Skip to content

Commit 5709d49

Browse files
committed
Clean up traq_plugin_exec
1 parent 72794e4 commit 5709d49

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

modules/exploits/multi/http/traq_plugin_exec.rb

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,11 @@ def initialize(info={})
1717
This module exploits an arbitrary command execution vulnerability in
1818
Traq 2.0 to 2.3. It's in the admincp/common.php script.
1919
20-
This function is called in each script located into /admicp/ directory to
20+
This function is called in each script located in the /admicp/ directory to
2121
make sure the user has admin rights, but this is a broken authorization
22-
schema due to the header() function doesn't stop the execution flow. This
23-
can be exploited by malicious users to execute admin functionality resulting
24-
for e.g. in execution of arbitrary PHP code leveraging of plugins.php
25-
functionality.
22+
schema due to the header() function doesn't stop the execution flow.
23+
This can be exploited by malicious users to execute admin functionality.
24+
e.g. execution of arbitrary PHP code leveraging of plugins.php functionality.
2625
},
2726
'License' => MSF_LICENSE,
2827
'Author' =>

0 commit comments

Comments
 (0)