Skip to content

Commit 579d012

Browse files
committed
spelling
1 parent b7f7afb commit 579d012

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/unix/http/pfsense_group_member_exec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ def initialize(info = {})
1717
pfSense, a free BSD based open source firewall distribution,
1818
version <= 2.3.1_1 contains a remote command execution
1919
vulnerability post authentication in the system_groupmanager.php page.
20+
Verified against 2.2.6 and 2.3.
2021
),
2122
'Author' =>
2223
[
@@ -111,7 +112,7 @@ def detect_version(cookie)
111112
print_status("pfSense Version Detected: #{version}")
112113
return Gem::Version.new(version)
113114
end
114-
# If the device isn't fully setup, you get stuck at redirects to wizar.php
115+
# If the device isn't fully setup, you get stuck at redirects to wizard.php
115116
# however, this does NOT stop exploitation strangely
116117
print_error("pfSens Version Not Detected or wizard still enabled.")
117118
Gem::Version.new('0.0')

0 commit comments

Comments
 (0)