1919
"WP Mobile Edition" version 2.2.7, allowing to read arbitrary files with the
20-
web server privileges. Stay tuned to the correct value in TARGETURI.
20+
web server privileges.
2121
},
2222
'References' =>
2323
[

modules/exploits/linux/http/multi_ncc_ping_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
'Description' => %q{
2020
This module exploits a remote command injection vulnerability on several routers. The
2121
vulnerability exists in the ncc service, while handling ping commands. This module has
22-
been tested on a DIR-626L emulated environment only. Several D-Link and TRENDnet devices
22+
been tested on a DIR-626L emulated environment. Several D-Link and TRENDnet devices
2323
are reported as affected, including: D-Link DIR-626L (Rev A) v1.04b04, D-Link DIR-636L
2424
(Rev A) v1.04, D-Link DIR-808L (Rev A) v1.03b05, D-Link DIR-810L (Rev A) v1.01b04, D-Link
2525
DIR-810L (Rev B) v2.02b01, D-Link DIR-820L (Rev A) v1.02B10, D-Link DIR-820L (Rev A)

modules/exploits/unix/webapp/wp_slideshowgallery_upload.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ def initialize(info = {})
1717
'Name' => 'Wordpress SlideShow Gallery Authenticated File Upload',
1818
'Description' => %q{
1919
The Wordpress SlideShow Gallery plugin contains an authenticated file upload
20-
vulnerability. We can upload arbitrary files to the upload folder, because
21-
the plugin also uses it's own file upload mechanism instead of the wordpress
22-
api it's possible to upload any file type.
20+
vulnerability. An attacker can upload arbitrary files to the upload folder.
21+
Since the plugin uses its own file upload mechanism instead of the WordPress
22+
API, it's possible to upload any file type.
2323
},
2424
'Author' =>
2525
[

modules/exploits/windows/local/run_as.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ def initialize(info = {})
3535
[
3636
[ 'URL', 'https://msdn.microsoft.com/en-us/library/windows/desktop/ms682431' ]
3737
],
38-
'DisclosureDate' => 'Jan 01 1999' # Not valid but required by msftidy
38+
'DisclosureDate' => 'Jan 01 1999' # Same as psexec -- a placeholder date for non-vuln 'exploits'
3939
))
4040

4141
register_options(

0 commit comments

Comments
 (0)