File tree Expand file tree Collapse file tree 1 file changed +4
-5
lines changed
modules/exploits/multi/http Expand file tree Collapse file tree 1 file changed +4
-5
lines changed Original file line number Diff line number Diff line change @@ -17,12 +17,11 @@ def initialize(info={})
17
17
This module exploits an arbitrary command execution vulnerability in
18
18
Traq 2.0 to 2.3. It's in the admincp/common.php script.
19
19
20
- This function is called in each script located into /admicp/ directory to
20
+ This function is called in each script located in the /admicp/ directory to
21
21
make sure the user has admin rights, but this is a broken authorization
22
- schema due to the header() function doesn't stop the execution flow. This
23
- can be exploited by malicious users to execute admin functionality resulting
24
- for e.g. in execution of arbitrary PHP code leveraging of plugins.php
25
- functionality.
22
+ schema due to the header() function doesn't stop the execution flow.
23
+ This can be exploited by malicious users to execute admin functionality.
24
+ e.g. execution of arbitrary PHP code leveraging of plugins.php functionality.
26
25
} ,
27
26
'License' => MSF_LICENSE ,
28
27
'Author' =>
You can’t perform that action at this time.
0 commit comments