Skip to content

Commit 386a191

Browse files
committed
Land rapid7#4201, release fixes
2 parents 651beb9 + e2dc862 commit 386a191

File tree

8 files changed

+13
-13
lines changed

8 files changed

+13
-13
lines changed

modules/auxiliary/admin/http/manageengine_pmp_privesc.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
ManageEngine Password Manager Pro (PMP) has an authenticated blind SQL injection
1818
vulnerability in SQLAdvancedALSearchResult.cc that can be abused to escalate
1919
privileges and obtain Super Administrator access. A Super Administrator can then
20-
use its privileges to dump the whole password database in CSV format. PMP can use
20+
use his privileges to dump the whole password database in CSV format. PMP can use
2121
both MySQL and PostgreSQL databases but this module only exploits the latter as
2222
MySQL does not support stacked queries with Java. PostgreSQL is the default database
2323
in v6.8 and above, but older PMP versions can be upgraded and continue using MySQL,

modules/auxiliary/admin/mssql/mssql_enum_sql_logins.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ def initialize(info = {})
1818
Selecting all of the logins from the master..syslogins table is restricted to sysadmins.
1919
However, logins with the PUBLIC role (everyone) can quickly enumerate all SQL Server
2020
logins using the SUSER_SNAME function by fuzzing the principal_id parameter. This is
21-
pretty simple, because the principal ids assigned to logins are incremental. Once logins
21+
pretty simple, because the principal IDs assigned to logins are incremental. Once logins
2222
have been enumerated they can be verified via sp_defaultdb error analysis. This is
23-
important, because not all of the principal ids resolve to SQL logins. Some resolve to
24-
roles etc. Once logins have been enumerated they can be used in dictionary attacks.
23+
important, because not all of the principal IDs resolve to SQL logins (some resolve to
24+
roles instead). Once logins have been enumerated, they can be used in dictionary attacks.
2525
},
2626
'Author' => ['nullbind <scott.sutherland[at]netspi.com>'],
2727
'License' => MSF_LICENSE,

modules/auxiliary/admin/mssql/mssql_escalate_execute_as.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info = {})
1515
'Name' => 'Microsoft SQL Server - Escalate EXECUTE AS',
1616
'Description' => %q{
1717
This module can be used escalate privileges if the IMPERSONATION privilege has been
18-
assigned to the user. In most cases this results in additional data access, but in
18+
assigned to the user. In most cases, this results in additional data access, but in
1919
some cases it can be used to gain sysadmin privileges.
2020
},
2121
'Author' => ['nullbind <scott.sutherland[at]netspi.com>'],

modules/auxiliary/admin/mssql/mssql_escalate_execute_as_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
'Name' => 'Microsoft SQL Server - SQLi Escalate Execute As',
1717
'Description' => %q{
1818
This module can be used escalate privileges if the IMPERSONATION privilege has been
19-
assigned to the user via error based SQL injection. In most cases this results in
19+
assigned to the user via error based SQL injection. In most cases, this results in
2020
additional data access, but in some cases it can be used to gain sysadmin privileges.
2121
The syntax for injection URLs is: /testing.asp?id=1+and+1=[SQLi];--
2222
},

modules/auxiliary/gather/eventlog_cred_disclosure.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ def initialize(info = {})
1919
allow an unauthenticated user to obtain the superuser password of any managed Windows and
2020
AS/400 hosts. This module abuses both vulnerabilities to collect all the available
2121
usernames and passwords. First the agentHandler servlet is abused to get the hostid and
22-
slid of each device (CVE-2014-6038); then these numeric id's are used to extract usernames
23-
and passwords by abusing the hostdetails servlet (CVE-2014-6039). Note that on version 7
22+
slid of each device (CVE-2014-6038); then these numeric IDs are used to extract usernames
23+
and passwords by abusing the hostdetails servlet (CVE-2014-6039). Note that on version 7,
2424
the TARGETURI has to be prepended with /event.
2525
},
2626
'Author' =>

modules/exploits/multi/http/visual_mining_netcharts_upload.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ def initialize(info = {})
2323
First, a lack of input validation in the administration console permits
2424
arbitrary jsp code upload to locations accessible later through the web
2525
service. Authentication is typically required, however a 'hidden' user is
26-
available by default (and non editable). This user, named 'Scheduler',
26+
available by default (and non-editable). This user, named 'Scheduler',
2727
can only login to the console after any modification in the user
2828
database (a user is added, admin password is changed etc). If the
2929
'Scheduler' user isn't available valid credentials must be supplied. The

modules/exploits/windows/fileformat/ms14_064_packager_python.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ def initialize(info={})
2020
publicly known as "Sandworm", on systems with Python for Windows installed. Windows Vista
2121
SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable.
2222
However, based on our testing, the most reliable setup is on Windows platforms running
23-
Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as
24-
using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a
23+
Office 2013 and Office 2010 SP2. Please keep in mind that some other setups such as
24+
those using Office 2010 SP1 may be less stable, and may end up with a crash due to a
2525
failure in the CPackage::CreateTempFileName function.
2626
},
2727
'License' => MSF_LICENSE,

modules/exploits/windows/fileformat/ms14_064_packager_run_as_admin.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ def initialize(info={})
2020
The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms
2121
such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known
2222
to be vulnerable. However, based on our testing, the most reliable setup is on Windows
23-
platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other
24-
setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a
23+
platforms running Office 2013 and Office 2010 SP2. Please keep in mind that some other
24+
setups such as using Office 2010 SP1 might be less stable, and may end up with a
2525
crash due to a failure in the CPackage::CreateTempFileName function.
2626
},
2727
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)