File tree Expand file tree Collapse file tree 1 file changed +6
-7
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +6
-7
lines changed Original file line number Diff line number Diff line change @@ -14,16 +14,16 @@ class Metasploit3 < Msf::Exploit::Remote
14
14
15
15
def initialize ( info = { } )
16
16
super ( update_info ( info ,
17
- 'Name' => 'STUNSHELL Web Shell Remote Code Execution(PHP eval) ' ,
17
+ 'Name' => 'STUNSHELL Web Shell Remote PHP Code Execution' ,
18
18
'Description' => %q{
19
- his module exploits unauthenticated versions of the "STUNSHELL" web shell. This
20
- module works when safe mode is enabled on the web server. This shell is widely
19
+ This module exploits unauthenticated versions of the "STUNSHELL" web shell.
20
+ This module works when safe mode is enabled on the web server. This shell is widely
21
21
used in automated RFI payloads.
22
22
} ,
23
23
'License' => MSF_LICENSE ,
24
24
'Author' =>
25
25
[
26
- 'bwall <bwall[at]openbwall.com>' , # vuln discovery & msf module
26
+ 'bwall <bwall[at]openbwall.com>' # vuln discovery & msf module
27
27
] ,
28
28
'References' =>
29
29
[
@@ -35,14 +35,13 @@ module works when safe mode is enabled on the web server. This shell is widely
35
35
{
36
36
'Keys' => [ 'php' ] ,
37
37
'Space' => 10000 ,
38
- 'DisableNops' => true ,
38
+ 'DisableNops' => true
39
39
} ,
40
40
'Platform' => [ 'php' ] ,
41
41
'Arch' => ARCH_PHP ,
42
42
'Targets' =>
43
43
[
44
- [ 'stunshell / Unix' , { 'Platform' => 'unix' } ] ,
45
- [ 'stunshell / Windows' , { 'Platform' => 'win' } ]
44
+ [ 'stunshell' , { } ]
46
45
] ,
47
46
'DisclosureDate' => 'Mar 23 2013' ,
48
47
'DefaultTarget' => 0 ) )
You can’t perform that action at this time.
0 commit comments