File tree Expand file tree Collapse file tree 1 file changed +8
-2
lines changed
modules/auxiliary/admin/http Expand file tree Collapse file tree 1 file changed +8
-2
lines changed Original file line number Diff line number Diff line change @@ -11,9 +11,15 @@ class Metasploit4 < Msf::Auxiliary
11
11
12
12
def initialize ( info = { } )
13
13
super ( update_info ( info ,
14
- 'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack (PoC) ' ,
14
+ 'Name' => 'Bash Specially-Crafted Environment Variables Code Injection Attack' ,
15
15
'Description' => %q{
16
- This module exploits a vulnerability.
16
+ This module exploits a remote command injection vulnerability in bash,
17
+ a popular shell environment, over an HTTP CGI vector. By passing a specially-crafted
18
+ string that is set as an environment variable, attckers may execute arbitrary operating
19
+ system commands.
20
+
21
+ For this version of the exploit, the target must already have netcat (nc) compiled with the
22
+ -e option.
17
23
} ,
18
24
'Author' => [ 'wvu' ] ,
19
25
'References' => [
You can’t perform that action at this time.
0 commit comments