Skip to content

Commit 4b7a438

Browse files
committed
Merge pull request rapid7#2587 from todb-r7/release-fixup
Release fixups
2 parents 1fee3ce + 4128aa8 commit 4b7a438

File tree

9 files changed

+24
-31
lines changed

9 files changed

+24
-31
lines changed

modules/auxiliary/admin/mysql/mysql_enum.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ def run
9191
:port => rport,
9292
:user => row[0],
9393
:pass => row[2],
94-
:type => "hash",
94+
:type => "mysql_hash",
9595
:sname => "mysql",
9696
:active => true
9797
})

modules/auxiliary/admin/smb/delete_file.rb

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,14 @@ def initialize
2222
super(
2323
'Name' => 'SMB File Delete Utility',
2424
'Description' => %Q{
25-
This module deletes a file from a target share and path. The only reason
26-
to use this module is if your existing SMB client is not able to support the features
27-
of the Metasploit Framework that you need, like pass-the-hash authentication.
25+
This module deletes a file from a target share and path. The usual reason
26+
to use this module is to work around limitations in an existing SMB client that may not
27+
be able to take advantage of pass-the-hash style authentication.
2828
},
2929
'Author' =>
3030
[
3131
'mubix' # copied from hdm upload_file module
3232
],
33-
'References' =>
34-
[
35-
],
3633
'License' => MSF_LICENSE
3734
)
3835

modules/auxiliary/admin/smb/download_file.rb

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,14 @@ def initialize
2222
super(
2323
'Name' => 'SMB File Download Utility',
2424
'Description' => %Q{
25-
This module downloads a file from a target share and path. The only reason
26-
to use this module is if your existing SMB client is not able to support the features
27-
of the Metasploit Framework that you need, like pass-the-hash authentication.
25+
This module deletes a file from a target share and path. The usual reason
26+
to use this module is to work around limitations in an existing SMB client that may not
27+
be able to take advantage of pass-the-hash style authentication.
2828
},
2929
'Author' =>
3030
[
3131
'mubix' # copied from hdm upload_file module
3232
],
33-
'References' =>
34-
[
35-
],
3633
'License' => MSF_LICENSE
3734
)
3835

modules/auxiliary/dos/http/nodejs_pipelining.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ class Metasploit3 < Msf::Auxiliary
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Node.js HTTP Pipelining DoS',
16+
'Name' => 'Node.js HTTP Pipelining Denial of Service',
1717
'Description' => %q{
18-
This module exploits a DoS in the HTTP parser of Node.js versions
18+
This module exploits a Denial of Service (DoS) condition in the HTTP parser of Node.js versions
1919
released before 0.10.21 and 0.8.26. The attack sends many pipelined
2020
HTTP requests on a single connection, which causes unbounded memory
2121
allocation when the client does not read the responses.

modules/auxiliary/scanner/http/jenkins_enum.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,10 @@ class Metasploit3 < Msf::Auxiliary
1919

2020
def initialize(info = {})
2121
super(update_info(info,
22-
'Name' => 'Jenkins Vulnerability Scanner',
22+
'Name' => 'Jenkins Enumeration',
2323
'Description' => %q{
24-
This module scans a Jenkins installation for a few vulnerabilities.
24+
This module enumerates a remote Jenkins installation in an unauthenticated manner, including
25+
host operating system and and Jenkins installation details.
2526
},
2627
'Author' => 'Jeff McCutchan',
2728
'License' => MSF_LICENSE

modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def initialize(info = {})
1616
super(update_info(info,
1717
'Name' => 'D-Link DIR-605L Captcha Handling Buffer Overflow',
1818
'Description' => %q{
19-
This module exploits an anonymous remote code execution on D-Link DIR-605L routers. The
19+
This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
2020
vulnerability exists while handling user supplied captcha information, and is due to the
2121
insecure usage of sprintf on the getAuthCode() function. This module has been tested
2222
successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.

modules/exploits/osx/local/persistence.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ def initialize(info={})
1919
super( update_info( info,
2020
'Name' => 'Mac OS X Persistent Payload Installer',
2121
'Description' => %q{
22-
This module provides a persistence boot payload by creating a plist entry
22+
This module provides a persistent boot payload by creating a plist entry
2323
in current user's ~/Library/LaunchAgents directory. Whenever the user logs in,
24-
the LaunchAgent will be invoked and our dropped payload will run.
24+
the LaunchAgent will be invoked and this dropped payload will run.
2525
},
2626
'License' => MSF_LICENSE,
2727
'Author' => [ "Marcin 'Icewall' Noga <marcin[at]icewall.pl>", "joev" ],

modules/exploits/windows/emc/replication_manager_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def initialize(info = {})
1717
'Description' => %q{
1818
This module exploits a remote command-injection vulnerability in EMC Replication Manager
1919
client (irccd.exe). By sending a specially crafted message invoking RunProgram function an
20-
attacker may be able to execute arbitrary code commands with SYSTEM privileges. Affected
20+
attacker may be able to execute arbitrary commands with SYSTEM privileges. Affected
2121
products are EMC Replication Manager < 5.3. This module has been successfully tested
2222
against EMC Replication Manager 5.2.1 on XP/W2003. EMC Networker Module for Microsoft
2323
Applications 2.1 and 2.2 may be vulnerable too although this module have not been tested

modules/post/windows/gather/credentials/sso.rb

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
##
2-
# This file is part of the Metasploit Framework and may be subject to
3-
# redistribution and commercial restrictions. Please see the Metasploit
4-
# web site for more information on licensing and terms of use.
5-
# http://metasploit.com/
2+
# This module requires Metasploit: http//metasploit.com/download
3+
# Current source: https://github.com/rapid7/metasploit-framework
64
##
75

86
require 'msf/core'
@@ -15,16 +13,16 @@ class Metasploit3 < Msf::Post
1513

1614
def initialize(info={})
1715
super( update_info(info,
18-
'Name' => 'Windows Single Sign On Credential Collector (Mimikatz)',
19-
'Description' => %q{
16+
'Name' => 'Windows Single Sign On Credential Collector (Mimikatz)',
17+
'Description' => %q{
2018
This module will collect cleartext Single Sign On credentials from the Local
2119
Security Authority using the Mimikatz extension. Blank passwords will not be stored
2220
in the database.
2321
},
24-
'License' => MSF_LICENSE,
25-
'Author' => ['Ben Campbell <eat_meatballs[at]hotmail.co.uk>'],
26-
'Platform' => ['win'],
27-
'SessionTypes' => ['meterpreter' ]
22+
'License' => MSF_LICENSE,
23+
'Author' => ['Ben Campbell <eat_meatballs[at]hotmail.co.uk>'],
24+
'Platform' => ['win'],
25+
'SessionTypes' => ['meterpreter' ]
2826
))
2927
end
3028

0 commit comments

Comments
 (0)