Skip to content

Commit 296a51f

Browse files
committed
Land rapid7#3917 - Description & module title update
2 parents 10dc6ed + 5ea968f commit 296a51f

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

modules/auxiliary/scanner/http/apache_mod_cgi_bash_env.rb

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ class Metasploit4 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Apache mod_cgi Bash Environment Variable Code Injection',
16+
'Name' => 'Apache mod_cgi Bash Environment Variable RCE Scanner',
1717
'Description' => %q{
1818
This module exploits a code injection in specially crafted environment
1919
variables in Bash, specifically targeting Apache mod_cgi scripts through
@@ -22,6 +22,10 @@ def initialize(info = {})
2222
PROTIP: Use exploit/multi/handler with a PAYLOAD appropriate to your
2323
CMD, set ExitOnSession false, run -j, and then run this module to create
2424
sessions on vulnerable hosts.
25+
26+
Note that this is not the recommended method for obtaining shells.
27+
If you require sessions, please use the apache_mod_cgi_bash_env_exec
28+
exploit module instead.
2529
},
2630
'Author' => [
2731
'Stephane Chazelas', # Vulnerability discovery

0 commit comments

Comments
 (0)