Skip to content

Commit 579d6c7

Browse files
committed
Land rapid7#3196, release fixes
2 parents 0c88372 + 7572d66 commit 579d6c7

File tree

5 files changed

+12
-10
lines changed

5 files changed

+12
-10
lines changed

modules/auxiliary/gather/alienvault_iso27001_sqli.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def initialize(info={})
1515
'Description' => %q{
1616
AlienVault 4.5.0 is susceptible to an authenticated SQL injection attack via a PNG
1717
generation PHP file. This module exploits this to read an arbitrary file from
18-
the file system. Any authenticated user should be able to exploit it. Administration
18+
the file system. Any authenticated user is able to exploit it, as administrator
1919
privileges aren't required.
2020
},
2121
'License' => MSF_LICENSE,

modules/auxiliary/scanner/http/oracle_demantra_file_retrieval.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,11 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Oracle Demantra Arbitrary File Retrieval with Authentication Bypass',
1717
'Description' => %q{
18-
This module exploits a file downlad vulnerability found in Oracle Demantra 12.2.1 in
19-
combination with an authentication bypass. This way an unauthenticated user can retreive
20-
any file on the system by referencing the full file path to any file a vulnerable machine.
18+
This module exploits a file downlad vulnerability found in Oracle
19+
Demantra 12.2.1 in combination with an authentication bypass. By
20+
combining these exposures, an unauthenticated user can retreive any file
21+
on the system by referencing the full file path to any file a vulnerable
22+
machine.
2123
},
2224
'References' =>
2325
[

modules/encoders/generic/eicar.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,8 @@ def initialize
1616
super(
1717
'Name' => 'The EICAR Encoder',
1818
'Description' => %q{
19-
This encoder merely tacks the EICAR test string to the beginning of
20-
the payload. Note, this is sure to ruin your payload.
19+
This encoder merely replaces the given payload with the EICAR test string.
20+
Note, this is sure to ruin your payload.
2121
2222
Any content-aware firewall, proxy, IDS, or IPS that follows anti-virus
2323
standards should alert and do what it would normally do when malware is

modules/exploits/linux/http/linksys_themoon_exec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ def initialize(info = {})
1616
'Name' => 'Linksys E-Series TheMoon Remote Command Injection',
1717
'Description' => %q{
1818
Some Linksys E-Series Routers are vulnerable to an unauthenticated OS command
19-
injection. This vulnerability was used from the so called "TheMoon" worm. There
20-
are many Linksys systems that might be vulnerable including E4200, E3200, E3000,
21-
E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900. This module was tested
19+
injection. This vulnerability was used from the so-called "TheMoon" worm. There
20+
are many Linksys systems that are potentially vulnerable, including E4200, E3200, E3000,
21+
E2500, E2100L, E2000, E1550, E1500, E1200, E1000, and E900. This module was tested
2222
successfully against an E1500 v1.0.5.
2323
},
2424
'Author' =>

modules/exploits/windows/fileformat/winrar_name_spoofing.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def initialize(info = {})
2020
when opening ZIP files. The file names showed in WinRAR when opening a ZIP file come from
2121
the central directory, but the file names used to extract and open contents come from the
2222
Local File Header. This inconsistency allows to spoof file names when opening ZIP files
23-
with WiRAR, which can be abused to execute arbitrary code, like exploited in the wild in
23+
with WinRAR, which can be abused to execute arbitrary code, as exploited in the wild in
2424
March 2014
2525
},
2626
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)