Skip to content

Commit 2f788c2

Browse files
author
Tod Beardsley
committed
Fix description
1 parent ca63fe9 commit 2f788c2

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

modules/auxiliary/admin/http/bash_env.rb

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,15 @@ class Metasploit4 < Msf::Auxiliary
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack (PoC)',
14+
'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack',
1515
'Description' => %q{
16-
This module exploits a vulnerability.
16+
This module exploits a remote command injection vulnerability in bash,
17+
a popular shell environment, over an HTTP CGI vector. By passing a specially-crafted
18+
string that is set as an environment variable, attckers may execute arbitrary operating
19+
system commands.
20+
21+
For this version of the exploit, the target must already have netcat (nc) compiled with the
22+
-e option.
1723
},
1824
'Author' => ['wvu'],
1925
'References' => [

0 commit comments

Comments
 (0)