Skip to content

Commit 29ad993

Browse files
author
jvazquez-r7
committed
cleanup for stunshell_eval
1 parent 514aed4 commit 29ad993

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

modules/exploits/multi/http/stunshell_eval.rb

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,16 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info={})
1616
super(update_info(info,
17-
'Name' => 'STUNSHELL Web Shell Remote Code Execution(PHP eval)',
17+
'Name' => 'STUNSHELL Web Shell Remote PHP Code Execution',
1818
'Description' => %q{
19-
his module exploits unauthenticated versions of the "STUNSHELL" web shell. This
20-
module works when safe mode is enabled on the web server. This shell is widely
19+
This module exploits unauthenticated versions of the "STUNSHELL" web shell.
20+
This module works when safe mode is enabled on the web server. This shell is widely
2121
used in automated RFI payloads.
2222
},
2323
'License' => MSF_LICENSE,
2424
'Author' =>
2525
[
26-
'bwall <bwall[at]openbwall.com>', # vuln discovery & msf module
26+
'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module
2727
],
2828
'References' =>
2929
[
@@ -35,14 +35,13 @@ module works when safe mode is enabled on the web server. This shell is widely
3535
{
3636
'Keys' => ['php'],
3737
'Space' => 10000,
38-
'DisableNops' => true,
38+
'DisableNops' => true
3939
},
4040
'Platform' => ['php'],
4141
'Arch' => ARCH_PHP,
4242
'Targets' =>
4343
[
44-
['stunshell / Unix', { 'Platform' => 'unix' } ],
45-
['stunshell / Windows', { 'Platform' => 'win' } ]
44+
['stunshell', {}]
4645
],
4746
'DisclosureDate' => 'Mar 23 2013',
4847
'DefaultTarget' => 0))

0 commit comments

Comments
 (0)