Skip to content

Commit 24b4dac

Browse files
committed
Land rapid7#5408, @g0tmi1k fixes verbiage and whitespace
2 parents 2ae9e39 + 127d073 commit 24b4dac

File tree

4 files changed

+8
-9
lines changed

4 files changed

+8
-9
lines changed

lib/msf/core/exploit/http/client.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ def initialize(info = {})
4747
Rex::Proto::Http::Client::DefaultUserAgent
4848
]),
4949
OptString.new('USERNAME', [false, 'The HTTP username to specify for authentication', '']),
50-
OptString.new('PASSWORD', [false, 'The HTTP password to specify for authentication', '']),
50+
OptString.new('PASSWORD', [false, 'The HTTP password to specify for authentication', '']),
5151
OptBool.new('DigestAuthIIS', [false, 'Conform to IIS, should work for most servers. Only set to false for non-IIS servers', true]),
5252
OptBool.new('SSL', [ false, 'Negotiate SSL for outgoing connections', false]),
5353
OptEnum.new('SSLVersion', [ false, 'Specify the version of SSL that should be used', 'Auto', ['Auto', 'SSL2', 'SSL3', 'TLS1']]),

modules/exploits/multi/http/traq_plugin_exec.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,11 @@ def initialize(info={})
1717
This module exploits an arbitrary command execution vulnerability in
1818
Traq 2.0 to 2.3. It's in the admincp/common.php script.
1919
20-
This function is called in each script located into /admicp/ directory to
21-
make sure the user has admin rights, but this is a broken authorization
22-
schema due to the header() function doesn't stop the execution flow. This
23-
can be exploited by malicious users to execute admin functionality resulting
24-
for e.g. in execution of arbitrary PHP code leveraging of plugins.php
25-
functionality.
20+
This function is called in each script located in the /admicp/ directory to
21+
make sure the user has admin rights. This is a broken authorization schema
22+
because the header() function doesn't stop the execution flow.
23+
This can be exploited by malicious users to execute admin functionality,
24+
e.g. execution of arbitrary PHP code leveraging of plugins.php functionality.
2625
},
2726
'License' => MSF_LICENSE,
2827
'Author' =>

modules/exploits/windows/http/xampp_webdav_upload_php.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ def initialize
3535
OptString.new('PATH', [ true, "The path to attempt to upload", '/webdav/']),
3636
OptString.new('FILENAME', [ false , "The filename to give the payload. (Leave Blank for Random)"]),
3737
OptString.new('USERNAME', [false, 'The HTTP username to specify for authentication', 'wampp']),
38-
OptString.new('PASSWORD', [false, 'The HTTP password to specify for authentication', 'xampp'])
38+
OptString.new('PASSWORD', [false, 'The HTTP password to specify for authentication', 'xampp'])
3939
], self.class)
4040
end
4141

modules/exploits/windows/iis/iis_webdav_upload_asp.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ def initialize
4343
# The USERNAME and PASSWORD are registered again to make them more obvious they're
4444
# configurable.
4545
OptString.new('USERNAME', [false, 'The HTTP username to specify for authentication', '']),
46-
OptString.new('PASSWORD', [false, 'The HTTP password to specify for authentication', '']),
46+
OptString.new('PASSWORD', [false, 'The HTTP password to specify for authentication', '']),
4747
OptString.new('PATH', [ true, "The path to attempt to upload", '/metasploit%RAND%.asp'])
4848
], self.class)
4949
end

0 commit comments

Comments
 (0)